default search action
I-Chang Jou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j15]Hsu-Kuang Chang, King-Chu Hung, I-Chang Jou:
Efficient XML Retrieval Service with Complete Path Representation. IEICE Trans. Inf. Syst. 96-D(4): 906-917 (2013) - [c12]Chi-Kao Chang, Min-Yuan Fang, I-Chang Jou, Nai-Chung Yang, Chung-Ming Kuo:
Subsampling Based Computation-Aware Motion Estimation. ISBAST 2013: 171-175
2000 – 2009
- 2009
- [c11]Hsu-Kuang Chang, I-Chang Jou:
Distance Dimension Reduction on Singular Value Decomposition for Efficient Clustering Semantic XML Document Using the SVD Fuzzy C-Mean (SVD-FCM). IKE 2009: 134-140 - [c10]Hsu-Kuang Chang, I-Chang Jou:
Distance Dimension Reduction on QR Factorization for Efficient Clustering Semantic XML Document Using the QR Fuzzy C-Mean (QR-FCM). Infoscale 2009: 272-287 - 2007
- [j14]Miin-Luen Day, Suh-Yin Lee, I-Chang Jou:
Multiple Description Watermarking Based on Quantization Index Modulus Modulation. J. Inf. Sci. Eng. 23(6): 1785-1800 (2007) - 2006
- [j13]Yu-Chi Pu, Wei-Chang Du, I-Chang Jou:
Perceptually Transparent Polyline Watermarking Based on Normal Multi-Resolution Representation. IEICE Trans. Inf. Syst. 89-D(12): 2939-2949 (2006) - [j12]Chiou-Yng Lee, Jenn-Shyong Horng, I-Chang Jou:
Low-Complexity Bit-Parallel Multiplier over GF(2m) Using Dual Basis Representation. J. Comput. Sci. Technol. 21(6): 887-892 (2006) - [c9]Yu-Chi Pu, Wei-Chang Du, I-Chang Jou:
Toward Blind Robust Watermarking of Vector Maps. ICPR (3) 2006: 930-933 - 2005
- [j11]Chiou-Yng Lee, Jenn-Shyong Horng, I-Chang Jou, Erl-Huei Lu:
Low-Complexity Bit-Parallel Systolic Montgomery Multipliers for Special Classes of GF(2m). IEEE Trans. Computers 54(9): 1061-1070 (2005) - 2004
- [c8]Louise Chuang, Jeng-Yang Hwang, Hen-Chang Chang, I-Chang Jou, Shiang-Bin Jong:
Quantitative Computer Image Analysis of Serum a-fetoprotein Rapid Gold Immunochromatographic Dipstick Assay. BIBE 2004: 108-114 - [c7]Shih-Chang Hsia, I-Chang Jou:
A High Robust Watermarking Technique Using Sub-Band Filtering. MMM 2004: 72-78 - [c6]Miin-Luen Day, Suh-Yin Lee, I-Chang Jou:
Watermark Re-synchronization Using Sinusoidal Signals in DT-CWT Domain. PCM (3) 2004: 394-401 - 2002
- [j10]Shih-Chang Hsia, I-Chang Jou, Shing-Ming Hwang:
A Gray Level Watermarking Algorithm Using Double Layer Hidden Approach. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(2): 463-471 (2002) - [c5]Miin-Luen Day, I-Chang Jou, Suh-Yin Lee:
Rotation, Scaling, and Translation Resilient Image Watermarking with Side Information at Encoder. IEEE Pacific Rim Conference on Multimedia 2002: 74-81
1990 – 1999
- 1998
- [j9]Quen-Zong Wu, Suh-Yin Lee, I-Chang Jou:
On-line signature verification based on logarithmic spectrum. Pattern Recognit. 31(12): 1865-1871 (1998) - 1997
- [j8]Quen-Zong Wu, Suh-Yin Lee, I-Chang Jou:
On-line signature verification based on split-and-merge matching mechanism. Pattern Recognit. Lett. 18(7): 665-673 (1997) - [j7]Quen-Zong Wu, I-Chang Jou, Suh-Yin Lee:
On-line signature verification using LPC cepstrum and neural networks. IEEE Trans. Syst. Man Cybern. Part B 27(1): 148-153 (1997) - 1996
- [j6]Jenq-Neng Hwang, Shih-Shien You, Shyh-Rong Lay, I-Chang Jou:
The cascade-correlation learning: a projection pursuit learning perspective. IEEE Trans. Neural Networks 7(2): 278-289 (1996) - 1994
- [j5]I-Chang Jou, Shih-Shien You, Long-Wen Chang:
Analysis of hidden nodes for multi-layer perceptron neural networks. Pattern Recognit. 27(6): 859-864 (1994) - [c4]Shih-Shien You, Jenq-Neng Hwang, I-Chang Jou, Shyh-Rong Lay:
A new cascaded projection pursuit network for nonlinear regression. ICASSP (2) 1994: 585-588 - 1992
- [c3]I-Chang Jou, Shih-Shien You, Long-Wen Chang:
Analysis of hidden nodes for Muti-layer perceptron neural networks. IROS 1992: 509-518 - 1991
- [j4]Rong-Huah Ju, I-Chang Jou, Mu-King Tsay:
Zooming techniques on digital Chinese character patterns: a further study and improvement. Image Vis. Comput. 9(3): 194-200 (1991) - [j3]I-Chang Jou:
A neural network-based on-line Chinese character recognition system. J. Vis. Commun. Image Represent. 2(1): 85-90 (1991) - 1990
- [c2]I-Chang Jou, Su-Ling Lee, Min-Tau Lin, Chih-Yuan Tseng, Shih-Shien You, Yuh-Juain Tsay:
A neural network based speaker verification system. ICSLP 1990: 1273-1276
1980 – 1989
- 1989
- [j2]I-Chang Jou:
Linear rotation based algorithm and systolic architecture for solving linear system equations. Parallel Comput. 11(3): 367-379 (1989) - 1986
- [j1]I-Chang Jou, Yu-Hen Hu, W. S. Feng:
A novel implementation of pipelined Toeplitz system solver. Proc. IEEE 74(10): 1463-1464 (1986) - [c1]I-Chang Jou, Yu Hen Hu, T. M. Parng:
VLSI Algorithms and Pipelined Architectures for Solving Structured Linear System. Aegean Workshop on Computing 1986: 156-165
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint