default search action
Jun-Lin Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j27]Jun-Lin Lin, Laksamee Khomnotai, Hsin-Chieh Liu:
Oscillation of Repeated Max-Weighted Power Mean Compositions of Fuzzy Matrices. Axioms 10(4): 254 (2021) - [j26]Jun-Lin Lin:
Generalizing Local Density for Density-Based Clustering. Symmetry 13(2): 185 (2021) - 2020
- [j25]Jun-Lin Lin, Jen-Chieh Kuo, Hsing-Wang Chuang:
Improving Density Peak Clustering by Automatic Peak Selection and Single Linkage Clustering. Symmetry 12(7): 1168 (2020) - [c17]Julie Yu-Chih Liu, Hung-Chin Hsu, Jun-Lin Lin:
Influence of Relationship Capability on Project Performance of Post-merger IS Integration. BIS 2020: 157-166
2010 – 2019
- 2019
- [j24]Jun-Lin Lin:
Accelerating Density Peak Clustering Algorithm. Symmetry 11(7): 859 (2019) - 2018
- [j23]Jun-Lin Lin:
Numerical Analysis of Consensus Measures within Groups. Entropy 20(6): 408 (2018) - [j22]Laksamee Khomnotai, Jun-Lin Lin, Zhi-Qiang Peng, Arpita Samanta Santra:
Iterative Group Decomposition for Refining Microaggregation Solutions. Symmetry 10(7): 262 (2018) - 2017
- [j21]Jun-Lin Lin, Laksamee Khomnotai:
Online Auction Fraud Detection in Privacy-Aware Reputation Systems. Entropy 19(7): 338 (2017) - [c16]Jun-Lin Lin, Zhi-Qiang Peng, K. Robert Lai:
Improving Pavement Anomaly Detection Using Backward Feature Elimination. BIS 2017: 341-349 - 2016
- [j20]Jun-Lin Lin, Laksamee Khomnotai:
Improving Fraudster Detection in Online Auctions by Using Neighbor-Driven Attributes. Entropy 18(1): 11 (2016) - 2014
- [j19]Jun-Lin Lin, Laksamee Khomnotai:
Using Neighbor Diversity to Detect Fraudsters in Online Auctions. Entropy 16(5): 2629-2641 (2014) - 2013
- [j18]Jun-Lin Lin:
On the Diversity Constraints for Portfolio Optimization. Entropy 15(11): 4607-4621 (2013) - [c15]Jun-Lin Lin, Hung-Chjh Chuan, Yu-Hsiang Tsai, Chun-Wei Cho:
Improving Imperialist Competitive Algorithm with Local Search for Global Optimization. Asia International Conference on Modelling and Simulation 2013: 61-64 - 2012
- [j17]Jun-Lin Lin, Yu-Hsiang Tsai, Chun-Ying Yu, Meng-Shiou Li:
Interaction Enhanced Imperialist Competitive Algorithms. Algorithms 5(4): 433-448 (2012) - [j16]Yu-Chen Huang, Hanjun Lin, Yeh-Liang Hsu, Jun-Lin Lin:
Using n-gram analysis to cluster heartbeat signals. BMC Medical Informatics Decis. Mak. 12: 64 (2012) - 2011
- [j15]Pei-Chann Chang, Chin-Yuan Fan, Jun-Lin Lin:
Trend discovery in financial time series data using a case based fuzzy decision tree. Expert Syst. Appl. 38(5): 6070-6080 (2011) - [j14]Jun-Lin Lin, Yan-Kuen Wu, Sy-Ming Guu:
On fuzzy relational equations and the covering problem. Inf. Sci. 181(14): 2951-2963 (2011) - 2010
- [j13]Jun-Lin Lin, Tsung-Hsien Wen, Jui-Chien Hsieh, Pei-Chann Chang:
Density-based microaggregation for statistical disclosure control. Expert Syst. Appl. 37(4): 3256-3263 (2010) - [j12]Jun-Lin Lin, Julie Yu-Chih Liu, Chih-Wen Li, Li-Feng Tsai, Hsin-Yi Chung:
Motor shaft misalignment detection using multiscale entropy with wavelet denoising. Expert Syst. Appl. 37(10): 7200-7204 (2010) - [j11]Jun-Lin Lin, Pei-Chann Chang, Julie Yu-Chih Liu, Tsung-Hsien Wen:
Comparison of microaggregation approaches on anonymized data quality. Expert Syst. Appl. 37(12): 8161-8165 (2010)
2000 – 2009
- 2009
- [j10]Jun-Lin Lin, Yung-Wei Cheng:
Privacy preserving itemset mining through noisy items. Expert Syst. Appl. 36(3): 5711-5717 (2009) - [j9]Pei-Chann Chang, Chen-Hao Liu, Jun-Lin Lin, Chin-Yuan Fan, Celeste See Pui Ng:
A neural network with a case based dynamic window for stock trading prediction. Expert Syst. Appl. 36(3): 6889-6898 (2009) - [j8]Pei-Chann Chang, Jih-Chang Hsieh, Shih-Hsin Chen, Jun-Lin Lin, Wei-Hsiu Huang:
Artificial chromosomes embedded in genetic algorithm for a chip resistor scheduling problem in minimizing the makespan. Expert Syst. Appl. 36(3): 7135-7141 (2009) - [j7]Jun-Lin Lin:
Detection of cloaked web spam by using tag-based methods. Expert Syst. Appl. 36(4): 7493-7499 (2009) - [j6]Jun-Lin Lin, Meng-Cheng Wei:
Genetic algorithm-based clustering approach for k-anonymization. Expert Syst. Appl. 36(6): 9784-9792 (2009) - [j5]Jun-Lin Lin, Yan-Kuen Wu, Pei-Chann Chang:
Minimizing a nonlinear function under a fuzzy max-t-norm relational equation constraint. Expert Syst. Appl. 36(9): 11633-11640 (2009) - [j4]Jun-Lin Lin:
On the relation between fuzzy max-Archimedean t-norm relational equations and the covering problem. Fuzzy Sets Syst. 160(16): 2328-2344 (2009) - [c14]Pei-Chann Chang, Chen-Hao Liu, Chin-Yuan Fan, Jun-Lin Lin, Chih-Ming Lai:
An Ensemble of Neural Networks for Stock Trading Decision Making. ICIC (2) 2009: 1-10 - 2008
- [c13]Jun-Lin Lin, Meng-Cheng Wei, Chih-Wen Li, Kuo-Chiang Hsieh:
A Hybrid Method for k-Anonymization. APSCC 2008: 385-390 - [c12]Pei-Chann Chang, Shih-Hsin Chen, Qingfu Zhang, Jun-Lin Lin:
MOEA/D for flowshop scheduling problems. IEEE Congress on Evolutionary Computation 2008: 1433-1438 - [c11]Jun-Lin Lin, Meng-Cheng Wei:
An efficient clustering method for k-anonymization. PAIS 2008: 46-50 - [c10]Pei-Chann Chang, Chin-Yuan Fan, Jun-Lin Lin, Jyun-Jie Lin:
Integrating a Piecewise Linear Representation Method with Dynamic Time Warping System for Stock Trading Decision Making. ICNC (2) 2008: 434-438 - [c9]Jun-Lin Lin:
Finding the Complete Set of Minimal Solutions for Fuzzy Max-Archimedean t-Norm Relational Equations. ISDA (1) 2008: 501-506 - 2007
- [c8]Jun-Lin Lin, Julie Yu-Chih Liu:
Privacy preserving itemset mining through fake transactions. SAC 2007: 375-379 - 2005
- [c7]Julie Yu-Chih Liu, Jun-Lin Lin:
Multilingual Sentence Hunter. WISE Workshops 2005: 84-93 - 2003
- [c6]Julie Yu-Chih Liu, Tsu-Hao Chang, Jun-Lin Lin:
Integration of Proximity Relations under Consistency Constraint. IKE 2003: 182-185 - [c5]Jun-Lin Lin:
Mining Maximal Frequent Intervals. SAC 2003: 426-431 - 2001
- [j3]Jun-Lin Lin, Margaret H. Dunham:
A Low-Cost Checkpointing Technique for Distributed Databases. Distributed Parallel Databases 10(3): 241-268 (2001) - 2000
- [j2]Kuei-Ann Wen, Anyi Chen, Yin-Jin Lan, Jun-Lin Lin, Chia-Huang Lin:
Three-dimensional PAC video codec for wireless data transmission. IEEE Trans. Circuits Syst. Video Technol. 10(8): 1455-1470 (2000)
1990 – 1999
- 1999
- [c4]Jun-Lin Lin, Xin-Hong Chen, Kuei-Ann Wen:
PAC coding for real-time video transmission over mobile radio environment. WCNC 1999: 359-362 - 1998
- [c3]Jun-Lin Lin, Margaret H. Dunham:
Mining Association Rules: Anti-Skew Algorithms. ICDE 1998: 486-493 - [c2]Yin-Jin Lan, Anyi Chen, Jun-Lin Lin, Kuei-Ann Wen:
Three-dimensional regression polynomial coding for video transmission. PIMRC 1998: 1071-1075 - 1997
- [j1]Jun-Lin Lin, Margaret H. Dunham, Mario A. Nascimento:
A Survey of Distributed Database Checkpointing. Distributed Parallel Databases 5(3): 289-319 (1997) - 1996
- [c1]Jun-Lin Lin, Margaret H. Dunham:
Segmented fuzzy checkpointing for main memory databases. SAC 1996: 158-165
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint