


default search action
ICS 2022: Taoyuan, Taiwan
- Sun-Yuan Hsieh
, Ling-Ju Hung
, Ralf Klasing, Chia-Wei Lee
, Sheng-Lung Peng
:
New Trends in Computer Technologies and Applications - 25th International Computer Symposium, ICS 2022, Taoyuan, Taiwan, December 15-17, 2022, Proceedings. Communications in Computer and Information Science 1723, Springer 2022, ISBN 978-981-19-9581-1
Invited Paper
- Dong Xiang:
High-Radix Interconnection Networks. 3-9
Algorithms, Bioinformatics, and Computation Theory
- Robert D. Barish
, Tetsuo Shibuya
:
String Editing Under Pattern Constraints. 13-24 - Hans-Joachim Böckenhauer
, Fabian Frei
, Silvan Horvath
:
Priority Algorithms with Advice for Disjoint Path Allocation Problems (Extended Abstract). 25-36 - Juhi Chaudhary
, B. S. Panda:
On Two Variants of Induced Matchings. 37-48 - Meirun Chen, Cheng-Kuan Lin, Kung-Jui Pai:
A Tree Structure for Local Diagnosis in Multiprocessor Systems Under Comparison Model. 49-60 - Po-An Chen, Chi-Jen Lu, Chuang-Chieh Lin
, Ke-Wei Fu:
Multiagent Learning for Competitive Opinion Optimization (Extended Abstract). 61-72 - Guillaume Fertin
, Oscar Fontaine, Géraldine Jean
, Stéphane Vialette
:
The Maximum Zero-Sum Partition Problem. 73-85 - Ruei-Sing Guan
, Yu-Chee Tseng
, Jen-Jee Chen
, Po-Tsun Paul Kuo
:
Combined Bayesian and RNN-Based Hyperparameter Optimization for Efficient Model Selection Applied for autoML. 86-97 - Sanpawat Kantabutra:
Adiabatic Quantum Computation for Cyber Attack and Defense Strategies. 98-110 - Tengxiang Lin
, Cheng-Kuan Lin
, Zhen Chen, Hongju Cheng
:
Computation Offloading Algorithm Based on Deep Reinforcement Learning and Multi-Task Dependency for Edge Computing. 111-122 - Yali Lv
, Cheng-Kuan Lin
, D. Frank Hsu, Jianxi Fan
:
A Comparison Diagnosis Algorithm for Conditional Fault Local Diagnosis of Multiprocessor Systems. 123-134 - Sushmita Paul, Ratanjeet Pratap Chauhan, Srinibas Swain
:
Novel Ways of Enumerating Restrained Dominating Sets of Cycles. 135-144 - Xiao-Wen Qin, Rong-Xia Hao, Sheng-Lung Peng:
Fault Diagnosability of Multigraph Matching Composition Networks. 145-155 - Md. Tahmidur Rafid, Rabeeb Ibrat, Md. Saidur Rahman
:
Generating Scale-Free Outerplanar Networks. 156-166 - Suying Wu
, Baolei Cheng
, Yan Wang
, Yuejuan Han
, Jianxi Fan
:
Hamiltonian Properties of the Dragonfly Network. 167-179 - Tomoyuki Yamakami:
Fine Grained Space Complexity and the Linear Space Hypothesis (Preliminary Report). 180-191 - Kun Zhao, Hongbin Zhuang
, Xiao-Yan Li, Fangying Song, Lichao Su:
Partition-Edge Fault-Tolerant Hamiltonicity of Pancake Graphs. 192-204
Cloud Computing and Big Data
- Che-Wei Chang, Xinyu Zhang, Hung-Chang Hsiao:
Query Regrouping Problem on Tree Structure for GPUs Accelerated Platform. 207-211 - Chih-Ming Huang, Ming-Ya Hsu, Chuan-Sheng Hung, Chun-Hung Richard Lin, Shi-Huang Chen:
The Enhancement of Classification of Imbalanced Dataset for Edge Computing. 212-222 - Shih-Wen Jiang, Syuan-You Chen, Whai-En Chen, Hsin-Te Wu:
Development of Personnel Epidemic Prevention Monitoring Access Control System. 223-229 - Robert Banaszak, Anna Kobusinska:
The Use of Serverless Processing in Web Application Development. 230-242 - Ming-Huang Tsai, Yun-He Wang, Wu-Chun Chung:
Scaling Model for vIMS on the Cloud. 243-254 - Chen-Shu Wang, Yean-Lin Lee:
Using Classification Algorithms to Predict Taiwan Stock Market - A Case Study of Taiwan Index Futures. 255-266 - Sheng-Kai Wang, Wan-Lin You, Shang-Pin Ma:
Semi-automatic Chatbot Generation for Web APIs. 267-278 - Rita Wiryasaputra
, Chin-Yin Huang
, Rio Williyanto, Chao-Tung Yang
:
Prediction of Middle-Aged Unhealthy Facial Skin Using VGG19 and Support Vector Machine Models. 279-289
Computer Vision and Image Processing
- Alan Shu-Luen Chang:
Real-Time Intentional Eye Blink Detection Using Rhombus Identification. 293-304 - Yu-Kai Ling, Ren Chieh Yang, Sheng-De Wang:
Difficulty-Aware Mixup for Replay-based Continual Learning. 305-316 - Kai-Xiang Liu, Chuan-Yu Chang, Huei-Ming Ma
:
Vision-Based Lightweight Facial Respiration and Heart Rate Measurement Technology. 317-328 - Sophia Yang, Jun-Teng Zhang, Chia-Wen Lin, Chih-Chung Hsu:
GAN-Based Criminal Suspect Face Generator. 329-340
Cryptography and Information Security
- Chia-Mei Chen, Yu-Xuan Wang, Zheng-Xun Cai, Boyi Lee, Gu-Hsin Lai:
Automatic Summarization of Critical Threat Intelligence Using Transfer Learning. 343-348 - Wei Gu
, Ching-Chun Chang
, Yu Bai, Yunyuan Fan, Liang Tao, Li Li
:
Anti-screenshot Watermarking Algorithm About Archives Image Based on Deep Learning Model. 349-361 - Chien-Hui Hung, Yi-ming Chen, Chao-Ching Wu:
Detecting Android Malware by Combining System Call Sequence Relationships with Local Feature Calculation. 362-373 - Shin-Jia Hwang, Tzu-Ping Chen:
A Detector Using Variant Stacked Denoising Autoencoders with Logistic Regression for Malicious JavaScript with Obfuscations. 374-386 - Bo-An Lai, Yi-Hsiu Yeh, Guan-Yu Chen, Jheng-Jia Huang, Nai-Wei Lo:
A Lightweight and Robust Authentication and Key Agreements with Physically Unclonable Function in Manufacturing Environments. 387-397 - Zheng Tang, Shiwei Jing, Jianjun Li, Guobao Hui, Wanyong Tian:
Image Compression and Meaningful Ciphertext Encryption Based on Histogram Shift Embedding. 398-406 - Fang-Ting Wu, Shao-Wei Tung, Jheng-Jia Huang
:
A Robust Two Factor Authentication Scheme with Fine Grained Biometrics Verification. 407-418
Electronics and Information Technology
- Chih-Che Chang, Chia-Mei Chen, Han-Wei Hsiao:
Applying an IoT Analytics Framework in East Asia Area. 421-433 - Wen-Ting Chang, Yi-Ming Chen, Hui-Hsuan Yang:
Android Malware Classifier Combining Permissions and API Features to Face Model Drifting. 434-446 - Jih-Ching Chiu, Yu-Quen Chen, Yi-Xiang Wang, Yung-Chi Liu:
Design and Implementation of the Optimized Computing Architecture for Matrix Decomposition Algorithms. 447-459 - Jih-Ching Chiu, Zhe-You Yan, Yung-Chi Liu:
Design and Implementation of the CNN Accelator Based on Multi-streaming SIMD Mechanisms. 460-473 - Jih-Ching Chiu, Yan-Ting Wu, Yung-Chi Liu, Chi-Yang Hsieh:
Design and Implementation of the Link-List DMA Controller for High Bandwidth Data Streaming. 474-486 - Hsiu-Mei Chou, Sugita Norika, Ching-Yeh Hsin, Tso-Chung Sung:
STEM Education Meets HPC. 487-492 - Chi-Yueh Hsu, Chun-Ming Kuo, Ruo-Wei Hung, Jong-Shin Chen:
Research on KNN-Based GNSS Coordinate Classification for Epidemic Management. 493-500 - Yung-Fa Huang, Shu-Wai Chang, Chuan-Bi Lin, Chun-Jung Chen, Shi-Jun Li, Ching-Mu Chen:
An Improved Light Weight Countermeasure Scheme to Efficiently Mitigate TCP Attacks in SDN. 501-511 - Ah-Fur Lai, Cheng-Ying Yang:
The Effectiveness of Block-Based Programming Learning on the Problem-Solving Skills of the Freshmen. 512-520 - Jason Lin
, Chia-Wei Tsai
, Chun-Wei Yang
, Elie Lafortune:
Behavior Profiling of Role-Playing Game Players Based on Heuristic Event Log Mining. 521-532 - Pai-Ching Tseng, Yi-Li Liou, Iuon-Chang Lin, Tzu-Ching Weng:
The Impact of Live Streaming on Personal Purchase Behavior. 533-544 - Hong-Wen Wang, Dai-Yi Chiu, Wei-Chung Chan, Zhi-Fang Yang:
Stochastic-Gradient-Descent-Based Max-Margin Early Event Detector. 545-552 - Sheng-Ming Wang, Muhammad Ainul Yaqin
, Fu-Hsiang Hsu
:
AHP-Based Assessment of Developing Online Virtual Reality Services with Progressive Web Apps. 553-566 - Mei-Yu Wu, Chih-Kun Ke:
From Data of Internet of Things to Domain Knowledge: A Case Study of Exploration in Smart Agriculture. 567-576 - Cheng-Ying Yang, Chuan-Bi Lin, Jenq-Foung J. F. Yao, Ming-Hsiang Hwang:
Physical Layer Coding and Cryptanalysis for the Secure Communications. 577-584
Mobile Computation and Wireless Communication
- Chun Hsiung, Fuchun Joseph Lin
, Jyh-Cheng Chen, Chien Chen:
5G Network Slice Scalability Based on Management Data Analytics Function (MDAF). 587-598 - Shashank Mishra
, Jia-Ming Liang
:
Design and Analysis for Wireless Tire Pressure Sensing System. 599-610
Ubiquitous Cybersecurity and Forensics
- Tzu Hao Chen
, Chit-Jie Chew, Ying-Chin Chen, Jung-San Lee
:
Preserving Collusion-Free and Traceability in Car-Sharing System Based on Blockchain. 613-624 - Nompilo Fakude
, Elmarie Kritzinger
:
Utilization of Theoretical Domains Framework (TDF) to Validate the Digital Piracy Behaviour Constructs - A Systematic Literature Review Study. 625-636 - Edy Kristianto
, Po-Ching Lin
, Ren-Hung Hwang
:
Domain-Specific Anomaly Detection for In-Vehicle Networks. 637-648 - Zhe-Wei Lin, Tzu-Hung Liu, Po-Wen Chi
:
LED: Learnable Encryption with Deniability. 649-660 - Guan-Yu Wang
, Hung-Jui Ko, Min-Yi Tsai, Wei-Jen Wang:
Module Architecture of Docker Image and Container Security. 661-669 - Hao-Yu Weng
, Min-Yi Tsai, Wei-Jen Wang, Cheng-Ta Huang:
High-Capacity Double-Layer Data Hiding Technique Based on 3D Magic Cube. 670-678

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.