Segueix
Chia-Chu Chiang
Chia-Chu Chiang
Correu electrònic verificat a ualr.edu
Títol
Citada per
Citada per
Any
A parallel apriori algorithm for frequent itemsets mining
Y Ye, CC Chiang
Fourth International Conference on Software Engineering Research, Management …, 2006
1992006
A new approach for software requirements elicitation
P Rajagopal, R Lee, T Ahlswede, CC Chiang, D Karolak
Sixth International Conference on Software Engineering, Artificial …, 2005
692005
Parallelizing fully homomorphic encryption for a cloud environment
R Hayward, CC Chiang
Journal of applied research and technology 13 (2), 245-252, 2015
472015
The use of adapters to support interoperability of components for reusability
CC Chiang
Information and Software Technology 45 (3), 149-156, 2003
402003
Legacy software modernization
CC Chiang, C Bayrak
2006 IEEE international conference on systems, man and cybernetics 2, 1304-1309, 2006
342006
Wrapping legacy systems for use in heterogeneous computing environments
CC Chiang
Information and Software Technology 43 (8), 497-507, 2001
342001
A framework for dynamically converting components to web services
R Lee, A Harikumar, CC Chiang, HS Yang, HK Kim, B Kang
Third ACIS Int'l Conference on Software Engineering Research, Management and …, 2005
182005
Extracting business rules from legacy systems into reusable components
CC Chiang
2006 IEEE/SMC International Conference on System of Systems Engineering, 6 pp., 2006
162006
An event driven architecture for application integration using web services
AK Harikumar, R Lee, CC Chiang, HS Yang
IRI-2005 IEEE International Conference on Information Reuse and Integration …, 2005
142005
Middleware support for coordination in distributed applications
CC Chiang, P Tang
Fifth International Symposium on Multimedia Software Engineering, 2003 …, 2003
132003
Software stability in software reengineering
CC Chiang
2007 IEEE International Conference on Information Reuse and Integration, 719-723, 2007
12*2007
A method for entity identification in open source documents with partially redacted attributes
N Wu, J Talburt, C Heien, N Pippenger, CC Chiang, E Pierce, E Gulley, ...
Journal of Computing Sciences in Colleges 22 (5), 138-144, 2007
112007
A managed security environment for enterprise iPhones
W Copeland, CC Chiang
Proceedings of the 50th Annual Southeast Regional Conference, 136-141, 2012
102012
A role-based secure group communication framework
J Bian, U Topaloglu, R Seker, C Bayrak, CC Chiang
2008 IEEE International Conference on System of Systems Engineering, 1-6, 2008
102008
An architecture for parallelizing fully homomorphic cryptography on cloud
R Hayward, CC Chiang
2013 Seventh International Conference on Complex, Intelligent, and Software …, 2013
92013
Securing enterprise mobile information
W Copeland, CC Chiang
2012 International Symposium on Computer, Consumer and Control, 80-83, 2012
92012
An iterative character segmentation method for irregularly formatted Chinese documents
CC Chiang, SS Yu
Proceedings of the Optical Character Recognition and Document Analysis …, 1996
91996
Programming parallel apriori algorithms for mining association rules
CC Chiang
2010 International Conference on System Science and Engineering, 593-598, 2010
82010
A distributed object computing architecture for leveraging software reengineering systems
CC Chiang
Proceedings of the 2001 ACM symposium on Applied computing, 653-657, 2001
82001
Constructing reusable specifications through analogy
CC Chiang, D Neubart
Proceedings of the 1999 ACM symposium on Applied computing, 586-592, 1999
81999
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20