default search action
Yen-Wen Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Yen-Wen Chen, Rui-Hsuan Wang, Yu-Hsiang Cheng, Chih-Cheng Lu, Meng-Fan Chang, Kea-Tiong Tang:
SUN: Dynamic Hybrid-Precision SRAM-Based CIM Accelerator With High Macro Utilization Using Structured Pruning Mixed-Precision Networks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(7): 2163-2176 (2024) - [j31]Chia-Yen Lee, Yen-Wen Chen:
Reinforcement Learning With Data Envelopment Analysis and Conditional Value-At-Risk for the Capacity Expansion Problem. IEEE Trans. Engineering Management 71: 6469-6480 (2024) - [c35]Yen-Wen Chen, Pin-Chi Chu, Chia-Yen Lee:
Real Options for Maintenance Scheduling with Bearing Degradation in Panel Manufacturer. CASE 2024: 1325-1330 - [c34]Yen-Wen Chen, Her-Terng Yau, Tsung-Yu Hsiao, Song-Wei Hong, Yi-Hsuan Cheng, Yi-Ji Wang:
Optimal Design using Particle Swarm Optimization for Ropeway Carrier Passive Dynamic Vibration Absorbers. MESA 2024: 1-7 - 2023
- [c33]Yen-Wen Chen, Yi-Wei Chiu, Yu-Sin Liu, Chih-Yu Huang, Yu-Chun Shen:
AI Powered Multi-model Content Creation For Virtual Gallery Using Learning Machine. UEMCON 2023: 704-709 - 2021
- [c32]Yen-Wen Chen, Kuo-Che Kao:
Study of Contention Window Adjustment for CSMA/CA by Using Machine Learning. APNOMS 2021: 206-209 - 2020
- [j30]Yoshiaki Kitaguchi, Woojin Seok, Jiun-Long Huang, Hongtaek Ju, Yen-Wen Chen, Kiyohito Yoshihara:
Management in a Cyber-Physical World: A Report on APNOMS 2019. J. Netw. Syst. Manag. 28(2): 423-431 (2020) - [j29]Yen-Sheng Chiang, Yen-Wen Chen, Wen-Chi Chuang, Chyi-In Wu, Chien-Te Wu:
Triadic balance in the brain: Seeking brain evidence for Heider's structural balance theory. Soc. Networks 63: 80-90 (2020)
2010 – 2019
- 2019
- [j28]Yen-Wen Chen, Yen-Yin Chu, Chun-Hsien Kung:
Dynamic group-based scheduling of machine-to-machine communication for uplink traffic in LTE networks. Int. J. Ad Hoc Ubiquitous Comput. 30(1): 48-58 (2019) - [c31]Yen-Wen Chen, Chih-Hong Chang:
Effective Uplink Data Transmission Scheme for MTCDs in LTE-A Networks. APNOMS 2019: 1-4 - [c30]Cheng-Ta Huang, Cheng-Yu Yang, Chi-Yao Weng, Yen-Wen Chen, Shiuh-Jeng Wang:
Secure Protocol for Identity-based Provable Data Possession in Cloud Storage. ICCCS 2019: 327-331 - 2018
- [j27]Yen-Wen Chen, Po-Yin Liao, Yu-Ching Chen:
Study of relay-based ad hoc rendezvous and data transmission in cognitive radio networks. Pervasive Mob. Comput. 51: 160-173 (2018) - [j26]Cheng-Yu Yang, Cheng-Ta Huang, Ya-Ping Wang, Yen-Wen Chen, Shiuh-Jeng Wang:
File changes with security proof stored in cloud service systems. Pers. Ubiquitous Comput. 22(1): 45-53 (2018) - [c29]Yen-Wen Chen, Yu-Hsuan Lin:
Study of Rule Placement Schemes for Minimizing TCAM Space and Effective Bandwidth Utilization in SDN. FiCloud Workshops 2018: 21-27 - 2017
- [j25]Yen-Wen Chen, Yen-Yin Chu, Chih-Wei Lai:
Study on State Dependent Radio Resource Scheduling for Downlink Traffic in LTE Networks. Wirel. Pers. Commun. 96(3): 4709-4723 (2017) - [c28]Chang-Wu Chen, Sang-Yoon Chang, Yih-Chun Hu, Yen-Wen Chen:
Protecting vehicular networks privacy in the presence of a single adversarial authority. CNS 2017: 1-9 - 2016
- [j24]Amy H. I. Lee, Chien-Wei Wu, Yen-Wen Chen:
A modified variables repetitive group sampling plan with the consideration of preceding lots information. Ann. Oper. Res. 238(1-2): 355-373 (2016) - [j23]Yen-Wen Chen, Po-Ying Liao, Ying-Cheng Wang:
A channel-hopping scheme for continuous rendezvous and data delivery in cognitive radio network. Peer-to-Peer Netw. Appl. 9(1): 16-27 (2016) - [j22]Chien-Wei Wu, Amy H. I. Lee, Yen-Wen Chen:
A Novel Lot Sentencing Method by Variables Inspection Considering Multiple Dependent State. Qual. Reliab. Eng. Int. 32(3): 985-994 (2016) - [c27]Yen-Wen Chen, Wang-Hsin Lu:
Small cells placement scheme in metropolitan area environment. APNOMS 2016: 1-6 - 2015
- [j21]Yen-Wen Chen, Meng-Hsien Lin, Min-Yan Wu:
Study of Data Placement Schemes for SNS Services in Cloud Environment. KSII Trans. Internet Inf. Syst. 9(8): 3203-3215 (2015) - [j20]Meng-Hsien Lin, Yen-Wen Chen:
Performance Analysis of Buffer Aware Scheduling for Video Services in LTE Network. KSII Trans. Internet Inf. Syst. 9(9): 3594-3610 (2015) - [j19]Yen-Wen Chen, Meng-Hsien Lin, Chen-Yu Yang, Yuan-Cheng Liang:
Analysis and Measurement of Signaling in 3G Environment for Social Networking Services. Wirel. Pers. Commun. 84(2): 867-883 (2015) - [c26]Pin-Jui Chen, Yen-Wen Chen:
Implementation of SDN based network intrusion detection and prevention system. ICCST 2015: 141-146 - 2014
- [j18]Yen-Wen Chen, Yen-Yin Chu, I-Hsuan Peng:
Energy-saving centric uplink scheduling scheme for broadband wireless access networks. EURASIP J. Wirel. Commun. Netw. 2014: 70 (2014) - [j17]Yen-Wen Chen, Meng-Hsien Lin, Yung-Ta Su:
Power Saving Efficiency Analysis of QoS Scheduling in the LTE Network Featuring Discontinuous Reception Operation. IEICE Trans. Commun. 97-B(10): 2212-2221 (2014) - [j16]Shaoh-Chen Ke, Yen-Wen Chen, Hao-An Fang:
An energy-saving-centric downlink scheduling scheme for WiMAX networks. Int. J. Commun. Syst. 27(11): 2518-2535 (2014) - [c25]Meng-Hsien Lin, Yen-Wen Chen:
Performance study of downlink scheduling for video streaming in LTE network. APNOMS 2014: 1-6 - [c24]Cui-Yu Kong, Yen-Wen Chen, I-Hsuan Peng:
Referential bounds analysis of uplink radio resource scheduling in LTE network. CCNC 2014: 519-524 - [c23]Yen-Wen Chen, Chien-Wei Wu:
A new lot sentencing method by variables inspection. CSCWD 2014: 380-383 - [c22]Yen-Wen Chen, Pei Ying Hsu, Jung Heng Tsai, Po Yin Liao, Meng-Hsien Lin:
A Heuristic Design of Uplink Scheduler in LTE-A Networks. IIH-MSP 2014: 884-888 - [c21]Fu Yuan Chua, Kang-Hao Lo, Yen-Wen Chen:
Study of Radio Resource Reallocation for Hotspots in LTE Network. ICS 2014: 355-363 - [c20]Yen-Wen Chen, Meng-Hsien Lin, Cho-Chun Huang:
Study of buffer aware scheduling for video streaming in LTE network. WPMC 2014: 531-535 - 2013
- [j15]I-Hsuan Peng, Yen-Wen Chen:
Energy consumption bounds analysis and its applications for grid based wireless sensor networks. J. Netw. Comput. Appl. 36(1): 444-451 (2013) - [j14]Yen-Wen Chen, Shaoh Chen Ke:
A uplink radio resource allocation scheme for localized SC-FDMA transmission in LTE network. J. Supercomput. 66(2): 670-685 (2013) - [c19]Yen-Wen Chen, Meng-Hsien Lin, Yung-Ta Su, Addison Y. S. Su:
Comparisons of power-saving efficiency for QoS traffics in LTE network by burst scheduling. APNOMS 2013: 1-6 - [c18]I-Hsuan Peng, Meng-Hsien Lin, Yen-Wen Chen, Fong-Ming Yang, Addison Y. S. Su:
Improvement of Streaming Video in Differential Service Networks by Using Opportunity RED Mechanism. CISIS 2013: 644-648 - 2012
- [j13]Chung-Ming Huang, Hao-Hsiang Ku, Yu-Chang Chao, Cheng-Wei Lin, Yen-Wen Chen:
Design and implementation of an adaptive Web2.0 QoS-based home appliance control service platform. Softw. Pract. Exp. 42(1): 57-87 (2012) - [c17]Po-Ying Liao, Bing-Mao Wu, Yen-Wen Chen:
Study of channel selection strategies in cognitive radio networks. ITST 2012: 160-164 - [c16]Yen-Wen Chen, I-Hsuan Peng, Chien-Yu Lai:
Study of Radio Resource Allocation Scheme for Single Carrier FDMA in LTE Network. VTC Spring 2012: 1-5 - 2011
- [j12]Yen-Wen Chen, Chang-Wu Chen, Yi-Shiou Lin:
Cross-layer design for radio resource allocation based on priority scheduling in OFDMA wireless access network. EURASIP J. Wirel. Commun. Netw. 2011: 28 (2011) - [j11]Duen-Yian Yeh, Ching-Hsue Cheng, Yen-Wen Chen:
A predictive model for cerebrovascular disease using data mining. Expert Syst. Appl. 38(7): 8970-8977 (2011) - [j10]Hwa-Chun Ma, Prasan Kumar Sahoo, Yen-Wen Chen:
Computational geometry based distributed coverage hole detection protocol for the wireless sensor networks. J. Netw. Comput. Appl. 34(5): 1743-1756 (2011) - [j9]Yen-Wen Chen, Ming-Jen Huang:
Study of Heuristic MAP Selection and Abstraction Schemes with Load Balance in HMIPv6. Wirel. Pers. Commun. 57(2): 217-232 (2011) - [c15]Chung-Ming Huang, Hao-Hsiang Ku, Yen-Wen Chen:
Design and Implementation of a Web 2.0 Service Platform for DPWS-Based Home-Appliances in the Cloud Environment. AINA Workshops 2011: 159-163 - [c14]I-Hsuan Peng, Yen-Wen Chen, Chang-Wu Chen, Yu-Chin Huang:
Management of multiplexed ATM connection over WiMax network. APNOMS 2011: 1-5 - 2010
- [j8]Yen-Wen Chen, Ming-Huang Tsai:
A Supplementary of WiMax Downlink Scheduling for Jitter Sensitive Traffic. IEICE Trans. Commun. 93-B(10): 2769-2772 (2010)
2000 – 2009
- 2009
- [j7]I-Hsuan Peng, Yen-Wen Chen, Hsiang-Ru Peng:
A Systematic Wavelength Assign Algorithm for Multicast in WDM Networks with Sparse Conversion Nodes. J. Inf. Sci. Eng. 25(2): 559-574 (2009) - [j6]I-Hsuan Peng, Yen-Wen Chen, Po-Wei Wu:
A connectivity-based approach for the construction of hierarchical WDM network topology. Photonic Netw. Commun. 18(1): 116-121 (2009) - [c13]Po-Ying Liao, Yen-Wen Chen:
A Demand-Aware Grouping Scheme for VoD Service in Peer to Peer Environment. ISPAN 2009: 480-484 - 2008
- [j5]Yen-Wen Chen, I-Hsuan Peng:
Study of multicast wavelength arrangement for maximizing network capacity in WDM networks with sparse wavelength converters. Photonic Netw. Commun. 15(2): 141-152 (2008) - [c12]Yen-Wen Chen, Hwa-Chun Ma, I-Hsuan Peng, Ta-En Chang:
Study of Cluster-Based Data Forwarding in Sensor Networks with Limited High-Power Mobile Nodes. ISPAN 2008: 93-98 - [c11]Chang-Wu Chen, Ping-Jia Su, Yen-Wen Chen:
Design of path-based multicast routing protocol in MANET. PM2HW2N 2008: 131-136 - 2007
- [c10]I-Hsuan Peng, Kuo-Wei Peng, Yen-Wen Chen:
Cross Layer Routing for Reliable Connections in IP over WDM Networks. AINA Workshops (1) 2007: 130-135 - [c9]Yen-Wen Chen, I-Hsuan Peng, Shiu-Tsuen Guan:
Dynamic Bandwidth Management for Handoffs with RSVP in 802.16/WLAN Environment. AINA Workshops (2) 2007: 243-248 - [c8]Yen-Wen Chen, Chin-Shiang Kuo:
Integrated Design of Grid-based Routing in Wireless Sensor Network. AINA 2007: 625-631 - [c7]Yen-Wen Chen, Fu-Yia Hsieh:
A Cross Layer Design for Handoff in 802.16e Network with IPv6 Mobility. WCNC 2007: 3844-3849 - 2006
- [j4]Yen-Wen Chen, I-Hsuan Peng:
Shared protection of lightpath with guaranteed switching time over DWDM networks. J. Commun. Networks 8(2): 228-233 (2006) - [c6]Yen-Wen Chen, Ming-Jen Huang:
A Novel MAP Selection Scheme by Using Abstraction Node in Hierarchical MIPv6. ICC 2006: 5408-5413 - [c5]Yen-Wen Chen, Yuan-Long Lee, I-Hsuan Peng:
Connection Control by Virtual Admission in Wireless LAN Environment. WASA 2006: 14-25 - 2005
- [j3]Yen-Wen Chen:
Study of LSP arrangement schemes in label switch networks. Int. J. Netw. Manag. 15(6): 421-431 (2005) - [c4]Yen-Wen Chen, Ji-Min Shih:
Binding Updates for Mobile Networks by Using Multicast Mechanism in IPv6 Environment. AINA 2005: 790-795 - 2004
- [c3]Yen-Wen Chen, Jian-Chin Huang:
Arrangement of prioritized LSP in MPLS networks. Parallel and Distributed Computing and Networks 2004: 88-93 - 2003
- [c2]Yen-Wen Chen, Zhong-Jian Yan:
Effect of the Label Management in Mobile IP over MPLS Networks. AINA 2003: 379-385 - [c1]Yuh-Ruey Lee, Chia-Wen Lin, Yen-Wen Chen:
Computation reduction in cascaded DCT-domain video downscaling transcoding. ISCAS (2) 2003: 860-863 - 2002
- [j2]Yen-Wen Chen:
Traffic behavior analysis and modeling of sub-networks. Int. J. Netw. Manag. 12(5): 323-330 (2002) - 2000
- [j1]Yen-Wen Chen, Jean-Lien C. Wu:
A heuristic approach of bandwidth management for video sources in ATM networks. Int. J. Netw. Manag. 10(1): 41-49 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint