default search action
Yen-Liang Pan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Ching-Yun Tseng, Ju-Chin Chen, Yen-Liang Pan:
An Improved Deadlock Recovery Policy of Flexible Manufacturing Systems Based on Resource Flow Graphs. IEEE Access 12: 65202-65212 (2024) - 2023
- [j7]Ter-Chan Row, Yen-Liang Pan:
Incomparable Single Controller for Solving Deadlock Problems of Flexible Manufacturing Systems. IEEE Access 11: 45270-45278 (2023) - 2021
- [j6]Ter-Chan Row, Yen-Liang Pan:
An Optimal Deadlock Recovery Algorithm for Special and Complex Flexible Manufacturing Systems-S₄PR. IEEE Access 9: 111083-111094 (2021)
2010 – 2019
- 2015
- [j5]Daniel Yuh Chao, Yen-Liang Pan:
Uniform formulas for compound siphons, complementary siphons and characteristic vectors in deadlock prevention of flexible manufacturing systems. J. Intell. Manuf. 26(1): 13-23 (2015) - 2013
- [j4]Yen-Liang Pan, Yi-Sheng Huang, Yi-Shun Weng, Weimin Wu, MuDer Jeng:
Computationally Improved Optimal Control Methodology for Linear Programming Problems of Flexible Manufacturing Systems. J. Appl. Math. 2013: 294835:1-294835:11 (2013) - [j3]Yi-Sheng Huang, Yen-Liang Pan, Pin-June Su:
Transition-Based Deadlock Detection and Recovery Policy for FMSs Using Graph Technique. ACM Trans. Embed. Comput. Syst. 12(1): 11:1-11:13 (2013) - [c7]Yen-Liang Pan, Hesuan Hu, MuDer Jeng:
One computationally improved deadlock prevention policy for flexible manufacturing systems using Petri nets. CASE 2013: 924-929 - [c6]Daniel Yuh Chao, Yen-Liang Pan, Wei-Hsiang Liao:
Structure Based Derived Uniform Formula for Siphon, Its Complementary Set and T-Characteristic Vectors. MIM 2013: 301-306 - [c5]Yen-Liang Pan, Mu-Der Jeng, Sheng-Luen Chung, Yu-Xin Guo:
Computationally Improved Optimal Deadlock Prevention Policy for Linear Programming Problems of Flexible Manufacturing Systems. SMC 2013: 2366-2371 - 2012
- [j2]Yi-Sheng Huang, Yen-Liang Pan, MengChu Zhou:
Computationally Improved Optimal Deadlock Control Policy for Flexible Manufacturing Systems. IEEE Trans. Syst. Man Cybern. Part A 42(2): 404-415 (2012) - [c4]Yen-Liang Pan, Yi-Sheng Huang, MuDer Jeng, Sheng-Luen Chung:
Using theory of regions with selective siphon control for deadlock prevention policy in Petri nets. SMC 2012: 1189-1194 - 2011
- [c3]Yen-Liang Pan, Yi-Sheng Huang, MuDer Jeng:
An efficient deadlock prevention policy for FMSs using reduction method and theory of regions. SMC 2011: 568-573 - 2010
- [j1]Yi-Sheng Huang, Yen-Liang Pan:
An Improved Deadlock Prevention Strategy for FMSs Using Theory of Regions. Int. J. Adv. Comp. Techn. 2(3): 22-30 (2010) - [c2]Yi-Sheng Huang, Yen-Liang Pan, Jenn-Huei Lin:
An improved deadlock prevention strategy for FMSs using theory of regions. ICIS 2010: 588-593 - [c1]Yi-Sheng Huang, Yen-Liang Pan, MuDer Jeng, Po-Lun Chang:
Enhancement of an deadlock prevention policy for FMSs using theory of regions. SMC 2010: 304-309
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-18 00:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint