default search action
Yu-Lung Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c17]Huiping Shen, Bih-Shiaw Jaw, Yu-Lung Wu:
Research on the evaluation of the capabilities of Strategy Chief Human Resources Officers. MISNC 2024: 167-171 - [c16]Po-Chiang Wang, Yu-Lung Wu:
Exploring the Implementation of Electronic Health Records: A Perspective from the Information Systems Success Model - A Case Study of Z Hospital. MISNC 2024: 191-193 - 2020
- [c15]Yu-Lung Wu, Wu-Chuan Yang, Shih-Hsing Cheng:
The Construction and Validation of the Dimensions and Scale of Service Quality of The Police Service. MISNC/IEMT 2020: 1:1-1:5
2010 – 2019
- 2015
- [c14]Yu-Lung Wu, Yu-Hui Tao, Deniel-Y. Chang, Ting-Mu Huang:
The Dimensions of Service Quality at College Computer Center: Scale Development and Validation. MISNC 2015: 381-392 - 2014
- [j12]Yu-Lung Wu, Yu-Hui Tao, Ching-Pu Li, Sheng-Yuan Wang, Chi-Yuan Chiu:
User-switching behavior in social network sites: A model perspective with drill-down analyses. Comput. Hum. Behav. 33: 92-103 (2014) - [c13]Fu-I Hou, Yu-Lung Wu:
Using the Hierarchical Linear Model to Construct Organizational Climate, Organizational Commitment, and Work Satisfaction Relationships of Freight Forwarder Shipping Companies. MoMM 2014: 359-362 - [c12]Yu-Lung Wu, Chi-Wen Chang, Chi-Jui Chang:
Exploring the Value of Cloud Services and QoE Factors on IPCentrex via the Means-End Chain Framework. MoMM 2014: 363-366 - [c11]Chunh-Ming Chung, Yu-Lung Wu:
Applying a Two-Level Analysis on the Growth Rate of King Grouper (Epinephelus Lanceolatu): Critical Analysis and Model Construction. MoMM 2014: 367-370 - 2013
- [c10]Yu-Lung Wu, Chi-Jui Chang, Yu-Hui Tao:
Closed-Circuit Television-Enabled Service: A Review of Security and Privacy Issues. COMPSAC Workshops 2013: 306-309 - 2012
- [j11]Tzung-Pei Hong, Ya-Fang Tung, Shyue-Liang Wang, Yu-Lung Wu, Min-Thai Wu:
A multi-level ant-colony mining algorithm for membership functions. Inf. Sci. 182(1): 3-14 (2012) - [c9]Tzung-Pei Hong, Ting-I Chien, Yeong-Chyi Lee, Yu-Lung Wu:
A Bio-Inspired Algorithm for Solving the Scheduling Problems with Redundant Molds. IBICA 2012: 24-28 - 2011
- [c8]Yu-Lung Wu, Yu-Hui Tao, Ching-Pu Li, Pei-Chi Yang, Guo-Shin Huang:
The Moderating Role of Virtual Community Cohesion and Critical Mass on the Link between Online-Game Website Service Quality and Play Satisfaction. ASONAM 2011: 635-640 - 2010
- [j10]Shyue-Liang Wang, Ting-Zheng Lai, Tzung-Pei Hong, Yu-Lung Wu:
Hiding collaborative recommendation association rules on horizontally partitioned data. Intell. Data Anal. 14(1): 47-67 (2010)
2000 – 2009
- 2009
- [j9]Tzung-Pei Hong, Chun-Wei Lin, Yu-Lung Wu:
Maintenance of fast updated frequent pattern trees for record deletion. Comput. Stat. Data Anal. 53(7): 2485-2499 (2009) - [j8]Tzung-Pei Hong, Ya-Fang Tung, Shyue-Liang Wang, Min-Thai Wu, Yu-Lung Wu:
An ACS-based framework for fuzzy data mining. Expert Syst. Appl. 36(9): 11844-11852 (2009) - [c7]Shyue-Liang Wang, Ting-Zheng Lai, Tzung-Pei Hong, Yu-Lung Wu:
Hiding Predictive Association Rules on Horizontally Distributed Data. IEA/AIE 2009: 133-141 - 2008
- [j7]Tzung-Pei Hong, Chun-Wei Lin, Yu-Lung Wu:
Incrementally fast updated frequent pattern trees. Expert Syst. Appl. 34(4): 2424-2435 (2008) - [j6]Yu-Hui Tao, Yu-Lung Wu, Hsin-Yi Chang:
A Practical Computer Adaptive Testing Model for Small-Scale Scenarios. J. Educ. Technol. Soc. 11(3): 259-274 (2008) - [j5]Tzung-Pei Hong, Chun-Hao Chen, Yeong-Chyi Lee, Yu-Lung Wu:
Genetic-Fuzzy Data Mining With Divide-and-Conquer Strategy. IEEE Trans. Evol. Comput. 12(2): 252-265 (2008) - [c6]Shyue-Liang Wang, Ting-Zheng Lai, Tzung-Pei Hong, Yu-Lung Wu:
Efficient Hiding of Collaborative Recommendation Association Rules with Updates. ICMLA 2008: 737-740 - [p1]Tzung-Pei Hong, Chun-Hao Chen, Yu-Lung Wu, Vincent S. Tseng:
Fining Active Membership Functions in Fuzzy Data Mining. Data Mining: Foundations and Practice 2008: 179-196 - 2007
- [j4]Ruey-Yi Wei, Yu-Lung Wu:
On Trellis Coded Noncoherent Space-Time Modulation. IEEE Trans. Wirel. Commun. 6(7): 2432-2437 (2007) - [j3]Yeong-Luh Ueng, Yu-Lung Wu, Ruey-Yi Wei:
Concatenated space-time block coding with trellis coded modulation using a delay processor. IEEE Trans. Wirel. Commun. 6(12): 4452-4463 (2007) - [c5]Yu-Lung Wu:
A Pilot Study of Applying Hierarchical Curriculum Structure Graph for Remedial Learning. ICALT 2007: 103-107 - 2006
- [j2]Yu-Lung Wu, Ruey-Yi Wei:
A Unitary Space-Time Modulation Scheme with Multistage Decoding. IEICE Trans. Commun. 89-B(6): 1869-1872 (2006) - [j1]Tzung-Pei Hong, Chun-Hao Chen, Yu-Lung Wu, Yeong-Chyi Lee:
A GA-based Fuzzy Mining Approach to Achieve a Trade-off Between Number of Rules and Suitability of Membership Functions. Soft Comput. 10(11): 1091-1101 (2006) - [c4]Tzung-Pei Hong, Jerry Jun-Wei Lin, Yu-Lung Wu:
Maintenance of Fast Updated Frequent Pattern Trees for Record Modification. ICICIC (1) 2006: 570-573 - [c3]Tzung-Pei Hong, Jerry Jun-Wei Lin, Yu-Lung Wu:
A Fast Updated Frequent Pattern Tree. SMC 2006: 2167-2172 - 2004
- [c2]Tzung-Pei Hong, Chun-Hao Chen, Yu-Lung Wu, Yeong-Chyi Lee:
Using divide-and-conquer GA strategy in fuzzy data mining. ISCC 2004: 116-121 - 2003
- [c1]Ruey-Yi Wei, Yu-Lung Wu:
Unitary space-time trellis codes. PIMRC 2003: 1017-1021
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint