default search action
Chih-Chiang Wang 0001
Person information
- affiliation: National Kaohsiung University of Science and Technology, Taiwan
- affiliation: National Kaohsiung University of Applied Sciences, Taiwan
- affiliation (2003-2007): North Carolina State University, Raleigh, NC, USA
Other persons with the same name
- Chih-Chiang Wang 0002 — Tamkang University, Tamsui, Taiwan
- Chih-Chiang Wang 0003 — Taiwan Semicond. Manuf. Co., Hsinchu, Taiwan
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]You-Sheng Lin, Rui-Jie Jiang, Muhammad Fajar, Jing-Wein Wang, Chih-Chiang Wang:
An Edge-Computing-Based Machine Learning Method for Detecting Goggle-Lens Defects. GCCE 2024: 473-474 - 2023
- [c13]Yi-Xian Cai, Shih-Chieh Chen, Chih-Chiang Wang:
An Implementation of Feature Selection for Detecting LOIC-based DDoS Attack. ICCE-Taiwan 2023: 607-608 - [c12]Yi-Xian Cai, Tsu-Chen Chang, Chih-Chiang Wang:
A Case Study of Detecting HULK-based DDoS Traffic with Random Forest Classifier. ICCE-Taiwan 2023: 609-610 - [c11]Jing-Wein Wang, Chih-Chiang Wang, Cunwei Lu:
Wearing Mask Detection Based on T-shaped Face. ICCE-Taiwan 2023: 611-612 - [c10]Shih-Chieh Chen, Chih-Chiang Wang:
Exploring the Vulnerability of Implementing DDoS Detection Systems based on Random-Forest Classifiers and Open Datasets. ICKII 2023: 413-416 - 2021
- [j12]Ngoc Tuyen Le, Duong Binh Giap, Jing-Wein Wang, Chih-Chiang Wang:
Tensor-Compensated Color Face Recognition. IEEE Trans. Inf. Forensics Secur. 16: 3339-3354 (2021) - 2020
- [j11]Ngoc Tuyen Le, Jing-Wein Wang, Duc Huy Le, Chih-Chiang Wang, Ngoc-Tu Nguyen:
Fingerprint Enhancement Based on Tensor of Wavelet Subbands for Classification. IEEE Access 8: 6602-6615 (2020) - [j10]Chien Ting Wang, Ying-Dar Lin, Chih-Chiang Wang, Yuan-Cheng Lai:
Cost minimization in placing service chains for virtualized network functions. Int. J. Commun. Syst. 33(4) (2020) - [c9]Chih-Chiang Wang, Jing-Wein Wang, Tsung-Chieh Cheng:
A Design of a Concealed Fingerprint Access Control System based on Commodity Smartphones and APP Software. GCCE 2020: 341-342 - [c8]Jing-Wein Wang, Chih-Chiang Wang, Tsung-Chieh Cheng:
AI-based Automatic Optical Inspection of Glass Bubble Defects. MSIE 2020: 242-246
2010 – 2019
- 2019
- [j9]Ngoc Tuyen Le, Duc Huy Le, Jing-Wein Wang, Chih-Chiang Wang:
Entropy-Based Clustering Algorithm for Fingerprint Singular Point Detection. Entropy 21(8): 786 (2019) - [c7]Chih-Chiang Wang:
A Model for Latency-Optimal Placement of Virtualized Network Functions over Hierarchical Datacenters. GCCE 2019: 113-114 - [c6]Ying-Chuan Lai, Chia-Chen Lin, Chih-Chiang Wang, Liren Tsai, Jing-Wein Wang:
A Design of Portable Solar-Powered Air-Quality Monitor with Cloud-enabled Safety Watch Smartphone APP. ICCE-TW 2019: 1-2 - [c5]Chia-Chen Lin, Ying-Chuan Lai, Chih-Chiang Wang, Liren Tsai, Jing-Wein Wang:
Development and Implementation of Solar-Assisted Electric Bicycle with GPS Tracking Service over Cloud. ICCE-TW 2019: 1-2 - 2018
- [j8]Ying-Dar Lin, Chih-Chiang Wang, Chien-Ying Huang, Yuan-Cheng Lai:
Hierarchical CORD for NFV Datacenters: Resource Allocation with Cost-Latency Tradeoff. IEEE Netw. 32(5): 124-130 (2018) - [j7]Chih-Chiang Wang, Ying-Dar Lin, Jang-Jiin Wu, Po-Ching Lin, Ren-Hung Hwang:
Toward Optimal Resource Allocation of Virtualized Network Functions for Hierarchical Datacenters. IEEE Trans. Netw. Serv. Manag. 15(4): 1532-1544 (2018) - [j6]Ying-Dar Lin, Chih-Chiang Wang, Yi-Jen Lu, Yuan-Cheng Lai, Hsi-Chang Yang:
Two-tier dynamic load balancing in SDN-enabled Wi-Fi networks. Wirel. Networks 24(8): 2811-2823 (2018) - 2017
- [j5]Ren-Hung Hwang, Chih-Chiang Wang, Wu-Bin Wang:
A Distributed Scheduling Algorithm for IEEE 802.15.4e Wireless Sensor Networks. Comput. Stand. Interfaces 52: 63-70 (2017) - 2016
- [j4]Chih-Chiang Wang, Ying-Dar Lin:
CDNPatch: a cost-effective failover mechanism for hybrid CDN-P2P live streaming systems. Int. J. Commun. Syst. 29(17): 2517-2533 (2016) - 2015
- [j3]Ying-Dar Lin, Minh-Tuan Thai, Chih-Chiang Wang, Yuan-Cheng Lai:
Two-tier project and job scheduling for SaaS cloud service providers. J. Netw. Comput. Appl. 52: 26-36 (2015) - 2012
- [j2]Weng-Long Chang, Kawuu Weicheng Lin, Ju-Chin Chen, Chih-Chiang Wang, Lai Chin Lu, Minyi Guo, Michael (Shan-Hui) Ho:
Molecular solutions of the RSA public-key cryptosystem on a DNA-based computer. J. Supercomput. 61(3): 642-672 (2012) - 2011
- [i1]Weng-Long Chang, Mang Feng, Kawuu Weicheng Lin, Chih-Chiang Wang, Ju-Chin Chen:
Quantum Algorithms of Solving the Backtracking of One-dimensional Cellular Automata. CoRR abs/1109.2998 (2011) - 2010
- [c4]Weng-Long Chang, Ting-Ting Ren, Mang Feng, Jun Luo, Kawuu Weicheng Lin, Minyi Guo, Lai Chin Lu, Chih-Chiang Wang, Gwo-Jia Jong:
Quantum Algorithms and Mathematical Representation of Bio-molecular Solutions for the Clique Problem in a Finite-dimensional Hilbert Space. CASoN 2010: 717-720 - [c3]Weng-Long Chang, Ting-Ting Ren, Mang Feng, Jun Luo, Kawuu Weicheng Lin, Minyi Guo, Lai Chin Lu, Gwo-Jia Jong, Chih-Chiang Wang:
Quantum Algorithms and Mathematical Representation of Bio-molecular Solutions for the Hitting-set Problem on a Quantum Computer. CASoN 2010: 721-724
2000 – 2009
- 2008
- [j1]Chih-Chiang Wang, Khaled Harfoush:
Shortest-path routing in randomized DHT-based Peer-to-Peer systems. Comput. Networks 52(18): 3307-3317 (2008) - 2007
- [c2]Chih-Chiang Wang, Khaled Harfoush:
On the Stability-Scalability Tradeoff of DHT Deployment. INFOCOM 2007: 2207-2215 - 2006
- [c1]Chih-Chiang Wang, Khaled Harfoush:
RASTER: A Light-Weight Routing Protocol to Discover Shortest Overlay Routes in Randomized DHT Systems. ICPADS (1) 2006: 553-560
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint