default search action
Shyong Jian Shyu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j29]Yi-Kung Shieh, Shyong Jian Shyu, Chin Lung Lu, Richard Chia-Tung Lee:
The exact multiple pattern matching problem solved by a reference tree approach. Theor. Comput. Sci. 882: 29-48 (2021)
2010 – 2019
- 2018
- [j28]Shyong Jian Shyu:
XOR-Based Visual Cryptographic Schemes With Monotonously Increasing and Flawless Reconstruction Properties. IEEE Trans. Circuits Syst. Video Technol. 28(9): 2397-2401 (2018) - [c17]Shyong Jian Shyu, Ying Zhen Tsai:
Accelerating Secret Sharing on GPU. ICS 2018: 460-467 - [c16]Shyong Jian Shyu, Ying Zhen Tsai, Yin-Te Tsai:
Implementing Secret Sharing Scheme in Parallel. I-SPAN 2018: 362-365 - 2016
- [j27]Ying-Ru Chen, Ling-Hwei Chen, Shyong Jian Shyu:
Secret image sharing with smaller shadow sizes for general access structures. Multim. Tools Appl. 75(21): 13913-13929 (2016) - 2015
- [j26]Kai-Hsiang Tsao, Shyong Jian Shyu, Chih-Hung Lin, Yao-Sheng Lee, Tzung-Her Chen:
Visual multiple-secret sharing for flexible general access structure by random grids. Displays 39: 80-92 (2015) - [j25]Shyong Jian Shyu:
Visual cryptograms of random grids for threshold access structures. Theor. Comput. Sci. 565: 30-49 (2015) - [j24]Shyong Jian Shyu, Ming Chiang Chen:
Minimizing Pixel Expansion in Visual Cryptographic Scheme for General Access Structures. IEEE Trans. Circuits Syst. Video Technol. 25(9): 1557-1561 (2015) - 2014
- [c15]Yi Hao Li, Shyong Jian Shyu:
Visual Two-Secret Sharing Schemes by Different Superimposition Positions. IWDW 2014: 350-363 - 2013
- [j23]Shyong Jian Shyu:
Visual Cryptograms of Random Grids for General Access Structures. IEEE Trans. Circuits Syst. Video Technol. 23(3): 414-424 (2013) - [j22]Shyong Jian Shyu, Hung-Wei Jiang:
General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes. IEEE Trans. Inf. Forensics Secur. 8(5): 733-743 (2013) - 2012
- [j21]Peng-Yeng Yin, Shyong Jian Shyu, Shih-Ren Yang, Yu-Chung Chang:
Reinforcement Learning for Improving Gene Identification Accuracy by Combination of Gene-Finding Programs. Int. J. Appl. Metaheuristic Comput. 3(1): 34-47 (2012) - [j20]Shyong Jian Shyu, Hung-Wei Jiang:
Efficient Construction for Region Incrementing Visual Cryptography. IEEE Trans. Circuits Syst. Video Technol. 22(5): 769-777 (2012) - [c14]Yi-Ling Wu, Tsu-Feng Ho, Shyong Jian Shyu, Bertrand M. T. Lin:
Discrete particle swarm optimization for materials acquisition in multi-unit libraries. IEEE Congress on Evolutionary Computation 2012: 1-7 - 2011
- [j19]Shyong Jian Shyu, Kun Chen:
Visual multiple secret sharing based upon turning and flipping. Inf. Sci. 181(15): 3246-3266 (2011) - [j18]Shyong Jian Shyu, Ming Chiang Chen:
Optimum Pixel Expansions for Threshold Visual Secret Sharing Schemes. IEEE Trans. Inf. Forensics Secur. 6(3-2): 960-969 (2011) - [c13]Tsu-Feng Ho, Yi-Ling Wu, Shyong Jian Shyu, Bertrand M. T. Lin:
Applying DPSO with dynamic diversity to books selection problem. MCDM 2011: 22-28 - 2010
- [j17]Shyong Jian Shyu, Kun Chen:
Visual Multiple-Secret Sharing by Circle Random Grids. SIAM J. Imaging Sci. 3(4): 926-953 (2010) - [c12]Tsu-Feng Ho, Shyong Jian Shyu, Yi-Ling Wu, Bertrand M. T. Lin:
Discrete Particle Swarm Optimization for Materials Budget Allocation in Academic Libraries. CSE 2010: 196-203 - [c11]Tsu-Feng Ho, Shyong Jian Shyu, Chris Tian-Jen Li:
Utilizing Particle Swarm Optimizations on student grouping problem. ICMLC 2010: 1899-1904 - [c10]Tsu-Feng Ho, Shyong Jian Shyu, Bertrand M. T. Lin, Yi-Ling Wu:
An evolutionary approach to library materials acquisition problems. IEEE Conf. of Intelligent Systems 2010: 450-455
2000 – 2009
- 2009
- [j16]Shyong Jian Shyu, Chun-Yuan Tsai:
Finding the longest common subsequence for multiple biological sequences by ant colony optimization. Comput. Oper. Res. 36(1): 73-91 (2009) - [j15]Tsu-Feng Ho, Peng-Yeng Yin, Gwo-Jen Hwang, Shyong Jian Shyu, Ya-Nan Yean:
Multi-Objective Parallel Test-Sheet Composition Using Enhanced Particle Swarm Optimization. J. Educ. Technol. Soc. 12(4): 193-206 (2009) - [j14]Shyong Jian Shyu:
Image encryption by multiple random grids. Pattern Recognit. 42(7): 1582-1596 (2009) - [c9]Tsu-Feng Ho, Shyong Jian Shyu, Feng-Hsu Wang, Chris Tian-Jen Li:
Composing High-Heterogeneous and High-Interaction Groups in Collaborative Learning with Particle Swarm Optimization. CSIE (4) 2009: 607-611 - [c8]Ran-Zan Wang, Yung-Yi Lin, Shang-Kuan Chen, Yeuan-Kuen Lee, Shih-Yu Huang, Shyong Jian Shyu:
Multisecret Image Sharing. IIH-MSP 2009: 977-980 - [c7]Yeuan-Kuen Lee, Graeme Bell, Shih-Yu Huang, Ran-Zan Wang, Shyong Jian Shyu:
An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding. PSIVT 2009: 349-360 - [c6]Shyong Jian Shyu, Chun-Chieh Chuang, Ying-Ru Chen, Ah-Fur Lai:
Weighted Threshold Secret Image Sharing. PSIVT 2009: 988-998 - 2008
- [c5]Shyong Jian Shyu, Ying-Ru Chen:
Threshold Secret Image Sharing by Chinese Remainder Theorem. APSCC 2008: 1332-1337 - [c4]Tsu-Feng Ho, Shyong Jian Shyu, Yi-Ling Wu:
Material Acquisitions in Academic Libraries. APSCC 2008: 1465-1470 - [c3]Tsu-Feng Ho, Shyong Jian Shyu, Yi-Ling Wu:
An Effective Approach to Acquisitions Allocation Problems for Digital Libraries. GEM 2008: 290-294 - 2007
- [j13]Shyong Jian Shyu:
Image encryption by random grids. Pattern Recognit. 40(3): 1014-1031 (2007) - [j12]Shyong Jian Shyu, Shih-Yu Huang, Yeuan-Kuen Lee, Ran-Zan Wang, Kun Chen:
Sharing multiple secrets in visual cryptography. Pattern Recognit. 40(12): 3633-3651 (2007) - [j11]Ran-Zan Wang, Shyong Jian Shyu:
Scalable secret image sharing. Signal Process. Image Commun. 22(4): 363-373 (2007) - 2006
- [j10]Shyong Jian Shyu, Bertrand M. T. Lin, Tsung-Shen Hsiao:
Ant colony optimization for the cell assignment problem in PCS networks. Comput. Oper. Res. 33: 1713-1740 (2006) - [j9]Shyong Jian Shyu:
Efficient visual secret sharing scheme for color images. Pattern Recognit. 39(5): 866-880 (2006) - 2004
- [j8]Shyong Jian Shyu, Peng-Yeng Yin, Bertrand M. T. Lin:
An Ant Colony Optimization Algorithm for the Minimum Weight Vertex Cover Problem. Ann. Oper. Res. 131(1-4): 283-304 (2004) - [j7]Shyong Jian Shyu, Bertrand M. T. Lin, Peng-Yeng Yin:
Application of ant colony optimization for no-wait flowshop scheduling problem to minimize the total completion time. Comput. Ind. Eng. 47(2-3): 181-193 (2004) - [j6]Shyong Jian Shyu, Yin-Te Tsai, Richard C. T. Lee:
The Minimal Spanning Tree Preservation Approaches for DNA Multiple Sequence Alignment and Evolutionary Tree Construction. J. Comb. Optim. 8(4): 453-468 (2004) - 2003
- [j5]Shyong Jian Shyu, Peng-Yeng Yin, Bertrand M. T. Lin, Mohamed Haouari:
Ant-Tree: an ant colony optimization approach to the generalized minimum spanning tree problem. J. Exp. Theor. Artif. Intell. 15(1): 103-112 (2003)
1990 – 1999
- 1999
- [c2]Shyong Jian Shyu:
A Multi-Thread Branch-and-Bound Algorithm for the Traveling Salesperson Problem. PP 1999 - 1996
- [j4]Shyong Jian Shyu, Henry Ker-Chang Chang, Kro-Chien Chou:
Implementation of a Linear Quadtree Coding Scheme on the Parallel Virtual Machine. Int. J. High Speed Comput. 8(1): 65-79 (1996) - [c1]Shyong Jian Shyu:
The Implementation of a Hypermedia Database Management System. Multimedia Technology and Applications 1996: 45-55 - 1994
- [j3]Henry Ker-Chang Chang, Jonathan Jen-Rong Chen, Shyong Jian Shyu:
A Parallel Algorithm for the Knapsack Problem Using a Generation and Searching Technique. Parallel Comput. 20(2): 233-243 (1994) - 1990
- [j2]Shyong Jian Shyu, Richard C. T. Lee:
Solving the set cover problem on a supercomputer. Parallel Comput. 13(3): 295-300 (1990) - [j1]Shyong Jian Shyu, Richard C. T. Lee:
The vectorization of the partition problem. Parallel Comput. 16(2-3): 343-350 (1990)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-04 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint