Ikuti
Chia-Chu Chiang
Chia-Chu Chiang
Email yang diverifikasi di ualr.edu
Judul
Dikutip oleh
Dikutip oleh
Tahun
A parallel apriori algorithm for frequent itemsets mining
Y Ye, CC Chiang
Fourth International Conference on Software Engineering Research, Management …, 2006
2072006
A new approach for software requirements elicitation
P Rajagopal, R Lee, T Ahlswede, CC Chiang, D Karolak
Sixth International Conference on Software Engineering, Artificial …, 2005
722005
Parallelizing fully homomorphic encryption for a cloud environment
R Hayward, CC Chiang
Journal of applied research and technology 13 (2), 245-252, 2015
442015
The use of adapters to support interoperability of components for reusability
CC Chiang
Information and Software Technology 45 (3), 149-156, 2003
402003
Legacy software modernization
CC Chiang, C Bayrak
2006 IEEE international conference on systems, man and cybernetics 2, 1304-1309, 2006
342006
Wrapping legacy systems for use in heterogeneous computing environments
CC Chiang
Information and Software Technology 43 (8), 497-507, 2001
342001
A framework for dynamically converting components to web services
R Lee, A Harikumar, CC Chiang, HS Yang, HK Kim, B Kang
Third ACIS Int'l Conference on Software Engineering Research, Management and …, 2005
182005
Extracting business rules from legacy systems into reusable components
CC Chiang
2006 IEEE/SMC International Conference on System of Systems Engineering, 6 pp., 2006
162006
An event driven architecture for application integration using web services
AK Harikumar, R Lee, CC Chiang, HS Yang
IRI-2005 IEEE International Conference on Information Reuse and Integration …, 2005
152005
Middleware support for coordination in distributed applications
CC Chiang, P Tang
Fifth International Symposium on Multimedia Software Engineering, 2003 …, 2003
132003
Software stability in software reengineering
CC Chiang
2007 IEEE International Conference on Information Reuse and Integration, 719-723, 2007
12*2007
A method for entity identification in open source documents with partially redacted attributes
N Wu, J Talburt, C Heien, N Pippenger, CC Chiang, E Pierce, E Gulley, ...
Journal of Computing Sciences in Colleges 22 (5), 138-144, 2007
112007
A managed security environment for enterprise iPhones
W Copeland, CC Chiang
Proceedings of the 50th annual ACM Southeast Conference, 136-141, 2012
102012
A role-based secure group communication framework
J Bian, U Topaloglu, R Seker, C Bayrak, CC Chiang
2008 IEEE International Conference on System of Systems Engineering, 1-6, 2008
102008
An architecture for parallelizing fully homomorphic cryptography on cloud
R Hayward, CC Chiang
2013 Seventh International Conference on Complex, Intelligent, and Software …, 2013
92013
Securing enterprise mobile information
W Copeland, CC Chiang
2012 International Symposium on Computer, Consumer and Control, 80-83, 2012
92012
Incremental elicitation and formalization of user requirements through rapid prototyping via software transformations
CC Chiang, JE Urban
Proceedings of 20th International Computer Software and Applications …, 1996
91996
Programming parallel apriori algorithms for mining association rules
CC Chiang
2010 International conference on system science and engineering, 593-598, 2010
82010
Automated software wrapping
CC Chiang
Proceedings of the 45th annual ACM Southeast Conference, 59-64, 2007
82007
A distributed object computing architecture for leveraging software reengineering systems
CC Chiang
Proceedings of the 2001 ACM symposium on Applied computing, 653-657, 2001
82001
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20