{"id":658,"date":"2022-06-13T20:32:10","date_gmt":"2022-06-13T12:32:10","guid":{"rendered":"http:\/\/wwflab.dscloud.me\/wordpress\/?page_id=658"},"modified":"2022-06-13T20:35:45","modified_gmt":"2022-06-13T12:35:45","slug":"%e8%ab%96%e6%96%87%e8%91%97%e4%bd%9c-publication","status":"publish","type":"page","link":"https:\/\/eb201wwf.site\/wordpress\/%e6%8c%87%e5%b0%8e%e6%95%99%e6%8e%88\/%e8%ab%96%e6%96%87%e8%91%97%e4%bd%9c-publication\/","title":{"rendered":"\u8ad6\u6587\u8457\u4f5c Publication"},"content":{"rendered":"\n<h2><strong>\u5b78\u8853\u671f\u520a\u8ad6\u6587<\/strong>(Journal)<\/h2>\n\n\n\n<ol><li><strong>Wei-Chih Lien, Congo Tak-Shing Ching, Zheng-Wei Lai, Hui-Min David Wang, Jhih- Siang Lin, Yen-Chang Huang, Feng-Huei Lin, Wen-Fong Wang*, 2022, Intelligent Fall-risk Assessment Based on Gait Stability and Symmetry among Older Adults Using Tri-axial Accelerometry, Frontiers in Bioengineering and Biotechnology, section Biomechanics, Vol.10. (SCI)(\u8207\u6210\u5927\u91ab\u9662\u53f0\u5357\u7e3d\u9662\u5fa9\u5065\u79d1\u5408\u4f5c\u7814\u7a76)<\/strong><\/li><li><strong>Ching-Yu Yang, Wen-Fong Wang, 2021, An efficient data hiding for ECG signals based on the integer wavelet transform and block standard deviation, Journal of King Saud University &#8211; Computer and Information Sciences, pp.1-15. (SCIE)<\/strong><\/li><li><strong>Yang, Ching-Yu, Cheng, Lian-Ta, Wang, Wen-Fong, 2020, An efficient reversible ECG steganography by adaptive LSB approach based on 1D FDCT domain, Multimedia Tools and Applications, Vol.79, No.33, pp.24449-24462. (SCI)<\/strong><\/li><li><strong>Chingyu Yang, Wenfong Wang, 2020, Progressive Data Hiding in Integer Wavelet Transform of Electrocardiogram by Using Simple Decision Rule and Coefficient Calibration, Revue d&#8217;Intelligence Artificielle, Vol.31, No.1, pp.11-20. (EI)<\/strong><\/li><li><strong>Wen-Fong Wang, Yen-Ting Chou, 2019, Implementing Backup Routing for Optical Networks via a BGP Enhancement Scheme, Journal of Innovative Technology, Vol.1, No.2, pp.27-34.<\/strong><\/li><li><strong>Wen-Fong Wang, Wei-Chih Lien*, Che-Yu Liu, Ching-Yu Yang, 2018, Study on Tripping Risks in Fast Walking through Cadence Controlled Gait Analysis, Journal of Healthcare Engineering, Vol.2018, pp.1-11. (SCI)(MOST105-2622-E-224-003-CC3)<\/strong><\/li><li><strong>Wen-Fong Wang, Ching-Yu Yang, Yan-Fu Wu, 2017, SVM-based classification method to identify alcohol consumption using ECG and PPG monitoring, Pervasive and Ubiquitous Computing, Vol.22, No.2, pp.275-287. (SCI)(NSC 100-2218-E-224-008-MY3)<\/strong><\/li><li><strong>Wei-Chih Lien, Yung-Heng Cheng, Ta-Shen Kuan, Yu-Lun Zheng, Chao-Hsien Hsieh, Wen-Fong Wang, 2017, Comparison of gait symmetry between poststroke fallers and nonfallers during level walking using triaxial accelerometry &#8211; A STROBE-compliant cross-sectional study, Medicine, Vol.96, No.9, pp.1-7. (SCI)<\/strong><\/li><li><strong>Ching-Yu Yang, Wen-Fong Wang, 2016, High-Capacity Steganographic Method for Color Images Using Progressive Pixel-Alignment, Journal of Information Hiding and Multimedia Signal Processing, Vol.6, No.4, pp.815-823. (EI)<\/strong><\/li><li><strong>Ching-Yu Yang, Wen-Fong Wang, 2016, Effective electrocardiogram steganography based on coefficient alignment, Journal of Medical Systems, Vol.40, No.3. (SCI)<\/strong><\/li><li><strong>Wen-Fong Wang, Ching-Yu Yang, Sheng-Jia Shih, 2015, Study on a Computational Model of Food Intake for a Body Weight Management System, Journal of Information Hiding and Multimedia Signal Processing, Vol.6, No.3, pp.511-522. (EI)(\u672a\u4f86\u751f\u6d3b\u4e92\u52d5\u5f0f\u6e9d\u901a\u74b0\u5883\u4e4b\u5efa\u7f6e\uff0d\u5b50\u8a08\u756b\u4e09:\u9577\u8005\u5065\u5eb7\u8207\u4f34\u8b77\u8ffd\u8e64\u5d4c\u5165\u5f0f\u7cfb\u7d71\u8a2d\u8a08\u8207\u5efa\u7f6e(2\/2), NSC 99-2220-E-224-004)<\/strong><\/li><li><strong>Ching-Yu Yang, Wen-Fong Wang, Yih-Fuh Wang, Ran-Zan Wang, 2014, An improved robust watermarking scheme based on a shape-specific point and feature-embedding technique, The Imaging Science Journal, Vol.63, No.4, pp.183-191. (SCI)<\/strong><\/li><li><strong>Wei-Song Wang, Hong-Yi Huang, Shu-Chun Chen, Kuo-Chuan Ho, Chia-Yu Lin, Tse-Chuan Chou, Chih-Hsien Hu, Wen-Fong Wang, Cheng-Feng Wu and Ching-Hsing Luo, 2011, Real-Time Telemetry System for Amperometric and Potentiometric Electrochemical Sensors, Sensors, pp.8594-8610. (SCI)<\/strong><\/li><li><strong>W.-S. WANG, H.-Y. HUANG, Z.-C. WU, S.-C. CHEN, W.-F. WANG, C.-F. WU and C.-H. LUO, 2011, Wireless biopotential acquisition system for portable healthcare monitoring, Journal of Medical Engineering &amp; Technology. (SCI)<\/strong><\/li><li><strong>Wen-Ping Chen, Wen-Fong Wang, and Wen-Shyang Hwang, 2010, Adaptive DBA Algorithm with Sorting Report Messages for EPON, IET Communications, Vol.4, No.18, pp.2230-2239. (SCI)<\/strong><\/li><li><strong>Feng-Chen Lee, Wen-Fong Wang, Jun-Bin Shih, 2009, A Multiple Slot Cell Scheduling Algorithm for Multicast Switching Systems, Scientia Iranica, Transactions D: Computer Science &amp; Engineering and Electrical Engineering, Vol.16, No.2, pp.119-127. (SCI)(NSC-98-2220-E224-012)<\/strong><\/li><li><strong>Wen-Ping Chen, Wen-Fong Wang, Wen-Shyang Hwang, 2008, A novel and simple beforehand bandwidth reservation (BBR) MAC protocol for OBS metro ring networks, Journal of High Speed Networks, Vol.17, pp.59-72. (SCI)<\/strong><\/li><li><strong>W.F. Wang, J.Y. Wang, J.J. Li, and C.H. Chiu, 2006, Study on Enhanced Strategies for the Performance of TCP\/IP Offload Engines, Intl Journal of Electrical Engineering (IJEE), Vol. 13, No. 2, pp. 105-116. (EI)(NSC91-2213-E-224-016)<\/strong><\/li><li><strong>W.F. Wang, J.Y. Wang, W.S. Hwang, and L.Y. Kung, 2001, On the resource reservation approach to design a large-scale and ultra high-speed MAN, Computers &amp; Electrical Engineering An International Journal, Vol.27, pp.173-199. (SCI)<\/strong><\/li><li><strong>W.F. Wang, W.S. Hwang, and J.Y. Wang, 2000, Design of a Large Scale Gbit\/s MAN using a Cyclic Reservation-based MAC Protocol, Journal of System Architecture, Vol. 46, No.12, pp. 1115-1135. (SCI)<\/strong><\/li><li><strong>J.Y. Wang, W.S. Hwang, and W.F. Wang, 2000, Performance Evaluation of Multiple-Channel Slotted Ring Networks with Tunable Transmitters and Fixed Receivers, Computer Communication, Vol. 23, pp. 1281-1291. (SCI)<\/strong><\/li><li><strong>W.F. Wang and L.Y. Kung, 1998, On a refined cyclic reservation-based MAC scheme for ultra high-speed hierarchical ring MANs, Journal of Circuits,Systems and Computers, Vol. 8, No. 3, pp. 379-404. (SCI)<\/strong><\/li><\/ol>\n\n\n\n<h2> <strong>\u7814\u8a0e\u6703\u8ad6\u6587<\/strong> (Conference) <\/h2>\n\n\n\n<ol><li><strong>\u6c5f\u9e97\u7389, \u9673\u6590\u5a1f, \u738b\u6587\u6953, \u5f35\u50b3\u80b2, \u6f58\u5bb6\u6d0b, \u674e\u653f\u61b2, \u90b1\u54c1\u5cf0, \u674e\u667a\u5cf0, 2021, \u5931\u667a\u9577\u8f29\u8ff7\u9014\u667a\u6167\u7269\u806f\u7db2\u5b9a\u4f4d\u8207\u5354\u5c0b\u901a\u5831\u7cfb\u7d71\u4e4b\u8a2d\u8a08\u8207\u5be6\u4f5c, \u7b2c\u5341\u4e00\u5c46\u7db2\u8def\u667a\u80fd\u8207\u61c9\u7528\u7814\u8a0e\u6703(NCWIA 2021), 2021\/07\/23, \u53f0\u7063\u7db2\u8def\u667a\u80fd\u5b78\u6703\u3001\u667a\u6167\u8fa8\u8b58\u7522\u696d\u670d\u52d9\u7814\u7a76\u4e2d\u5fc3, \u53f0\u4e2d, pp.1-5.<\/strong><\/li><li><strong>\u6797\u7a1a\u7fd4, \u694a\u5141\u7ff0, \u8607\u777f\u5be7, \u9023\u5049\u5fd7, \u5b6b\u5065\u8000, \u5f35\u5bb6\u9298, \u738b\u6587\u6953, 2020, \u57fa\u65bc\u4e09\u8ef8\u52a0\u901f\u5ea6\u611f\u6e2c\u8a0a\u865f\u4e4b\u8001\u4eba\u6b65\u614b\u81ea\u76f8\u95dc\u5206\u6790, \u53f0\u7063\u9ad8\u9f61\u7167\u8b77\u66a8\u6559\u80b2\u5354\u6703\u7814\u8a0e\u6703 FACES 2020\u5e74\u6703\u5b78\u8853\u8ad6\u6587, 2020\/10\/18, \u53f0\u7063\u9ad8\u9f61\u7167\u8b77\u66a8\u6559\u80b2\u5354\u6703, \u53f0\u5357, pp.2.<\/strong><\/li><li><strong>Chien-Yao Sun, Wei-Chih Lien, Wen-Fong Wang, Yi-Ching Yang, Ruei-Ning Su, Chia-Ming Chang, 2020, Fall risk assessment using triaxial accelerometry for older patients undergoing hemodialysis, \u53f0\u7063\u9ad8\u9f61\u7167\u8b77\u66a8\u6559\u80b2\u5354\u6703\u7814\u8a0e\u6703 FACES 2020\u5e74\u6703\u5b78\u8853\u8ad6\u6587, 2020\/10\/18, \u53f0\u7063\u9ad8\u9f61\u7167\u8b77\u66a8\u6559\u80b2\u5354\u6703, \u53f0\u5357, pp.1.<\/strong><\/li><li><strong>Wen-Fong Wang, Wei-Chih Lien, Yong-Tian Xiao, Shu-Chun Yeh, Yen-Chi Huang, Cheng-Wei Lai, Jun-jie Lai, Chuan-Yu Chang, 2020, An IOT-based Mobility Assessment Scheme for Elders Living in Communities, \u7b2c\u5341\u5c46\u7db2\u8def\u667a\u80fd\u8207\u61c9\u7528\u7814\u8a0e\u6703(NCWIA 2020), 2020\/07\/31-2020\/08\/01, \u53f0\u7063\u7db2\u8def\u667a\u80fd\u5b78\u6703\u3001\u667a\u6167\u8fa8\u8b58\u7522\u696d\u670d\u52d9\u7814\u7a76\u4e2d\u5fc3, Douliu, Yunlin, pp.148-151. (109-13270)<\/strong><\/li><li><strong>Li-Yu Chiang, Jun-Yi Lin, Wen-Fong Wang, 2018, Exploration on the Design of Sport Prescription and the Behavior of College Students, International Computer Symposium 2018 (ICS 2018), 2018\/12\/20-22, National Yunlin University of Science and Technology, Douliu, Yunlin, pp.1-7.<\/strong><\/li><li><strong>Tin Chang, Tzu-Hsuan Chung, En-Wei Lin, Jun-Jie Lai, Xin-Hong Lai, Wen-Fong Wang*, Chuan-Yu Chang, Ching-Yu Yang, 2018, Indoor navigation based on a gait recognition and counting scheme, International Computer Symposium 2018 (ICS 2018), 2018\/12\/20-22, National Yunlin University of Science and Technology, Douliu, Yunlin, pp.1-10.<\/strong><\/li><li><strong>Ching-Yu Yang and Wen-Fong Wang, 2018, An Improved High-Capacity ECG Steganography with Smart Offset Coefficients, The Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2018), 2018\/11\/26-28, Tohoku University, Sendai, Japan, pp.1-8.<\/strong><\/li><li><strong>Wen-Fong Wang*, Ying-Peng Huang, Chuan-Yu Chang, Ching-Yu Yang, 2018, Micro Physiological Vibration Detection for Human Heartbeats, The Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2018), 2018\/11\/26-28, Tohoku University, Sendai, Japan.<\/strong><\/li><li><strong>\u912d\u5169\u9054, \u694a\u6176\u88d5, \u738b\u6587\u6953, 2018, \u4ee5\u4e00\u7dad\u5feb\u901f\u96e2\u6563\u9918\u5f26\u8f49\u63db\u70ba\u57fa\u790e\u4e4b\u9ad8\u96b1\u85cf\u5bb9\u91cf\u4e4b\u5fc3\u96fb\u5716\u96b1\u5beb\u8853, \u7b2c\u5341\u4e03\u5c46\u96e2\u5cf6\u8cc7\u8a0a\u6280\u8853\u8207\u61c9\u7528 \u96e2\u5cf6\u8cc7\u8a0a\u6280\u8853\u8207\u61c9\u7528 \u7814\u8a0e\u6703, 2018\/05\/24-26, \u99ac\u516c, \u6f8e\u6e56, Douliu, Yunlin.<\/strong><\/li><li><strong>Ching-Yu Yang and Wen-Fong Wang, 2017, High-capacity ECG Steganography with Smart Offset Coefficients, The Thirteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2017), 2017\/08\/12-15, Tohoku University, Matsue, Shimane.<\/strong><\/li><li><strong>Wen-Fong Wang, Ching-Yu Yang and Hao-Hsiang Wang, 2015, Study on the Relationship between Stair&#8217;s Slope and Upward\/Downward Gaits in Stairs, The Eleventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), 2015\/09\/23-25, South Australia University, Adelaide. (104H500404)<\/strong><\/li><li><strong>Wen-Fong Wang, Deng-Yi Wang, Ching-Yu Yang, 2015, Analysis of Movement Effectiveness in Badminton Strokes with Accelerometers, The 9th International Conference on Genetic and Evolutionary Computing (ICGEC 2015), 2015\/08\/26-28, University of Computer Studies, Yangon, Yangon. (100H500404)<\/strong><\/li><li><strong>\u5f35\u9d6c\u8abc, \u738b\u6587\u6953, \u694a\u6176\u88d5, 2015, \u61c9\u7528\u65bc\u6162\u8dd1\u6d3b\u52d5\u4e4b\u904b\u7bc0\u5f8b\u63a7\u5236\u6cd5\u7814\u7a76, \u7b2c\u5341\u56db\u5c46\u96e2\u5cf6\u8cc7\u8a0a\u6280\u8853\u8207\u61c9\u7528\u7814\u8a0e\u6703, 2015\/05\/22-23, \u570b\u7acb\u6f8e\u6e56\u79d1\u6280\u5927\u5b78, \u6f8e\u6e56. (MOST 103-2221-E-224-084)<\/strong><\/li><li><strong>Wen-Fong Wang, Ching-Yu Yang and Ji-Ting Gu, 2014, A Sport Recognition Method with Utilizing Less Motion Sensors, The Eighth International Conference on Genetic and Evolutionary Computing, 2014\/10\/18-20, Nanchang Institute of Technology, Nanchang. (\u7db2\u5b87\u5be6\u9ad4\u7cfb\u7d71\u4e0a\u4eba\u672c\u5065\u5eb7\u7167\u8b77\u74b0\u5883\u4e4b\u7814\u7a76\u8207\u5efa\u7f6e\uff0d\u5b50\u8a08\u756b\u4e09\uff1a\u5efa\u69cb\u65bc\u7db2\u5b87\u5be6\u9ad4\u7cfb\u7d71\u5167\u652f\u63f4\u5bb6\u5ead\u5065\u5eb7\u7ba1\u7406\u5e73\u53f0\u4e4b\u8a2d\u8a08\u8207\u6574\u5408, SC 100-2218-E-224-008-MY3)<\/strong><\/li><li><strong>\u912d\u5b87\u502b, \u738b\u6587\u6953, \u694a\u6176\u88d5, \u76e7\u6e05\u677e, 2014, \u53ef\u61c9\u7528\u65bc\u904b\u52d5\u7ba1\u7406\u7684\u96fb\u5b50\u8df3\u7e69\u4e4b\u8a2d\u8a08\u8207\u5be6\u4f5c, \u7b2c 13 \u5c46\u96e2\u5cf6\u8cc7\u8a0a\u6280\u8853\u8207\u61c9\u7528\u7814\u8a0e\u6703, 2014\/05\/23-24, \u5c4f\u6771\u5546\u696d\u6280\u8853\u5b78\u9662, \u58be\u4e01\u590f\u90fd\u6c99\u7058\u9152\u5e97. (\u7db2\u5b87\u5be6\u9ad4\u7cfb\u7d71\u4e0a\u4eba\u672c\u5065\u5eb7\u7167\u8b77\u74b0\u5883\u4e4b\u7814\u7a76\u8207\u5efa\u7f6e\uff0d\u5b50\u8a08\u756b\u4e09\uff1a\u5efa\u69cb\u65bc\u7db2\u5b87\u5be6\u9ad4\u7cfb\u7d71\u5167\u652f\u63f4\u5bb6\u5ead\u5065\u5eb7\u7ba1\u7406\u5e73\u53f0\u4e4b\u8a2d\u8a08\u8207\u6574\u5408, NSC 100-2218-E-224-008-MY3)<\/strong><\/li><li><strong>\u738b\u6587\u6953, \u5ed6\u5049\u4e1e, \u76e7\u6e05\u677e, 2014, \u5229\u7528 ECG \u5fc3\u96fb\u8a0a\u865f P \u6ce2\u7279\u5fb5\u65bc\u5fc3\u640f\u904e\u65e9\u75c7\u72c0\u5206\u6790, \u7b2c\u56db\u5c46\u7db2\u8def\u667a\u80fd\u8207\u61c9\u7528\u7814\u8a0e\u6703, 2014\/05\/02-03, \u6f8e\u6e56\u79d1\u6280\u5927\u5b78\u3001\u96f2\u6797\u79d1\u6280\u5927\u5b78, \u6f8e\u6e56\u79d1\u6280\u5927\u5b78. (NSC 100-2218-E-224)<\/strong><\/li><li><strong>Wen-Fong Wang, Li-Chuan Hung, Ching-Sung Lu, 2013, Design of Partially Buffered Crossbar Switches For Supporting Mixed Traffic, 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013\/10\/16-18, Beijing University of Technology, China, Beijing. (NSC 99-2220-E-224-004)<\/strong><\/li><li><strong>Wen-Fong Wang, Yi-Jhou Shen, 2013, A Congestion-Relief Method for Wormhole-routed 2D Mesh Networks, the 2012 International Conference on Information Security and Intelligent Control (ISIC 2012), 2013\/08\/14-16, National Yunlin University of Science &amp; Technology, Douliu, Yunlin. (NSC 100-2218-E-224 -008 -MY3)<\/strong><\/li><li><strong>Wen-Fong Wang, Wei-Jing Liou, 2013, Design of a Context Aware Exercise System, the 2012 International Conference on Information Security and Intelligent Control (ISIC 2012), 2013\/08\/14-16, National Yunlin University of Science and Technology, Douliu, Yunlin. (NSC 100-2218-E-224 -008 -MY3)<\/strong><\/li><li><strong>\u9ec3\u672c\u65ed, \u90ed\u7d00\u5ef7, \u738b\u6587\u6953, 2013, \u5065\u5eb7\u8207\u7528\u85e5\u7ba1\u7406\u7cfb\u7d71, \u7b2c 11 \u5c46\u96e2\u5cf6\u8cc7\u8a0a\u6280\u8853\u8207\u61c9\u7528\u7814\u8a0e\u6703, 2013\/05\/25-26, \u6f8e\u6e56\u79d1\u6280\u5927\u5b78, \u6f8e\u6e56\u79d1\u6280\u5927\u5b78.<\/strong><\/li><li><strong>\u6881\u8018\u8f14, \u8521\u5764\u7ff0, \u738b\u6587\u6953, 2013, \u7ba1\u7406\u5f0f USB \u96fb\u5b50\u5bc6\u78bc\u9396, \u7b2c 11 \u5c46\u96e2\u5cf6\u8cc7\u8a0a\u6280\u8853\u8207\u61c9\u7528\u7814\u8a0e\u6703, 2013\/05\/25-26, \u6f8e\u6e56\u79d1\u6280\u5927\u5b78, \u6f8e\u6e56\u79d1\u6280\u5927\u5b78. (NSC 100-2218-E-224 -008 -MY3)<\/strong><\/li><li><strong>Wen-Fong Wang, Zhi-Chun Jao, 2011, Design of a Partially Buffered Crossbar Router for Mesh-based Network-on-Chips, 2011 Extreme Scale Computing Application Enablement &#8211; Modeling and Tools II, 2011\/09\/02-04, St. Francis Xavier University, Canada, Banff, Canada. (NSC100-2218-E-224-008-MY3)<\/strong><\/li><li><strong>Wen-Fong Wang, Sheng-Jia Shih, Ching-Sung Lu, 2011, Design of a computational model for health management, The International Conference on Computing and Security (ICCS) 2011, 2011\/07\/08-11, National University of Mongolia, Ulaanbaatar, Mongolia. (NSC100-2218-E-224-008-MY3)<\/strong><\/li><li><strong>\u738b\u6587\u6953, \u6797\u51a0\u6a3a, \u6797\u82b3\u5b5c, 2011, \u9280\u9aee\u65cf\u9ad8\u667a\u80fd\u6574\u5408\u578b\u885b\u6d74\u8a2d\u5099, 2011\u6578\u4f4d\u751f\u6d3b\u79d1\u6280\u7814\u8a0e\u6703, 2011\/07\/07-08, \u96f2\u6797\u79d1\u6280\u5927\u5b78\u8cc7\u5de5\u7cfb, \u6597\u516d\u5e02,\u96f2\u79d1\u5927. (NSC100-2218-E-224-008-MY3)<\/strong><\/li><li><strong>\u738b\u6587\u6953, 2011, Design of a crosspoint queued router for a micro-network in SoCs, The 3rd IEEE International Conference on Advanced Computer Control, 2011\/01\/18-20, Harbin Institute of Technology, Harbin, China. (NSC99-2220-E-224-004)<\/strong><\/li><li><strong>Wen-Fong Wang, Nan-Tong Wang, Sheng-Jia Shih, 2010, Design of a health management system with physiological signal acquisition, 2010 Asia Pacific Conference on Circuits and Systems (APCCAS 2010), 2010\/12\/06-09, IEEE, Kuala Lumpur, Malaysia. (\u672a\uff1f\u751f\u6d3b\u4e92\u52d5\u5f0f\u6e9d\u901a\u74b0\u5883\u4e4b\u5efa\u7f6e\uff0d\u5b50\u8a08\u756b\u4e09:\uff1f\u9577\u8005\u5065\u5eb7\u8207\u4f34\u8b77\u8ffd\u8e64\u5d4c\u5165\u5f0f\u7cfb\u7d71\u8a2d\u8a08\u8207\u5efa\u7f6e(2\/2))<\/strong><\/li><li><strong>Wen-Fong Wang, Fong-Cheng Lee, Guo-Lung Lu, 2010, An Efficient Shared-Memory Crosspoint Buffered Packet Switch for Mixed Uni- and Multicast Traffic, AINA, 2010\/04\/20-23, IEEE, Perth, pp.133-138.<\/strong><\/li><li><strong>Wen-Fong Wang, Yu-Siang Sun, Ching-Sung Lu, 2009, Simulative Investigation of Network Services for Resilient Packet Ring in Steering Mode, Chinacom2009, 2009\/08\/26-28, \u897f\u5b89\u96fb\u5b50\u79d1\u6280\u5927\u5b78, \u897f\u5b89. (NSC 97-2218-E-224-006)<\/strong><\/li><li><strong>Wen-Fong Wang, Ching-Sung Lu, 2009, Simulative Performance Analysis of Resilient Packet Ring in Protection Modes, HIS2009, 2009\/08\/12-14, \u700b\u967d\u5e2b\u7bc4\u5927\u5b78, \u700b\u967d. (NSC96-2221-E-224-006)<\/strong><\/li><li><strong>\u738b\u6587\u6953, \u65bd\u4fca\u8cd3, 2008, Supporting Multiple Priorities for CICQ Switches with Virtual Crosspoint Queues, 2008\u5e74\u5168\u570b\u96fb\u4fe1\u7814\u8a0e\u6703(NST2008), 2008\/12\/05-06, \u864e\u5c3e. (\u672a\u4f86\u751f\u6d3b\u4e92\u52d5\u5f0f\u6e9d\u901a\u74b0\u5883\u4e4b\u5efa\u7f6e\uff0d\u5b50\u8a08\u756b\u4e09:\u5e74\u9577\u8005\u5065\u5eb7\u8207\u4f34\u8b77\u8ffd\u8e64\u5d4c\u5165\u5f0f\u7cfb\u7d71\u8a2d\u8a08\u8207\u5efa\u7f6e(I), NSC 97-2218-E-224-006-)<\/strong><\/li><li><strong>\u738b\u6587\u6953, \u5b6b\u7389\u7965, 2008, Simulative Analysis of MPEG Video Streaming in RPR under Wrapping Protection Events, 2008\u5e74\u5168\u570b\u96fb\u4fe1\u7814\u8a0e\u6703(NST2008), 2008\/12\/05-06, \u864e\u5c3e. (\u672a\u4f86\u751f\u6d3b\u4e92\u52d5\u5f0f\u6e9d\u901a\u74b0\u5883\u4e4b\u5efa\u7f6e\uff0d\u5b50\u8a08\u756b\u4e09:\u5e74\u9577\u8005\u5065\u5eb7\u8207\u4f34\u8b77\u8ffd\u8e64\u5d4c\u5165\u5f0f\u7cfb\u7d71\u8a2d\u8a08\u8207\u5efa\u7f6e(I), NSC 97-2218-E-224-006-)<\/strong><\/li><li><strong>Wen-Fong Wang, Yi-Shian Chen, Lih-Chyau Wuu, 2008, An Adaptive Control Scheme of Reserved Bandwidth for RPR in Steering Mode, 11th Asia-Pacific Network Operations and Management Symposium (APNOMS&#8217;08), 2008\/10\/22-24, Beijing, pp.507-510. (\u672a\u4f86\u751f\u6d3b\u4e92\u52d5\u5f0f\u6e9d\u901a\u74b0\u5883\u4e4b\u5efa\u7f6e\uff0d\u5b50\u8a08\u756b\u4e09:\u5e74\u9577\u8005\u5065\u5eb7\u8207\u4f34\u8b77\u8ffd\u8e64\u5d4c\u5165\u5f0f\u7cfb\u7d71\u8a2d\u8a08\u8207\u5efa\u7f6e(I), NSC 97-2218-E-224-006-)<\/strong><\/li><li><strong>Fong-Cheng Lee, Wen-fong Wang, Ming-Da Liu, 2008, An Efficient Buffered Crossbar Switching Architecture with Multiple Multicast Virtual Output Queues for Mixed Uni- and Multicast Traffic, 14th Asia-Pacific Conf. on Comm.(APCC&#8217;08), 2008\/10\/14-16, Tokyo. (\u57fa\u65bc\u4e00\u500b\u65b0\u578b\u74b0\u5f0f\u591a\u91cd\u6295\u7968\u6a5f\u5236\u7684\u9ad8\u6027\u80fdCICQ\u4ea4\u63db\u5668\u4e4b\u8edf\u786c\u9ad4\u5be6\u9a57\u5e73\u53f0\u5be6\u4f5c, NSC96-2221-E-224-006)<\/strong><\/li><li><strong>Ngoc-diep Tran, Wen-fong Wang, 2008, Experimenting OBGP inter-domain Optical Switching, Int&#8217;l Conf. on Advanced Technologies for Comm.(ATC 2008), 2008\/10\/06-09, Hanoi.<\/strong><\/li><li><strong>Wen-Fong Wang, Nguyen Thi Minh Ngoc, Hai-Son Pham, 2008, Study on a Broadband Fixed Wireless Access System based on Chordal Ring Topology, Int&#8217;l Conf. on Advanced Technologies for Comm.(ATC 2008), 2008\/10\/06-09, Hanoi.<\/strong><\/li><li><strong>Wen-Fong Wang, Juu-You Wang, 2008, Performance Analysis of a Novel Ring-based Multi-Polling Algorithm for Crosspoint Buffer Switches, 3rd Int&#8217;l Conf. on Comm. and Networking in China (ChinaCom 2008), 2008\/08\/25-28, Hangzhou. (\u57fa\u65bc\u4e00\u500b\u65b0\u578b\u74b0\u5f0f\u591a\u91cd\u6295\u7968\u6a5f\u5236\u7684\u9ad8\u6027\u80fdCICQ\u4ea4\u63db\u5668\u4e4b\u8edf\u786c\u9ad4\u5be6\u9a57\u5e73\u53f0\u5be6\u4f5c, NSC96-2221-E-224-006)<\/strong><\/li><li><strong>Wen-Fong Wang, Lih-Chyau Wuu, 2008, A Stable Path Selection Algorithm for Protecting Optical Networks using OBGP Backup Routing, 1st Int&#8217;l Workshop on Nonlinear Dynamics and Synchronization (INDS&#8217;08), 2008\/07\/18-19, Klagenfurt. (\u57fa\u65bc\u4e00\u500b\u65b0\u578b\u74b0\u5f0f\u591a\u91cd\u6295\u7968\u6a5f\u5236\u7684\u9ad8\u6027\u80fdCICQ\u4ea4\u63db\u5668\u4e4b\u8edf\u786c\u9ad4\u5be6\u9a57\u5e73\u53f0\u5be6\u4f5c, NSC96-2221-E-224-006)<\/strong><\/li><li><strong>Feng-chen Lee, Wen-fong Wang, 2008, A Blocking Reduction Scheme for Multiple Slot Cell Scheduling in Multicast Switching Systems, 13th Int&#8217;l CSI Computer Conf., 2008\/03\/09-11, Kish island. (\u57fa\u65bc\u4e00\u500b\u65b0\u578b\u74b0\u5f0f\u591a\u91cd\u6295\u7968\u6a5f\u5236\u7684\u9ad8\u6027\u80fdCICQ\u4ea4\u63db\u5668\u4e4b\u8edf\u786c\u9ad4\u5be6\u9a57\u5e73\u53f0\u5be6\u4f5c, NSC96-2221-E-224-006)<\/strong><\/li><li><strong>\u912d\u878d\u61cb, \u738b\u6587\u6953, 2007, \u57fa\u65bcOBGP\u4e4b\u5149\u96fb\u8def\u4ea4\u63db\u5e73\u53f0\u8a2d\u8a08\u8207\u5be6\u4f5c, 2007\u6578\u4f4d\u79d1\u6280\u8207\u5275\u65b0\u7ba1\u7406\u7814\u8a0e\u6703, 2007\/06\/02, \u53f0\u5317\u7e23, \u83ef\u68b5\u5927\u5b78.<\/strong><\/li><li><strong>\u8521\u4f91\u5ef7, \u738b\u6587\u6953, 2007, \u61c9\u7528\u5728802.16e\u7db2\u8def\u4e0a\u4e4b\u7bc0\u80fd\u67b6\u69cb, 2007\u6578\u4f4d\u79d1\u6280\u8207\u5275\u65b0\u7ba1\u7406\u7814\u8a0e\u6703, 2007\/06\/02, \u53f0\u5317\u7e23, \u83ef\u68b5\u5927\u5b78.<\/strong><\/li><li><strong>F.C. Lee, W.F. Wang, and M.W. Lai, 2006, Design of a Jump-ahead Scheduling Scheme for Reducing Multicast Contention Conflicts in Input Queuing Switches, 2006\u5168\u570b\u96fb\u4fe1\u7814\u8a0e\u6703, 2006\/12\/01-02, \u9ad8\u96c4, pp.91. (NSC95-2218-E-224-007)<\/strong><\/li><li><strong>Wang Wen-Fong and Wang Yun-You, 2006, A Novel Ring-based Multi-Polling Scheme for Combined Input and Crosspoint Queued Switches, 2006\u5168\u570b\u96fb\u4fe1\u7814\u8a0e\u6703, 2006\/12\/01-02, \u9ad8\u96c4, pp.90. (NSC95-2218-E-224-007)<\/strong><\/li><li><strong>C.W. Cheng and W.F. Wang, 2006, A Fast Restoration Scheme for WDM Networks, 2006\u96fb\u5b50\u901a\u8a0a\u8207\u61c9\u7528\u7814\u8a0e\u6703(CECA), 2006\/07\/06, \u9ad8\u96c4, pp.23. (NSC94-2213-E-224-002)<\/strong><\/li><li><strong>W.F. Wang and P.H. Shih, 2006, Study on an Enhanced Link-Stability based Routing Scheme for Mobile Ad hoc Networks, IEEE SECON\/IWWAN&#8217;2006, 2006\/06\/27-29, New York. (NSC94-2213-E-224-002)<\/strong><\/li><li><strong>C.W. Cheng and W.F. Wang, 2006, A Fast Restoration Management Scheme for WDM Networks, \u7b2c\u4e94\u5c46\u96e2\u5cf6\u8cc7\u8a0a\u6280\u8853\u8207\u61c9\u7528\u7814\u8a0e\u6703, 2006\/06\/02-03, \u91d1\u9580, pp.21. (NSC94-2213-E-224-002)<\/strong><\/li><li><strong>T.S. Chang, W.F. Wang, and C.H. Yu, 2006, An Analysis of Probability for Routing Topology of Wireless Sensor Networks Forming Node-set, \u7b2c\u4e94\u5c46\u96e2\u5cf6\u8cc7\u8a0a\u6280\u8853\u8207\u61c9\u7528\u7814\u8a0e\u6703, 2006\/06\/02-03, \u91d1\u9580, pp.23. (NSC94-2213-E-224-002)<\/strong><\/li><li><strong>C.H. Hsu and W.F. Wang, 2006, Study on Novel Combined Input and Output Queued Switches Architectures, \u7b2c\u4e94\u5c46\u96e2\u5cf6\u8cc7\u8a0a\u6280\u8853\u8207\u61c9\u7528\u7814\u8a0e\u6703, 2006\/06\/02-03, \u91d1\u9580, pp.24. (NSC94-2213-E-224-002)<\/strong><\/li><li><strong>\u8cf4\u5b5f\u7def, \u738b\u6587\u6953, \u674e\u8c50\u6210, 2006, \u7fa4\u64ad\u8a0a\u52d9\u5728\u865b\u64ec\u8f38\u51fa\u7de9\u885d\u4f47\u5217\u77e9\u9663\u5f0f\u4ea4\u63db\u5668\u4e4b\u7814\u7a76, 2006\u6578\u4f4d\u79d1\u6280\u8207\u5275\u65b0\u7ba1\u7406\u570b\u969b\u7814\u8a0e\u6703, 2006\/04\/01, \u53f0\u5317, pp.591-601. (NSC94-2213-E-224-002)<\/strong><\/li><li><strong>\u912d\u5fd7\u6587, \u738b\u6587\u6953, 2006, \u61c9\u7528\u65bc\u5206\u6ce2\u591a\u5de5\u7db2\u8def\u4e4b\u6700\u4f73\u5316\u5feb\u901f\u56de\u5fa9\u7b56\u7565, 2006\u6578\u4f4d\u79d1\u6280\u8207\u5275\u65b0\u7ba1\u7406\u570b\u969b\u7814\u8a0e\u6703, 2006\/04\/01, \u53f0\u5317, pp.579-590. (NSC94-2213-E-224-002)<\/strong><\/li><li><strong>\u9673\u4f91\u8208, \u738b\u6587\u6953, \u4f59\u6210\u5f18, 2006, \u61c9\u7528\u65bc\u90fd\u6703\u5340\u4e4bIEEE 802.17\u5f48\u6027\u5c01\u5305\u74b0\u7db2\u8def\u516c\u5e73\u6027\u6a5f\u5236\u53ca\u4fdd\u8b77\u884c\u70ba\u6a21\u5f0f\u4e4b\u7814\u7a76, 2006\u6578\u4f4d\u79d1\u6280\u8207\u5275\u65b0\u7ba1\u7406\u570b\u969b\u7814\u8a0e\u6703, 2006\/04\/01, \u53f0\u5317, pp.376-387. (NSC94-2213-E-224-002)<\/strong><\/li><li><strong>\u8a31\u90e1\u6cd3, \u674e\u8c50\u6210, \u738b\u6587\u6953, 2006, \u8fd1\u4ee3\u7d50\u5408\u8f38\u5165\u8207\u8f38\u51fa\u57e0\u7de9\u885d\u4f47\u5217\u4ea4\u63db\u5668\u64ec\u4f3c\u8f38\u51fa\u57e0\u7de9\u885d\u4f47\u5217\u4ea4\u63db\u5668\u4e4b\u7814\u7a76, 2006\u6578\u4f4d\u79d1\u6280\u8207\u5275\u65b0\u7ba1\u7406\u570b\u969b\u7814\u8a0e\u6703, 2006\/04\/01, \u53f0\u5317, pp.844-854. (NSC94-2213-E-224-002)<\/strong><\/li><li><strong>\u5f35\u8070\u69ae, \u738b\u6587\u6953, 2006, \u7814\u7a76\u8207\u5206\u6790\u5efa\u69cb\u611f\u6e2c\u7db2\u8def\u62d3\u6a38\u4e4b\u7bc0\u9ede\u7d44\u5f62\u6210\u6cd5\u5247, 2006\u6578\u4f4d\u79d1\u6280\u8207\u5275\u65b0\u7ba1\u7406\u570b\u969b\u7814\u8a0e\u6703, 2006\/04\/01, \u53f0\u5317, pp.214-225. (NSC94-2213-E-224-002)<\/strong><\/li><li><strong>\u9ec3\u4eae\u7dad, \u738b\u6587\u6953, 2005, \u652f\u63f4\u5149\u50b3\u8f38\u7db2\u8def\u4e4b\u5149\u908a\u754c\u9598\u9053\u5354\u5b9a\u8def\u7531\u5668\u7814\u7a76\u8207\u8a2d\u8a08, 2005\u6c11\u751f\u96fb\u5b50\u66a8\u4fe1\u865f\u8655\u7406\u7814\u8a0e\u6703(\u8ad6\u6587\u96c6\u6458\u8981), 2005\/11\/17-18, \u96f2\u6797(\u6597\u516d), pp.65. (NSC93-2213-E224-022)<\/strong><\/li><li><strong>C.H. Yu and W.F. Wang, 2005, Congestion Detection in Distributed GMPLS-based Multiregion Networks, 2005\u6c11\u751f\u96fb\u5b50\u66a8\u4fe1\u865f\u8655\u7406\u7814\u8a0e\u6703(\u8ad6\u6587\u96c6\u6458\u8981), 2005\/11\/17-18, \u96f2\u6797(\u6597\u516d), pp.43. (NSC93-2213-E224-022)<\/strong><\/li><li><strong>C.C. Chiu and W.F. Wang, 2005, A New Standard of Metropolitan Area Networks: IEEE 802.17 Resilient Packet Ring Architecture, 2005\u6c11\u751f\u96fb\u5b50\u66a8\u4fe1\u865f\u8655\u7406\u7814\u8a0e\u6703(\u8ad6\u6587\u96c6\u6458\u8981), 2005\/11\/17-18, \u96f2\u6797(\u6597\u516d), pp.66. (NSC93-2213-E224-022)<\/strong><\/li><li><strong>\u9673\u6631\u744b, \u9673\u4f91\u8208, \u9673\u80b2\u5ef7, \u738b\u6587\u6953, 2005, \u61c9\u7528\u65bc\u7db2\u8def\u5bb6\u96fb\u4e4b\u5c0f\u578b\u5d4c\u5165\u5f0f\u5373\u6642\u4f5c\u696d\u7cfb\u7d71\u6a21\u7d44\u4e4b\u7814\u7a76\u8207\u8a2d\u8a08, 2005\u958b\u653e\u6e90\u78bc\u7814\u8a0e\u6703(ICOS2005)(\u8ad6\u6587\u96c6\u6458\u8981), 2005\/11\/10-12, \u53f0\u5317, pp.26. (NSC93-2218-E-224 -009)<\/strong><\/li><li><strong>W.F. Wang, J.Y. Wang, and J.J. Lee, 2005, Study on Enhanced Strategies for TCP\/IP Offload Engines, 2005 IEEE Int&#8217;l Conference on Parallel and Distributed Systems (ICPADS&#8217;05), vol.1, 2005\/07\/20-22, Fukuoka, pp.398-404. (NSC91-2213-E-224-016)<\/strong><\/li><li><strong>\u8a79\u4fe1\u5fd7, \u738b\u6587\u6953, 2004, Study on Migrating BGP to OBGP, 1st Applied Science and Technology Conference (ASTC) &#8212; Photonics and Communications, 2004\/12\/09-10, Kaohsiung. (NSC93-2213-E224-022)<\/strong><\/li><li><strong>\u90b1\u4fca\u8ae7, \u738b\u6587\u6953, 2004, A New Standard of Metropolitan Area Networks IEEE 802 17 Resilient Packet Ring Architecture, 1st Applied Science and Technology Conference (ASTC) &#8212; Photonics and Communications, 2004\/12\/09-10, Kaohsiung. (NSC93-2213-E224-022)<\/strong><\/li><li><strong>Wen-Fong Wang and Fong-Cheng Lee, 2004, The High Performance Switch Architectures, 1st Applied Science and Technology Conference (ASTC) &#8212; Photonics and Communications, 2004\/12\/09-10, Kaohsiung. (NSC93-2213-E224-022)<\/strong><\/li><li><strong>Po-Hung Shih and Wen-Fong Wang, 2004, Multi-Path Routing Protocol considering Dual Graph in Mobile Ad Hoc Networks, 1st Applied Science and Technology Conference (ASTC) &#8212; Photonics and Communications, 2004\/12\/09-10, Kaohsiung. (NSC93-2213-E224-022)<\/strong><\/li><li><strong>S.J. Jan and W.F. Wang, 2004, Routing Policy Models and Convergence Issue of BGP and OBGP, 2004\u6578\u4f4d\u751f\u6d3b\u8207\u7db2\u969b\u7db2\u8def\u79d1\u6280\u7814\u8a0e\u6703, 2004\/06\/24-26, \u53f0\u5357, pp.44. (NSC93-2213-E224-022)<\/strong><\/li><li><strong>F.C. Lee and W.F. Wang, 2004, Analysis of high performance shared buffer switches, 2004\u6578\u4f4d\u751f\u6d3b\u8207\u7db2\u969b\u7db2\u8def\u79d1\u6280\u7814\u8a0e\u6703, 2004\/06\/24-26, \u53f0\u5357, pp.90. (NSC93-2213-E224-022)<\/strong><\/li><li><strong>P.H. Shih and W.F. Wang, 2004, Power Saving Issues in Sensor Networks, 2004\u901a\u4fe1\u96fb\u5b50\u79d1\u6280\u8207\u61c9\u7528\u7814\u8a0e\u6703, 2004\/05\/28, \u9ad8\u96c4, pp.80. (NSC93-2213-E224-022)<\/strong><\/li><li><strong>W.F. Wang and L.Y. Ho, 2003, Investigation of Packet Buffering Structures in nodes of Resilient Packet Ring Networks, 2003 Int&#8217;l Symposium on Communications (ISCOM&#8217;03), 2003\/12\/10-12, Tao-Yuan(Chang Gung University), pp.173. (NSC91-2213-E-224-016)<\/strong><\/li><li><strong>W.F. Wang and J.J. Lee, 2003, Architecture Design of a Switching Chip inside Optical Ethernet Switches, 2003 IEEE Int&#8217;l Conference on Parallel Processing (ICPP&#8217;03), 2003\/10\/06-09, Kaohsiung, pp.338-344. (NSC91-2213-E-224-016)<\/strong><\/li><li><strong>\u8a31\u4fee\u8c6a, \u9673\u5929\u7965, \u9ec3\u91cd\u9054, \u738b\u6587\u6953, 2003, \u5168\u96d9\u5de5\u5149\u4e59\u592a\u7db2\u8def\u4ea4\u63db\u5668\u8a2d\u8a08\u8207\u88fd\u4f5c, 2003\u6578\u4f4d\u751f\u6d3b\u8207\u7db2\u969b\u7db2\u8def\u79d1\u6280\u7814\u8a0e\u6703, 2003\/09\/18-19, \u53f0\u5357\u5e02(\u6210\u529f\u5927\u5b78). (NSC91-2213-E-224-016)<\/strong><\/li><li><strong>W.C. Yang and W.F. Wang, 2003, Multi-layer Fault Management in IP-over-WDM Networks, 2003\u6578\u4f4d\u751f\u6d3b\u8207\u7db2\u969b\u7db2\u8def\u79d1\u6280\u7814\u8a0e\u6703, 2003\/09\/18-19, \u53f0\u5357\u5e02(\u6210\u529f\u5927\u5b78). (NSC91-2213-E-224-044)<\/strong><\/li><li><strong>S.A. In and W.F. Wang, 2003, Issues for Routing in the Optical Networks, 2003\u6578\u4f4d\u751f\u6d3b\u8207\u7db2\u969b\u7db2\u8def\u79d1\u6280\u7814\u8a0e\u6703, 2003\/09\/18-19, \u53f0\u5357\u5e02(\u6210\u529f\u5927\u5b78). (NSC91-2213-E-224-044)<\/strong><\/li><li><strong>\u674e\u4e16\u5091, \u738b\u6587\u6953, 2003, \u4f4e\u6210\u672c\u3001\u9ad8\u6548\u76ca\u4e4b10G\u4e59\u592a\u7db2\u8def\u4ea4\u63db\u5668\u8a2d\u8a08, 2003\u300c\u638c\u63e1\u5b78\u8853\u65b0\u9a45\u52e2\u3001\u63a5\u8ecc\u570b\u969b\u5316\u6559\u80b2\u300d\u7814\u8a0e\u6703, 2003\/06\/10, \u6843\u5712\u9f9c\u5c71(\u9298\u50b3\u5927\u5b78), pp.243-251.<\/strong><\/li><li><strong>W.F. Wang and J.J. Lee, 2002, An Efficient Switching Architecture Design for Optical Ethernet, 2002\u5168\u570b\u96fb\u4fe1\u7814\u8a0e\u6703, 2002\/12\/06-07, \u5357\u6295(\u57d4\u91cc). (NSC90-2218-E-224-030)<\/strong><\/li><li><strong>W.F. Wang and S.J. Lee, 2002, A Low Cost and High Efficient Switching Chip Design for 10 Gb\/s Ethernet, 2002 Taiwan-Japan Symposium on SQUID &amp; Communication Electronics, 2002\/11\/25-29, Changhua(Da-Yeh University), pp.105-108. (NSC90-2218-E-224-030)<\/strong><\/li><li><strong>W.S. Hwang, W.F. Wang , J.Y. Wang, and C.C. Li, 2001, A Carrier Preemption Access Control Protocol for Supporting IP Packets over WDM Ring Networks, ISCOM&#8217;2001, 2001\/11\/13-15, Tainan.<\/strong><\/li><li><strong>J .Y. Wang, W. S. Hwang, W. F. Wang, and Ce-Kuen Shieh, 1999, RESMRing: a reservation-based multi-channel optical slotted ring network, MECC and ISCE\u201999 Proc., Melaka, pp. 129-134.<\/strong><\/li><li><strong>J.Y. Wang, W. S. Hwang, W. F. Wang, and Ce-Kuen Shieh, 1999, CPMR: a carrier-preview protocol for multi-channel slotted ring network, ISCOM&#8217;99, 1999\/11\/07-10, Kaohsiung, pp.97-102.<\/strong><\/li><li><strong>W.F. Wang, and L.Y. Kung, 1995, A loss-free access control mechanism on high-speed buffer insertion rings, IEEE SICON\/ICIE Proceedings of the 1995 IEEE Singapore International Conference, 1995\/07\/03-05, Singapore, pp.242-245.<\/strong><\/li><li><strong>W.F. Wang and L.Y. Kung, 1995, A high-speed double loop network with buffer insertion access scheme for supporting multi-media communication services, IEEE SICON\/ICIE Proceedings of the 1995 IEEE Singapore International Conference, 1995\/07\/03-05, Singapore, pp.237-240.<\/strong><\/li><li><strong>C.S. Lu, W.F. Wang, et al., 1991, A formal approach to multi-party protocol conformance testing, 1991 International Symposium on Communications (ISCOM&#8217;91), 1991\/12\/01-03, Tainan, pp.381-385.<\/strong><\/li><li><strong>C.S. Lu, W.F. Wang, et al., 1991, The testing of OSI communication protocols and the establishing of testing center, 1991\u96fb\u4fe1\u79d1\u6280\u7814\u8a0e\u6703, 1991\/11\/21-22, \u53f0\u5317, pp.263-277.<\/strong><\/li><li><strong>C.S. Lu, W.F. Wang, et al., 1991, Multi-party conformance testing for OSI relay system, Proceedings of 13th International Telecommunication Symposium (ITS&#8217;91), 1991\/09\/01-03, Taipei, pp.151-156.<\/strong><\/li><li><strong>C.S. Lu and W.F. Wang, 1991, A formal approach to generate test cases from protocol specifications in Estelle, Program of 1991 R.O.C.-ROK Telecommunication Technology Symposium, 1991\/08\/01, \u53f0\u5317, pp.34-39.<\/strong><\/li><li><strong>C.S. Lu, W.F. Wang, 1991, Test generation method for communication protocols: a formal approach, Proceedings of 6th International Joint Workshop on Computer Communications, 1991\/07\/17-19, Fukuoka, pp.275-281.<\/strong><\/li><li><strong>C.S. Lu, W.F. Wang, et al., 1990, Study on a multi-peer protocol conformance test system, 1990\u96fb\u4fe1\u79d1\u6280\u7814\u8a0e\u6703, 1990\/12\/01-02, \u53f0\u5317\u5e02, pp.177-203.<\/strong><\/li><li><strong>W.F. Wang and L.Y. Kung, 1989, Extended Network Service in File and Directory, Singapore International Conference on Networks&#8217;89 (SICON&#8217;89), 1989\/07\/17-20, Singapore.<\/strong><\/li><li><strong>W.F. Wang and L.Y. Kung, 1989, Formal Specification of ISO file Transfer, Access and Management in Estelle,1989 Joint Technical Conference on Circuits\/Systems,Computers and Communications (JTC-CSCC\u201989), 1989\/06\/25-26, Hokkaido.<\/strong><\/li><\/ol>\n\n\n\n<ul><li><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u5b78\u8853\u671f\u520a\u8ad6\u6587(Journal) Wei-Chih Lien, Congo Tak-Shing Ching, Z &hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"parent":58,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/eb201wwf.site\/wordpress\/wp-json\/wp\/v2\/pages\/658"}],"collection":[{"href":"https:\/\/eb201wwf.site\/wordpress\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/eb201wwf.site\/wordpress\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/eb201wwf.site\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eb201wwf.site\/wordpress\/wp-json\/wp\/v2\/comments?post=658"}],"version-history":[{"count":3,"href":"https:\/\/eb201wwf.site\/wordpress\/wp-json\/wp\/v2\/pages\/658\/revisions"}],"predecessor-version":[{"id":661,"href":"https:\/\/eb201wwf.site\/wordpress\/wp-json\/wp\/v2\/pages\/658\/revisions\/661"}],"up":[{"embeddable":true,"href":"https:\/\/eb201wwf.site\/wordpress\/wp-json\/wp\/v2\/pages\/58"}],"wp:attachment":[{"href":"https:\/\/eb201wwf.site\/wordpress\/wp-json\/wp\/v2\/media?parent=658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}