default search action
Sheng-De Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c65]Tai-Che Feng, Sheng-De Wang:
VP-DARTS: Validated Pruning Differentiable Architecture Search. ICAART (2) 2024: 47-57 - 2023
- [j62]Yin-Tzu Huang, Tzer-Shyong Chen, Sheng-De Wang:
Authenticated Key Agreement Scheme for Fog Computing in a Health-Care Environment. IEEE Access 11: 46871-46881 (2023) - [c64]Shih Ping Lin, Sheng-De Wang:
SGAS-es: Avoiding Performance Collapse by Sequential Greedy Architecture Search with the Early Stopping Indicator. FICC (2) 2023: 135-154 - [c63]Wei-Chin Chien, Sheng-De Wang:
Anomaly Detection for Multivariate Industrial Sensor Data via Decoupled Generative Adversarial Network. ICAART (3) 2023: 1028-1035 - [c62]Min-Chun Tsai, Sheng-De Wang:
Self-Supervised Image Anomaly Detection and Localization with Synthetic Anomalies. IOTSMS 2023: 90-95 - [c61]Jen-Chieh Yang, Hung-I Lin, Lin-Jing Kuo, Sheng-De Wang:
MOFP: Multi-Objective Filter Pruning for Deep Learning Models. TrustCom 2023: 2414-2423 - [c60]Chang-Hsuan Hsieh, Jen-Chieh Yang, Hung-Yi Lin, Lin-Jing Kuo, Sheng-De Wang:
A Hybrid Filter Pruning Method Based on Linear Region Analysis. TrustCom 2023: 2424-2431 - [c59]Peng-Yu Chen, Jen-Chieh Yang, Sheng-De Wang:
Soft Hybrid Filter Pruning using a Dual Ranking Approach. TrustCom 2023: 2432-2439 - 2022
- [j61]Ssu-Ting Liu, Sheng-De Wang:
Improved Trickle Algorithm Toward Low Power and Better Route for the RPL Routing Protocol. IEEE Access 10: 83322-83335 (2022) - [j60]Jen-Kuang Liu, Sheng-De Wang:
CFFS: A Persistent Memory File System for Contiguous File Allocation With Fine-Grained Metadata. IEEE Access 10: 91678-91698 (2022) - [j59]Yin-Tzu Huang, Dai-Lun Chiang, Tzer-Shyong Chen, Sheng-De Wang, Feipei Lai, Yu-Da Lin:
Lagrange interpolation-driven access control mechanism: Towards secure and privacy-preserving fusion of personal health records. Knowl. Based Syst. 236: 107679 (2022) - [c58]You-Wei Cheng, Sheng-De Wang:
Enhanced Local Gradient Smoothing: Approaches to Attacked-region Identification and Defense. ICAART (2) 2022: 254-263 - [c57]Lit-Yang Liew, Sheng-De Wang:
Object Detection Edge Performance Optimization on FPGA-Based Heterogeneous Multiprocessor Systems. ICCE 2022: 1-6 - [c56]Yu-Kai Ling, Ren Chieh Yang, Sheng-De Wang:
Difficulty-Aware Mixup for Replay-based Continual Learning. ICS 2022: 305-316 - 2021
- [j58]Wen-Chin Chen, Yin-Tzu Huang, Sheng-De Wang:
Provable Secure Group Key Establishment Scheme for Fog Computing. IEEE Access 9: 158682-158694 (2021) - [j57]Yi-Hsin Wu, Jui-Yu Huang, Yi-Chun Yao, Yin-Jing Tien, Cheng-Juei Yu, Sheng-De Wang:
Detecting and Scoring Equipment Faults in Real Time During Semiconductor Test Processes. IEEE Des. Test 38(4): 119-126 (2021) - [i2]Jun-Liang Lin, Sheng-De Wang:
Communication-Efficient Separable Neural Network for Distributed Inference on Edge Devices. CoRR abs/2111.02489 (2021) - 2020
- [j56]Yi-Hsin Wu, Yu-Hsin Chang, Yin-Jing Tien, Cheng-Juei Yu, Sheng-De Wang, Cheng-Hung Wu:
Using Partial Combination Models to Improve Prediction Quality and Transparency in Mixed Datasets. IEEE Access 8: 132106-132120 (2020) - [j55]Chi-Wei Lu, Sheng-De Wang, Shao-Yi Chien:
A Novel Gaming Video Encoding Process Using In-Game Motion Vectors. IEEE Trans. Circuits Syst. Video Technol. 30(7): 2207-2214 (2020) - [c55]Jia-Wei Kan, Wei-Chin Chien, Sheng-De Wang:
Grid Structure Attention for Natural Language Interface to Bash Commands. ICS 2020: 67-72 - [c54]Hsi-Wen Chen, Hong-Han Shuai, Sheng-De Wang, De-Nian Yang:
Quality-Aware Streaming Network Embedding with Memory Refreshing. PAKDD (1) 2020: 448-461
2010 – 2019
- 2019
- [c53]Anthony Chen, Fu-Hsuan Liu, Sheng-De Wang:
Data Reduction for real-time bridge vibration data on Edge. DSAA 2019: 602-603 - 2018
- [j54]Cheng-Juei Yu, Yi-Hsin Wu, Sheng-De Wang:
An Approach to the Design of Specific Hardware Circuits from C Programs. J. Inf. Sci. Eng. 34(2): 337-351 (2018) - [c52]Yen-Cheng Liu, Yu-Ying Yeh, Tzu-Chien Fu, Sheng-De Wang, Wei-Chen Chiu, Yu-Chiang Frank Wang:
Detach and Adapt: Learning Cross-Domain Disentangled Deep Representation. CVPR 2018: 8867-8876 - [c51]Kuan-Ting Chen, Sheng-De Wang:
Distributed Continuous Control with Meta Learning on Robotic Arms. SMC 2018: 3081-3087 - 2017
- [c50]Yi-Hsin Wu, Sheng-De Wang, Li-Jung Chen, Cheng-Juei Yu:
Streaming analytics processing in manufacturing performance monitoring and prediction. IEEE BigData 2017: 3285-3289 - [c49]Jhen-Hao Li, Sheng-De Wang:
PhishBox: An Approach for Phishing Validation and Detection. DASC/PiCom/DataCom/CyberSciTech 2017: 557-564 - [c48]Sheng-De Wang, Kuan-Jung Chiang:
BLE Tree Networks for Sensor Devices in Internet of Things. DASC/PiCom/DataCom/CyberSciTech 2017: 1304-1309 - [c47]Yen-Cheng Liu, Wei-Chen Chiu, Sheng-De Wang, Yu-Chiang Frank Wang:
Domain-Adaptive generative adversarial networks for sketch-to-photo inversion. MLSP 2017: 1-6 - [i1]Tzu-Chien Fu, Yen-Cheng Liu, Wei-Chen Chiu, Sheng-De Wang, Yu-Chiang Frank Wang:
Learning Cross-Domain Disentangled Deep Representation with Supervision from A Single Domain. CoRR abs/1705.01314 (2017) - 2016
- [c46]Che-Hsun Liu, Zhi Jie Zhang, Sheng-De Wang:
An Android Malware Detection Approach Using Bayesian Inference. CIT 2016: 476-483 - [c45]Yu-Chen Chang, Sheng-De Wang:
The Concept of Attack Scenarios and Its Applications in Android Malware Detection. HPCC/SmartCity/DSS 2016: 1485-1492 - 2015
- [j53]Chien-Chi Chen, Sheng-De Wang:
A hybrid multiple-character transition finite-automaton for string matching engine. Microprocess. Microsystems 39(2): 122-134 (2015) - [c44]Tahsin Turker Mutlugun, Sheng-De Wang:
OpenCL computing on FPGA using multiported shared memory. FPL 2015: 1-4 - [c43]Hsiang-Yu Tseng, Ssu-Ting Liu, Sheng-De Wang:
An FPGA Memory Hierarchy for High-level Synthesized OpenCL Kernels. HPCC/CSS/ICESS 2015: 1719-1724 - [c42]Hui-Hao Chou, Sheng-De Wang:
An adaptive network intrusion detection approach for the cloud environment. ICCST 2015: 1-6 - [c41]Hsin-Yu Chuang, Sheng-De Wang:
Machine Learning Based Hybrid Behavior Models for Android Malware Analysis. QRS 2015: 201-206 - 2014
- [c40]Ssu-Ting Liu, Sheng-De Wang:
PFBF: Pre-Filtered Bloom Filters. ICS 2014: 32-39 - 2013
- [j52]Chien-Chi Chen, Sheng-De Wang:
An efficient multicharacter transition string-matching engine based on the aho-corasick algorithm. ACM Trans. Archit. Code Optim. 10(4): 25:1-25:22 (2013) - [c39]Chia-Hao Hsu, Sheng-De Wang:
An Embedded NIDS with Multi-core Aware Packet Capture. CSE 2013: 778-785 - 2012
- [j51]Yeong-Sheng Chen, Der-Jiunn Deng, Yu-Ming Hsu, Sheng-De Wang:
Efficient uplink scheduling policy for variable bit rate traffic in IEEE 802.16 BWA systems. Int. J. Commun. Syst. 25(6): 734-748 (2012) - [j50]Chia-Hui Liu, Yu-Fang Chung, Tzer-Shyong Chen, Sheng-De Wang:
Mobile Agent Application and Integration in Electronic Anamnesis System. J. Medical Syst. 36(3): 1009-1020 (2012) - [j49]Chia-Hui Liu, Yu-Fang Chung, Tzer-Shyong Chen, Sheng-De Wang:
The Enhancement of Security in Healthcare Information Systems. J. Medical Syst. 36(3): 1673-1688 (2012) - [j48]Chia-Hui Liu, Yu-Fang Chung, Te-Wei Chiang, Tzer-Shyong Chen, Sheng-De Wang:
A Mobile Agent Approach for Secure Integrated Medical Information Systems. J. Medical Syst. 36(5): 2731-2741 (2012) - 2011
- [c38]Cheng-Han You, Sheng-De Wang:
A Data Parallel Approach to XML Parsing and Query. HPCC 2011: 520-527 - [c37]Chia-Hao Hsu, Sheng-De Wang:
Embedded Network Intrusion Detection Systems with a Multi-core Aware Packet Capture Module. ICPP Workshops 2011: 207-213 - [c36]Sheng-De Wang, Chih-Hung Weng:
Algorithms and Hardware Architectures for Variable Block Size Motion Estimation. UIC 2011: 536-549 - 2010
- [j47]Yi-Chih Liu, Sheng-De Wang:
A virtual teleconferencing system based on face detection and 3D animation in a low-bandwidth environment. Int. J. Imaging Syst. Technol. 20(4): 323-332 (2010) - [j46]Chang-Ching Yang, Chen-Mou Cheng, Sheng-De Wang:
Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems. J. Inf. Sci. Eng. 26(5): 1563-1582 (2010) - [j45]Cheng-Juei Yu, Yi-Hsin Wu, Sheng-De Wang:
An in-place search algorithm for the resource constrained scheduling problem during high-level synthesis. ACM Trans. Design Autom. Electr. Syst. 15(4): 29:1-29:13 (2010)
2000 – 2009
- 2009
- [j44]Yi-Hsin Wu, Cheng-Juei Yu, Sheng-De Wang:
Heuristic algorithm for the resource constrained scheduling problem during high-level synthesis. IET Comput. Digit. Tech. 3(1): 43-51 (2009) - [j43]Kuo-Ping Wu, Sheng-De Wang:
Choosing the kernel parameters for support vector machines by the inter-cluster distance in the feature space. Pattern Recognit. 42(5): 710-717 (2009) - [c35]Yeong-Sheng Chen, Der-Jiunn Deng, Yu-Ming Hsu, Sheng-De Wang:
An enhanced uplink scheduling algorithm for video traffic transmission in IEEE 802.16 BWA systems. IWCMC 2009: 1330-1334 - [c34]Chia-Hui Liu, Yu-Fang Chung, Tzer-Shyong Chen, Sheng-De Wang:
Access Control and Key Management Scheme Based on Bilinear Pairings over Elliptic Curves for Mobile Agent. MUE 2009: 189-196 - 2008
- [c33]Yuan-Chin Wen, Chia-Hung Chen, Sheng-De Wang:
Crossing Heterogeneous Grid Systems with a Single Sign-On Scheme Based on a P2P Layer. APSCC 2008: 45-51 - [c32]Ching-Hwa Yu, Michael Pan, Sheng-De Wang:
Adaptive Neighbor Caching for Fast BSS Transition Using IEEE 802.11k Neighbor Report. ISPA 2008: 353-360 - 2007
- [c31]Sheng-De Wang, Zheng Yi Huang:
Layered Peer to Peer Streaming Using Hidden Markov Models. EUC Workshops 2007: 136-145 - [c30]Hau-Han Wang, Sheng-De Wang:
The Modified Grid Location Service for Mobile Ad-Hoc Networks. GPC 2007: 334-347 - [c29]Yung-Tai Hsu, Yuan-Jin Wen, Sheng-De Wang:
Embedded Hardware/Software Design and Cosimulation using User Mode Linux and SystemC. ICPP Workshops 2007: 17 - [c28]Kuo-Ping Wu, Sheng-De Wang:
Choosing the Kernel Parameters for the Directed Acyclic Graph Support Vector Machines. MLDM 2007: 276-285 - [c27]Chia Hsiang Hsu, Cheng-Juei Yu, Sheng-De Wang:
Energy Saving Based on CPU Voltage Scaling and Hardware Software Partitioning. PRDC 2007: 217-223 - 2006
- [c26]Kuang-Han Fei, Sheng-Yan Chuang, Sheng-De Wang:
A Power-Aware Routing Protocol Using Multi-Route Transmission for Mobile Ad Hoc Networks. EUC Workshops 2006: 540-549 - [c25]Kuo-Ping Wu, Sheng-De Wang:
Choosing the Kernel parameters of Support Vector Machines According to the Inter-cluster Distance. IJCNN 2006: 1205-1211 - [c24]Zheng Yi Huang, Sheng-De Wang:
A Dependable Outbound Bandwidth Based Approach for Peer to Peer Media Streaming. PRDC 2006: 221-229 - [c23]Kuo-Ping Wu, Sheng-De Wang:
Choosing the Parameters of 2-norm Soft Margin Support Vector Machines According to the Cluster Validity. SMC 2006: 4825-4831 - [c22]Jian-Feng Huang, Sheng-Yan Chuang, Sheng-De Wang:
Transmission Range Designation Broadcasting Methods for Wireless Ad Hoc Networks. UIC 2006: 312-321 - 2005
- [c21]Kuo-Ping Wu, Sheng-De Wang:
A Weighting Initialization Strategy for Weighted Support Vector Machines. ICAPR (1) 2005: 288-296 - [c20]Yi-Cheng Huang, Sheng-Yan Chuang, Sheng-De Wang:
A Dynamic Node Degree Management Scheme for Energy-efficient Routing Protocols in Wireless Ad Hoc Networks. ICPADS (2) 2005: 7-11 - [c19]Sheng-De Wang, I-Tar Hsu, Zheng Yi Huang:
Dynamic Scheduling Methods for Computational Grid Environments. ICPADS (1) 2005: 22-28 - [c18]Michael Pan, Sheng-Yan Chuang, Sheng-De Wang:
Local Repair Mechanisms for On-Demand Routing in Mobile Ad hoc Networks. PRDC 2005: 317-324 - 2004
- [j42]Tai-Ning Yang, Sheng-De Wang:
Competitive algorithms for the clustering of noisy data. Fuzzy Sets Syst. 141(2): 281-299 (2004) - [j41]Chun-fu Lin, Sheng-De Wang:
Training algorithms for fuzzy support vector machines with noisy data. Pattern Recognit. Lett. 25(14): 1647-1656 (2004) - [j40]Chuan-Kai Lin, Sheng-De Wang:
An adaptive H∞ controller design for bank-to-turn missiles using ridge Gaussian neural networks. IEEE Trans. Neural Networks 15(6): 1507-1516 (2004) - [c17]Sheng-De Wang, Hsuen-Ling Ko, Yung-Yu Zhuang:
Japster: An Improved Peer-to-Peer Network Architecture. EUC 2004: 1044-1054 - [c16]Richard Hsiao, Sheng-De Wang:
Jelly: A Dynamic Hierarchical P2P Overlay Network with Load Balance and Locality. ICDCS Workshops 2004: 534-540 - 2003
- [c15]Chun-fu Lin, Sheng-De Wang:
Training algorithms for fuzzy support vector machines with noisy data. NNSP 2003: 517-526 - 2002
- [j39]Wei-Chi Ku, Sheng-De Wang:
An Anonymous Endorsement System. J. Inf. Sci. Eng. 18(1): 107-114 (2002) - [j38]Chun-fu Lin, Sheng-De Wang:
Fuzzy support vector machines. IEEE Trans. Neural Networks 13(2): 464-471 (2002) - [c14]Kuan-Sheng Hsueh, Sheng-De Wang:
A Packet-Based Caching Proxy with Loss Recovery for Video Streaming. PRDC 2002: 185-192 - 2001
- [j37]Chih-Jen Lee, Sheng-De Wang:
Fingerprint feature reduction by principal Gabor basis function. Pattern Recognit. 34(11): 2245-2248 (2001) - [j36]Tai-Ning Yang, Sheng-De Wang:
A rotation invariant printed Chinese character recognition system. Pattern Recognit. Lett. 22(2): 85-95 (2001) - [c13]Sheng-De Wang, Yuhder Lin:
Jato: A Compact Binary File Format for Java Class. ICPADS 2001: 467-476 - [c12]Sheng-De Wang, Pao Hwa Sui:
Fault-Tolerant Routing in Two-Dimensional Mesh Networks with Less-Restricted Fault Patterns. PRDC 2001: 111-118 - 2000
- [j35]Sheng-De Wang, Chuan-Kai Lin:
Adaptive tuning of the fuzzy controller for robots. Fuzzy Sets Syst. 110(3): 351-363 (2000) - [j34]Pao Hwa Sui, Sheng-De Wang:
A fault-tolerant routing algorithm for wormhole routed meshes. Parallel Comput. 26(4): 455-465 (2000) - [j33]Tai-Ning Yang, Sheng-De Wang:
Fuzzy auto-associative neural networks for principal component extraction of noisy data. IEEE Trans. Neural Networks Learn. Syst. 11(3): 808-810 (2000) - [j32]Ming-Jer Tsai, Sheng-De Wang:
Adaptive and Deadlock-Free Routing for Irregular Faulty Patterns in Mesh Multicomputers. IEEE Trans. Parallel Distributed Syst. 11(1): 50-63 (2000)
1990 – 1999
- 1999
- [j31]Wei-Chi Ku, Sheng-De Wang:
A secure and practical electronic voting scheme. Comput. Commun. 22(3): 279-286 (1999) - [j30]Chuan-Kai Lin, Sheng-De Wang:
Fuzzy system identification using an adaptive learning rule with terminal attractors. Fuzzy Sets Syst. 101(3): 343-352 (1999) - [j29]Sheng-De Wang, Chien-Hui Lee:
Fuzzy system modeling using linear distance rules. Fuzzy Sets Syst. 108(2): 179-191 (1999) - [j28]Pao Hwa Sui, Sheng-De Wang:
Fault-Tolerant Wormhole Routing in Two-Dimensional Mesh Networks with Convex Faults. Inf. Sci. 121(3-4): 217-231 (1999) - [j27]Tai-Ning Yang, Sheng-De Wang:
Robust algorithms for principal component analysis. Pattern Recognit. Lett. 20(9): 927-933 (1999) - 1998
- [j26]Chuan-Kai Lin, Sheng-De Wang:
A self-organizing fuzzy control approach for bank-to-turn missiles. Fuzzy Sets Syst. 96(3): 281-306 (1998) - [j25]Sheng-De Wang, Wei-Der Jwo:
Replication and Partitioning for Data Arrays in Distributed Memory Systems. J. Inf. Sci. Eng. 14(1): 281-298 (1998) - [j24]Sheng-De Wang, Tsong-Chih Hsu:
Perceptron-perceptron net. Pattern Recognit. Lett. 19(7): 559-568 (1998) - [j23]Ming-Jer Tsai, Sheng-De Wang:
A Fully Adaptive Routing Algorithm for Dynamically Injured Hypercubes, Meshes, and Tori. IEEE Trans. Parallel Distributed Syst. 9(2): 163-174 (1998) - [c11]Sheng-De Wang, Ming-Jer Tsai:
Adaptive and Fault-Tolerant Routing with 100% Node Utilization for Mesh Multicomputer. ICPADS 1998: 367-374 - 1997
- [j22]Tsong-Chih Hsu, Sheng-De Wang:
The K1-Map Reduction for Pattern Classifications. IEEE Trans. Pattern Anal. Mach. Intell. 19(6): 616-622 (1997) - [j21]Pao Hwa Sui, Sheng-De Wang:
An Improved Algorithm for Fault-Tolerant Routing in Hypercubes. IEEE Trans. Computers 46(9): 1040-1042 (1997) - [j20]Tsong-Chih Hsu, Sheng-De Wang:
k-winners-take-all neural net with Θ(1) time complexity. IEEE Trans. Neural Networks 8(6): 1557-1561 (1997) - 1996
- [j19]Chien-Hui Lee, Sheng-De Wang:
A self-organizing adaptive fuzzy controller. Fuzzy Sets Syst. 80(3): 295-313 (1996) - [j18]Yeong-Sheng Chen, Sheng-De Wang, Chien-Min Wang:
Tiling Nested Loops into Maximal Rectangular Blocks. J. Parallel Distributed Comput. 35(2): 123-132 (1996) - [j17]Sheng-De Wang, Cha-Hon Sun:
Transformations of star-delta and delta-star reliability networks. IEEE Trans. Reliab. 45(1): 120-126 (1996) - [c10]Jeen-Fong Lin, Sheng-De Wang:
High-Performance Low-Cost Non-Blocking Switch for ATM. INFOCOM 1996: 818-821 - 1995
- [j16]Cha-Hon Sun, Sheng-De Wang:
An efficient pruning algorithm for value independent knapsack problem using a DAG structure. Comput. Oper. Res. 22(3): 321-334 (1995) - [j15]Tsong-Chih Hsu, Sheng-De Wang:
Comments on "On the design of feedforward neural networks for binary mapping [1]". Neurocomputing 9(1): 81-84 (1995) - [j14]Tsong-Chih Hsu, Sheng-De Wang:
A simple architecture for constant time sorting machines. SIGARCH Comput. Archit. News 23(1): 13-19 (1995) - [j13]Isaac Yi-Yuan Lee, Sheng-De Wang:
Ring-Connected Networks and Their Relationship to Cubical Ring Connected Cycles and Dynamic Redundancy Networks. IEEE Trans. Parallel Distributed Syst. 6(9): 988-996 (1995) - 1994
- [j12]Isaac Yi-Yuan Lee, Sheng-De Wang:
A versatile ring-connected hypercube. IEEE Micro 14(3): 60-67 (1994) - [j11]Cha-Hon Sun, Sheng-De Wang:
Comments on "Distributed Algorithms for Network Recognition Problems". IEEE Trans. Computers 43(6): 768 (1994) - [c9]Pao Hwa Sui, Sheng-De Wang, Isaac Yi-Yuan Lee:
Broadcasting on Faulty Hypercubes. ICPADS 1994: 128-133 - [c8]Yeong-Sheng Chen, Sheng-De Wang, Chien-Min Wang:
Compiler techniques for maximizing fine-grain and coarse-grain parallelism in loops with uniform dependences. International Conference on Supercomputing 1994: 204-213 - 1993
- [j10]David Shou, Sheng-De Wang:
A new transformation method for nondominated coterie design. Inf. Sci. 74(3): 223-246 (1993) - [j9]David Shou, Sheng-De Wang:
An Efficient Quorum Generating Approach for Distributed Mutual Exclusion. J. Inf. Sci. Eng. 9(2): 229-251 (1993) - [j8]Rong-Chau Liu, Sheng-De Wang:
Performance modeling and analysis of load balancing policies with priority queueing. J. Syst. Softw. 20(2): 169-187 (1993) - [c7]Isaac Yi-Yuan Lee, Sheng-De Wang:
Ring-Connected Hypercubes and Their Relationship to Cubical Ring Connected Cycles and Dynamic Redundancy Networks. ACM Conference on Computer Science 1993: 137-142 - [c6]David Shou, Sheng-De Wang:
Protocol Refinement for Maintaining Replicated Data in Distributed Systems. SPDP 1993: 245-249 - 1992
- [j7]Chiun-Chieh Hsu, Sheng-De Wang, Te-Son Kuo:
A Well-informed Approach to Distributed Task Assignment. Comput. J. 35(Additional-Papers): A227-A236 (1992) - [j6]Chiun-Chieh Hsu, Sheng-De Wang:
Heuristic task assignment for distributed computing systems. Inf. Sci. 62(1-2): 65-86 (1992) - [j5]Chien-Min Wang, Sheng-De Wang:
A hybrid scheme for efficiently executing nested loops on multiprocessors. Parallel Comput. 18(6): 625-637 (1992) - [j4]Chien-Min Wang, Sheng-De Wang:
Efficient Processor Assignment Algorithms and Loop Transformations for Executing Nested Parallel Loops on Multiprocessors. IEEE Trans. Parallel Distributed Syst. 3(1): 71-82 (1992) - 1991
- [j3]Sheng-De Wang, Chien-Min Wang:
Compiler Techniques for Extracting Loop-Level Parallelism. J. Inf. Sci. Eng. 7(4): 543-563 (1991) - [c5]Chien-Min Wang, Sheng-De Wang:
Compiler techniques to extract parallelism within a nested loop. COMPSAC 1991: 24-29 - [c4]Chien-Min Wang, Sheng-De Wang:
A Scheduling Scheme for Efficiently Executing Hybrid Nested Loops. ICPP (2) 1991: 260-261 - 1990
- [j2]Sheng-De Wang, Te-Son Kuo:
Design of robust linear state feedback laws: Ellipsoidal set-theoretic approach. Autom. 26(2): 303-309 (1990) - [j1]Chien-Min Wang, Sheng-De Wang:
Structured partitioning of concurrent programs for execution on multiprocessors. Parallel Comput. 16(1): 41-57 (1990) - [c3]Sheng-De Wang, Hackerd M. S. Yeh:
Self-adaptive neural architectures for control applications. IJCNN 1990: 309-314 - [c2]Sheng-De Wang, Chung-Chi Pan:
A neural network approach for Chinese character recognition. IJCNN 1990: 917-923
1980 – 1989
- 1989
- [c1]Chiun-Chieh Hsu, Sheng-De Wang, Te-Son Kuo:
Minimization of task turnaround time for distributed systems. COMPSAC 1989: 2-7
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-05 21:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint