王勝德教授的著作列表 - Publication List of Sheng-De Wang

Publication List of 王勝德 Sheng-De Wang

Journal articles & book chapters:

  1. Y. -T. Huang, T. -S. Chen and S. -D. Wang , “Authenticated Key Agreement Scheme for Fog Computing in a Health-Care Environment,” IEEE Access, vol. 11, 46871-46881, May 2023
  2. Ssu-Ting Liu and Sheng-De Wang, “Improved Trickle Algorithm Toward Low Power and Better Route for the RPL Routing Protocol,” IEEE Access, Vol. 10, 83322-83335, Aug. 2022
  3. Jen-Kuang Liu and Sheng-De Wang, “CFFS: A Persistent Memory File System for Contiguous File Allocation With Fine-Grained Metadata,” IEEE Access, Vol. 10, 91678-91698, Aug. 2022
  4. Yin-Tzu Huang, Dai-Lun Chiang, Tzer-Shyong Chen, Sheng-De Wang, Fei-Pei Lai, Yu-Da Lin, “Lagrange interpolation-driven access control mechanism: Towards secure and privacy-preserving fusion of personal health records. ,” Knowledge-Based Systems, Vol. 236, Jan. 2022
  5. Wen-Chin Chen, Yin-Tzu Huang, and Sheng-De Wang, “Provable Secure Group Key Establishment Scheme for Fog Computing,” IEEE Access, vol. 9, 158682-158694, Nov. 2021
  6. Yi-Hsin Wu, Jui-Yu Huang, Yi-Chun, Yin-Jing Tien, Cheng-Juei Yu, Sheng-De Wang, “ Detecting and Scoring Equipment Faults in Real-time during Semiconductor Test Processes,” IEEE Design and Test, Vol. 38, No. 4, 120-126, Jul. 2021
  7. Jones Sai-Wang Wan, Sheng-De Wang, “ Concept Drift Detection Based on Pre-Clustering and Statistical Testing,” Journal of Internet Technology, Vol. 22, 465-472, 2021
  8. Chi-Wei Lu, Shen-De Wang, and Shao-Yi Chien , “ A Novel Gaming Video Encoding Process Using In-Game Motion Vectors,” IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, Vol. 30, No. 7, 2207-2214, Jul. 2020
  9. Yi-Hsin Wu, Yu-Hsin Chang, Yin-Jing Tien, Cheng-Juei Yu, Sheng-De Wang, Cheng-Hung Wu, “ Using Partial Combination Models to Improve Prediction Quality and Transparency in Mixed Datasets,” IEEE Access, Vol. 8, 132106-132120, 2020
  10. Cheng-Juei Yu, Yi-Hsin Wu, and Sheng-De Wang, “An Approach to the Design of Specific Hardware Circuits from C Programs,” Journal of Information Science and Engineering, vol. 34,, 337-351, 2018
  11. 林顥宗,王勝德,, “"網路入侵偵測的證據萃取與保留的兩階段分析方法,” 前瞻科技與管理, 5卷1期, 107-128, May 2015
  12. Chien-Chi Chen, Sheng-De Wang, “A hybrid multiple-character transition finite-automaton for string matching engine,” Microprocessors and Microsystems - Embedded Hardware Design, 39(2), 122-134, 2015
  13. 張智傑,王勝德, “適用於網路入侵偵測不平衡資料之階層式多重分類器,” Communications of CCISA (資訊安全通訊期刊), Vol 21, No. 2, 21-40, 2015
  14. 江格, 黃昌平, 高培晟, 王勝德, “普遍存在之行動裝置應用程式漏洞,” Communications of CCISA (資訊安全通訊期刊), Vol 24, No. 4, pp. 1-8, Sept. 2014
  15. Chien-Chi Chen and Sheng-De Wang, “An efficient multi-character transition string-matching engine based on the Ahocorasick algorithm,” ACM Transactions on Architecture and Code Optimization (TACO), Volume 10 Issue 4, pp. 25:1--25:22, Dec. 2013
  16. Chien-Chi Chen and Sheng-De Wan, “A Multi-Character Transition String Matching Architecture Based On Aho-Corasick Algorithm,” International Journal of Innovative Computing, Information and Control, Volume 8, Number 12, December 2012, pp. 8367-8386, Dec. 2012
  17. Yeong-Sheng Chen, Der-Jiunn Deng, Yu-Ming Hsu and Sheng-De Wang, “Efficient uplink scheduling policy for variable bit rate traffic in IEEE 802.16 BWA systems,” International Journal of Communication Systems, Volume 25, Issue 6, pages 734–748, Jun. 2012
  18. C. H. Liu, Y. F. Chung, T. S. Chen, and S. D. Wang, “The enhancement of security in healthcare information systems,” Journal of Medical Systems, 36(3), 1673-88, Jun. 2012
  19. C. H. Liu, Y. F. Chung, T. S. Chen, and S. D. Wang, “Mobile agent application and integration in electronic anamnesis system,” Journal of Medical Systems, 36(3), 1009–1020, Jun. 2012
  20. C. H. Liu, Y. F. Chung, T. S. Chen, and S. D. Wang, “An ID-based access control in a hierarchical key management for mobile agent,” International Journal of Innovative Computing, Information and Control, Vol.7, No.3, pp. 1443-1456, Mar. 2011
  21. C. H. Liu, Y. F. Chung, T. S. Chen and S. D. Wang, “The Design of ID-Based Access Control System with Time-Sensitive key for Mobile Agent’s Migration,” International Journal of Innovative Computing, Information and Control, Vol.7, No.12,, pp. 7077-7090, 2011
  22. Yi-Chih Liu and Sheng-De Wang, “A virtual teleconferencing system based on face detection and 3D animation in a low-bandwidth environment,” International Journal of Imaging Systems and Technology, Volume 20, Issue 4, pages 323–332, Dec. 2010
  23. Cheng-Juei Yu, Yi-Hsin Wu, and Sheng-De Wang, “An in-place search algorithm for the resource constrained scheduling problem during high-level synthesis,” ACM Transactions on Design Automation of Electronic Systems, Vol. 15, No. 4, pp. 1-13, Sept. 2010
  24. Chang-Ching Yang, Chen-Mou Cheng, and Sheng-De Wang, “Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems,” Journal of Information Science and Engineering, Vol. 26 No. 5, pp. 1563-1582, Sept. 2010
  25. Shang-Feng Chiang, Kuo Chiang, and Ruo-Jian Yu, and Sheng-De Wang, “Scalable Index and Data Management for Unstructured Peer-to-Peer Networks,” Handbook of Research on Scalable Computing Technologies, IGI Global, Hershey, Pennsylvania, pp. 123-139, 2010
  26. Kuo-Ping Wu and Sheng-De Wang,, “ "Choosing the kernel parameters for support vector machines by the inter-cluster distance in the feature space,",” Pattern Recognition, Vol. 42 , No. 5,, pp. 710-717, May 2009
  27. Y.-H. Wu, C.-J. Yu, and S.-D. Wang, “Heuristic algorithm for the resource-constrained scheduling problem during high-level synthesis,” IET Computers & Digital Techniques, Volume 3, Issue 1, 43-51, Jan. 2009
  28. Chun-Hung Wu, Kuo Chiang, Ruo-Jian Yu, Sheng-De Wang, “Locality and Resource Aware Peer-to-Peer Overlay Networks,” Journal of the Chinese Institute of Engineers, Vol. 31, No. 7, 1207-1217, Dec. 2008
  29. Yuan-Jin Wen and Sheng-De Wang, “Minimizing Migration on Grid Environments: an Experience on Sun Grid Engine,” Journal of Information Technology and Applications, Vol. 1 No. 4, pp. 297-304., Mar. 2007
  30. Kuang-Han Fei, Sheng-Yan Chuang and Sheng-De Wang, “A Power-Aware Routing Protocol Using Multi-Route Transmission for Mobile Ad Hoc Networks,” Emerging Directions in Embedded and Ubiquitous Computing, LNCS Volume 4097, pp. 540-549, Aug. 2006
  31. J. Fu Lin and Sheng De Wang, “Fuzzy support vector machines with automatic membership setting,” Support Vector Machines: Theory and Applications Ed. by Lipo Wang, Studies in Fuzziness and Soft Computing, Springer, ISBN: 3540243, pp. 233-254, Aug. 2005
  32. Tai-Ning Yang and Sheng-De Wang,, “Competitive algorithms for the clustering of noisy data,” Fuzzy Sets and Systems, Volume: 141, Issue: 2, pp. 281-299, 2004
  33. Chun-Fu Lin and Sheng-De Wang, “Training algorithms for fuzzy support vector machines with noisy data,” Pattern Recognition Letters, Volume: 25, Issue: 14, pp. 1647-1656, 2004
  34. Chuan-Kai Lin and Sheng-De Wang, “An adaptive H infinity controller design for bank-to-turn missiles using ridge Gaussian neural networks,” IEEE Transactions on Neural Networks, Volume 15, Issue 6, Page(s):1507 - 1, 2004
  35. H. -C. Huang, J. -Y. Chen, S. -D. Wang, and C. -M. Chen, “Adaptive ultrasonic speckle reduction based on the slope-facet model,” Ultrasound in Medicine and Biology, Volume: 29, Issue: 8, pp. 1161-1175, Aug. 2003
  36. C. -F. Lin and S. -D. Wang, “Fuzzy Support Vector Machines,” IEEE Transactions on Neural Networks, Vol. 13, No. 2, pp. 464-471, Mar. 2002
  37. W. -C. Ku and S. -D. Wang, “An Anonymous Endorsement System,” Journal of Information Science and Engineering, Vol.18, No.1, pp.107-114, 2002
  38. Huan-Chao Huang, Chung-Ming Chen, Sheng-De Wang, and Henry Horng-Shing Lu,, “Adaptive symmetric mean filter: a new noise-reduction approach based on the slope facet model,” Applied Optics, vol. 10, pp. 5192-5205, 2001
  39. T. -N. Yang and S. -D. Wang, “A rotation invariant printed Chinese character recognition system,” Pattern Recognition Letters, vol. 22, pp. 85-95, 2001
  40. C. -J. Lee and S. -D. Wang, “Fingerprint feature reduction by Gabor basis function,” Pattern Recognition, vol. 34, no. 11, pp. 2245-2248, 2001
  41. W. -C. Ku and S. -D. Wang, “Cryptanalysis of modified authenticated key agreement protocol,” Electronics Letters, vol. 36, no. 21, pp. 1770-1771, Oct. 2000
  42. T. -N. Yang and S. -D. Wang, “Fuzzy Auto-Associative Neural Networks for Principal Component Extraction of Noisy Data,” IEEE Transactions on Neural Networks, vol. 11, no. 3, pp. 808-810, May 2000
  43. M. -J. Tsai and S. -D. Wang, “Adaptive and Deadlock-Free Routing for Irregular Faulty Patterns in Mesh Multicomputers,” IEEE Transactions on Parallel and Distributed Systems, vol. 11, no. 1, pp. 50-63, Jan. 2000
  44. P. -H. Sui and S. -D. Wang, “A fault-tolerant wormhole routing algorithm for mesh networks,” IEE proceedings-Computers and Digital Techniques, vol. 147, no. 1, Jan. 2000
  45. S. -D. Wang and C. -K. Lin, “Adaptive tuning of the fuzzy controller for robots,” Fuzzy Sets and Systems, vol. 110, pp. 351-363, 2000
  46. P. -H. Sui and S. -D. Wang, “A fault-tolerant routing algorithm for wromhole routed meshes,” Parallel Computing, vol. 26, pp. 455-465, 2000
  47. C. -K. Lin, S. -D. Wang, “Fuzzy system identification using an adaptive learning rule with terminal attractors,” Fuzzy Sets And Systems, vol. 101, no. 3, pp. 343-352, Feb. 1999
  48. W. -C. Ku and S. -D. Wang, “A secure and practical electronic voting scheme,” Computer Communications, vol. 22, no. 3, pp. 279-286, Feb. 1999
  49. C. -J. Lee and S. -D. Wang, “Fingerprint feature extraction using Gabor filters,” IEE Electronics Leeters, vol. 35, no. 4, pp. 288-290, Feb. 1999
  50. T. -N. Yang and S. -D. Wang, “Robust algorithms for principle component analysis,” Pattern Recognition Letters, vol. 20, pp. 927-933, 1999
  51. S. -D. Wang and C. -H. Lee, “Fuzzy system modeling using linear distance rules,” Fuzzy Sets and Systems, vol. 108, pp. 179-191, 1999
  52. P. -H. Sui and S. -D. Wang, “Fault-tolerant wormhole routing in two-dimensional mesh networks with convex faults,” Information Sciences, An International Journal, vol. 121, pp. 217-231, 1999

Conference & proceeding papers:

  1. Lin, H.-I., Kuo, L.-J. and Wang, S.-D., “HPE-DARTS: Hybrid Pruning and Proxy Evaluation in Differentiable Architecture Search.,” The 17th International Conference on Agents and Artificial Intelligence , 252-263, Porto, Portugal, Feb. 2025
  2. Kuo, M.-Y. and Wang, S.-D., “GWNet: A Lightweight Model for Low-Light Image Enhancement Using Gamma Correction and Wavelet Transform.,” The 17th International Conference on Agents and Artificial Intelligence (ICAART 2025, 264-274, Porto, Portugal, Feb. 2025
  3. Feng, T-C. and Wang, Sheng-De, “VP-DARTS: Validated Pruning Differentiable Architecture Search.,” The 16th International Conference on Agents and Artificial Intelligence, 47-57, Feb. 2024
  4. Peng-Yu Chen, Jen-Chieh Yang, and Sheng-De Wang, “Soft Hybrid Filter Pruning using a Dual Ranking Approach,” The 26th IEEE International Conference on Computational Science and Engineering (CSE-2023), November 1-3, Exeter, UK., Nov. 2023
  5. Jen-Chieh Yang, Hung-I Lin, Lin-Jing Kuo and Sheng-De Wang , “MOFP: Multi-Objective Filter Pruning for Deep Learning Models.,” The 26th IEEE International Conference on Computational Science and Engineering (CSE-2023), November 1-3, Exeter, UK., Nov. 2023
  6. Chang-Hsuan Hsieh, Jen-Chieh Yang, Hung-Yi Lin, Lin-Jing Kuo and Sheng-De Wang, “A Hybrid Filter Pruning Method Based on Linear Region Analysis ,” The 26th IEEE International Conference on Computational Science and Engineering (CSE-2023), Exeter, UK., Nov. 2023
  7. Min-Chun Tsai and Sheng-De Wang , “Self-Supervised Image Anomaly Detection and Localization with Synthetic Anomalies. ,” The 10th International Conference on Internet of Things: Systems, Management and Security (IOTSMS 2023)., Oct. 2023
  8. Wei-Chin Chen and Sheng-De Wang , “Anomaly Detection for Multivariate Industrial Sensor Data via Decoupled Generative Adversarial Network,” The 15th International Conference on Agents and Artificial Intelligence (ICAART)., Feb. 2023
  9. Shih-Ping Lin and Sheng-De Wang , “SGAS-es: Avoiding Performance Collapse by Sequential Greedy Architecture Search with the Early Stopping Indicator,” FICC 2023. Lecture Notes in Networks and Systems., Feb. 2023
  10. Yu-Kai Ling, Ren Chieh Yang and Sheng-De Wang , “Difficulty-Aware Mixup for Replay-based Continual Learning,” International Computer Symposium, Taoyuan, Taiwan.., Dec. 2022
  11. Cheng You-Wei and Sheng-De Wang, “Enhanced Local Gradient Smoothing: Approaches to Attacked-region Identification and Defense.,” 14th International Conference on Agents and Artificial Intelligence (ICAART) , Feb. 2022
  12. Lit-Yang Liew and Sheng-De Wang, “Object Detection Edge Performance Optimization on FPGA-Based Heterogeneous Multiprocessor Systems,” IEEE 40th International Conference on Consumer Electronics, Jan. 2022
  13. Shih-Hsien Chuang, Ren-Chieh Yang, and Sheng-De Wang , “Network Intrusion Detection System with Stream Machine Learning in Fog Layer and Online Labeling in Cloud Layer. ,” 2021 International Conference on Electronic Communications, Internet of Things and Big Data (ICEIB), Dec. 2021
  14. Jia-Wei Kan, Wei-Chin Chien, and Sheng-De Wang, “Grid Structure Attention for Natural Language Interface to Bash Commands.,” International Computer Symposium, Tainan, Taiwan., Dec. 2020
  15. Jia-Wei Kan, Wei-Chin Chien, and Sheng-De Wang, “Grid Structure Attention for Natural Language Interface to Bash Commands.,” International Computer Symposium, Tainan, Taiwan., Dec. 2020
  16. Hsi-Wen Chen, Hong-Han Shuai, Sheng-De Wang, and De-Nian Yang , “Quality-Aware Streaming Network Embedding with Memory Refreshing. Advances in Knowledge Discovery and Data Mining,” 24th Pacific-Asia Conference (PAKDD), Singapore, May 2020
  17. Chin-Yuan Yeh, Hsi-Wen Chen, Shang-Lun Tsai, Shang-De Wang, “Disrupting Image-Translation-Based DeepFake Algorithms with Adversarial Attacks.,” IEEE Winter Applications of Computer Vision Workshops (WACVW). , Mar. 2020
  18. Anthony Chen, Fu-Hsuan Liu, Sheng-De Wang , “Data Reduction for real-time bridge vibration data on Edge,” The 6th IEEE International Conference on Data Science and Advanced Analytics, Washington DC, USA., Oct. 2019
  19. Yen-Cheng Liu, Yu-Ying Yeh, Tzu-Chien Fu, Sheng-De Wang, Wei-Chen Chiu and Yu-Chang Frank Wang, “Detach and Adapt: Learning Cross-Domain Disentangled Deep Representation,” IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, Jun. 2018
  20. Kuan-Ting Chen and Sheng-De Wang, “Distributed Continuous Control with Meta Learning On Robotic Arms,” 2018 IEEE International Conference on Systems, Man, and Cybernetics, Miyazaki, Japan, October, 2018., 2018
  21. Jones Sai-Wang Wan and Sheng-De Wang, “Concept Drift Detection Based on Pre-Clustering and Statistical Testing,” TANET 2017, 台灣網際網路研討會, Hua-Lien, Taiwan, Dec. 2017
  22. Sheng-De Wang and Kuan-Jung Chiang, “BLE Tree Networks for Sensor Devices in Internet of Things,” IEEE DataCom 2017, The 3rd IEEE International Conference on Big Data Intelligence and Computing, Orlando, Florida, USA, Nov. 2017
  23. Jhen-Hao Li and Sheng-De Wang, “PhishBox: An Approach for Phishing Validation and Detection,” IEEE DASC2017, The 15th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2017), Orlando, Florida, USA, Nov. 2017
  24. Yen-Cheng Liu, Wei-Chen Chiu, Sheng-De Wang, Yu-Chiang Frank Wang, “Domain-Adaptive generative adversarial networks for sketch-to-photo inversion,” MLSP 2017 : IEEE International Workshop on Machine Learning for Signal Processing, Tokyo, Sept. 2017
  25. Che-Hsun Liu, Zhi-Jie Zhang and Sheng-De Wang, “An Android Malware Detection Approach Using Bayesian Inference,” The 6th IEEE International Symposium On Cloud And Service Computing, Fiji, Dec. 2016
  26. Yu-Chen Chang, Sheng-De Wang, “The Concept of Attack Scenarios and its Applications in Android Malware Detection,” The 2nd IEEE International Conference on Data Science and Systems(DSS 2016), Sydney Australia, Dec. 2016
  27. Tahsin Turker Mutlugun and Sheng-De Wang, “OpenCL Computing on FPGA Using Multiported Shared Memory,” The International Conference on Field-programmable Logic and Applications, London, UK, Sept. 2015
  28. Hsin-Yu Chuang and Sheng-De Wang, “Machine learning based hybrid behavior models for Android malware analysis,” The 2015 IEEE International Conference on Software Quality, Reliability and Security, Vancouver, Canada, Aug. 2015
  29. Hsiang-Yu Tseng, Ssu-Ting Liu, and Sheng-De Wang, “An FPGA Memory Hierarchy for High-level Synthesized OpenCL Kernels,” IEEE International Symposium on High Performance and Smart Computing (IEEE HPSC 2015), New York, USA, Aug. 2015
  30. 林顥宗、王勝德, “網路入侵偵測的證據萃取與保留的兩階段分析方法(A Two-Phase Analysis Approach to Extracting and Preserving Relevant Evidences from NIDS Alerts),” 中華安全科技與管理學會『雲端科技與安全管理』研討會, 2014., 2014
  31. Ssu-Ting Liu and Sheng-De Wang, “PFBF: Pre-Filtered Bloom Filter,” Proceedings of International Computer Symposium, Tung-Hai University, Taichung, Taiwan, 2014., 2014
  32. Chia-Hao Hsu and Sheng-De Wang, “An Embedded NIDS with Multi-Core Aware Packet Capture,” IEEE 16th International Conference on Computational Science and Engineering (with ICESS 2013), Sydney, Australia, Dec. 2013
  33. Chih-Chun Chiu, Hui-Hao Chou, and Sheng-De Wang, “An Embedded Hardware/Software Platform for Network Firewall and IP Protocol Processing,” Conference on Innovative Electronics Design and Applications, Sun-Moon Lake, Nan-Tou, Taiwan., Dec. 2012
  34. Cheng-Han You and Sheng-De Wang, “A Data Parallel Approach to XML Parsing and Query,” The 2011 International Symposium on Advances of High Performance Computing and Networking (AHPCN-2011), HPCC 2011, Banff, Canada, Sept. 2011
  35. Sheng-De Wang, Chih-Hung Weng,, “Algorithms and Hardware Architectures for Variable Block Size Motion Estimation,” International Conference on Ubiquitous Intelligence and Computing (UIC 2011), Banff, Canada, Sept. 2011
  36. Chia-Hao Hsu and Sheng-De Wang, “Embedded Network Intrusion Detection Systems with a Multi-Core Aware Packet Capture Module,” Workshop of Embedded Multi-core Systems, Interational Conference of Parallel Processing, Taipei, Taiwan, Sept. 2011
  37. 曾翔煜, 劉思廷, 王勝德,, “基於簡單電力與磁力分析方法(SPA/EMA)之FPGA安全檢測平台,” CISC2011 第二十一屆資訊安全會議 (Cryptology and Information Security Conference), NFU, Yunlin, Taiwan, May 2011
  38. C. H. Liu, T. Y. Fang, Y. F. Chung, T. S. Chen, S. D. Wang, “A time-restricted key management for mobile agent in distributed networks,” Symposium on Cloud and Service Computing, Taipei, Taiwan, Jan. 2011
  39. Nicolas Moro,Ssu-Ting Liu, Sheng-De Wang, “A novel use of Trusted Platform Modules for simple hierarchical access control in content delivery networks,” 011 Information Technologies Applications and Management Conference, ITAMC2011, Kaohsiung, Taiwan., 2011
  40. Sheng-De Wang, Chun-Wei Chen,Michael Pan, andn Chih-Hao Hsu, “Hardware Accelerated XML Parsers with Well Form Checkers and Abstract Classification Tables,” International Computer Symposium, pp. 467-473, Tainan, Taiwan, Dec. 2010
  41. Chia-Hui Liu, Yu-Fang Chung, Jin-De Jhuo, Tzer-Shyong Chen, Sheng-De Wang, “An ID-based access control with time-bound key management for mobile agent,” The 2010 IAENG International Conference on Computer Science, Hong Kong, Mar. 2010
  42. Shih-Wei Chang, Michael Pan and Sheng-De Wang,, ““A Robust P2P Media Streaming Scheme in Dynamic Environments,",” The 6th Workshop on Grid Technologies and Applications, Taitung, Dec. 2009
  43. Yeong-Sheng Chen, Chih-Chieh Lin, and Sheng-De Wang,, “"A Traffic-Aware Routing Algorithm for IEEE 802.16j Multihop Relay Networks,",” 2009 Fourth International Conference on Communications and Networking in China, Aug. 2009
  44. Yeong-Sheng Chen, Der-Jiunn Deng, Yu-Ming Hsu, and Sheng-De Wang,, “ "An Enhanced Uplink Scheduling Algorithm for Video Traffic Transmission in IEEE 802.16 BWA Systems,",” The 5th International Wireless Communications and Mobile Computing Conference,, Jun. 2009
  45. Chia-Hui Liu, Yu-Fang Chung, Tzer-Shyong Chen, and Sheng-De Wang,, ““Access Control and Key Management Scheme based on Bilinear Pairing over Elliptic Curves for Mobile Agent,”,” 2009 Third International Conference on Multimedia and Ubiquitous Engineering,, pp. 189-196, Jun. 2009
  46. Cheng-Juei Yu, Yi-Hsin Wu, and Sheng-De Wang,, “Coevolution of Go Players on Distributed Computing Environments,” The 5th Workshop on Grid Technologies and Applications, Tainan, December, 2008, Dec. 2008
  47. Yuan-Chin Wen, Chia-Hung Chen, and Sheng-De Wang,, “Crossing Heterogeneous Grid Systems with a Single Sign-on Scheme based on a P2P Layer,” 2008 IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2008), Yilan, Taiwan, Dec. 2008
  48. Ching-Hwa Yu, Michael Pan, and Sheng-De Wang,, “Adaptive Neighbor Caching for Fast BSS Transition using IEEE 802.11k Neighbor Report,” The 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA-08), Sydney, Australia, Dec. 2008
  49. Fen-Cheng Yang, Michael Pan, and Sheng-De Wang,, “An Enhanced Medium Access Control Protocol for Multi-Channel Multi-Interface Wireless Mesh Networks,,” 2008 International Computer Symposium, Tamkang University, Taiwan, Nov. 2008
  50. Chia Hsiang Hsu, Cheng-Juei Yu and Sheng-De Wang, “Energy Saving Based on CPU Voltage Scaling and Hardware Software Partitioning,” The 13th IEEE Pacific Rim International Symposium on Dependable Computing, Melbourne, Australia, Dec. 2007
  51. Yung-Tai Hsu, Yuan-Jin Wen and Sheng-De Wang, “Embedded Hardware/Software Design and Cosimulation using User Mode Linux and SystemC,” International Conference Parallel Processing, EPDC workshops, pp. 17-22, Xi-an, China, Sept. 2007
  52. Shang-Feng Chiang, Chun-Hung Wu, and Sheng-De Wang, “An Active Index Diffusion Scheme for Multilayer Unstructured Peer-to-Peer Networks,” International Conference on Communications, Circuits and Systems, Fukuoka, Japan, Jul. 2007
  53. Hau-Han Wang and Sheng-De Wang, “The Modified Grid Location Service for Mobile Ad-Hoc Networks,” Grid and Pervasive Computing 2007, LNCS 4459, pp. 334–347,, Paris, France, May 2007
  54. Yuan-Jin Wen and Sheng-De Wang, “Minimizing Migration on Grid Environments: an Experience on Sun Grid Engine,” The Third Workshop on Grid Technologies and Applications, pp. 27-33, Hsinchu. Taiwan, Dec. 2006
  55. Zheng-Yi Huang and Sheng-De Wang, “A dependable outbound bandwidth based approach for peer to peer media streaming,” IEEE 12th Pacific Rim International Symposium on Dependable Computing, pp. 221-229, Riverside, California, USA, Dec. 2006
  56. Kuo-Ping Wu and Sheng-De Wang, “Choosing the Parameters of 2-norm Soft Margin Support Vector Machines According to the Cluster Validity,” 2006 IEEE International Conference on Systems, Man, and Cybernetics, Taipei, Taiwan, Oct. 2006
  57. Jian-Feng Huang, Sheng-Yan Chuang, and Sheng-De Wang, “Transmission Range Designation Broadcasting Methods for Wireless Ad Hoc Networks,” The 3rd International Conference on Ubiquitous Intelligence and Computing, 312-321, Wuhan, China, Sept. 2006
  58. Kuo-Ping Wu and Sheng-De Wang, “Choosing the Kernel parameters of Support Vector Machines According to the Inter-cluster Distance,” IEEE World Congress on Computational Intelligence, International Joint Conference on Neural Networks, Vancouva, Canada, Jul. 2006
  59. Zheng-Yi Huang and Sheng-De Wang, “JOS: A Java-based parallel environment for distributed computing systemss,” Proceedings of the Second Workshop on Grid Technologies and Applications, Hualien, Taiwan,, Dec. 2005
  60. Michael Pan, Sheng-Yan Chuang, Sheng-De Wang, “Local Repair Mechanisms for On-Demand Routing in Mobile Ad hoc Networks,” 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), 317-324, ChangSha, Hunan, China, Dec. 2005
  61. K. -P Wu and S. -D. Wang, “A weighting initialization strategy for weighted support vector machines,” The third international conference on Advances in Pattern Recognition, UK, Oct. 2005
  62. Y -C. Huang, S. –Y. Chuang and S. –D. Wang, “A Dynamic Node Degree Management Scheme for Energy-efficient Routing Protocols in Wireless Ad Hoc Networks,” International Conferences on Parallel and Distributed Systems, Workshop on Parallel and Distributed Embedded Systems (PDES'2005), Japan, Jul. 2005
  63. I. -T. Hsu, Z. -Y. Huang, and S. -D. Wang, “Dynamic Scheduling Methods for Computational Grid Environments,” International Conferences on Parallel and Distributed Systems, Japan, Jul. 2005
  64. I-Tar Hsu, Zheng-Yi Huang and Sheng-De Wang, “A Dynamic Scheduling Method for Computational Grid Environment,” Proceedings of the First Workshop on Grid Technologies and Applications (WoGTA' 04, HsinChu, Taiwan, Dec. 2004
  65. Sheng-De Wang, Hsuen-Ling Ko and Yung-Yu Zhuang,, “Japster: An Improved Peer-to-Peer Network Architecture,” Embedded and Ubiquitous Computing: EUC 2004, Lecture Notes In Computer Scienc, Japan, Jul. 2004
  66. Hsiao, R. and Sheng-De Wang, “Jelly: a dynamic hierarchical P2P overlay network with load balance and locality,” Proceedings. 24th International Conference on Distributed Computing Systems Workshops, Page(s):534 - 54, Hachioji, Tokyo, Japan, Mar. 2004
  67. Chun-Fu Lin and Sheng-De Wang, “Training algorithms for fuzzy support vector machines with noisy data,” 2003 IEEE 13th Workshop on Neural Networks for Signal Processing, Page(s):517 - 52, Sept. 2003
  68. S. -D. Wang and; P.M.H. Dai, “Multipath banyan-based multistage networks for ATM switches,” Parallel and Distributed Computing, Applications and Technologies, 2003. PDCAT'2003. Proceedings of the Fourth International Con, Page(s): 319 -32, Aug. 2003
  69. K. -S. Hsueh and S. -D. Wang, “A Packet-Based Caching Proxy with Loss Recovery for Video Streaming,” 2002 Pacific Rim International Symposium on Dependable Computing, Tsukuba International Congress Center, Japan, Dec. 2002
  70. C. -J. Lee, S. -D. Wang, and M. -H. Kao, “Direct Core Point Detection in Raw Fingerprint Images,” The 2002 International Conference on Artificial Intelligence (IC-AI'02), Las Vegas, USA, Jun. 2002
  71. T. -N. Yang and S. -D. Wang, “Fuzzy Robust Clustering and C Spherical Shells Algorithm,” National Computer Symposium, Taipei, Dec. 2001
  72. S. -D. Wang and P. -H. Sui, “Fault-Tolerant Routing in Two-Dimensional Mesh Networks with Less-Restricted Fault Patterns,” Pacific Rim Conference on Dependable Computing, Dec. 2001
  73. S. -D. Wang and Y. Lin, “Jato: a compact binary file format for Java class,” Poceedings of Eighth International Conference on Parallel and Distributed Systems (ICPADS 2001), pp. 467 -474, 2001
  74. C. -J. Lee, S. -D. Wang, and K. -B. Wu, “Fingerprint recognition using principal Gabor basis function,” Proceedings Proceedings of 2001 International Symposium on Intelligent Multimedia, Video & Speech Processing (ISIMP2001), pp. 393-396, 2001
  75. C. -J. Lee and S. -D. Wang, “Gabor basis functions for fingerprint image representation and recognition,” The Second International Conference on Parallel and Distributed Computing, Applications, and Techniques (PDCAT2001), pp. 56-63, 2001
  76. C. -J. Lee, S. -D. Wang, and K. -B. Wu, “Fingerprint recognition using the responses of principal Gabor basis functions,” Third International Conference on Information, Communications, and Signal Processing (ICICS2001), 2001
  77. C. -J. Lee and S. -D. Wang, “Fingerprint verification based on local Gabor filters,” The Sixth Conference on Artificial Intelligence and Applications (TAAI2001), 2001
  78. C. -F. Lin and S. -D. Wang, “Fuzzy Least Squares Support Vector Machines,” 9th National Symposium on Fuzzy Theory and Application, Chung-Li, 2001
  79. S. -D. Wang and P. -H. Sui, “Routing in Two-Dimensional Mesh Networks with Arbitrarily Shaped Faults,” Proceedings of The Sixth Workshop on Compiler Techniques for High-Performance Computing, pp. 187-196, National Sun Yat-sen University, Kaohsiung, Taiwan, 2000
  80. T. -N. Yang and S. -D. Wang, “Principal component analysis based on fuzzy objective functions,” Proceedings of 1999 National Computer Symposium, pp. B350-B353, Dec. 1999
  81. W. -C. Ku and S. -D. Wang, “Enhanced mechanisms for protecting the subscriber anonumity in GSM,” Proceedings of the 1999 International Symposium on Communicatioins, pp. 200-204, Nov. 1999
  82. S. -D. Wang and C. -J. Lee, “Fingerprint recognition using directional micropatterm histograms and LVQ Networks,” 1999 International Conference on Information Intelligence and Systems, pp. 300-303, Oct. 1999
  83. C. -J. Lee and S. -D. Wang, “A Gabor Filter-Based Approach to Fingerprint Recognition,” 1999 IEEE Workshop on Signal Processing Systems Design and Implementation, pp. 371-378, Taipei, Taiwan, Oct. 1999
  84. Murphy C. -C. Chen and S. -D. Wang, “EKernel: An Object-Oriented -kernel,” 1999 Workshop in Distributed System Technologies and Applications, pp. 401-408, Tainan, May 1999
  85. P. -H. Sui and S. -D. Wang, “Fault-Tolerant Routing in Two-Dimensional Mesh Networks,” The Fifth Workshop on Compiler Techniques for High-Performance Computing, pp. 47-54, Chiayi, Taiwan, Mar. 1999

Patents:

  1. Chieh-Chi Chen and Sheng-De Wang, “Content Addressable Memory,” US7952902B2, May 2011
  2. Sheng-Hsun Cho and Sheng-De Wang, “Method and System for Packet Classification with Reduced Memory Space and Enhanced Access Speed,” US7953082B2, May 2011
  3. Ching-Fu Kung and Sheng-De Wang, “Computer Network Packet Classification Method and System based on a Nonoverlapping Rule Group Encoding Scheme,” 美國, US7792120B2, Sept. 2010
  4. Chang-Chih Hsieh and Sheng-De Wang, “Two-stage Computer Network packet Classification Method and System,” 美國, US7782868B2, Aug. 2010