Chao-Hsien Chu 朱昭贤
Chao-Hsien Chu 朱昭贤
Professor of Information Sciences and Technology, Pennsylvania State University
Verified email at ist.psu.edu - Homepage
Title
Cited by
Cited by
Year
Anonymous two-factor authentication: Certain goals are beyond attainment
D Wang, D He, P Wang, CH Chu
IEEE Transactions on Dependable and Secure Computing, 1-14, 2014
334*2014
The adoption and implementation of RFID technologies in healthcare: a literature review
W Yao, CH Chu, Z Li
Journal of medical systems 36 (6), 3507-3525, 2012
2912012
The use of RFID in healthcare: Benefits and barriers
W Yao, CH Chu, Z Li
2010 IEEE International Conference on RFID-Technology and Applications, 128-134, 2010
2222010
A genetic algorithm for cellular manufacturing design and layout
X Wu, CH Chu, Y Wang, W Yan
European journal of operational research 181 (1), 156-167, 2007
2172007
A fuzzy clustering approach to manufacturing cell formation
CH Chu, JC Hayya
The International Journal of Production Research 29 (7), 1475-1487, 1991
1991991
Leveraging complex event processing for smart hospitals using RFID
W Yao, CH Chu, Z Li
Journal of Network and Computer Applications 34 (3), 799-810, 2011
1822011
Genetic algorithms for communications network design-an empirical study of the factors that influence performance
H Chou, G Premkumar, CH Chu
IEEE Transactions on Evolutionary Computation 5 (3), 236-249, 2001
1762001
A comparison of three array-based clustering techniques for manufacturing cell formation
CH Chu, M Tsai
The International Journal of Production Research 28 (8), 1417-1433, 1990
1631990
Cluster analysis in manufacturing cellular formation
CH Chu
Omega 17 (3), 289-295, 1989
1631989
ISSAQ: An integrated sensing systems for real-time indoor air quality monitoring
JY Kim, CH Chu, SM Shin
IEEE Sensors Journal 14 (12), 1-15, 2014
1552014
A review of data mining-based financial fraud detection research
D Yue, X Wu, Y Wang, Y Li, CH Chu
2007 International Conference on Wireless Communications, Networking and …, 2007
1342007
Data mining for network intrusion detection: A comparison of alternative methods*
D Zhu, G Premkumar, X Zhang, CH Chu
Decision Sciences 32 (4), 635-660, 2001
1232001
Data management for Internet of things: Challenges, approaches and opportunities
M Ma, P Wang, CH Chu
Green Computing and Communications (GreenCom), 2013 IEEE and Internet of …, 2013
1182013
The effect of lead‐time variability: The case of independent demand
U Bagchi, JC Hayya, CH Chu
Journal of Operations Management 6 (2), 159-177, 1986
1161986
Genetic algorithms for integrating cell formation with machine layout and scheduling
X Wu, CH Chu, Y Wang, D Yue
Computers & Industrial Engineering 53 (2), 277-289, 2007
1142007
Information markets vs. opinion pools: An empirical comparison
Y Chen, CH Chu, T Mullen, DM Pennock
Proceedings of the 6th ACM Conference on Electronic Commerce, 58-67, 2005
1092005
Search for radiative transitions in the hypernucleus B
RE Chrien, S Bart, M May, PH Pile, RJ Sutter, P Barnes, B Bassalleck, ...
Physical Review C 41 (3), 1062, 1990
951990
A heuristic ant algorithm for solving QoS multicast routing problem
CH Chu, JH Gu, XD Hou, Q Gu
Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat …, 2002
912002
Simulation studies in JIT production
CH Chu, WL Shih
The International Journal Of Production Research 30 (11), 2573-2586, 1992
901992
Content-based image authentication: current status, issues, and challenges
SH Han, CH Chu
International Journal of Information Security 9 (1), 19-32, 2010
832010
The system can't perform the operation now. Try again later.
Articles 1–20