default search action
Jyh-Jong Tsay
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j16]Cheng-Shian Lin, Jyh-Jong Tsay:
Passive forgery detection using discrete cosine transform coefficient analysis in JPEG compressed images. J. Electronic Imaging 25(3): 033010 (2016) - 2014
- [j15]Cheng-Shian Lin, Jyh-Jong Tsay:
A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis. Digit. Investig. 11(2): 120-140 (2014) - [j14]Jyh-Jong Tsay, Chi-Hsiang Lin:
Hierarchical directory mapping for category-constrained meta-search. J. Intell. Inf. Syst. 42(1): 75-94 (2014) - 2012
- [j13]Shao-Shin Hung, Chih Ming Chiu, Tsou Tsun Fu, Jung-Tsung Chen, Derchian Tsaih, Jyh-Jong Tsay:
Clustering Spatial Data for Aggregate Query Processing in Walkthrough: A Hypergraph Approach. Trans. Edutainment 7: 86-98 (2012) - [c28]Shih-Chieh Su, Jyh-Jong Tsay:
Rotation crossover and K-site move mutation for evolutionary protein folding in 3D FCC HP model (preliminary version). BIBM 2012: 1-4 - [c27]Jyh-Jong Tsay, Shih-Chieh Su:
A Memetic Algorithm for Protein Structure Prediction based on the 2D Triangular Lattice Model. BIOINFORMATICS 2012: 131-136 - [p1]Shao-Shin Hung, Chih Ming Chiu, Tsou Tsun Fu, Jung Tzung Chen, Jyh-Jong Tsay:
Intelligent-Based Visual Pattern Clustering for Storage Layouts in Virtual Environments. Computational Social Networks 2012: 269-290 - 2011
- [j12]Chih-Ming Chiu, Shao-Shin Hung, Jyh-Jong Tsay:
Automatic Modeling of Frequent Behaviors of Avatars and Players in a On Line Game. Int. J. Virtual Real. 10(1): 5-11 (2011) - [c26]Jyh-Jong Tsay, Shih-Chieh Su:
Ab initio protein structure prediction based on memetic algorithm and 3D FCC lattice model. BIBM Workshops 2011: 315-318 - [c25]Jyh-Jong Tsay, Bo-Liang Wu, Hou-Ji Dai:
BioDBLink: Multi-level Data Matching for Automatic Generation of Cross Links among Biochemical Pathway Databases. BIOINFORMATICS 2011: 125-130 - [c24]Jyh-Jong Tsay, Chin-Wen Tsay, Shen-Hsien Lin:
Web Query Interface Parsing for Building Web-Based Metasearch Systems. Web Intelligence/IAT Workshops 2011: 347-350 - 2010
- [j11]Jyh-Jong Tsay, Bo-Liang Wu, Yu-Sen Jeng:
Hierarchically organized layout for visualization of biochemical pathways. Artif. Intell. Medicine 48(2-3): 107-117 (2010) - [j10]Jyh-Jong Tsay, Chi-Hsiang Lin, Tzung-Bang Chen:
Category mapping for the automatic integration of category-constrained web search. Int. J. Bus. Intell. Data Min. 5(1): 43-55 (2010) - [c23]Jyh-Jong Tsay, Bo-Liang Wu, Guo-Gen Huang:
HOLY-II: Improved Hierarchically Organized Layout for Visualization of Biochemical Complex Pathways. BIOINFORMATICS 2010: 135-140 - [c22]Jyh-Jong Tsay, Chin-Wen Tsay, Xin-Jie Wang:
Visual Content Structures for Wrapper Induction in Building Metasearch Systems. Web Intelligence 2010: 180-183
2000 – 2009
- 2009
- [c21]Jyh-Jong Tsay, Bo-Liang Wu, Chien-Wen Chen:
Data Matching for Physical Integration of Biochemical Pathway Databases. BIBE 2009: 216-220 - [c20]Jyh-Jong Tsay, Bo-Liang Wu, Chang-Ching Hsieh:
Automatic Extraction of Kinetic Information from Biochemical Literatures. FSKD (5) 2009: 28-32 - [c19]Jyh-Jong Tsay, Chin-Wen Tsay, Ping-Hong Chen:
Association Pattern Mining for Product Specification Integration. FSKD (2) 2009: 60-64 - 2008
- [c18]Jyh-Jong Tsay, Bo-Liang Wu, Yu-Sen Jeng:
Hierarchically Organized Layout for Visualization of Biochemical Pathway. BMEI (1) 2008: 153-157 - 2005
- [c17]Jyh-Jong Tsay, Chen-Yang Shih, Bo-Liang Wu:
AuToCrawler: An Integrated System for Automatic Topical Crawler. ACIS-ICIS 2005: 462-467 - [c16]Yi-Wei Jan, Jyh-Jong Tsay, Bo-Liang Wu:
WISE: A Visual Tool for Automatic Extraction of Objects from World Wide Web. Web Intelligence 2005: 590-593 - 2004
- [j9]Jyh-Jong Tsay, Jing-Doo Wang:
Improving linear classifier for Chinese text categorization. Inf. Process. Manag. 40(2): 223-237 (2004) - 2003
- [j8]Jyh-Jong Tsay, Kuo-Shun Ding, Wen-Tsong Wang:
Optimal Algorithm for Matrix Transpose on Wormhole-Switched Meshes. J. Inf. Sci. Eng. 19(1): 167-177 (2003) - [c15]Jyh-Jong Tsay, Hsuan-Yu Chen, Chi-Feng Chang, Ching-Han Lin:
Enhancing Techniques for Efficient Topic Hierarchy Integration. ICDM 2003: 657-660 - 2002
- [j7]Jing-Doo Wang, Jyh-Jong Tsay:
Mining Periodic Events from Retrospective Chinese News. Int. J. Comput. Process. Orient. Lang. 15(4): 361-377 (2002) - 2000
- [j6]Jyh-Jong Tsay, Jing-Doo Wang:
Design and Evaluation of Approaches for Automatic Chinese Text. Int. J. Comput. Linguistics Chin. Lang. Process. 5(2) (2000) - [c14]Jyh-Jong Tsay, Jing-Doo Wang:
Improving automatic Chinese text categorization by error correction. IRAL 2000: 1-8 - [c13]Kuo-Shun Ding, Jyh-Jong Tsay:
The Design of User-Level Distributed Shared Memory System in SCI-Based Clusters. PDPTA 2000
1990 – 1999
- 1999
- [c12]Jyh-Jong Tsay, Jing-Doo Wang, Chun-Fu Pai, Ming-Kuen Tsay:
Implementation and Evaluation of Scalable Approaches for Automatic Chinese Text Categorization. PACLIC 1999: 179-190 - [c11]Kuo-Shun Ding, Jyh-Jong Tsay:
Design and Implementation of User-Level Network Programming Interface for SCI-Cluster. PDPTA 1999: 2384-2390 - [c10]Jyh-Jong Tsay, Jing-Doo Wang:
Term Selection with Distributional Clustering for Chinese Text Categorization using N-grams. ROCLING (2) 1999: 151-170 - 1998
- [j5]Kuo-Shun Ding, Ching-Tien Ho, Jyh-Jong Tsay:
Matrix transpose on meshes with wormhole and XY routing. Discret. Appl. Math. 83(1-3): 41-59 (1998) - [c9]Jyh-Jong Tsay, Wen-Tsong Wang:
Nearly Optimal Algorithms for Broadcast on d-Dimensional All-Port and Wormhole-Routed Torus. IPPS/SPDP 1998: 2-9 - 1994
- [j4]Mikhail J. Atallah, Frank K. H. A. Dehne, Russ Miller, Andrew Rau-Chaplin, Jyh-Jong Tsay:
Multisearch Techniques: Parallel Data Structures on Mesh-Connected Computers. J. Parallel Distributed Comput. 20(1): 1-13 (1994) - [c8]Jyh-Jong Tsay, Hsin-Chi Li:
Lock-Free Concurrent Tree Structures for Multiprocessor Systems. ICPADS 1994: 544-549 - [c7]Kuo-Shun Ding, Ching-Tien Ho, Jyh-Jong Tsay:
Matrix transpose on meshes with wormhole and XY routing. SPDP 1994: 656-663 - 1993
- [j3]Jyh-Jong Tsay:
An Efficient Implemention of Priority Queues Using Fixed-Sized Systolic Coprocessors. Inf. Process. Lett. 46(4): 193-198 (1993) - [j2]Jyh-Jong Tsay:
Mapping Tree-structured Computations onto Mesh-connected Arrays of Processors. Parallel Algorithms Appl. 1(3): 211-220 (1993) - [c6]Michael T. Goodrich, Jyh-Jong Tsay, Darren Erik Vengroff, Jeffrey Scott Vitter:
External-Memory Computational Geometry (Preliminary Version). FOCS 1993: 714-723 - [c5]Jyh-Jong Tsay:
Parallel Algorithms for Geometric Problems on Networks of Processors. SPDP 1993: 200-207 - 1992
- [j1]Mikhail J. Atallah, Jyh-Jong Tsay:
On the Parallel-Decomposability of Geometric Problems. Algorithmica 8(3): 209-231 (1992) - [c4]Jyh-Jong Tsay:
Searching Tree Structures on a Mesh of Processors. SODA 1992: 114-123 - [c3]Jyh-Jong Tsay:
Mapping Tree-Structured Computations onto Mesh-Connected Arrays of Processors. SPDP 1992: 77-84 - 1991
- [c2]Mikhail J. Atallah, Frank K. H. A. Dehne, Russ Miller, Andrew Rau-Chaplin, Jyh-Jong Tsay:
Multisearch Techniques for Implementing Data Structures on a Mesh-Connected Computer (Preliminary Version). SPAA 1991: 204-214 - 1990
- [b1]Jyh-Jong Tsay:
Techniques for solving geometric problems on mesh-connected computers. Purdue University, USA, 1990
1980 – 1989
- 1989
- [c1]Mikhail J. Atallah, Jyh-Jong Tsay:
On the Parallel Decomposability of Geometric Problems. SCG 1989: 104-113
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-27 21:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint