default search action
Sheau-Dong Lang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2010
- [j13]Shuxin Li, Sheau-Dong Lang:
A partition based method for finding highly correlated pairs. Int. J. Data Min. Model. Manag. 2(4): 334-350 (2010)
2000 – 2009
- 2009
- [c29]Robert Lee, Sheau-Dong Lang, Kevin Stenger:
From digital forensic report to Bayesian network representation. ISI 2009: 303-306 - 2008
- [j12]Khanh Vu, Kien A. Hua, Hao Cheng, Sheau-Dong Lang:
Bounded Approximation: A New Criterion for Dimensionality Reduction Approximation in Similarity Search. IEEE Trans. Knowl. Data Eng. 20(6): 768-783 (2008) - [c28]Robert Lee, Sheau-Dong Lang:
Locality-Based Server Profiling for Intrusion Detection. ISI Workshops 2008: 205-216 - [c27]Daniel M. Purcell, Sheau-Dong Lang:
Forensic Artifacts of Microsoft Windows Vista System. ISI Workshops 2008: 304-319 - [e2]Christopher C. Yang, Hsinchun Chen, Michael Chau, Kuiyu Chang, Sheau-Dong Lang, Patrick S. Chen, Raymond Hsieh, Daniel Zeng, Fei-Yue Wang, Kathleen M. Carley, Wenji Mao, Justin Zhan:
Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings. Lecture Notes in Computer Science 5075, Springer 2008, ISBN 978-3-540-69136-5 [contents] - 2007
- [c26]Shuxin Li, Robert Lee, Sheau-Dong Lang:
Mining Distance-Based Outliers from Categorical Data. ICDM Workshops 2007: 225-230 - 2006
- [c25]Shuxin Li, Robert Lee, Sheau-Dong Lang:
Detecting outliers in interval data. ACM Southeast Regional Conference 2006: 290-295 - [c24]Shuxin Li, Robert Lee, Sheau-Dong Lang:
Efficient mining of strongly correlated item pairs. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 624102 - [c23]Khanh Vu, Kien A. Hua, Hao Cheng, Sheau-Dong Lang:
A non-linear dimensionality-reduction technique for fast similarity search in large databases. SIGMOD Conference 2006: 527-538 - 2005
- [c22]Mian Zhou, Sheau-Dong Lang:
Weighted link graphs: a distributed IDS for secondary intrusion detection and defense. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 39-51 - [c21]Mian Zhou, Robert Lee, Sheau-Dong Lang:
Locality-based Profile Analysis for Secondary Intrusion Detection. ISPAN 2005: 166-173 - [c20]Nualsawat Hiransakolwong, Kien A. Hua, Soontharee Koompairojn, Khanh Vu, Sheau-Dong Lang:
An adaptive distance computation technique for image retrieval systems. SAC 2005: 1195-1199 - 2004
- [c19]Nualsawat Hiransakolwong, Khanh Vu, Kien A. Hua, Sheau-Dong Lang:
Shape recognition based on the medial axis approach. ICME 2004: 257-260 - 2002
- [c18]Li-Jen Mao, Sheau-Dong Lang:
Parallel Algorithms for the Degree-Constrained Minimum Spanning Tree Problem Using Nearest-Neighbor Chains and the Heap-Traversal Technique. ICPP Workshops 2002: 398-404 - 2000
- [j11]Inien Syu, Sheau-Dong Lang:
Adapting a diagnostic problem-solving model to information retrieval. Inf. Process. Manag. 36(2): 313-330 (2000) - [j10]Jennifer Burg, Anne Boyle, Sheau-Dong Lang:
Using Constraint Logic Programming to Analyze theChronology in "A Rose for Emily". Comput. Humanit. 34(4): 377-392 (2000)
1990 – 1999
- 1999
- [j9]Jennifer J. Burg, John D. Ainsworth, Brian Casto, Sheau-Dong Lang:
Experiments with the "Oregon Trail Knapsack Problem". Electron. Notes Discret. Math. 1: 26-35 (1999) - [j8]Sheau-Dong Lang:
An Extended Banker's Algorithm for Deadlock Avoidance. IEEE Trans. Software Eng. 25(3): 428-432 (1999) - [c17]Wen-Lin Hsu, Sheau-Dong Lang:
Classification Algorithms for NETNEWS Articles. CIKM 1999: 114-121 - [c16]Sheau-Dong Lang, Li-Jen Mao, Wen-Lin Hsu:
Probabilistic analysis of the RNN-CLINK clustering algorithm. Data Mining and Knowledge Discovery: Theory, Tools, and Technology 1999: 31-38 - [c15]Wen-Lin Hsu, Sheau-Dong Lang:
Feature Reduction and Database Maintenance in NETNEWS Classification. IDEAS 1999: 137-144 - [c14]Li-Jen Mao, Narsingh Deo, Sheau-Dong Lang:
A Parallel Algorithm for the Degree-Constrained Minimum Spanning Tree Problem Using Nearest-Neighbor Chains. ISPAN 1999: 184-189 - 1998
- [c13]Sheau-Dong Lang, Li-Jen Mao:
A Comparison of Two Torus-Based K-Coteries. ICPADS 1998: 300- - 1996
- [j7]Jennifer Burg, Sheau-Dong Lang, Charles E. Hughes:
Intelligent Backtracking in CLP(R). Ann. Math. Artif. Intell. 17(3-4): 189-211 (1996) - [c12]Inien Syu, Sheau-Dong Lang, Narsingh Deo:
Incorporating Latent Semantic Indexing into a Neural Network Model for Information Retrieval. CIKM 1996: 145-153 - [c11]Inien Syu, Sheau-Dong Lang, Narsingh Deo:
A neural network model for information retrieval using latent semantic indexing. ICNN 1996: 1318-1323 - 1995
- [c10]Inien Syu, Sheau-Dong Lang, Kien A. Hua:
A Heuristic Information Retrieval Model on a Massively Parallel Processor. ICDE 1995: 365-372 - 1994
- [c9]Inien Syu, Sheau-Dong Lang:
A Competition-Based Connectionist Model for Information Retrieval Using a Merged Thesaurus. CIKM 1994: 164-170 - [c8]Jennifer Burg, Sheau-Dong Lang, Charles E. Hughes:
Finding Conflict Sets and Backtrack Points in CLP(R). ICLP 1994: 323-338 - [c7]S. Wang, Sheau-Dong Lang:
A Tree-Based Distributed Algorithm for the K-Entry Critical Section Problem. ICPADS 1994: 592-599 - [c6]Wen K. Lee, Kien A. Hua, Sheau-Dong Lang:
On Random Sampling for Parallel Simulated Annealing. IPPS 1994: 253-257 - [c5]Kien A. Hua, Sheau-Dong Lang, Wen K. Lee:
A Decomposition-Based Simulated Annealing Technique for Data Clustering. PODS 1994: 117-128 - [c4]Inien Syu, Sheau-Dong Lang:
A Competition-Based Connectionist Model for Information Retrieval. RIAO 1994: 248-265 - 1992
- [c3]Kien A. Hua, Wen K. Lee, Sheau-Dong Lang:
Parallel Simulated Annealing for Efficient Data Clustering. DEXA 1992: 244-249 - [c2]Jennifer Burg, Charles E. Hughes, Sheau-Dong Lang:
Parallel Execution of CLP-R Programs. IJCSLP Workshop on Concurrent and Parallel Implementations 1992 - 1990
- [j6]Sheau-Dong Lang:
Analysis of Recursive Batched Interpolation Search. BIT 30(1): 42-50 (1990) - [j5]Sheau-Dong Lang, Yannis Manolopoulos:
Efficient Expressions for Completely and Partly Unsuccessful Batched Search of Tree-Structured Files. IEEE Trans. Software Eng. 16(12): 1433-1435 (1990)
1980 – 1989
- 1989
- [j4]Sheau-Dong Lang, James R. Driscoll, Jiann H. Jou:
A Unified Analysis of Batched Searching of Sequential and Tree-Structured Files. ACM Trans. Database Syst. 14(4): 604-618 (1989) - 1987
- [j3]James R. Driscoll, Sheau-Dong Lang, LeRoy A. Franklin:
Modeling B-Tree Insertion Activity. Inf. Process. Lett. 26(1): 5-18 (1987) - [j2]James R. Driscoll, Sheau-Dong Lang, Stephen M. Bratman:
Achieving minimum height for block split tree structured files. Inf. Syst. 12(1): 115-124 (1987) - 1986
- [j1]Sheau-Dong Lang, James R. Driscoll, Jiann H. Jou:
Batch Insertion for Tree Structured File Organizations - Improving Differential Database Reprensentation. Inf. Syst. 11(2): 167-175 (1986) - [c1]Sheau-Dong Lang, James R. Driscoll, Jiann H. Jou:
Improving the Differential File Technique via Batch Operations for Tree Structured File Organizations. ICDE 1986: 524-532 - 1983
- [e1]Larry K. Cottrell, Sheau-Dong Lang, A. Joe Turner:
Proceedings of the 14th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 1983, Orlando, FL, USA, February 17-18, 1983. ACM 1983, ISBN 978-0-89791-091-0 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint