default search action
Ching-Tsorng Tsai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j16]Chun-Cheng Lin, Ching-Tsorng Tsai, Yu-Liang Liu, Tsai-Ting Chang, Yung-Sheng Chang:
Security and Privacy in 5G-IIoT Smart Factories: Novel Approaches, Trends, and Challenges. Mob. Networks Appl. 28(3): 1043-1058 (2023) - 2022
- [j15]Shyh-Wei Chen, Po-Hsiang Chen, Ching-Tsorng Tsai, Chia-Hui Liu:
An Intelligent Based Symmetrical Classification of Online Shop Selling Counterfeit Products. Symmetry 14(10): 2132 (2022) - [c16]Shyh-Wei Chen, Po-Hsiang Chen, Ching-Tsorng Tsai, Chia-Hui Liu:
Development of Machine Learning Based Fraudulent Website Detection Scheme. ICKII 2022: 108-110
2010 – 2019
- 2018
- [c15]KuanTing Wu, ShingHua Chou, ShyhWei Chen, Ching-Tsorng Tsai, Shyan-Ming Yuan:
Application of machine learning to identify Counterfeit Website. iiWAS 2018: 321-324 - 2017
- [j14]Chun-Cheng Lin, Ching-Tsorng Tsai, Der-Jiunn Deng, I-Hsin Tsai, Shun-Yu Jhong:
Minimizing electromagnetic pollution and power consumption in green heterogeneous small cell network deployment. Comput. Networks 129: 536-547 (2017) - [c14]Che-Pin Chang, Hsin-Ta Chiao, Yue-Shan Chang, Ching-Tsorng Tsai, Kuo-Kai Yuen, Shyan-Ming Yuan:
UCS - A Unified Cloud Storage Integration Service. SC² 2017: 245-248 - 2014
- [c13]Chih-Hung Chang, Chih-Wei Lu, Wen Pin Yang, William Cheng-Chung Chu, Chao-Tung Yang, Ching-Tsorng Tsai, Pao-Ann Hsiung:
A SysML Based Requirement Modeling Automatic Transformation Approach. COMPSAC Workshops 2014: 474-479 - [c12]Yu Chin Cheng, Jung-Sing Jwo, Ching-Tsorng Tsai:
A Leading Indicator of Post-Release Defect Density in Refactoring-based Software Maintenance - A Case Study. ICS 2014: 1815-1821 - [c11]Yi-Ming Huang, Ching-Wen Kuo, Ching-Tsorng Tsai:
A Solution to Improve Web Application Performance. ICS 2014: 2185-2188 - 2013
- [j13]Chishyan Liaw, Wei-Hua Andrew Wang, Ching-Tsorng Tsai, Chao-Hui Ko, Gorden Hao:
Evolving a Team in a First-Person Shooter Game by using a Genetic Algorithm. Appl. Artif. Intell. 27(3): 199-212 (2013) - 2012
- [j12]Chishyan Liaw, Ching-Tsorng Tsai, Chao-Hui Ko:
Nonlinear quantization on Hebbian-type associative memories. Appl. Intell. 36(4): 824-833 (2012) - [c10]Hongji Yang, Shang Zheng, William Cheng-Chung Chu, Ching-Tsorng Tsai:
Linking Functions and Quality Attributes for Software Evolution. APSEC 2012: 250-259 - [c9]Chishyan Liaw, Ching-Tsorng Tsai, Chung-Chi Lin, Jing-Long Wu:
Evolving a Character in a First-person Shooter. IJCCI 2012: 265-267 - [c8]Chia Feng Lin, Shyan-Ming Yuan, Muh-Chyi Leu, Ching-Tsorng Tsai:
A Framework for Scalable Cloud Video Recorder System in Surveillance Environment. UIC/ATC 2012: 655-660 - [c7]Wen-Feng Hsu, Guo-Heng Luo, Shyan-Ming Yuan, Ching-Tsorng Tsai:
Constructing Private Cloud Storage Using Network Attatched Storage. UIC/ATC 2012: 713-718 - 2011
- [j11]Ching-Tsorng Tsai, Chishyan Liaw, Huan-Chen Huang, Chao-Hui Ko:
An Evolutionary Strategy for a Computer Team Game. Comput. Intell. 27(2): 218-234 (2011) - [j10]Chao-Hui Ko, Ching-Tsorng Tsai, Chishyan Liaw:
The Linear Quantization Strategy of Quadratic Hebbian-Type Associative Memories and Their Performance Analysis. J. Inf. Sci. Eng. 27(2): 481-492 (2011) - [j9]Chein-I Chang, Chao-Cheng Wu, Ching-Tsorng Tsai:
Random N-Finder (N-FINDR) Endmember Extraction Algorithms for Hyperspectral Imagery. IEEE Trans. Image Process. 20(3): 641-656 (2011) - 2010
- [j8]Yue-Shan Chang, Ching-Lung Chang, Yung-Shuan Hung, Ching-Tsorng Tsai:
Ncash: NFC Phone-Enabled Personalized Context Awareness Smart-Home Environment. Cybern. Syst. 41(2): 123-145 (2010) - [c6]Wei Xiong, Chein-I Chang, Ching-Tsorng Tsai:
Estimation of virtual dimensionality in hyperspectral imagery by linear spectral mixture analysis. IGARSS 2010: 979-982 - [c5]Chung-Chi Lin, Chishyan Liaw, Ching-Tsorng Tsai:
A piecewise linear convolution interpolation with third-order approximation for real-time image processing. SMC 2010: 3632-3637
2000 – 2009
- 2009
- [c4]Yung-Wei Kao, Ching-Tsorng Tsai, Tung-Hing Chow, Shyan-Ming Yuan:
An offline browsing system for mobile devices. iiWAS 2009: 338-343 - [c3]Yung-Wei Kao, Ching-Tsorng Tsai, Wei-Hsiang Hung, Shyan-Ming Yuan, Hsin-Ta Chiao:
A cross-platform P2P based blog system. MoMM 2009: 510-513 - 2005
- [c2]Ching-Tsorng Tsai, Chishyan Liaw, Cherng-yue Huang, Jiann-Shu Lee:
Synthesizing the Artistic Effects of Ink Painting. SCIA 2005: 359-368 - 2003
- [j7]Jiann-Shu Lee, Ching-Tsorng Tsai, Chen-Hsing Pen, Hui-Chieh Lu:
A real time collaboration system for teleradiology consultation. Int. J. Medical Informatics 72(1-3): 73-79 (2003) - 2001
- [j6]Jzau-Sheng Lin, Ching-Tsorng Tsai, Jiann-Shu Lee:
An Annealed Chaotic Competitive Learning Network with Nonlinear Self-feedback and Its Application in Edge Detection. Neural Process. Lett. 13(1): 55-69 (2001)
1990 – 1999
- 1998
- [p1]Pau-Choo Chung, Ching-Tsorng Tsai:
Reliability issue and quantization effects in optical and electronic network implementations of hebbian-type associative memories. Algorithms and Architectures 1998: 261-291 - 1994
- [j5]Pau-Choo Chung, Ching-Tsorng Tsai, E-Liang Chen, Yung-Nien Sun:
Polygonal approximation using a competitive Hopfield neural network. Pattern Recognit. 27(11): 1505-1512 (1994) - 1993
- [j4]Jiann-Shu Lee, Yung-Nien Sun, Chin-Hsing Chen, Ching-Tsorng Tsai:
Wavelet based corner detection. Pattern Recognit. 26(6): 853-865 (1993) - [j3]Ching-Tsorng Tsai, Yung-Nien Sun, Pau-Choo Chung, Jiann-Shu Lee:
Endocardial boundary detection using a neural network. Pattern Recognit. 26(7): 1057-1068 (1993) - [c1]Pau-Choo Chung, Yi-Nung Chung, Ching-Tsorng Tsai:
Quantization effects of Hebbian-type associative memories. ICNN 1993: 1366-1370 - 1992
- [j2]Yung-Nien Sun, Ching-Tsorng Tsai:
Segmentation of echocardiograms using a neural network. Microprocess. Microprogramming 35(1-5): 791-798 (1992) - [j1]Yung-Nien Sun, Ching-Tsorng Tsai:
A new model-based approach for industrial visual inspection. Pattern Recognit. 25(11): 1327-1336 (1992)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-19 00:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint