


Остановите войну!
for scientists:


default search action
Dan Chia-Tien Lo
Chia-Tien Dan Lo – Dan Lo 0001 – Dan C. Lo – C. Dan Lo
Person information

- affiliation: Kennesaw State University, Marietta, GA, USA
- affiliation (former): Southern Polytechnic State University, Marietta, GA, USA
- affiliation (2002 - 2008): University of Texas-San Antonio, TX, USA
- affiliation (PhD 2001): Illinois Institute of Technology, Chicago, IL, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c104]Tarun Potluri, Yong Shi, Hossain Shahriar, Dan Chia-Tien Lo, Reza M. Parizi, Hongmei Chi, Kai Qian:
Secure Software Development in Google Colab. AIIoT 2023: 398-402 - [c103]Dhanunjai Bandi, Yong Shi, Hossain Shahriar, Dan C. Lo, Kun Suo, Hongmei Chi, Kai Qian:
Quantum Machine Learning for Security Data Analysis. AIIoT 2023: 460-465 - [c102]Yong Shi, Nazmus Sakib, Hossain Shahriar, Dan Lo, Hongmei Chi, Kai Qian:
AI-Assisted Security: A Step towards Reimagining Software Development for a Safer Future. COMPSAC 2023: 991-992 - [c101]Mst. Shapna Akter, Hossain Shahriar, Dan Lo, Nazmus Sakib, Kai Qian, Michael E. Whitman, Fan Wu:
Authentic Learning Approach for Artificial Intelligence Systems Security and Privacy. COMPSAC 2023: 1010-1012 - [c100]Dan C. Lo
, Hossain Shahriar
, Kai Qian
, Michael E. Whitman
, Fan Wu
, Cassandra Thomas
:
Authentic Learning on Machine Learning for Cybersecurity. SIGCSE (2) 2023: 1299 - [c99]Yong Shi, Hossain Shahriar, Dan C. Lo, Kai Qian, Hongmei Chi:
Collaborative and Active Learning with Portable Online Hands-on Labware for Blockchain Development. SIGCSE (2) 2023: 1307 - 2022
- [c98]Md. Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Michael E. Whitman, Alfredo Cuzzocrea, Fan Wu, Victor Clincy:
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware: Neural Network Algorithms for Network Denial of Service (DOS) Detection. IEEE Big Data 2022: 5715-5720 - [c97]Mohammad Masum, Md. Jobair Hossain Faruk
, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan:
Ransomware Classification and Detection With Machine Learning Algorithms. CCWC 2022: 316-322 - [c96]Chunlan Gao, Yanqing Zhang, Dan Lo, Yong Shi, Jian Huang:
Improving the Machine Learning Prediction Accuracy with Clustering Discretization. CCWC 2022: 513-517 - [c95]Chulan Gao, Hossain Shahriar, Dan Lo, Yong Shi, Kai Qian:
Improving the Prediction Accuracy with Feature Selection for Ransomware Detection. COMPSAC 2022: 424-425 - [c94]Dan Chia-Tien Lo, Kai Qian, Yong Shi, Hossain Shahriar, Chung Ng:
Broaden Multidisciplinary Data Science Research by an Innovative Cyberinfrastructure Platform. COMPSAC 2022: 428-429 - [c93]Md. Jobair Hossain Faruk
, Mohammad Masum, Hossain Shahriar, Kai Qian, Dan Lo:
Authentic Learning of Machine Learning to Ransomware Detection and Prevention. COMPSAC 2022: 442-443 - [c92]Mohammad Masum, Hossain Shahriar, Nazmus Sakib, Maria Valero, Kai Qian, Dan Lo, Fan Wu, Mohammed Karim, Parth Bhavsar, Jidong Yang:
Scalable Machine Learning Using PySpark. COMPSAC 2022: 454-455 - [c91]Dan Chia-Tien Lo, Hossain Shahriar, Kai Qian, Michael E. Whitman, Fan Wu, Cassandra Thomas:
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware. SIGCSE (2) 2022: 1153 - [c90]Dan Chia-Tien Lo, Brian Robert Lawler:
Enhance Capacity to Foster Secondary Computer Science Teachers in Multiple Pathways. SIGCSE (2) 2022: 1157 - [i2]Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha, Shahriar Sobhan, Md Abdullah Khan, Michael E. Whitman, Alfredo Cuzzocrea, Dan Chia-Tien Lo, Akond Rahman
, Fan Wu:
Malware Detection and Prevention using Artificial Intelligence Techniques. CoRR abs/2206.12770 (2022) - [i1]Mohammad Masum, Md. Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan C. Lo, Muhaiminul Islam Adnan:
Ransomware Classification and Detection With Machine Learning Algorithms. CoRR abs/2207.00894 (2022) - 2021
- [c89]Dan Chia-Tien Lo, Brian Robert Lawler:
A study on students' views toward K-12 computer science teaching career. ACM Southeast Conference 2021: 190-193 - [c88]Dan C. Lo, Hossain Shahriar, Kai Qian, Michael E. Whitman, Fan Wu:
Colab Cloud Based Portable and Shareable Hands-on Labware for Machine Learning to Cybersecurity. IEEE BigData 2021: 3311-3315 - [c87]Md. Jobair Hossain Faruk
, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha
, Shahriar Sobhan, Md Abdullah Khan, Michael E. Whitman, Alfredo Cuzzocrea, Dan C. Lo, Akond Rahman
, Fan Wu:
Malware Detection and Prevention using Artificial Intelligence Techniques. IEEE BigData 2021: 5369-5377 - 2020
- [c86]Nusrat Asrafi, Dan Chia-Tien Lo, Reza M. Parizi, Yong Shi, Yu-Wen Chen:
Comparing Performance of Malware Classification on Automated Stacking. ACM Southeast Regional Conference 2020: 307-308 - [c85]Karl Kevin Tiba Fossoh, Dan Lo:
Graphical Representation of Text Semantics. ACM Southeast Regional Conference 2020: 318-319 - [c84]Ava Podrazhansky, Rebekah Roepke, Jennifer Nguyen, Dan Lo:
Utilizing Computer Vision, Clustering and Neural Networks for Melanoma Categorization. ACM Southeast Regional Conference 2020: 322-323 - [c83]Songqiao Yu, Dan Lo:
Disinformation Detection using Passive Aggressive Algorithms. ACM Southeast Regional Conference 2020: 324-325 - [c82]Zhuolin Li, Hao Zhang, Hossain Shahriar
, Dan Lo, Kai Qian, Michael E. Whitman, Fan Wu:
Denial of Service (DoS) Attack Detection: Performance Comparison of Supervised Machine Learning Algorithms. DASC/PiCom/CBDCom/CyberSciTech 2020: 469-474 - [c81]Hossain Shahriar
, Michael E. Whitman, Dan Lo, Fan Wu, Cassandra Thomas:
Case Study-based Portable Hands-on Labware for Machine Learning in Cybersecurity. SIGCSE 2020: 1273 - [c80]Dan C. Lo, Kai Qian, Hossain Shahriar
, Fan Wu, Johng-Chern Chern, Pascal Paschos, Chung Ng:
Information Assurance and Security Education on Undergraduate Computing Degree Programs. SIGCSE 2020: 1274 - [c79]Dan Chia-Tien Lo, Ruth Bearden, Deepa Muralidhar, Hossain Shahriar
, Wei Chen, Pascal Paschos, Chung Ng:
A Hands-On Lab for Macro Malware Detection using Machine Learning on Virtual Machines. SIGCSE 2020: 1275 - [e2]J. Morris Chang, Dan Lo, Eric Gamess:
Proceedings of the 2020 ACM Southeast Conference, ACM SE '20, Tampa, FL, USA, April 2-4, 2020. ACM 2020, ISBN 978-1-4503-7105-6 [contents]
2010 – 2019
- 2019
- [c78]Dan Chia-Tien Lo, Charles Garnder, Pascal Paschos, Chung Ng:
Subject-Oriented Data Retrieval and Analysis on Sina Weibo. IEEE BigData 2019: 4431-4434 - [c77]Hossain Shahriar
, Miahcel Whitman, Dan Chia-Tien Lo, Fan Wu, Cassandra Thomas, Alfredo Cuzzocrea:
Experiential Learning: Case Study-Based Portable Hands-on Regression Labware for Cyber Fraud Prediction. IEEE BigData 2019: 5814-5818 - [c76]Zhengwu Sun, Dan Chia-Tien Lo, Yong Shi:
Big Data Analysis on Social Networking. IEEE BigData 2019: 6220-6222 - [c75]Dan Lo, Karl Kevin Tiba, Sergiu Buciumas, Frank Ziller:
An Emperical Study on Application of Big Data Analytics to Automate Service Desk Business Process. COMPSAC (2) 2019: 670-675 - [c74]Hao Zhang, Zhuolin Li, Hossain Shahriar
, Dan Lo, Fan Wu, Ying Qian:
Protecting Data in Android External Data Storage. COMPSAC (1) 2019: 924-925 - [e1]Dan Lo, Donghyun Kim, Eric Gamess:
Proceedings of the 2019 ACM Southeast Conference, ACM SE '19, Kennesaw, GA, USA, April 18-20, 2019. ACM 2019, ISBN 978-1-4503-6251-1 [contents] - 2018
- [c73]Xianyong Meng, Kai Qian, Dan Chia-Tien Lo, Hossain Shahriar
, Md Arabin Islam Talukder
, Prabir Bhattacharya:
Secure Mobile IPC Software Development with Vulnerability Detectors in Android Studio. COMPSAC (1) 2018: 829-830 - [c72]Kai Qian, Reza M. Parizi, Dan Chia-Tien Lo:
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development. DSC 2018: 1-2 - [c71]Kai Qian, Dan Chia-Tien Lo, Reza M. Parizi, Fan Wu, Emmanuel Agu, Bei-Tseng Chu:
Authentic Learning Secure Software Development (SSD) in Computing Education. FIE 2018: 1-9 - [c70]Xianyong Meng, Kai Qian, Dan Chia-Tien Lo, Prabir Bhattacharya:
Detectors for Intent ICC Security Vulnerability with Android IDE. ICUFN 2018: 355-357 - [c69]Xianyong Meng, Kai Qian, Dan Chia-Tien Lo, Prabir Bhattacharya, Fan Wu:
Secure Mobile Software Development with Vulnerability Detectors in Static Code Analysis. ISNCC 2018: 1-4 - [c68]Hossain Shahriar
, Kai Qian, Md Arabin Islam Talukder
, Dan Chia-Tien Lo, Nidhibahen Patel:
Mobile Software Security with Dynamic Analysis. PRDC 2018: 223-224 - 2017
- [j18]Liang Hong, Wei Chen, Sachin Shetty, Dan Chia-Tien Lo, Reginald Cooper:
Strong Security Approach with Compromised Nodes Detection in Cognitive Radio Sensor Networks. Int. J. Netw. Comput. 7(1): 50-68 (2017) - [c67]Joel Kamdem Teto, Ruth Bearden, Dan Chia-Tien Lo:
The Impact of Defensive Programming on I/O Cybersecurity Attacks. ACM Southeast Regional Conference 2017: 102-111 - [c66]Michael Kranzlein, Dan Chia-Tien Lo:
Training on the poles for review sentiment polarity classification. IEEE BigData 2017: 3934-3937 - [c65]Ruth Bearden, Dan Chia-Tien Lo:
Automated microsoft office macro malware detection using machine learning. IEEE BigData 2017: 4448-4452 - [c64]Jhu-Sin Luo, Dan Chia-Tien Lo:
Binary malware image classification using machine learning with local binary pattern. IEEE BigData 2017: 4664-4667 - [c63]Kai Qian, Dan Chia-Tien Lo, Hossain Shahriar
, Lei Li, Fan Wu, Prabir Bhattacharya:
Learning database security with hands-on mobile labs. FIE 2017: 1-6 - 2016
- [c62]Carlos Cepeda, Dan Chia-Tien Lo, Pablo Ordóñez:
Feature Selection and Improving Classification Performance for Malware Detection. BDCloud-SocialCom-SustainCom 2016: 560-566 - [c61]Chia-Tien Dan Lo, Pablo Ordóñez, Carlos Cepeda Mora:
Towards an effective and efficient malware detection system. IEEE BigData 2016: 3648-3655 - [c60]Tianda Yang, Kai Qian, Dan Chia-Tien Lo, Ying Xie, Yong Shi, Lixin Tao:
Improve the Prediction Accuracy of Naïve Bayes Classifier with Association Rule Mining. BigDataSecurity/HPSC/IDS 2016: 129-133 - [c59]Yong Shi, Dan Chia-Tien Lo, Kai Qian:
Teaching Secure Cloud Computing Concepts with Open Source CloudSim Environment. COMPSAC Workshops 2016: 247-252 - [c58]Dan Chia-Tien Lo, Kai Qian, Wei Chen:
Hardware Attacks and Security Education. COMPSAC Workshops 2016: 253-257 - [c57]Christopher Francis-Christie, Dan Lo:
A Combination of Active and Passive Video Steganalysis to Fight Sensitive Data Exfiltration through Online Video. COMPSAC Workshops 2016: 371-376 - [c56]Jing He, Dan Chia-Tien Lo, Ying Xie, Jonathan W. Lartigue:
Integrating Internet of Things (IoT) into STEM undergraduate education: Case study of a modern technology infused courseware for embedded system course. FIE 2016: 1-9 - [c55]Wei Chen, Liang Hong, Sachin Shetty
, Dan Chia-Tien Lo, Reginald Cooper:
Cross-Layered Security Approach with Compromised Nodes Detection in Cooperative Sensor Networks. IPDPS Workshops 2016: 499-508 - [c54]Kai Qian, Dan Lo, Wei Chen, Ying Qian:
Promote Self-efficacy in Learning of Mobile App and Security with real-world Relevant Laboratory (Abstract Only). SIGCSE 2016: 691 - [c53]Tianda Yang, Kai Qian, Lei Li, Dan Chia-Tien Lo, Lixin Tao:
Static Mining and Dynamic Taint for Mobile Security Threats Analysis. SmartCloud 2016: 234-240 - 2015
- [c52]Wanqing You, Kai Qian, Chia-Tien Dan Lo, Prabir Bhattacharya, Minzhe Guo, Ying Qian:
Web Service-Enabled Spam Filtering with Naïve Bayes Classification. BigDataService 2015: 99-104 - [c51]Amir Atabekov, Marcel Starosielsky, Dan Chia-Tien Lo, Jing (Selena) He:
Internet of Things-Based Temperature Tracking System. COMPSAC Workshops 2015: 493-498 - [c50]Chia-Tien Dan Lo, Kai Qian, Wei Chen, Tamara Rogers, Kuosheng Ma:
Learning Hands-on Information Assurance and Security on Mobile Devices. COMPSAC 2015: 874-879 - [c49]Dan Chia-Tien Lo, Kai Qian, Wei Chen:
Mobile security education on portable labs. FIE 2015: 1-4 - [c48]Teng Zhao, Dan Chia-Tien Lo, Kai Qian:
A Neural-Network Based DDoS Detection System Using Hadoop and HBase. HPCC/CSS/ICESS 2015: 1326-1331 - [c47]Tianda Yang, Yu Yang, Kai Qian, Dan Chia-Tien Lo, Ying Qian, Lixin Tao:
Automated Detection and Analysis for Android Ransomware. HPCC/CSS/ICESS 2015: 1338-1343 - [c46]Chia-Tien Dan Lo, Kai Qian, Wei Chen, Tamara Rogers:
A Low Cost, Portable Platform for Information Assurance and Security Education. ICALT 2015: 111-113 - 2014
- [c45]Chia-Tien Dan Lo, Kai Qian, Victor Clincy, Hossain Shahriar
, Wei Chen:
Labware for networking protocols and wireless security using Android-enabled mobile devices. ACM Southeast Regional Conference 2014: 13:1-13:6 - [c44]Chia-Tien Dan Lo, Kai Qian, Kuosheng Ma:
A multidisciplinary project for undergraduate summer research in computer systems. ACM Southeast Regional Conference 2014: 32:1-32:2 - [c43]Dan Chia-Tien Lo, Kai Qian, Wei Chen, Hossain Shahriar
, Victor Clincy:
Authentic learning in network and security with portable labs. FIE 2014: 1-5 - [c42]Minzhe Guo, Prabir Bhattacharya, Kai Qian, Chia-Tien Dan Lo, Xi He:
Enhancing the information assurance and security (IAS) in CS education with mobile-device based hands-on labs. ITiCSE 2014: 343 - 2013
- [j17]Yi-Gang Tai, Chia-Tien Dan Lo, Kleanthis Psarris:
Scalable matrix decompositions with multiple cores on FPGAs. Microprocess. Microsystems 37(8-B): 887-898 (2013) - [j16]Luna Mingyi Zhang, Keqin Li, Dan Chia-Tien Lo, Yanqing Zhang:
Energy-efficient task scheduling algorithms on heterogeneous computers with continuous and discrete speeds. Sustain. Comput. Informatics Syst. 3(2): 109-118 (2013) - [c41]Minzhe Guo, Kai Qian, Ming Yang, Chia-Tien Dan Lo, Kuosheng Ma, Liang Hong, Li Yang:
Android-Based Mobile Sensory System Labware for Embedded System Education. ICALT 2013: 118-119 - [c40]Chia-Tien Dan Lo, Orlando Karam:
Enhance Capstone Projects with a New Online Collaboration System. ICALT 2013: 217-218 - 2012
- [j15]Yi-Gang Tai, Chia-Tien Dan Lo, Kleanthis Psarris:
Accelerating Matrix Operations with Improved Deeply Pipelined Vector Reduction. IEEE Trans. Parallel Distributed Syst. 23(2): 202-210 (2012) - [c39]Dan Chia-Tien Lo, Kai Qian, Gang Quan, Liang Hong:
Work in progress: Enhance CS/CE student learning in computer architecture and organization through a remote instrument control lab with mixed reality. FIE 2012: 1-2 - [c38]Kai Qian, Chia-Tien Dan Lo, Yi Pan
, Yanqing Zhang, Xiaolin Hu, Liang Hong:
Real-World Relevant Learning with Android Smartphones. ICALT 2012: 476-477 - [c37]Kai Qian, Chia-Tien Dan Lo, Yi Pan, Yanqing Zhang, Xiaolin Hu, Liang Hong:
The cross-curriculum mobile computing labware for CS (abstract only). SIGCSE 2012: 664 - 2011
- [c36]Chia-Tien Dan Lo, Kai Qian, Yan-Qing Zhang:
Teaching operating systems with simple low-cost portable energy efficient devices. ACM Southeast Regional Conference 2011: 25-30 - [c35]Chia-Tien Dan Lo:
Performance-aware multicore programming. ACM Southeast Regional Conference 2011: 126-131 - [c34]Dan Lo, Larry Wang:
An online tutoring system with instant responses. ACM Southeast Regional Conference 2011: 316-317 - [c33]Dan Lo, Andy Wang, Sarah M. North, Max M. North:
A new curriculum for hardware-based network intrusion detection. ACM Southeast Regional Conference 2011: 318-319 - [c32]Yi-Gang Tai, Kleanthis Psarris, Chia-Tien Dan Lo:
Synthesizing Tiled Matrix Decomposition on FPGAs. FPL 2011: 464-469 - [c31]Chia-Tien Dan Lo, Kai Qian, Yanqing Zhang:
A Simple Low-Cost Portable Energy Efficient Device to Supplement Operating System Curriculum. ICALT 2011: 76-77 - 2010
- [c30]Kai Qian, Chia-Tien Dan Lo:
A novel embedded system curriculum with portable hands-on labs in a box. ACM Southeast Regional Conference 2010: 53 - [c29]Kai Qian, Chia-Tien Dan Lo:
Leveraging CS capstone project and green smart energy computing with WSN in a box. ACM Southeast Regional Conference 2010: 84 - [c28]Chia-Tien Dan Lo, Kai Qian:
Green Computing Methodology for Next Generation Computing Scientists. COMPSAC 2010: 250-251 - [c27]Yi-Gang Tai, Chia-Tien Dan Lo, Kleanthis Psarris:
Multiple data set reduction on FPGAs. FPT 2010: 45-52 - [c26]Chia-Tien Dan Lo, Kai Qian, Li Yang:
Innovative CS capstone projects on green energy applications with WSN in a box. ITiCSE 2010: 307 - [c25]Kai Qian, Chia-Tien Dan Lo, Li Yang, Jigang Liu:
Inquiry-based active learning in introductory programming courses. ITiCSE 2010: 312 - [c24]Kai Qian, Chia-Tien Dan Lo, Xiaolin Hu:
Portable labs in a box for embedded system education. ITiCSE 2010: 318
2000 – 2009
- 2009
- [j14]Wen-Jyi Hwang, Huang-Chun Roan, Ying-Nan Shih, Chia-Tien Dan Lo, Chien-Min Ou:
FPGA-based ROM-free network intrusion detection using shift-OR circuit. J. Embed. Comput. 3(2): 99-107 (2009) - [j13]Chia-Tien Dan Lo, Yi-Gang Tai:
Space Optimization on Counters for FPGA-Based Perl Compatible Regular Expressions. ACM Trans. Reconfigurable Technol. Syst. 2(4): 23:1-23:18 (2009) - [c23]Yi-Gang Tai, Chia-Tien Dan Lo, Kleanthis Psarris:
An Improved Reduction Algorithm With Deeply Pipelined Operators. SMC 2009: 3060-3065 - 2008
- [j12]Huang-Chun Roan, Wen-Jyi Hwang, Wei-Jhih Huang, Chia-Tien Dan Lo:
Network Intrusion Detection Based on Shift-OR Circuit. J. Inf. Sci. Eng. 24(4): 1229-1239 (2008) - [c22]Chia-Tien Dan Lo, Yi-Gang Tai:
Highly Space Efficient Counters for Perl Compatible Regular Expressions in FPGAs. ARC 2008: 51-62 - [c21]Yi-Gang Tai, Chia-Tien Dan Lo, Kleanthis Psarris:
Accelerating matrix decomposition with replications. IPDPS 2008: 1-8 - [c20]Chia-Tien Dan Lo, Yi-Gang Tai, Kleanthis Psarris:
Hardware implementation for network intrusion detection rules with regular expression support. SAC 2008: 1535-1539 - 2007
- [j11]J. Morris Chang, C. Dan Lo:
FPGA-based reconfigurable computing II. Microprocess. Microsystems 31(2) (2007) - [j10]Chia-Tien Dan Lo, J. Morris Chang:
FPGA-based reconfigurable computing III. Microprocess. Microsystems 31(8): 475-476 (2007) - [c19]Mayumi Kato, Chia-Tien Dan Lo:
Compression for Low Power Consumption in Battery-powered Handsets. DCC 2007: 386 - [c18]Yi-Gang Tai, Chia-Tien Dan Lo, Kleanthis Psarris:
Applying Out-of-Core QR Decomposition Algorithms on FPGA-Based Systems. FPL 2007: 86-91 - 2006
- [j9]J. Morris Chang, C. Dan Lo:
FPGA-based reconfigurable computing. Microprocess. Microsystems 30(6): 281-282 (2006) - [c17]Huang-Chun Roan, Chien-Min Ou, Wen-Jyi Hwang, Chia-Tien Dan Lo:
Efficient Logic Circuit for Network Intrusion Detection. EUC 2006: 776-784 - [c16]Huang-Chun Roan, Wen-Jyi Hwang, Chia-Tien Dan Lo:
Shift-Or Circuit for Efficient Network Intrusion Detection Pattern Matching. FPL 2006: 1-6 - [c15]Chia-Tien Dan Lo, Yi-Gang Tai, Kleanthis Psarris, Wen-Jyi Hwang:
Super fast hardware string matching. FPT 2006: 385-388 - 2005
- [c14]Mayumi Kato, Chia-Tien Dan Lo:
Hardware Solution to Java Compressed Heap. FCCM 2005: 307-308 - [c13]Mayumi Kato, Chia-Tien Dan Lo:
Impact of Java Compressed Heap on Mobile/Wireless Communication. ITCC (2) 2005: 2-7 - 2004
- [j8]Chia-Tien Dan Lo, Witawas Srisa-an, J. Morris Chang:
The design and analysis of a quantitative simulator for dynamic memory management. J. Syst. Softw. 72(3): 443-453 (2004) - [c12]Mayumi Kato, Chia-Tien Dan Lo:
Growing adaptation of computer science in Bioinfomatics. ISICT 2004: 226-231 - [c11]Mayumi Kato, Chia-Tien Dan Lo:
A heap de/compression module for wireless Java. PPPJ 2004: 91-99 - 2003
- [j7]Witawas Srisa-an, Chia-Tien Dan Lo, J. Morris Chang:
Active Memory Processor: A Hardware Garbage Collector for Real-Time Java Embedded Devices. IEEE Trans. Mob. Comput. 2(2): 89-101 (2003) - [c10]Chia-Tien Dan Lo:
The Design of a Self-Maintained Memory Module for Real-Time Systems. IWSOC 2003: 337-342 - 2002
- [j6]J. Morris Chang, Witawas Srisa-an, Chia-Tien Dan Lo, Edward F. Gehringer
:
DMMX: Dynamic memory management extensions. J. Syst. Softw. 63(3): 187-199 (2002) - [j5]Witawas Srisa-an, Chia-Tien Dan Lo, J. Morris Chang:
Object resizing and reclamation through the use of hardware bit-maps. Microprocess. Microsystems 25(9-10): 459-467 (2002) - [j4]