Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proactive Privacy Practices In The Trend Of Ubiquitous Services: An Integrative Social Contracts Perspective., and . PACIS, page 210. Queensland University of Technology, (2011)The anatomy study of server-initial agreement for general hierarchy wired/wireless networks., , and . Comput. Stand. Interfaces, 31 (1): 219-226 (2009)The New Territory of Lightweight Security in a Cloud Computing Environment., , , , and . NPC, volume 8707 of Lecture Notes in Computer Science, page 526-529. Springer, (2014)Reaching Safety Vehicular Ad Hoc Network of IoT., , , and . ACIIDS (2), volume 10192 of Lecture Notes in Computer Science, page 289-298. (2017)The Data Analysis for the Influence of Cross-cultural Training on the Adaptability of Foreign Workers., , , , and . iCAST, page 1-7. IEEE, (2019)A Three-Phases Scheduling in a Hierarchical Cloud Computing Network., , , and . CMC, page 114-117. IEEE Computer Society, (2011)Using House of Dynamic Wants to Discovery the Competency of Religious Lecturer - An Example of I-Kuan Ta in the Central Region of Taiwan., , , and . CMCSN, page 122-125. IEEE Computer Society, (2016)Effect of Information System Co-construction Policy on Cultural Propaganda Oriented Government Website - The National Taiwan Symphony Orchestra as a Case Study., , , and . CMCSN, page 142-145. IEEE Computer Society, (2016)A unified framework for cluster manager election and clustering mechanism in mobile ad hoc networks., , , and . Comput. Stand. Interfaces, 30 (5): 329-338 (2008)Towards a hybrid load balancing policy in grid computing system., , , and . Expert Syst. Appl., 36 (10): 12054-12064 (2009)