Calculated based on number of publications stored in Pure and citations from Scopus
Calculated based on number of publications stored in Pure and citations from Scopus
Calculated based on number of publications stored in Pure and citations from Scopus
1993 …2022

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2021

    OAuth-Based Access Control Framework for IoT Systems

    Shieh, M-Z., Liu, J. C., Kao, Y-C., Tsai, S-C. & Lin, Y-B., 5 Dec 2021, Smart Grid and Internet of Things - 4th EAI International Conference, SGIoT 2020, Proceedings. Lin, Y-B. & Deng, D-J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 208-219 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 354).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • REST API Fuzzing by Coverage Level Guided Blackbox Testing

    Tsai, C. H., Tsai, S. C. & Huang, S. K., 2021, Proceedings - 2021 21st International Conference on Software Quality, Reliability and Security, QRS 2021. Institute of Electrical and Electronics Engineers, p. 291-300 10 p. (IEEE International Conference on Software Quality, Reliability and Security, QRS; vol. 2021-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2018

    A dichotomy result for cyclic-order traversing games

    Chen, Y. T., Tsai, M-T. & Tsai, S-C., 1 Dec 2018, 29th International Symposium on Algorithms and Computation, ISAAC 2018. Lee, D-T., Liao, C-S. & Hsu, W-L. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, (Leibniz International Proceedings in Informatics, LIPIcs; vol. 123).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fast Failover with Hierarchical Disjoint Paths in SDN

    Liao, Y. Z. & Tsai, S-C., 1 Jan 2018, 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8647950. (2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • 2017

    An autoblocking mechanism for firewall service

    Fu, S. J., Hsu, H. W., Kao, Y-C., Tsai, S-C. & Tseng, C-C., 18 Oct 2017, 2017 IEEE Conference on Dependable and Secure Computing. Institute of Electrical and Electronics Engineers Inc., p. 531-532 2 p. 8073877. (2017 IEEE Conference on Dependable and Secure Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Detecting amplification attacks with Software Defined Networking

    Chen, C. C., Chen, Y. R., Lu, W. C., Tsai, S-C. & Yang, M. C., 18 Oct 2017, 2017 IEEE Conference on Dependable and Secure Computing. Institute of Electrical and Electronics Engineers Inc., p. 195-201 7 p. 8073807. (2017 IEEE Conference on Dependable and Secure Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    25 Scopus citations
  • Forwarding path discovery with software defined networking

    Chen, C. C., Chen, Y. R., Tsai, S-C. & Yang, M. C., 1 Nov 2017, 19th Asia-Pacific Network Operations and Management Symposium: Managing a World of Things, APNOMS 2017. Institute of Electrical and Electronics Engineers Inc., p. 299-302 4 p. 8094133. (19th Asia-Pacific Network Operations and Management Symposium: Managing a World of Things, APNOMS 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Implementing NFV system with OpenStack

    Chen, J., Chen, Y., Tsai, S-C. & Lin, Y-B., 18 Oct 2017, 2017 IEEE Conference on Dependable and Secure Computing. Institute of Electrical and Electronics Engineers Inc., p. 188-194 7 p. 8073806. (2017 IEEE Conference on Dependable and Secure Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • 2015

    Restrictions of nondegenerate Boolean functions and degree lower bounds over different rings

    Lee, C. J., Lokam, S. V., Tsai, S-C. & Yang, M. C., 28 Sep 2015, Proceedings - 2015 IEEE International Symposium on Information Theory, ISIT 2015. Institute of Electrical and Electronics Engineers Inc., p. 501-505 5 p. 7282505. (IEEE International Symposium on Information Theory - Proceedings; vol. 2015-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • 2014

    Online prediction problems with variation

    Lee, C. J., Tsai, S-C. & Yang, M. C., 1 Jan 2014, Computing and Combinatorics - 20th International Conference, COCOON 2014, Proceedings. Springer Verlag, p. 49-60 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8591 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2011

    Computational randomness from generalized hardcore sets

    Lee, C. J., Lu, C. J. & Tsai, S-C., 9 Sep 2011, Fundamentals of Computation Theory - 18th International Symposium, FCT 2011, Proceedings. p. 78-89 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6914 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Computing the Ball Size of Frequency Permutations under Chebyshev Distance

    Shieh, M-Z. & Tsai, S-C., 26 Oct 2011, 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011. p. 2100-2104 5 p. 6033927. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • 2010

    On the minimum weight problem of permutation codes under chebyshev distance

    Shieh, M-Z. & Tsai, S-C., 23 Aug 2010, 2010 IEEE International Symposium on Information Theory, ISIT 2010 - Proceedings. p. 1183-1187 5 p. 5513663. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2009

    Decoding frequency permutation arrays under infinite norm

    Shieh, M-Z. & Tsai, S-C., 19 Nov 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 2713-2717 5 p. 5205867. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Extracting computational entropy and learning noisy linear functions

    Lee, C. J., Lu, C. J. & Tsai, S-C., 1 Dec 2009, Computing and Combinatorics - 15th Annual International Conference, COCOON 2009, Proceedings. p. 338-347 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5609 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2008

    A Monte Carlo method for estimating the extended all-terminal reliability

    Huang, S. M., Wu, Q. & Tsai, S-C., 25 Aug 2008, Proceedings - 4th International Conference on Networking and Services, ICNS 2008. p. 122-127 6 p. 4476546. (Proceedings - 4th International Conference on Networking and Services, ICNS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Efficient encoding and decoding with permutation arrays

    Lin, T. T., Tsai, S-C. & Tzeng, W-G., 29 Sep 2008, Proceedings - 2008 IEEE International Symposium on Information Theory, ISIT 2008. p. 211-214 4 p. 4594978. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • 2007

    Impossibility results on weakly black-box hardness amplification

    Lu, C. J., Tsai, S-C. & Wu, H. L., 1 Dec 2007, Fundamentals of Computation Theory - 16th International Symposium, FCT 2007, Proceedings. p. 400-411 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4639 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • On the complexity of hard-core set constructions

    Lu, C. J., Tsai, S-C. & Wu, H. L., 1 Dec 2007, Automata, Languages and Programming - 34th International Colloquium, ICALP 2007, Proceedings. p. 183-194 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4596 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • 2006

    Deterministic extractors for independent-symbol sources

    Lee, C. J., Lu, C. J. & Tsai, S-C., 1 Jan 2006, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings. Springer Verlag, p. 84-95 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4051 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • 2000

    Compiler optimization on instruction scheduling for low power

    Lee, C., Lee, J. K., Hwang, T. T. & Tsai, S-C., 1 Jan 2000, Proceedings - 13th International Symposium on System Synthesis, ISSS 2000. IEEE Computer Society, p. 55-60 6 p. 874029. (Proceedings of the International Symposium on System Synthesis; vol. 2000-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    54 Scopus citations
  • 1997

    A note on the bottleneck counting argument

    Simon, J. & Tsai, S-C., 1 Jan 1997, Proceedings - 12th Annual IEEE Conference on Computational Complexity, CCC 1997 (Formerly: Structure in Complexity Theory Conference). IEEE Computer Society, p. 297-301 5 p. 612324. (Proceedings of the Annual IEEE Conference on Computational Complexity).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • 1995

    Recycling random bits in parallel

    Friedl, K. & Tsai, S-C., 1 Jan 1995, Proceedings of the 28th Annual Hawaii International Conference on System Sciences, HICSS 1995. IEEE Computer Society, p. 14-19 6 p. 375482. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 1993

    Lower bounds on representing Boolean functions as polynomials in Zm

    Tsai, S-C., 1 Jan 1993, Proceedings of the Eighth Annual Structure in Complexity Theory Conference. Anon (ed.). Publ by IEEE, p. 96-101 6 p. (Proceedings of the Eighth Annual Structure in Complexity Theory Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations