王勝德教授的著作列表 - Publication List of Sheng-De Wang

Publication List of 王勝德 Sheng-De Wang

Journal articles & book chapters:

  1. Wen-Chin Chen, Yin-Tzu Huang, and Sheng-De Wang, “Provable Secure Group Key Establishment Scheme for Fog Computing,” IEEE Access, vol. 9, 158682-158694, Nov. 2021
  2. Yi-Hsin Wu, Jui-Yu Huang, Yi-Chun, Yin-Jing Tien, Cheng-Juei Yu, Sheng-De Wang, “ Detecting and Scoring Equipment Faults in Real-time during Semiconductor Test Processes,” IEEE Design and Test, Vol. 38, No. 4, 120-126, Jul. 2021
  3. Jones Sai-Wang Wan, Sheng-De Wang, “ Concept Drift Detection Based on Pre-Clustering and Statistical Testing,” Journal of Internet Technology, Vol. 22, 465-472, 2021
  4. Chi-Wei Lu, Shen-De Wang, and Shao-Yi Chien , “ A Novel Gaming Video Encoding Process Using In-Game Motion Vectors,” IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, Vol. 30, No. 7, 2207-2214, Jul. 2020
  5. Yi-Hsin Wu, Yu-Hsin Chang, Yin-Jing Tien, Cheng-Juei Yu, Sheng-De Wang, Cheng-Hung Wu, “ Using Partial Combination Models to Improve Prediction Quality and Transparency in Mixed Datasets,” IEEE Access, Vol. 8, 132106-132120, 2020
  6. Cheng-Juei Yu, Yi-Hsin Wu, and Sheng-De Wang, “An Approach to the Design of Specific Hardware Circuits from C Programs,” Journal of Information Science and Engineering, vol. 34,, 337-351, 2018
  7. 林顥宗,王勝德,, “"網路入侵偵測的證據萃取與保留的兩階段分析方法,” 前瞻科技與管理, 5卷1期, 107-128, May 2015
  8. Chien-Chi Chen, Sheng-De Wang, “A hybrid multiple-character transition finite-automaton for string matching engine,” Microprocessors and Microsystems - Embedded Hardware Design, 39(2), 122-134, 2015
  9. 張智傑,王勝德, “適用於網路入侵偵測不平衡資料之階層式多重分類器,” Communications of CCISA (資訊安全通訊期刊), Vol 21, No. 2, 21-40, 2015
  10. 江格, 黃昌平, 高培晟, 王勝德, “普遍存在之行動裝置應用程式漏洞,” Communications of CCISA (資訊安全通訊期刊), Vol 24, No. 4, pp. 1-8, Sept. 2014
  11. Chien-Chi Chen and Sheng-De Wang, “An efficient multi-character transition string-matching engine based on the Ahocorasick algorithm,” ACM Transactions on Architecture and Code Optimization (TACO), Volume 10 Issue 4, pp. 25:1--25:22, Dec. 2013
  12. Chien-Chi Chen and Sheng-De Wan, “A Multi-Character Transition String Matching Architecture Based On Aho-Corasick Algorithm,” International Journal of Innovative Computing, Information and Control, Volume 8, Number 12, December 2012, pp. 8367-8386, Dec. 2012
  13. Yeong-Sheng Chen, Der-Jiunn Deng, Yu-Ming Hsu and Sheng-De Wang, “Efficient uplink scheduling policy for variable bit rate traffic in IEEE 802.16 BWA systems,” International Journal of Communication Systems, Volume 25, Issue 6, pages 734–748, Jun. 2012
  14. C. H. Liu, Y. F. Chung, T. S. Chen, and S. D. Wang, “The enhancement of security in healthcare information systems,” Journal of Medical Systems, 36(3), 1673-88, Jun. 2012
  15. C. H. Liu, Y. F. Chung, T. S. Chen, and S. D. Wang, “Mobile agent application and integration in electronic anamnesis system,” Journal of Medical Systems, 36(3), 1009–1020, Jun. 2012
  16. C. H. Liu, Y. F. Chung, T. S. Chen, and S. D. Wang, “An ID-based access control in a hierarchical key management for mobile agent,” International Journal of Innovative Computing, Information and Control, Vol.7, No.3, pp. 1443-1456, Mar. 2011
  17. C. H. Liu, Y. F. Chung, T. S. Chen and S. D. Wang, “The Design of ID-Based Access Control System with Time-Sensitive key for Mobile Agent’s Migration,” International Journal of Innovative Computing, Information and Control, Vol.7, No.12,, pp. 7077-7090, 2011
  18. Yi-Chih Liu and Sheng-De Wang, “A virtual teleconferencing system based on face detection and 3D animation in a low-bandwidth environment,” International Journal of Imaging Systems and Technology, Volume 20, Issue 4, pages 323–332, Dec. 2010
  19. Cheng-Juei Yu, Yi-Hsin Wu, and Sheng-De Wang, “An in-place search algorithm for the resource constrained scheduling problem during high-level synthesis,” ACM Transactions on Design Automation of Electronic Systems, Vol. 15, No. 4, pp. 1-13, Sept. 2010
  20. Chang-Ching Yang, Chen-Mou Cheng, and Sheng-De Wang, “Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems,” Journal of Information Science and Engineering, Vol. 26 No. 5, pp. 1563-1582, Sept. 2010
  21. Shang-Feng Chiang, Kuo Chiang, and Ruo-Jian Yu, and Sheng-De Wang, “Scalable Index and Data Management for Unstructured Peer-to-Peer Networks,” Handbook of Research on Scalable Computing Technologies, IGI Global, Hershey, Pennsylvania, pp. 123-139, 2010
  22. Kuo-Ping Wu and Sheng-De Wang,, “ "Choosing the kernel parameters for support vector machines by the inter-cluster distance in the feature space,",” Pattern Recognition, Vol. 42 , No. 5,, pp. 710-717, May 2009
  23. Y.-H. Wu, C.-J. Yu, and S.-D. Wang, “Heuristic algorithm for the resource-constrained scheduling problem during high-level synthesis,” IET Computers & Digital Techniques, Volume 3, Issue 1, 43-51, Jan. 2009
  24. Chun-Hung Wu, Kuo Chiang, Ruo-Jian Yu, Sheng-De Wang, “Locality and Resource Aware Peer-to-Peer Overlay Networks,” Journal of the Chinese Institute of Engineers, Vol. 31, No. 7, 1207-1217, Dec. 2008
  25. Yuan-Jin Wen and Sheng-De Wang, “Minimizing Migration on Grid Environments: an Experience on Sun Grid Engine,” Journal of Information Technology and Applications, Vol. 1 No. 4, pp. 297-304., Mar. 2007
  26. Kuang-Han Fei, Sheng-Yan Chuang and Sheng-De Wang, “A Power-Aware Routing Protocol Using Multi-Route Transmission for Mobile Ad Hoc Networks,” Emerging Directions in Embedded and Ubiquitous Computing, LNCS Volume 4097, pp. 540-549, Aug. 2006
  27. J. Fu Lin and Sheng De Wang, “Fuzzy support vector machines with automatic membership setting,” Support Vector Machines: Theory and Applications Ed. by Lipo Wang, Studies in Fuzziness and Soft Computing, Springer, ISBN: 3540243, pp. 233-254, Aug. 2005
  28. Tai-Ning Yang and Sheng-De Wang,, “Competitive algorithms for the clustering of noisy data,” Fuzzy Sets and Systems, Volume: 141, Issue: 2, pp. 281-299, 2004
  29. Chun-Fu Lin and Sheng-De Wang, “Training algorithms for fuzzy support vector machines with noisy data,” Pattern Recognition Letters, Volume: 25, Issue: 14, pp. 1647-1656, 2004
  30. Chuan-Kai Lin and Sheng-De Wang, “An adaptive H infinity controller design for bank-to-turn missiles using ridge Gaussian neural networks,” IEEE Transactions on Neural Networks, Volume 15, Issue 6, Page(s):1507 - 1, 2004
  31. H. -C. Huang, J. -Y. Chen, S. -D. Wang, and C. -M. Chen, “Adaptive ultrasonic speckle reduction based on the slope-facet model,” Ultrasound in Medicine and Biology, Volume: 29, Issue: 8, pp. 1161-1175, Aug. 2003
  32. C. -F. Lin and S. -D. Wang, “Fuzzy Support Vector Machines,” IEEE Transactions on Neural Networks, Vol. 13, No. 2, pp. 464-471, Mar. 2002
  33. W. -C. Ku and S. -D. Wang, “An Anonymous Endorsement System,” Journal of Information Science and Engineering, Vol.18, No.1, pp.107-114, 2002
  34. Huan-Chao Huang, Chung-Ming Chen, Sheng-De Wang, and Henry Horng-Shing Lu,, “Adaptive symmetric mean filter: a new noise-reduction approach based on the slope facet model,” Applied Optics, vol. 10, pp. 5192-5205, 2001
  35. T. -N. Yang and S. -D. Wang, “A rotation invariant printed Chinese character recognition system,” Pattern Recognition Letters, vol. 22, pp. 85-95, 2001
  36. C. -J. Lee and S. -D. Wang, “Fingerprint feature reduction by Gabor basis function,” Pattern Recognition, vol. 34, no. 11, pp. 2245-2248, 2001
  37. W. -C. Ku and S. -D. Wang, “Cryptanalysis of modified authenticated key agreement protocol,” Electronics Letters, vol. 36, no. 21, pp. 1770-1771, Oct. 2000
  38. T. -N. Yang and S. -D. Wang, “Fuzzy Auto-Associative Neural Networks for Principal Component Extraction of Noisy Data,” IEEE Transactions on Neural Networks, vol. 11, no. 3, pp. 808-810, May 2000
  39. M. -J. Tsai and S. -D. Wang, “Adaptive and Deadlock-Free Routing for Irregular Faulty Patterns in Mesh Multicomputers,” IEEE Transactions on Parallel and Distributed Systems, vol. 11, no. 1, pp. 50-63, Jan. 2000
  40. P. -H. Sui and S. -D. Wang, “A fault-tolerant wormhole routing algorithm for mesh networks,” IEE proceedings-Computers and Digital Techniques, vol. 147, no. 1, Jan. 2000
  41. S. -D. Wang and C. -K. Lin, “Adaptive tuning of the fuzzy controller for robots,” Fuzzy Sets and Systems, vol. 110, pp. 351-363, 2000
  42. P. -H. Sui and S. -D. Wang, “A fault-tolerant routing algorithm for wromhole routed meshes,” Parallel Computing, vol. 26, pp. 455-465, 2000
  43. C. -K. Lin, S. -D. Wang, “Fuzzy system identification using an adaptive learning rule with terminal attractors,” Fuzzy Sets And Systems, vol. 101, no. 3, pp. 343-352, Feb. 1999
  44. W. -C. Ku and S. -D. Wang, “A secure and practical electronic voting scheme,” Computer Communications, vol. 22, no. 3, pp. 279-286, Feb. 1999
  45. C. -J. Lee and S. -D. Wang, “Fingerprint feature extraction using Gabor filters,” IEE Electronics Leeters, vol. 35, no. 4, pp. 288-290, Feb. 1999
  46. T. -N. Yang and S. -D. Wang, “Robust algorithms for principle component analysis,” Pattern Recognition Letters, vol. 20, pp. 927-933, 1999
  47. S. -D. Wang and C. -H. Lee, “Fuzzy system modeling using linear distance rules,” Fuzzy Sets and Systems, vol. 108, pp. 179-191, 1999
  48. P. -H. Sui and S. -D. Wang, “Fault-tolerant wormhole routing in two-dimensional mesh networks with convex faults,” Information Sciences, An International Journal, vol. 121, pp. 217-231, 1999

Conference & proceeding papers:

  1. Yen-Cheng Liu, Yu-Ying Yeh, Tzu-Chien Fu, Sheng-De Wang, Wei-Chen Chiu and Yu-Chang Frank Wang, “Detach and Adapt: Learning Cross-Domain Disentangled Deep Representation,” IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, Jun. 2018
  2. Kuan-Ting Chen and Sheng-De Wang, “Distributed Continuous Control with Meta Learning On Robotic Arms,” 2018 IEEE International Conference on Systems, Man, and Cybernetics, Miyazaki, Japan, October, 2018., 2018
  3. Jones Sai-Wang Wan and Sheng-De Wang, “Concept Drift Detection Based on Pre-Clustering and Statistical Testing,” TANET 2017, 台灣網際網路研討會, Hua-Lien, Taiwan, Dec. 2017
  4. Sheng-De Wang and Kuan-Jung Chiang, “BLE Tree Networks for Sensor Devices in Internet of Things,” IEEE DataCom 2017, The 3rd IEEE International Conference on Big Data Intelligence and Computing, Orlando, Florida, USA, Nov. 2017
  5. Jhen-Hao Li and Sheng-De Wang, “PhishBox: An Approach for Phishing Validation and Detection,” IEEE DASC2017, The 15th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2017), Orlando, Florida, USA, Nov. 2017
  6. Yen-Cheng Liu, Wei-Chen Chiu, Sheng-De Wang, Yu-Chiang Frank Wang, “Domain-Adaptive generative adversarial networks for sketch-to-photo inversion,” MLSP 2017 : IEEE International Workshop on Machine Learning for Signal Processing, Tokyo, Sept. 2017
  7. Che-Hsun Liu, Zhi-Jie Zhang and Sheng-De Wang, “An Android Malware Detection Approach Using Bayesian Inference,” The 6th IEEE International Symposium On Cloud And Service Computing, Fiji, Dec. 2016
  8. Yu-Chen Chang, Sheng-De Wang, “The Concept of Attack Scenarios and its Applications in Android Malware Detection,” The 2nd IEEE International Conference on Data Science and Systems(DSS 2016), Sydney Australia, Dec. 2016
  9. Tahsin Turker Mutlugun and Sheng-De Wang, “OpenCL Computing on FPGA Using Multiported Shared Memory,” The International Conference on Field-programmable Logic and Applications, London, UK, Sept. 2015
  10. Hsin-Yu Chuang and Sheng-De Wang, “Machine learning based hybrid behavior models for Android malware analysis,” The 2015 IEEE International Conference on Software Quality, Reliability and Security, Vancouver, Canada, Aug. 2015
  11. Hsiang-Yu Tseng, Ssu-Ting Liu, and Sheng-De Wang, “An FPGA Memory Hierarchy for High-level Synthesized OpenCL Kernels,” IEEE International Symposium on High Performance and Smart Computing (IEEE HPSC 2015), New York, USA, Aug. 2015
  12. 林顥宗、王勝德, “網路入侵偵測的證據萃取與保留的兩階段分析方法(A Two-Phase Analysis Approach to Extracting and Preserving Relevant Evidences from NIDS Alerts),” 中華安全科技與管理學會『雲端科技與安全管理』研討會, 2014., 2014
  13. Ssu-Ting Liu and Sheng-De Wang, “PFBF: Pre-Filtered Bloom Filter,” Proceedings of International Computer Symposium, Tung-Hai University, Taichung, Taiwan, 2014., 2014
  14. Chia-Hao Hsu and Sheng-De Wang, “An Embedded NIDS with Multi-Core Aware Packet Capture,” IEEE 16th International Conference on Computational Science and Engineering (with ICESS 2013), Sydney, Australia, Dec. 2013
  15. Chih-Chun Chiu, Hui-Hao Chou, and Sheng-De Wang, “An Embedded Hardware/Software Platform for Network Firewall and IP Protocol Processing,” Conference on Innovative Electronics Design and Applications, Sun-Moon Lake, Nan-Tou, Taiwan., Dec. 2012
  16. Cheng-Han You and Sheng-De Wang, “A Data Parallel Approach to XML Parsing and Query,” The 2011 International Symposium on Advances of High Performance Computing and Networking (AHPCN-2011), HPCC 2011, Banff, Canada, Sept. 2011
  17. Sheng-De Wang, Chih-Hung Weng,, “Algorithms and Hardware Architectures for Variable Block Size Motion Estimation,” International Conference on Ubiquitous Intelligence and Computing (UIC 2011), Banff, Canada, Sept. 2011
  18. Chia-Hao Hsu and Sheng-De Wang, “Embedded Network Intrusion Detection Systems with a Multi-Core Aware Packet Capture Module,” Workshop of Embedded Multi-core Systems, Interational Conference of Parallel Processing, Taipei, Taiwan, Sept. 2011
  19. 曾翔煜, 劉思廷, 王勝德,, “基於簡單電力與磁力分析方法(SPA/EMA)之FPGA安全檢測平台,” CISC2011 第二十一屆資訊安全會議 (Cryptology and Information Security Conference), NFU, Yunlin, Taiwan, May 2011
  20. C. H. Liu, T. Y. Fang, Y. F. Chung, T. S. Chen, S. D. Wang, “A time-restricted key management for mobile agent in distributed networks,” Symposium on Cloud and Service Computing, Taipei, Taiwan, Jan. 2011
  21. Nicolas Moro,Ssu-Ting Liu, Sheng-De Wang, “A novel use of Trusted Platform Modules for simple hierarchical access control in content delivery networks,” 011 Information Technologies Applications and Management Conference, ITAMC2011, Kaohsiung, Taiwan., 2011
  22. Sheng-De Wang, Chun-Wei Chen,Michael Pan, andn Chih-Hao Hsu, “Hardware Accelerated XML Parsers with Well Form Checkers and Abstract Classification Tables,” International Computer Symposium, pp. 467-473, Tainan, Taiwan, Dec. 2010
  23. Chia-Hui Liu, Yu-Fang Chung, Jin-De Jhuo, Tzer-Shyong Chen, Sheng-De Wang, “An ID-based access control with time-bound key management for mobile agent,” The 2010 IAENG International Conference on Computer Science, Hong Kong, Mar. 2010
  24. Shih-Wei Chang, Michael Pan and Sheng-De Wang,, ““A Robust P2P Media Streaming Scheme in Dynamic Environments,",” The 6th Workshop on Grid Technologies and Applications, Taitung, Dec. 2009
  25. Yeong-Sheng Chen, Chih-Chieh Lin, and Sheng-De Wang,, “"A Traffic-Aware Routing Algorithm for IEEE 802.16j Multihop Relay Networks,",” 2009 Fourth International Conference on Communications and Networking in China, Aug. 2009
  26. Yeong-Sheng Chen, Der-Jiunn Deng, Yu-Ming Hsu, and Sheng-De Wang,, “ "An Enhanced Uplink Scheduling Algorithm for Video Traffic Transmission in IEEE 802.16 BWA Systems,",” The 5th International Wireless Communications and Mobile Computing Conference,, Jun. 2009
  27. Chia-Hui Liu, Yu-Fang Chung, Tzer-Shyong Chen, and Sheng-De Wang,, ““Access Control and Key Management Scheme based on Bilinear Pairing over Elliptic Curves for Mobile Agent,”,” 2009 Third International Conference on Multimedia and Ubiquitous Engineering,, pp. 189-196, Jun. 2009
  28. Cheng-Juei Yu, Yi-Hsin Wu, and Sheng-De Wang,, “Coevolution of Go Players on Distributed Computing Environments,” The 5th Workshop on Grid Technologies and Applications, Tainan, December, 2008, Dec. 2008
  29. Yuan-Chin Wen, Chia-Hung Chen, and Sheng-De Wang,, “Crossing Heterogeneous Grid Systems with a Single Sign-on Scheme based on a P2P Layer,” 2008 IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2008), Yilan, Taiwan, Dec. 2008
  30. Ching-Hwa Yu, Michael Pan, and Sheng-De Wang,, “Adaptive Neighbor Caching for Fast BSS Transition using IEEE 802.11k Neighbor Report,” The 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA-08), Sydney, Australia, Dec. 2008
  31. Fen-Cheng Yang, Michael Pan, and Sheng-De Wang,, “An Enhanced Medium Access Control Protocol for Multi-Channel Multi-Interface Wireless Mesh Networks,,” 2008 International Computer Symposium, Tamkang University, Taiwan, Nov. 2008
  32. Chia Hsiang Hsu, Cheng-Juei Yu and Sheng-De Wang, “Energy Saving Based on CPU Voltage Scaling and Hardware Software Partitioning,” The 13th IEEE Pacific Rim International Symposium on Dependable Computing, Melbourne, Australia, Dec. 2007
  33. Yung-Tai Hsu, Yuan-Jin Wen and Sheng-De Wang, “Embedded Hardware/Software Design and Cosimulation using User Mode Linux and SystemC,” International Conference Parallel Processing, EPDC workshops, pp. 17-22, Xi-an, China, Sept. 2007
  34. Shang-Feng Chiang, Chun-Hung Wu, and Sheng-De Wang, “An Active Index Diffusion Scheme for Multilayer Unstructured Peer-to-Peer Networks,” International Conference on Communications, Circuits and Systems, Fukuoka, Japan, Jul. 2007
  35. Hau-Han Wang and Sheng-De Wang, “The Modified Grid Location Service for Mobile Ad-Hoc Networks,” Grid and Pervasive Computing 2007, LNCS 4459, pp. 334–347,, Paris, France, May 2007
  36. Yuan-Jin Wen and Sheng-De Wang, “Minimizing Migration on Grid Environments: an Experience on Sun Grid Engine,” The Third Workshop on Grid Technologies and Applications, pp. 27-33, Hsinchu. Taiwan, Dec. 2006
  37. Zheng-Yi Huang and Sheng-De Wang, “A dependable outbound bandwidth based approach for peer to peer media streaming,” IEEE 12th Pacific Rim International Symposium on Dependable Computing, pp. 221-229, Riverside, California, USA, Dec. 2006
  38. Kuo-Ping Wu and Sheng-De Wang, “Choosing the Parameters of 2-norm Soft Margin Support Vector Machines According to the Cluster Validity,” 2006 IEEE International Conference on Systems, Man, and Cybernetics, Taipei, Taiwan, Oct. 2006
  39. Jian-Feng Huang, Sheng-Yan Chuang, and Sheng-De Wang, “Transmission Range Designation Broadcasting Methods for Wireless Ad Hoc Networks,” The 3rd International Conference on Ubiquitous Intelligence and Computing, 312-321, Wuhan, China, Sept. 2006
  40. Kuo-Ping Wu and Sheng-De Wang, “Choosing the Kernel parameters of Support Vector Machines According to the Inter-cluster Distance,” IEEE World Congress on Computational Intelligence, International Joint Conference on Neural Networks, Vancouva, Canada, Jul. 2006
  41. Zheng-Yi Huang and Sheng-De Wang, “JOS: A Java-based parallel environment for distributed computing systemss,” Proceedings of the Second Workshop on Grid Technologies and Applications, Hualien, Taiwan,, Dec. 2005
  42. Michael Pan, Sheng-Yan Chuang, Sheng-De Wang, “Local Repair Mechanisms for On-Demand Routing in Mobile Ad hoc Networks,” 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), 317-324, ChangSha, Hunan, China, Dec. 2005
  43. K. -P Wu and S. -D. Wang, “A weighting initialization strategy for weighted support vector machines,” The third international conference on Advances in Pattern Recognition, UK, Oct. 2005
  44. Y -C. Huang, S. –Y. Chuang and S. –D. Wang, “A Dynamic Node Degree Management Scheme for Energy-efficient Routing Protocols in Wireless Ad Hoc Networks,” International Conferences on Parallel and Distributed Systems, Workshop on Parallel and Distributed Embedded Systems (PDES'2005), Japan, Jul. 2005
  45. I. -T. Hsu, Z. -Y. Huang, and S. -D. Wang, “Dynamic Scheduling Methods for Computational Grid Environments,” International Conferences on Parallel and Distributed Systems, Japan, Jul. 2005
  46. I-Tar Hsu, Zheng-Yi Huang and Sheng-De Wang, “A Dynamic Scheduling Method for Computational Grid Environment,” Proceedings of the First Workshop on Grid Technologies and Applications (WoGTA' 04, HsinChu, Taiwan, Dec. 2004
  47. Sheng-De Wang, Hsuen-Ling Ko and Yung-Yu Zhuang,, “Japster: An Improved Peer-to-Peer Network Architecture,” Embedded and Ubiquitous Computing: EUC 2004, Lecture Notes In Computer Scienc, Japan, Jul. 2004
  48. Hsiao, R. and Sheng-De Wang, “Jelly: a dynamic hierarchical P2P overlay network with load balance and locality,” Proceedings. 24th International Conference on Distributed Computing Systems Workshops, Page(s):534 - 54, Hachioji, Tokyo, Japan, Mar. 2004
  49. Chun-Fu Lin and Sheng-De Wang, “Training algorithms for fuzzy support vector machines with noisy data,” 2003 IEEE 13th Workshop on Neural Networks for Signal Processing, Page(s):517 - 52, Sept. 2003
  50. S. -D. Wang and; P.M.H. Dai, “Multipath banyan-based multistage networks for ATM switches,” Parallel and Distributed Computing, Applications and Technologies, 2003. PDCAT'2003. Proceedings of the Fourth International Con, Page(s): 319 -32, Aug. 2003
  51. K. -S. Hsueh and S. -D. Wang, “A Packet-Based Caching Proxy with Loss Recovery for Video Streaming,” 2002 Pacific Rim International Symposium on Dependable Computing, Tsukuba International Congress Center, Japan, Dec. 2002
  52. C. -J. Lee, S. -D. Wang, and M. -H. Kao, “Direct Core Point Detection in Raw Fingerprint Images,” The 2002 International Conference on Artificial Intelligence (IC-AI'02), Las Vegas, USA, Jun. 2002
  53. T. -N. Yang and S. -D. Wang, “Fuzzy Robust Clustering and C Spherical Shells Algorithm,” National Computer Symposium, Taipei, Dec. 2001
  54. S. -D. Wang and P. -H. Sui, “Fault-Tolerant Routing in Two-Dimensional Mesh Networks with Less-Restricted Fault Patterns,” Pacific Rim Conference on Dependable Computing, Dec. 2001
  55. S. -D. Wang and Y. Lin, “Jato: a compact binary file format for Java class,” Poceedings of Eighth International Conference on Parallel and Distributed Systems (ICPADS 2001), pp. 467 -474, 2001
  56. C. -J. Lee, S. -D. Wang, and K. -B. Wu, “Fingerprint recognition using principal Gabor basis function,” Proceedings Proceedings of 2001 International Symposium on Intelligent Multimedia, Video & Speech Processing (ISIMP2001), pp. 393-396, 2001
  57. C. -J. Lee and S. -D. Wang, “Gabor basis functions for fingerprint image representation and recognition,” The Second International Conference on Parallel and Distributed Computing, Applications, and Techniques (PDCAT2001), pp. 56-63, 2001
  58. C. -J. Lee, S. -D. Wang, and K. -B. Wu, “Fingerprint recognition using the responses of principal Gabor basis functions,” Third International Conference on Information, Communications, and Signal Processing (ICICS2001), 2001
  59. C. -J. Lee and S. -D. Wang, “Fingerprint verification based on local Gabor filters,” The Sixth Conference on Artificial Intelligence and Applications (TAAI2001), 2001
  60. C. -F. Lin and S. -D. Wang, “Fuzzy Least Squares Support Vector Machines,” 9th National Symposium on Fuzzy Theory and Application, Chung-Li, 2001
  61. S. -D. Wang and P. -H. Sui, “Routing in Two-Dimensional Mesh Networks with Arbitrarily Shaped Faults,” Proceedings of The Sixth Workshop on Compiler Techniques for High-Performance Computing, pp. 187-196, National Sun Yat-sen University, Kaohsiung, Taiwan, 2000
  62. T. -N. Yang and S. -D. Wang, “Principal component analysis based on fuzzy objective functions,” Proceedings of 1999 National Computer Symposium, pp. B350-B353, Dec. 1999
  63. W. -C. Ku and S. -D. Wang, “Enhanced mechanisms for protecting the subscriber anonumity in GSM,” Proceedings of the 1999 International Symposium on Communicatioins, pp. 200-204, Nov. 1999
  64. S. -D. Wang and C. -J. Lee, “Fingerprint recognition using directional micropatterm histograms and LVQ Networks,” 1999 International Conference on Information Intelligence and Systems, pp. 300-303, Oct. 1999
  65. C. -J. Lee and S. -D. Wang, “A Gabor Filter-Based Approach to Fingerprint Recognition,” 1999 IEEE Workshop on Signal Processing Systems Design and Implementation, pp. 371-378, Taipei, Taiwan, Oct. 1999
  66. Murphy C. -C. Chen and S. -D. Wang, “EKernel: An Object-Oriented -kernel,” 1999 Workshop in Distributed System Technologies and Applications, pp. 401-408, Tainan, May 1999
  67. P. -H. Sui and S. -D. Wang, “Fault-Tolerant Routing in Two-Dimensional Mesh Networks,” The Fifth Workshop on Compiler Techniques for High-Performance Computing, pp. 47-54, Chiayi, Taiwan, Mar. 1999

Patents:

  1. Chieh-Chi Chen and Sheng-De Wang, “Content Addressable Memory,” US7952902B2, May 2011
  2. Sheng-Hsun Cho and Sheng-De Wang, “Method and System for Packet Classification with Reduced Memory Space and Enhanced Access Speed,” US7953082B2, May 2011
  3. Ching-Fu Kung and Sheng-De Wang, “Computer Network Packet Classification Method and System based on a Nonoverlapping Rule Group Encoding Scheme,” 美國, US7792120B2, Sept. 2010
  4. Chang-Chih Hsieh and Sheng-De Wang, “Two-stage Computer Network packet Classification Method and System,” 美國, US7782868B2, Aug. 2010