Year |
Citation |
Score |
2017 |
Parks R, Xu H, Chu C, Lowry PB. Examining the intended and unintended consequences of organisational privacy safeguards European Journal of Information Systems. 26: 37-65. DOI: 10.1057/S41303-016-0001-6 |
0.663 |
|
2015 |
Wang D, He D, Wang P, Chu C. Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment Ieee Transactions On Dependable and Secure Computing. 12: 428-442. DOI: 10.1109/Tdsc.2014.2355850 |
0.333 |
|
2015 |
Liu B, Chu CH. Relationship-based federated access control model for EPC Discovery Service Computers and Security. 55: 251-270. DOI: 10.1016/J.Cose.2015.06.003 |
0.408 |
|
2014 |
Li Z, Chu C, Yao W. A semantic authorization model for pervasive healthcare Journal of Network and Computer Applications. 38: 76-87. DOI: 10.1016/J.Jnca.2013.06.006 |
0.556 |
|
2013 |
Kumar A, Yao W, Chu C. Flexible Process Compliance with Semantic Constraints Using Mixed-Integer Programming Informs Journal On Computing. 25: 543-559. DOI: 10.1287/Ijoc.1120.0520 |
0.326 |
|
2013 |
Li F, Luo B, Liu P, Lee D, Chu C. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing Ieee Transactions On Information Forensics and Security. 8: 888-900. DOI: 10.1109/Tifs.2013.2247398 |
0.561 |
|
2012 |
Yao W, Chu CH, Li Z. The adoption and implementation of RFID technologies in healthcare: a literature review. Journal of Medical Systems. 36: 3507-25. PMID 22009254 DOI: 10.1007/S10916-011-9789-8 |
0.55 |
|
2011 |
Chen R, Li Z, Chu C. Toward service innovation Journal of Technology Management in China. 6: 216-231. DOI: 10.1108/17468771111157436 |
0.54 |
|
2011 |
Yao W, Chu C, Li Z. Leveraging complex event processing for smart hospitals using RFID Journal of Network and Computer Applications. 34: 799-810. DOI: 10.1016/J.Jnca.2010.04.020 |
0.54 |
|
2010 |
Bhattacharya M, Chu C, Hayya J, Mullen T. An exploratory study of RFID adoption in the retail sector Operations Management Research. 3: 80-89. DOI: 10.1007/S12063-010-0029-Z |
0.324 |
|
2010 |
Han SH, Chu CH. Content-based image authentication: Current status, issues, and challenges International Journal of Information Security. 9: 19-32. DOI: 10.1007/S10207-009-0093-2 |
0.317 |
|
2007 |
Gu Q, Liu P, Chu CH, Zhu S. Defence against packet injection in ad hoc networks International Journal of Security and Networks. 2: 154. DOI: 10.1504/Ijsn.2007.012832 |
0.553 |
|
2007 |
Gu Q, Chu C, Liu P. Modelling and analysis of bandwidth competition in 802.11 wireless networks International Journal of Mobile Network Design and Innovation. 2: 190-201. DOI: 10.1504/Ijmndi.2007.017323 |
0.533 |
|
2007 |
Leong T, Chu C. Wireless network design: a space-filling curve approach International Journal of Mobile Network Design and Innovation. 2: 180-189. DOI: 10.1504/Ijmndi.2007.017322 |
0.351 |
|
2007 |
Wu X, Chu C, Wang Y, Yan W. A genetic algorithm for cellular manufacturing design and layout European Journal of Operational Research. 181: 156-167. DOI: 10.1016/J.Ejor.2006.05.035 |
0.317 |
|
2007 |
Wu X, Chu C, Wang Y, Yue D. Genetic algorithms for integrating cell formation with machine layout and scheduling Computers & Industrial Engineering. 53: 277-289. DOI: 10.1016/J.Cie.2007.06.021 |
0.336 |
|
2006 |
Hsu HH, Cheng SF, Chen LM, Liu JY, Chu CH, Weng YJ, Li ZY, Lin CS, Lee SD, Kuo WW, Huang CY. Over-expressed estrogen receptor-alpha up-regulates hTNF-alpha gene expression and down-regulates beta-catenin signaling activity to induce the apoptosis and inhibit proliferation of LoVo colon cancer cells. Molecular and Cellular Biochemistry. 289: 101-9. PMID 16628468 DOI: 10.1007/s11010-006-9153-3 |
0.409 |
|
2006 |
Gu Q, Chu C, Liu P, Zhu S. Slander-resistant forwarding isolation in ad hoc networks International Journal of Mobile Network Design and Innovation. 1: 162-174. DOI: 10.1504/Ijmndi.2006.012086 |
0.564 |
|
2006 |
Wu X, Chu C, Wang Y, Yan W. Concurrent design of cellular manufacturing systems: a genetic algorithm approach International Journal of Production Research. 44: 1217-1241. DOI: 10.1080/00207540500338252 |
0.337 |
|
2001 |
Zhu D, Premkumar G, Zhang X, Chu C. Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods Decision Sciences. 32: 635-660. DOI: 10.1111/J.1540-5915.2001.Tb00975.X |
0.308 |
|
2000 |
Premkumar G, Chu C, Chou H. Telecommunications Network Design: Comparison of Alternative Approaches Decision Sciences. 31: 483-506. DOI: 10.1111/J.1540-5915.2000.Tb01631.X |
0.302 |
|
2000 |
Chu C, Premkumar G, Chou H. Digital data networks design using genetic algorithms European Journal of Operational Research. 127: 140-158. DOI: 10.1016/S0377-2217(99)00329-X |
0.326 |
|
1989 |
Chu CH. Design issues for intelligent microcomputer-based decision support systems Journal of Information Systems Management. 6: 25-33. DOI: 10.1080/07399018908960140 |
0.318 |
|
1988 |
Chu CH, Wang HP(, Chu YC. On the design of an intelligent micro-based DSS for line balancing Computers and Industrial Engineering. 14: 419-427. DOI: 10.1016/0360-8352(88)90044-7 |
0.311 |
|
Show low-probability matches. |