default search action
Fengyi Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c9]Zhaoyan Dai, Jianxin Chen, Fengyi Lin, Yu Chen, Yawen Fan, Chong Jiang, Jingyan Xu:
MSD-HAM-Net: A Multi-modality Fusion Network of PET/CT Images for the Prognosis of DLBCL Patients. ICANN (8) 2024: 314-327 - 2022
- [j14]Qian Long Kweh, Wen-Min Lu, Fengyi Lin, Yung-Jr Deng:
Impact of research and development tax credits on the innovation and operational efficiencies of Internet of things companies in Taiwan. Ann. Oper. Res. 315(2): 1217-1241 (2022) - 2021
- [j13]Sheng-Wei Lin, Wen-Min Lu, Fengyi Lin:
Entrusting decisions to the public service pension fund: An integrated predictive model with additive network DEA approach. J. Oper. Res. Soc. 72(5): 1015-1032 (2021)
2010 – 2019
- 2014
- [j12]Fengyi Lin, Deron Liang, Ching-Chiang Yeh, Jui-Chieh Huang:
Novel feature selection methods to financial distress prediction. Expert Syst. Appl. 41(5): 2472-2483 (2014) - 2012
- [j11]Ching-Chiang Yeh, Fengyi Lin, Chih-Yu Hsu:
A hybrid KMV model, random forests and rough set theory approach for credit rating. Knowl. Based Syst. 33: 166-172 (2012) - 2011
- [j10]Fengyi Lin, Deron Liang, Enchia Chen:
Financial ratio selection for business crisis prediction. Expert Syst. Appl. 38(12): 15094-15102 (2011) - [j9]Fengyi Lin, Seedy S. Fofanah, Deron Liang:
Assessing citizen adoption of e-Government initiatives in Gambia: A validation of the technology acceptance model in information systems success. Gov. Inf. Q. 28(2): 271-279 (2011) - [j8]Fengyi Lin, Shuching Chou, Wei-Kang Wang:
IS practitioners' views on core factors of effective IT governance for Taiwan SMEs. Int. J. Technol. Manag. 54(2/3): 252-269 (2011) - [j7]Fengyi Lin, Ching-Chiang Yeh, Meng-Yuan Lee:
The use of hybrid manifold learning and support vector machines in the prediction of business failure. Knowl. Based Syst. 24(1): 95-101 (2011) - 2010
- [j6]Wen-Min Lu, Wei-Kang Wang, Wei-Ting Tung, Fengyi Lin:
Capability and efficiency of intellectual capital: The case of fabless companies in Taiwan. Expert Syst. Appl. 37(1): 546-555 (2010) - [c8]Chien-Cheng Lin, Fengyi Lin, Deron Liang:
An Analysis of Using State of the Art Technologies to Implement Real-Time Continuous Assurance. SERVICES 2010: 415-422
2000 – 2009
- 2009
- [j5]Z-John Liu, Fengyi Lin, Li-Peng Fang:
A Study of Applying DEA to Measure Performance on Bank Implementing Financial Electronic Data Interchange. Int. J. Electron. Bus. Manag. 7(4): 268-277 (2009) - 2008
- [c7]Fengyi Lin, Deron Liang, Shih-Jung Chiu:
The Study of a Financial Crisis Prediction Model based on XBRL. SNPD 2008: 147-153 - [c6]Chen-Liang Fang, Deron Liang, Fengyi Lin, Chien-Cheng Lin:
A Preliminary Study on Portable Interceptor Mechanism to SOAP. SNPD 2008: 759-764 - 2007
- [j4]Ruey-Shyang Wu, Fengyi Lin, Shyan-Ming Yuan, Kai-Chih Liang:
A reference model and integration framework for building enterprise computing platform. Int. J. Technol. Manag. 38(4): 439-462 (2007) - [j3]Chen-Liang Fang, Deron Liang, Fengyi Lin, Chien-Cheng Lin:
Fault tolerant Web Services. J. Syst. Archit. 53(1): 21-38 (2007) - 2006
- [c5]Chen-Liang Fang, Deron Liang, Fengyi Lin, Chien-Cheng Lin, William Cheng-Chung Chu:
A Portable Interceptor Mechanism on SOAP for Continuous Audit. APSEC 2006: 95-104 - [c4]Ruey-Shyang Wu, Kuo-Jung Su, Fengyi Lin, Shyan-Ming Yuan:
FJM2 - A Decentralized JMS System. TEAA 2006: 326-340 - 2005
- [j2]Fengyi Lin, Olivia R. Liu Sheng, Soushan Wu:
An integrated framework for eChain bank accounting systems. Ind. Manag. Data Syst. 105(3): 291-306 (2005) - 2004
- [c3]Chen-Liang Fang, Deron Liang, Fengyi Lin:
A Nested Invocation Suppression Mechanism for Cctive Replicated SOAP Systems. APSEC 2004: 392-399 - 2003
- [c2]Deron Liang, Chen-Liang Fang, Chyouhwa Chen, Fengyi Lin:
Fault tolerant web service. APSEC 2003: 310- - 2002
- [c1]Deron Liang, Chen-Liang Fang, Chyouhwa Chen, Fengyi Lin:
A nested invocation suppression mechanism for active replication fault-tolerant CORBA. APSEC 2002: 117- - 2001
- [j1]Deron Liang, Fengyi Lin, Soushan Wu:
Electronically auditing EDP systems: With the support of emerging information technologies. Int. J. Account. Inf. Syst. 2(2): 130-147 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-30 21:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint