Chao-Hsien Chu 朱昭贤
Chao-Hsien Chu 朱昭贤
Professor of Information Sciences and Technology, Pennsylvania State University
Adresse e-mail validée de - Page d'accueil
Citée par
Citée par
Anonymous two-factor authentication: Certain goals are beyond attainment
D Wang, D He, P Wang, CH Chu
IEEE Transactions on Dependable and Secure Computing, 1-14, 2014
The adoption and implementation of RFID technologies in healthcare: a literature review
W Yao, CH Chu, Z Li
Journal of medical systems 36 (6), 3507-3525, 2012
A genetic algorithm for cellular manufacturing design and layout
X Wu, CH Chu, Y Wang, W Yan
European journal of operational research 181 (1), 156-167, 2007
A fuzzy clustering approach to manufacturing cell formation
CH Chu, JC Hayya
The International Journal of Production Research 29 (7), 1475-1487, 1991
The use of RFID in healthcare: Benefits and barriers
W Yao, CH Chu, Z Li
2010 IEEE International Conference on RFID-Technology and Applications, 128-134, 2010
Leveraging complex event processing for smart hospitals using RFID
W Yao, CH Chu, Z Li
Journal of Network and Computer Applications 34 (3), 799-810, 2011
Genetic algorithms for communications network design-an empirical study of the factors that influence performance
H Chou, G Premkumar, CH Chu
IEEE Transactions on Evolutionary Computation 5 (3), 236-249, 2001
Cluster analysis in manufacturing cellular formation
CH Chu
Omega 17 (3), 289-295, 1989
A comparison of three array-based clustering techniques for manufacturing cell formation
CH Chu, M Tsai
The International Journal of Production Research 28 (8), 1417-1433, 1990
Data mining for network intrusion detection: A comparison of alternative methods*
D Zhu, G Premkumar, X Zhang, CH Chu
Decision Sciences 32 (4), 635-660, 2001
ISSAQ: An integrated sensing systems for real-time indoor air quality monitoring
JY Kim, CH Chu, SM Shin
IEEE Sensors Journal 14 (12), 1-15, 2014
The effect of lead‐time variability: The case of independent demand
U Bagchi, JC Hayya, CH Chu
Journal of Operations Management 6 (2), 159-177, 1986
A review of data mining-based financial fraud detection research
D Yue, X Wu, Y Wang, Y Li, CH Chu
2007 International Conference on Wireless Communications, Networking and …, 2007
Information markets vs. opinion pools: An empirical comparison
Y Chen, CH Chu, T Mullen, DM Pennock
Proceedings of the 6th ACM conference on Electronic commerce, 58-67, 2005
Genetic algorithms for integrating cell formation with machine layout and scheduling
X Wu, CH Chu, Y Wang, D Yue
Computers & Industrial Engineering 53 (2), 277-289, 2007
Search for radiative transitions in the hypernucleus B
RE Chrien, S Bart, M May, PH Pile, RJ Sutter, P Barnes, B Bassalleck, ...
Physical Review C 41 (3), 1062, 1990
Data management for Internet of things: Challenges, approaches and opportunities
M Ma, P Wang, CH Chu
Green Computing and Communications (GreenCom), 2013 IEEE and Internet of …, 2013
Simulation studies in JIT production
CH Chu, WL Shih
The International Journal Of Production Research 30 (11), 2573-2586, 1992
Content-based image authentication: current status, issues, and challenges
SH Han, CH Chu
International Journal of Information Security 9 (1), 19-32, 2010
A heuristic ant algorithm for solving QoS multicast routing problem
CH Chu, JH Gu, XD Hou, Q Gu
Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20