
Abstract

Members

Achievement

Meeting

Links

Main Project

Chinese Version

|
|
Journal
papers
1.
C. H. Tzeng, Z. F. Yang, and W. H.
Tsai
(2004). “Adaptive data hiding in palette images by color
ordering and mapping with security protection,” IEEE
Transactions on Communications, Vol. 52, No. 4, pp. 791-800.
(SCI, EI)
2.
C. H. Tzeng and W. H. Tsai (2004).
“A combined approach to integrity protection and verification of
palette images using fragile watermarks and digital signatures,”
IEICE Transactions on Fundamentals of Electronics,
Communications and Computer Sciences, Vol. E87-A, No. 6, pp.
1612-1619. (SCI)
3.
C. C. Lin and W. H. Tsai (2004).
“Secret multimedia information sharing with data hiding
capability by simple logic operations,” Pattern
Recognition and Image Analysis, Vol. 14, No. 4, pp. 594-600.
4.
C. C. Lin and W. H. Tsai (2004).
“Secret image sharing with steganography and authentication,”
Journal of Systems & Software, Vol. 73, No. 3, pp.
405-414. (EI)
5.
Y. C. Chiu and W. H. Tsai (2006).
"Copyright Protection by Watermarking for Color Images against
Print-and-Scan Operations Using Coding and Synchronization of
Peak Locations in Discrete Fourier Transform Domain," Journal
of Information Science and Engineering, Vol. 22, No. 3, pp.
483-496. (SCI)
6.
T. Y. Liu and W. H. Tsai (2007). "A New
steganographic method for data hiding in Microsoft Word
documents by a change tracking technique," IEEE Transactions
on Information Forensics and Security, Vol. 2, No. 1, pp.
24-30.
7.
I. S. Lee and W. H. Tsai (2007). "Data hiding in
binary images with distortion-minimizing capabilities by optimal
block pattern coding and dynamic programming techniques,"
IEICE Transactions on Information and Systems, Vol. E90-D,
No. 8, pp. 1142-1150. (SCI)
8.
Shun-Chieh Lin and Shian-Shyong Tseng (2004) “Constructing
Detection Knowledge for DDoS Intrusion Tolerance,” Expert
Systems With Applications, Vol. 27, No. 3, pp.379-390.
(2004/2/11 submitted, 2004/5/11 accepted) [SCI, EI]
9.
Shun-Chieh Lin, Po-Chih Huang, Shian-Shyong Tseng, and Nien-Yi
Jan (2006), “Knowledge Acquisition Assist in Analyzing Network
Behaviors,” to appear in WSEAS Transaction on Computers. [EI]
10. Shun-Chieh Lin,
Chien-Hao Wen, Shian-Shyong Tseng, and Yao-Tsung Lin (2006)
“Rule Base Partitioning for Constructing Meta-rule,” accepted by
Journal of Internet Technology with minor revision. [EI]
11. C. Y. Wang, S.
S. Tseng, T. P. Hong and Yian-Shu Chu (2007/01), “Online
generation of association rules under multidimensional
consideration based on negative-border,” Journal of Information
Science and Engineering Vol. 23, No. 1. pp. 233-242 (SCI, EI)
12. Shian-Shyong
Tseng, Kenny Huang, Johannes Chiang (2007),”Internet exchange
traffic sharing and market competition,” Journal of Internet
Technology Vol. 8, No.1. (EI)
13. S. S. Tseng, P.
C. Sue, J. M. Su, J. F. Weng, and W. N. Tsai(2007), “A new
approach for constructing the concept map,” Computer and
Education 49, pp.691-707. (SSCI)
14. M. T. Chen,
B.M.T. Lin, and S. S. Tseng (2007), “Multicast routing and
wavelength assignment with delay constraint in WDM network with
heterogeneous capability,” to appear in Journal of Network &
Computer Applications. (SCI) In Press, Corrected Proof,
Available online 18 August 2006
15. Shun-Chieh Lin,
Shian-Shyong Tseng, Wen-Guey Tzeng, and Shyan-Ming Yuan (2007)
“A framework of high confidence e-healthcare information
system,” Asian Journal of Health and Information Sciences Vol.
1, No. 2, pp.176-188.
16. Yian-Shu Chu,
Shian-Shyong Tseng, Chin-Hsuan Chang, Chang-Sheng Chen (2007),
“A Learning-by-Doing Remedial Tutoring System for Building and
Managing SIP/ENUM DNS Servers,” International Journal of
Electrical Engineering Volume 14, No. 1, 2007, pp. 33-38. (EI)
17. Shun-Chieh Lin,
Chia-Wen Teng, and Shian-Shyong Tseng (2007) “Capturing
Evolutional Knowledge using Time Interval Tracing,” Journal of
Advanced Computational Intelligence & Intelligent Informatics,
Vol.11, No. 4, pp. 373-380.
18. W. H. Tarng,
M.Y. Chang, L. K. Lai, S. S. Tseng and J. F. Weng (2007): “An
Adaptive Web-based Learning System for the Scientific Concepts
of Water Cycle in Primary Schools”, Journal of Advanced
Technology for Learning, Vol. 4, No. 2, P208-1093 2007. (EI)
19. Wen-Chung Shih,
Chao-Tung Yang, and Shian-Shyong Tseng, (2007), “A
Performance-based Parallel Loop Scheduling on Grid
Environments,” Journal of Supercomputing, 41(3), pp. 247-267.
[SCI, EI].
20. Hsiao-Han Chen,
Wei-Hsun Lee, Shian-Shyong Tseng,(2007) "A Spatiotemporal
Traffic Bottlenecks Mining Model for Discovering Bottlenecks in
Urban Network", World Congress on Intelligent Transportation
System, Oct. 10-Oct. 13, 2007, Beijing, China.
21. Shun-Chieh Lin,
Shian-Shyong Tseng, and Chia-Wen Teng (2008/02) “Dynamic EMCUD
for knowledge acquisition,” Expert Systems with Applications
Vol.34 , Issue 2 pp.833-844. (SCI, EI)
22. Yian-Shu Chu,
Shian-Shyong Tseng, Yu-Jie Tsai, and Ren-Jei Luo, “An
Intelligent Questionnaire Analysis Expert System,” Expert
Systems with Applications, Volume 40, Issue 3, 2008. (SCI)
23. Shian-Shyong
Tseng and Shun-Chieh Lin (2008) “VODKA: Variant Objects
Discovering Knowledge Acquisition,” to appear in Expert Systems
with Applications [SCI,EI]
24. W.-C. Chen, S.
S. Tseng, and T.-P. Hong (2008) “An efficient bit-based feature
selection method,” to appear in Expert Systems with Applications
[SCI,EI]
25. Chao-Tung Yang,
Wen-Chung Shih, and Shian-Shyong Tseng, (2008), “Dynamic
Partitioning of Loop Iterations on Heterogeneous PC Clusters,”
Journal of Supercomputing. Vol.44(1),P1-23 [SCI, EI]
26. Wen-Chung Shih,
Chao-Tung Yang, and Shian-Shyong Tseng, (2008), “Using a
Performance-based Skeleton to Implement Divisible Load
Applications on Grid Computing Environments,” Journal of
Information Science and Engineering (JISE). (2008/1/28 accepted)
[SCI, EI].
27. Wen-Chung Shih,
Shian-Shyong Tseng, and Chao-Tung Yang, “Using Taxonomic
Indexing Trees to Efficiently Retrieve SCORM-compliant Documents
in e-Learning Grids,” to appear in Journal of Educational
Technology & Society. . (2007/7/23 accepted) [SSCI].
28. Shian-Shyong
Tseng, Jun-Ming Su, Gwo-Jen Hwang, Gwo-Haur Hwang, Chin-Chung
Tsai and Chang-Jiun Tsai,”An Object-Oriented Course Framework
for Developing Adaptive Learning Systems,” to appear in Journal
of Educational Technology & Society. . (2007/10 accepted)
[SSCI].
29. Wen-Chung Shih,
Shian-Shyong Tseng, and Chao-Tung Yang, “Wiki-based Rapid
Prototyping for Teaching-Material Design in e-Learning Grids,”
Computers & Education. (2007/10/22 accepted) [SSCI].
30. Wei-Hsun Lee,
Shian-Shyong Tseng, and Sheng-Han Tsai, “A Knowledge base
Real-Time Travel Time Prediction System for Urban Network”,
Expert System with Applications. [SCI, EI] (accepted)
31. Cheng-Yuan Ho
and Yaw-Chung Chen, “Snug-Vegas and Snug-Reno: Performance
Improvement of TCP over Heterogeneous Networks,” IEE Proceedings
– Communications, Vol. 153, Issue 2, pp. 169-176, April 2006.
32. Cheng-Yuan Ho,
Yi-Cheng Chan, and Yaw-Chung Chen, “Gallop-Vegas:
An Enhanced Slow-Start Mechanism for TCP Vegas,” Journal of
Communications
and Networks (KICS), Vol. 8, No. 3, pp.351-359, September
2006.
33. Cheng-Yuan Ho,
Yaw-Chung Chen, and Cheng-Yun Ho, “Improving Performance
of Delay-based TCPs with Rerouting,” IEEE Communications
Letters, Vol. 11, Issue 1, pp. 88-90, January 2007.
34. Cheng-Yuan Ho,
Yi-Cheng Chan, and Yaw-Chung Chen, “TCP-Ho: A
Congestion Control Algorithm with Design and Performance
Evaluation,”
IEICE Transactions on Communications, Vol. E90-B, No. 3, pp.
516-
526, March 2007.
35. Cheng-Yuan Ho,
Yi-Cheng Chan, and Yaw-Chung Chen, “WARD: A Deterministic
Fluid Model,” IET Communications1, Vol. 1, Issue 4, pp.
711-717, August 2007.
36. Cheng-Yuan Ho,
Yi-Cheng Chan, and Yaw-Chung Chen, “WARD: a
transmission control protocol-friendly stateless active queue
management
scheme,” IET Communications, Vol. 1, Issue 6, pp. 1179-1186,
December
2007.
37. Cheng-Yuan Ho,
Yaw-Chung Chen, Yi-Cheng Chan, and Cheng-Yun Ho,
“Fast Retransmit and Fast Recovery Schemes of Transport
Protocols: ASurvey and Taxonomy,” Computer Networks, Vol. 52,
Issue 6, pp. 1308-
1327, April 2008.
Conference papers
1. P.
M. Huang, D. C. Wu, and W. H. Tsai (2004/06). "A novel
block-based authentication technique for binary images by block
pixel rearrangements," Proceedings of 2004 IEEE International
Conference on Multimedia & Expo (ICME 2004), Taipei, Taiwan,
Republic of China.
2. Wei-Liang Lin and Wen-Hsiang Tsai (2004/12). “Data Hiding
in Image Mosaics by Visible Boundary Regions and Its Copyright
Protection Application against Print-And-Scan Attacks,”
Proceedings of 2004 International Computer Symposium (ICS 2004),
Taipei, Taiwan, Republic of China.
3.
Y. C. Chiu and W. H. Tsai (2004/08). "Copyright protection by
watermarking for Color Images against Rotation and Scaling
Attacks Using Peak Detection and Synchronization in Discrete
Fourier Transform Domain," Proceedings of Third Workshop on
Digital Archives Technologies, Taipei, Taiwan, pp. 207-213,
August 5-6, 2004.
4. Y.
C. Chiu and W. H. Tsai (2004/08). “Copyright protection by
watermarking for color images against print-and-scan operations
using coding and synchronization of peak locations in discrete
Fourier transform domain,” Proceedings of 2004 Conference on
Computer Vision, Graphics and Image Processing, Hualien, Taiwan,
Republic of China.
5. K.
L. Huang and W. H. Tsai (2004/08). “Secret sharing with
steganographic effects for HTML documents,” Proceedings of 2004
Conference on Computer Vision, Graphics and Image Processing,
Hualien, Taiwan, Republic of China.
6. S.
C. Hung, T. Y. Liu and W. H. Tsai (2005/6). “A new approach to
automatic generation of tile mosaic images for data hiding
applications,” 2005 Conference on Digital Contents Management &
Applications (DCMA 2005), Kaohsiung, Taiwan, Republic of China,
pp. 11-20.
7. T.
Y. Liu and W. H. Tsai (2005/6). “Active quotation authentication
in Microsoft Word documents using block signatures,” 3rd
International Conference on Information Technology: Research and
Education (ITRE 2005), Hsinchu, Taiwan, Republic of China.
8. Y.
C. Chuang and W. H. Tsai (2005/8). “Active copyright protection
of html files by a watermarking technique,” Proceedings of 2005
Conference on Computer Vision, Graphics and Image Processing,
Taipei, Taiwan, Republic of China.
9. L.
Y. Weng and W. H. Tsai (2005/8). "Integrity authentication of
grayscale document images surviving print-and-scan attacks,"
Proceedings of 2005 Conference on Computer Vision, Graphics and
Image Processing, Taipei, Taiwan, Republic of China.
10. Y.
Y. Yang, D. C. Wu and W. H. Tsai (2005/9). “Watermarking of
numerical databases using spread spectrum techniques,”
Proceedings of 4th Workshop on Digital Archives Technologies,
pp.79-84, Taipei, Taiwan, Republic of China.
11.
S. C. Hung, D. C. Wu, and W. H. Tsai (2005/12). “Data hiding in
stained glass images,” Proceedings of 2005 International
Symposium on Intelligent Signal Processing and Communications
Systems, pp. 129-132, Hong Kong.
12. K.
F. Chien and W. H. Tsai (2006/08). “Authentication of
surveillance video sequences and contents by hiding motion
vector information,” Proceedings of 2006 Conference on Computer
Vision, Graphics and Image Processing, Taoyuan, Taiwan, Republic
of China.
13.
C. Y. Hsu and W. H. Tsai (2006/08). “Creation of a new type of
image - circular dotted image - for data hiding by a dot
overlapping scheme,” Proceedings of 2006 Conference on Computer
Vision, Graphics and Image Processing, Taoyuan, Taiwan, Republic
of China.
14. Y.
L. Wang and W. H. Tsai (2006/08). “Lossless visible watermarking
for copyright protection of H.263 videos,” Proceedings of 2006
Conference on Computer Vision, Graphics and Image Processing,
Taoyuan, Taiwan, Republic of China.
15. P.
P. Chen and W. H. Tsai (2006/08-09). “Copyright protection of
palette images by a robust lossless visible watermarking
technique,” Proceedings of 5th Workshop on Digital Archives
Technologies, Taipei, Taiwan, Republic of China
16. I.
S. Lee and W. H. Tsai (2007/08) "Data hiding in grayscale images
by dynamic programming based on a human visual model,"
Proceedings of 2007 Conference on Computer Vision, Graphics and
Image Processing, Miaoli, Taiwan, Republic of China.
17.
Wen-Yi Hsin, Shian-Shyong Tseng, Shun-Chieh Lin (2005) “A Study
of Alert-Based Collaborative Defense,” in Proc. of The 8th
International Symposium on Parallel Architectures, Algorithms &
Networks (ISPAN 2005), Dec. 7-9, 2005, Las Vegas, Nevada,
U.S.A., pp. 148-153.
18.
W. C. Shih, C. T. Tung, and S. S. Tseng (2005/03),” A hybrid
parallel loop scheduling scheme on grid environments,” in Proc.
of 4th International Conference on Grid and Cooperative
Computing (GCC 2005), Nov. 30-Dec. 3, 2005, Beijing, China and
Lecture Notes in Computer Sciences ,Vol. 3795, pp. 370-381.
[SCI]
19.
Chien-Hao Wen, Shun-Chieh Lin, Shian-Shyong Tseng, and Yao-Tsung
Lin (2005) “Rule Base Partitioning for Constructing Meta-rule,”
Proc. of TAAI 2005 (CDROM), Dec. 2-3, 2005, Kaohsiung, Taiwan,
R.O.C.
20.
Chia-Wen Teng, Shun-Chieh Lin, and Shian-Shyong Tseng (2005)
“Evolution in Knowledge Acquisition method with Time Interval
Tracing Oriented,” Proc. of TAAI 2005 (CDROM), Dec. 2-3, 2005,
Kaohsiung, Taiwan, R.O.C.
21.
Wen-Yi Hsin, Shian-Shyong Tseng, and Shun-Chieh Lin (2005)
“Designing a Collaborative Defense System,” in Proc. of
TANET2005, 中興大學. Taichung, Taiwan, Oct. 26-28, 2005.
22.
Shun-Chieh Lin, Po-Chih Huang, Shian-Shyong Tseng, and Nien-Yi
Jan (2006), “Analyzing Network Behaviors with Knowledge
Acquisition and Data Warehousing,” to appear in the proceedings
of the 10th WSEAS CSCC Multiconference, Athens, Greece, 13-15,
July.
23.
Shun-Chieh Lin, Yao-Tsung Lin, Shian-Shyong Tseng, and Nien-Yi
Jan (2006) “Ontology Discovery Using Cases Clustering,” to
appear in the proceedings of SCIS & ISIS 2006, Tokyo, Japan.
24.
Wen-Chung Shih, Chao-Tung Yang, Chun-Jen Chen, and Shian-Shyong
Tseng, (2007), “Parallel Loop Scheduling Using Knowledge-Based
Workload Estimation on Grid Environments,” in Proc. of the
IEEE/IPSJ International Symposium on Applications and the
Internet (SAINT 2007), Jan. 15-19, 2007, Hiroshima, Japan. [EI]
25.
Jui-Feng Weng, Shian-Shyong Tseng, Jun-Ming Su, Yang-Ching
Fan(2007)” Constructing a Test Item Generator for Program
Debugging Assessment,” The 2007 International Conference on
Frontiers in Education: Computer Science and Computer
Engineering (FECS'07), June 6-July 7, Las Vegas, U.S.A.
26.
W. H. Tarng, M.Y. Chang, L. K. Lai, S. S. Tseng and J. F. Weng
(2007): An Adaptive Web-based Learning System for the Scientific
Concepts of Water Cycle in Primary Schools, Journal of Advanced
Technology for Learning, Vol.2, No. 2, 2007. (EI)
27.
H.N. Lin, S.S. Tseng, J.F. Weng, H.Y. Lin and J.M. Su,(2007),
“An Iterative, Collaborative Ontology Construction
Scheme,”ICICIC2007, Kumamoto, Sep. 5-7, 2007.
28.
Shian-Shyong Tseng, Jui-Feng Weng, Huan-Yu Lin, Ang-Jui Tsai,
and Jun-Ming SU(2007), “Ontology-based Topic Analyzer for
Programming Learning Forum,” 15th International Conference on
Computers in Education, Nov.5-9, 2007, Hiroshima, Japan.
29.
Wen-Chung Shih and Shian-Shyong Tseng, (2008), “Folksonomy-based
Indexing for Location-aware Retrieval of Learning Contents,” The
5th IEEE International Conference on Wireless, Mobile, and
Ubiquitous Technology in Education (WMUTE 2008), Mar. 23-26,
2008, Beijing, China. (The Best Paper Award)
30.
Huan-Yu Lin, Shian-Shyong Tseng*, Jui-Feng Weng, Jun-Ming Su,
(2008),"Collaborative Interpretative Service Assisted Design
System Based on Hierarchical Case Based Approach", IEEE
International Conference on Sensor Networks, Ubiquitous, and
Trustworthy Computing (SUTC 2008),11-13 June 2008 in Taichung,
Taiwan
31.
Yi-Cheng Chan, Chia-Tai Chan, Yaw-Chung Chen, and Cheng-Yuan Ho,
“Performance Improvement of Congestion Avoidance Mechanism for
TCP
Vegas,” in Proceedings of The 10th IEEE International Conference
on
Parallel and Distributed Systems, ICPADS 2004, pp. 605-612,
Newport
Beach, California, USA, July 2004.
32.
Cheng-Yuan Ho, Yi-Cheng Chan, and Yaw-Chung Chen, “An Enhanced
Slow-Start Mechanism for TCP Vegas,” in Proceedings of The 11th
IEEE
International Conference on Parallel and Distributed Systems,
ICPADS
2005, Vol. 1, pp. 405-411, Fukuoka Institute of Technology
(FIT),
Fukuoka, Japan, July 2005.
33.
Cheng-Yuan Ho, Yi-Cheng Chan, and Yaw-Chung Chen, “An Efficient
Mechanism of TCP-Vegas on Mobile IP Networks,” in Proceedings of
IEEE INFOCOM 2005, Vol. 4, pp. 2776-2780, and IEEE Global
Internet
Symposium in conjunction with IEEE INFOCOM 2005, pp. 1-5, Miami,
Florida, USA, March 2005.
34.
Cheng-Yuan Ho, Chen-Hua Shih, Yaw-Chung Chen, and Yi-Cheng Chan,
“An Aided Congestion Avoidance Mechanism for TCP Vegas,” in
Proceedings
of 2005 International Conference on Computer Networks and Mobile
Computing, ICCNMC 2005, pp. 961-971, Zhangjiajie, Hunan,
China, August 2005.
35.
Cheng-Yuan Ho, Yi-Cheng Chan, and Yaw-Chung Chen, “A
TCP-Friendly
Stateless AQM Scheme for Fair Bandwidth Allocation,” in
Proceedings of
International Conference on Autonomic and Autonomous Systems,
and
International Conference on Networking and Services, IEEE ICAS
2005
and ICNS 2005, pp. 14-14 (6 pages), Papeete, Tahiti, French
Polynesia,
October 2005.
36.
Wen-Kang Jia, Yaw-Chung Chen, and Cheng-Yuan Ho, “Traffic
Behavior
Analysis of Frame Bursting for SISO IEEE 802.3z Networks,” in
Proceedings
of Asia-Pacific Optical Communications Conference, SPIE (APOC
2006 ), Vol. 6354, pp. 63541L-1-63541L-11, Kimdaejung Convention
Center,
Gwangju, Korea, September 2006.
37.
Y. C. Chen and W. Y. Chen, “An Agent-Based Metric for Quality of
Services over Wireless Networks,”IEEE COMPSAC 2006, Sept. 2006,
Chicago.
Award
|
2004 |
|
2004 |
|
2005 |
|
2006 |
|
2006 |
-
Best Paper Award, Y.
C. Chen and W. Y. Chen, “An Agent-Based Metric
for Quality of Services over Wireless
Networks,”IEEE COMPSAC 2006, Sept. 2006, Chicago
|
2006 |
|
2007 |
|
|