A parallel apriori algorithm for frequent itemsets mining Y Ye, CC Chiang Fourth International Conference on Software Engineering Research, Management …, 2006 | 207 | 2006 |
A new approach for software requirements elicitation P Rajagopal, R Lee, T Ahlswede, CC Chiang, D Karolak Sixth International Conference on Software Engineering, Artificial …, 2005 | 72 | 2005 |
Parallelizing fully homomorphic encryption for a cloud environment R Hayward, CC Chiang Journal of applied research and technology 13 (2), 245-252, 2015 | 44 | 2015 |
The use of adapters to support interoperability of components for reusability CC Chiang Information and Software Technology 45 (3), 149-156, 2003 | 40 | 2003 |
Legacy software modernization CC Chiang, C Bayrak 2006 IEEE international conference on systems, man and cybernetics 2, 1304-1309, 2006 | 34 | 2006 |
Wrapping legacy systems for use in heterogeneous computing environments CC Chiang Information and Software Technology 43 (8), 497-507, 2001 | 34 | 2001 |
A framework for dynamically converting components to web services R Lee, A Harikumar, CC Chiang, HS Yang, HK Kim, B Kang Third ACIS Int'l Conference on Software Engineering Research, Management and …, 2005 | 18 | 2005 |
Extracting business rules from legacy systems into reusable components CC Chiang 2006 IEEE/SMC International Conference on System of Systems Engineering, 6 pp., 2006 | 16 | 2006 |
An event driven architecture for application integration using web services AK Harikumar, R Lee, CC Chiang, HS Yang IRI-2005 IEEE International Conference on Information Reuse and Integration …, 2005 | 15 | 2005 |
Middleware support for coordination in distributed applications CC Chiang, P Tang Fifth International Symposium on Multimedia Software Engineering, 2003 …, 2003 | 13 | 2003 |
Software stability in software reengineering CC Chiang 2007 IEEE International Conference on Information Reuse and Integration, 719-723, 2007 | 12* | 2007 |
A method for entity identification in open source documents with partially redacted attributes N Wu, J Talburt, C Heien, N Pippenger, CC Chiang, E Pierce, E Gulley, ... Journal of Computing Sciences in Colleges 22 (5), 138-144, 2007 | 11 | 2007 |
A managed security environment for enterprise iPhones W Copeland, CC Chiang Proceedings of the 50th annual ACM Southeast Conference, 136-141, 2012 | 10 | 2012 |
A role-based secure group communication framework J Bian, U Topaloglu, R Seker, C Bayrak, CC Chiang 2008 IEEE International Conference on System of Systems Engineering, 1-6, 2008 | 10 | 2008 |
An architecture for parallelizing fully homomorphic cryptography on cloud R Hayward, CC Chiang 2013 Seventh International Conference on Complex, Intelligent, and Software …, 2013 | 9 | 2013 |
Securing enterprise mobile information W Copeland, CC Chiang 2012 International Symposium on Computer, Consumer and Control, 80-83, 2012 | 9 | 2012 |
Incremental elicitation and formalization of user requirements through rapid prototyping via software transformations CC Chiang, JE Urban Proceedings of 20th International Computer Software and Applications …, 1996 | 9 | 1996 |
Programming parallel apriori algorithms for mining association rules CC Chiang 2010 International conference on system science and engineering, 593-598, 2010 | 8 | 2010 |
Automated software wrapping CC Chiang Proceedings of the 45th annual ACM Southeast Conference, 59-64, 2007 | 8 | 2007 |
A distributed object computing architecture for leveraging software reengineering systems CC Chiang Proceedings of the 2001 ACM symposium on Applied computing, 653-657, 2001 | 8 | 2001 |