


default search action
Chen-Shu Wang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c27]Jinyu Cai, Jialong Li, Mingyue Zhang, Munan Li, Chen-Shu Wang, Kenji Tei:
Language Evolution for Evading Social Media Regulation via LLM-Based Multi-Agent Simulation. CEC 2024: 1-10 - [c26]Chen-Shu Wang, Wei-Chieh Lin, Bo-Yi Li:
Applied Machine Learning to Analyze Negative Online Reviews: Feature Extraction and Usefulness Prediction. M2VIP 2024: 1-6 - [i1]Jinyu Cai, Jialong Li, Mingyue Zhang, Munan Li, Chen-Shu Wang, Kenji Tei:
Language Evolution for Evading Social Media Regulation via LLM-based Multi-agent Simulation. CoRR abs/2405.02858 (2024) - 2022
- [c25]Chen-Shu Wang, Yean-Lin Lee:
Using Classification Algorithms to Predict Taiwan Stock Market - A Case Study of Taiwan Index Futures. ICS 2022: 255-266 - 2021
- [j15]Chun-Jung Juan, Chen-Shu Wang, Bo-Yi Lee
, Shang-Yu Chiang, Chun-Chang Yeh, Der-Yang Cho, Wu-Chung Shen:
Integration of Genetic Programming and TABU Search Mechanism for Automatic Detection of Magnetic Resonance Imaging in Cervical Spondylosis. Int. J. Interact. Multim. Artif. Intell. 6(7): 109 (2021)
2010 – 2019
- 2019
- [j14]Chen-Shu Wang, Shiang-Lin Lin, Tung-Hsiang Chou, Bo-Yi Li
:
An integrated data analytics process to optimize data governance of non-profit organization. Comput. Hum. Behav. 101: 495-505 (2019) - [c24]Chen-Shu Wang, Bo-Yi Li, Chao-Wei Yang, Wei-Chieh Lin, Shang-Chih Hung, Song-Bor Chiang, Chih-Hsuan Tsuei:
Optimized Luminaire Allocation and Configuration with Luminaire Failure Compensation. BigComp 2019: 1-8 - 2017
- [c23]Bo-Yi Li, Chen-Shu Wang:
To Solve the TDVRPTW via Hadoop MapReduce Parallel Computing. ACIIDS (2) 2017: 55-64 - [c22]Chen-Shu Wang, Shiang-Lin Lin, Jui-Yen Chang:
MapReduce-Based Frequent Pattern Mining Framework with Multiple Item Support. ACIIDS (2) 2017: 65-74 - [c21]Chen-Ling Tai, Chen-Shu Wang:
Balanced k-Means. ACIIDS (2) 2017: 75-82 - [c20]Chen-Shu Wang, Chun-Jung Juan, Tung-Yao Lin, Chun-Chang Yeh, Shang-Yu Chiang:
Prediction Model of Cervical Spine Disease Established by Genetic Programming. MISNC 2017: 38:1-38:6 - 2016
- [j13]Chen-Shu Wang, Cheng-Yu Lai, Shiang-Lin Lin:
What Make People Getting Charged Apps Instead of Free One? J. Glob. Inf. Manag. 24(2): 57-74 (2016) - [j12]Chen-Shu Wang, Shiang-Lin Lin, Heng-Li Yang:
Impersonate human decision making process: an interactive context-aware recommender system. J. Intell. Inf. Syst. 47(2): 195-207 (2016) - [c19]Chen-Shu Wang, Shiang-Lin Lin:
Why are people willing to pay for cloud storage service? ICIS 2016: 1-6 - [c18]Shiang-Lin Lin, Chen-Shu Wang, Hui-Chu Chiu, Chun-Jung Juan:
Analyzing Medical Transaction Data by using Association Rule Mining with Multiple Minimum Supports. PACIS 2016: 391 - 2015
- [j11]Chen-Shu Wang, Yu-Chieh Li, Yeu-Ruey Tzeng:
How to replicate the cognitive process in computer game-based learning units. Inf. Technol. People 28(2): 327-343 (2015) - [c17]Chen-Shu Wang, Shiang-Lin Lin:
An integrated optimization model for wireless access point deployment construction, and enhancement. SNPD 2015: 339-344 - 2014
- [c16]Shiang-Lin Lin, Chen-Shu Wang, Heng-Li Yang:
Applying Fuzzy AHP to Understand the Factors of Cloud Storage Adoption. ACIIDS (2) 2014: 282-291 - 2013
- [j10]Chen-Shu Wang:
An Agent-Based Expert System Architecture for Product Return Administration. IEICE Trans. Inf. Syst. 96-D(1): 73-80 (2013) - [j9]Chen-Shu Wang, Wen-Chih Chang:
Guest Editorial. J. Softw. 8(9): 2105 (2013) - [c15]Chen-Shu Wang, Shiang-Lin Lin, Heng-Li Yang:
Combining FAHP with MDS to Analyze the Key Factors of Different Consumer Groups for Tablet PC Purchasing. ITCS 2013: 607-616 - 2012
- [j8]Chen-Shu Wang, Heng-Li Yang:
A recommender mechanism based on case-based reasoning. Expert Syst. Appl. 39(4): 4335-4343 (2012) - [c14]Chen-Shu Wang, Li-Fang Kao:
The Optimal Deployment of Wi-Fi Wireless Access Points Using the Genetic Algorithm. ICGEC 2012: 542-545 - [c13]Chen-Shu Wang, Yi-Dung Chen:
Base Station Deployment with Capacity and Coverage in WCDMA Systems Using Genetic Algorithm at Different Height. ICGEC 2012: 546-549 - [c12]Chen-Shu Wang, Shiang-Lin Lin:
Combining Fuzzy AHP and Association Rule to Evaluate the Activity Processes of E-learning System. ICGEC 2012: 566-570 - 2011
- [c11]Chen-Shu Wang, I-Hsien Ting, Yu-Chieh Li:
Taiwan Academic Network Discussion via Social Networks Analysis Perspective. ASONAM 2011: 685-689 - [c10]I-Hsien Ting, Chia-Hung Lin, Chen-Shu Wang:
Constructing a Cloud Computing Based Social Networks Data Warehousing and Analyzing System. ASONAM 2011: 735-740 - 2010
- [j7]Deng-Yiv Chiu, Chen-Shu Wang, Wen-Chih Chang:
Guest Editorial. J. Softw. 5(12): 1315-1316 (2010) - [j6]Deng-Yiv Chiu, Chen-Shu Wang, Tien-Tsun Chung:
Attacking and Defending Perspective of E-Crime Behavior and Psychology: A Systemic Dynamic Simulation Approach. J. Softw. 5(12): 1349-1354 (2010) - [c9]Chen-Shu Wang, Chun-Yi Li:
Integrated baby-care recommender platform based on hybrid commonsense reasoning and case-based reasoning algorithms. NCM 2010: 676-681 - [c8]Chen-Shu Wang, Yu-Chieh Li:
IT/IM academic network in Taiwan via social networks analyze of conference committees. NCM 2010: 733-737
2000 – 2009
- 2009
- [j5]Heng-Li Yang, Chen-Shu Wang:
Corrigendum "Recommender system for software project planning one application of revised CBR algorithm" [Experts Systems with Applications 36 (5) (2009) 8938-8945]. Expert Syst. Appl. 36(10): 12627 (2009) - [c7]Chen-Shu Wang, Hsin-Chang Li:
General Model for Ubiquitous Networking Deployment Constructed Recommendation. NCM 2009: 97-102 - [c6]Chen-Shu Wang, Yu-Chieh Li:
Integrated Network Management Certification Training with Computer Game: A Knowledge Placement Framework. NCM 2009: 1842-1845 - 2008
- [j4]Heng-Li Yang, Chen-Shu Wang:
Two stages of case-based reasoning - Integrating genetic algorithm with data mining mechanism. Expert Syst. Appl. 35(1-2): 262-272 (2008) - [j3]Chien-Chih Yu
, Chen-Shu Wang:
A hybrid mining approach for optimizing returns policies in e-retailing. Expert Syst. Appl. 35(4): 1575-1582 (2008) - [j2]Heng-Li Yang, Chen-Shu Wang:
Locating online loan applicants for an insurance company. Online Inf. Rev. 32(2): 221-235 (2008) - [j1]Chen-Shu Wang, Ching-Ter Chang:
Integrated genetic algorithm and goal programming for network topology design problem with multiple objectives and multiple criteria. IEEE/ACM Trans. Netw. 16(3): 680-690 (2008) - [c5]Chuen-Lung Chen, Chen-Shu Wang, Ya-Hui Lee, Yu-Min Lee:
A Process-Oriented System Dynamics Model for Software Development Project Prediction. NCM (2) 2008: 126-131 - [c4]Chen-Shu Wang, Yeu-Ruey Tzeng:
A Wireless Networking Technologies Overview Over Ubiquitous Service Applications. NCM (1) 2008: 156-161 - 2007
- [c3]Heng-Li Yang, Chen-Shu Wang:
Integrated Framework for Reverse Logistics. IEA/AIE 2007: 501-510 - [c2]Heng-Li Yang, Chen-Shu Wang, Mu-Yen Chen
:
A Personalization Recommendation Framework of IT Certification e-Learning System. KES (2) 2007: 50-57 - [c1]Chen-Shu Wang, Yeu-Ruey Tzeng:
Prediction Model for Policy Loans of Insurance Company. CEC/EEE 2007: 653-658
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint