328:
assessment and evaluation research. DiabeticLink research includes information extraction, sentiment analysis, and social network analysis to be integrated into the
DiabeticLink portal. SilverLink is being developed in the U.S., China, and Taiwan to support senior citizens living independently. SilverLink's capabilities include a home-health system that monitors fall detection, daily health status, and activity levels, and can alert caregivers in the event of anomalous situations. Chen also founded Caduceus Intelligence Corporation (CIC), a UA spinoff company working in the area of healthcare information systems. CIC lists web analytics, smart health, patient support, and knowledge discovery as its areas of expertise.
319:
studying cyber security, in exchange for government service. Students are recruited from across
Arizona, including from military bases, community college, and tribal colleges. The program asserts a special emphasis on minority recruitment and retention. Program components are described as including student mentoring and development, independent study and research, internship and post-graduation placement assistance, and program assessment and evaluation. The program is aimed at helping to fill expected federal vacancies in cyber security and related positions over the next 5 years.
297:
enforcement agencies across the United States. COPLINK's functions have been described in numerous local, regional, and national sources including the New York Times, the Boston Globe, and the Denver Post. In 2003, COPLINK was named a finalist for the IACP/Motorola Webber Seavey Award: Quality in Law
Enforcement. In July 2009, KCC merged with i2 Inc., a market leader in security analytics. In September 2011, the KCC/i2 firm was acquired by IBM for $ 500 million. In October 2017, IBM sold Coplink to Forensic Logic.
343:
open source and other data, such as network data, data from honeypots, hacker forums, phishing data, and security-related tweets, in numerous languages including
English, Arabic, French, Russian, and more. The project is also intended to provide tools and support for social network analysis and data visualization. The project is intended to serve individuals working in "academia, government, and industry to share data, information, and expertise relevant to research in intelligence and security informatics."
363:, and received the IEEE Computer Society Technical Achievement Award in 2006 and the INFORMS Design Science Award in 2008. A paper for which he was co-author was given the MISQ Best Paper Award for 2010 ("Detecting Fake Websites: The Contribution of Statistical Learning Theory", by Ahmed Abbasi, Zhu Zhang, David Zimbra, Hsinchun Chen, and Jay F. Nunamaker Jr., published in volume 34, issue 3 of MIS Quarterly). Also in 2010, he was recognized as "Distinguished Alumnus" of the
315:
Criminology). The Hacker Web project aims to investigate questions regarding hacker behavior, markets, and community structure, among other things. The intended result is a computational framework including algorithms, software, and tools for access and use by other researchers to examine how cyber attacker groups form, develop, and spread their ideas. The project is funded through August 2016.
306:"Writeprint," aims to support authorship identification of online postings and other writings. The Dark Web project is supported by grants from the National Science Foundation and other federal agencies, and has been recognized in the national press including Science News, Wired Magazine, Discover Magazine, and the Toronto Star.
377:
recognized his accomplishments as a top scientist in its 2012 series, "Centennial Salute to
Science". In March 2013 he was named the Thomas R. Brown Chair in Management and Technology at the UA, as well as the UA's 2013 Innovator of the Year. In May he was inducted as a University of Arizona Regents'
318:
Chen was also awarded $ 4.2M from NSF (with UA co-PIs Drs. Salim Hariri, Mark Patton, and Paulo Goes) for the AZSecure
Cybersecurity Scholarship-for-Service program at The University of Arizona (NSF DUE #1303362). Project funds provide scholarships for undergraduate, graduate, and doctoral students
217:
In 2005, Chen was ranked #8 in publication productivity in
Information Systems (CAIS 2005), #1 in Digital Library research (IP&M 2005), and #9 in a list of the "Top 32" most productive information systems researchers (EJIS 2007) in three bibliometric studies. In 2008, Chen was recognized as one
342:
As part of ongoing work in intelligence and security informatics, Chen was awarded over $ 1.4M from NSF for a three-year pilot demonstration project to make available data and analysis tools to serve information and cyber security researchers. The funds are to support the creation of an archive of
314:
Chen was awarded a grant of $ 1.2M from the
National Science Foundation (NSF) for “Securing Cyber Space: Understanding the Cyber Attackers and Attacks via Social Media Analytics” (NSF SES #1314631). Co-PIs are Dr. Salim Hariri (UA; ECE); Dr. Ronald Breiger (UA; Sociology); and Dr. Tom Holt (MSU;
296:
In 1997, Chen began development of the COPLINK software, which supports information sharing, analysis, and visualization of law enforcement data. He founded
Knowledge Computing Corporation (KCC) to commercialize COPLINK, which then entered the market in 2002 and is now used in thousands of law
174:
Chen's research primarily focuses on data/web/text mining and knowledge management techniques. He has applied his work in the fields of web computing, search engines, digital libraries, health informatics, security informatics, biomedical informatics and business intelligence. His most notable
327:
Chen has developed the "Smart Health" project in his Lab, which lists the following research objectives: (1) developing technical approaches to support cyber-enabled patient empowerment; (2) developing personalized healthcare and community mapping techniques; and (3) conducting theory-driven
305:
Chen is also the director of the
Artificial Intelligence Lab's project, "Dark Web Terrorism Research," the goal of which is to develop and use automated tools to systematically collect and analyze terrorist content from the Internet. One software program developed as part of the project,
153:
and the Director and founder of the Artificial Intelligence Lab (AI Lab). He also served as lead program director of the Smart and Connected Health program at the National Science Foundation from 2014 to 2015. He received a B.S. degree from
371:. In 2011, he received the IEEE 2011 Research Achievement and Leadership Award in Intelligence and Security Informatics and was a finalist for the AZ Tech Council's Governor's Innovation of the Year Award. The
1106:
Chuang, Joshua; Maimoon, Lubaina; Yu, Shuo; Hongyi, Zhu; Nybroe, Casper; Hsiao, Owen; Li, Shu-Hsing; Lu, Hsinmin; Chen, Hsinchun (January 20, 2016). "SilverLink: Smart Home Health Monitoring for Senior Care".
1445:
1455:
1430:
221:
Chen has authored or edited more than 40 books and conference proceedings, 30 book chapters, 280 SCI journal articles, and 180 refereed conference articles. His books include: Dark Web (2012;
159:
288:
He spearheaded the development of the International Conference of Asian Digital Library (ICADL) and the IEEE International Conference on Intelligence and Security Informatics (ISI).
1460:
360:
209:
Chen has also served as a Scientific Counselor/Advisor to the United States National Library of Medicine (NLM), Academia Sinica in Taiwan, and the National Library of China.
808:
834:
1425:
1151:
1440:
1435:
1420:
1450:
1124:
282:
274:
266:
258:
250:
242:
234:
226:
218:
of the top-ranked authors in the Management Information Systems field. His "H-index" score from Google Scholar is 90 (as of December 2017).
1368:
1337:
762:
1374:
405:[Lecture by special professor Chen Hsinchun of the Faculty of Information Management]. National Taiwan University. 27 March 2018
383:
352:
337:
378:
Professor. He was elected as a China National 1000-Elite Chair Professor with the Tsinghua University in 2013. In 2015 he was named a
812:
1081:
900:"Award Abstract #0709338: CRI:CRD - Developing a Dark Web Collection and Infrastructure for Computational and Social Sciences"
1056:
364:
155:
87:
44:
101:
1465:
663:
600:
Chua, Alton; Yang, Christopher C.; et al. (2008). "The shift towards multi-disciplinarity in information science".
175:
contributions are in management information systems, digital libraries, health informatics, and security informatics.
1226:"NSF Award Search: Award#1443019 - CIF21 DIBBs: DIBBs for Intelligence and Security Informatics Research Community"
368:
424:
269:); Intelligence and Security Informatics for International Security: Information Sharing and Data Mining (2006;
921:"Award Abstract #0730908: EXP-LA: Explosives and IEDs in the Dark Web: Discovery, Categorization, and Analysis"
386:"for contributions to the research and development of security informatics and health informatics systems."
1415:
1155:
562:
451:
784:
150:
59:
1176:
527:
899:
860:"The Online Hunt for Terrorists: Researchers are using Web spiders to track down terrorists online"
163:
1130:
582:
543:
517:
373:
1378:
1317:
967:"Global Jihad Online: Terrorist Networks Are More Wired Than Ever (Section: START: Infoporn)".
940:
Rehmeyer, Julie (Jan 13, 1007). "Tiny Behavioral Differences Can Reveal Your Identity Online".
1344:
1120:
920:
278:
270:
262:
254:
246:
238:
230:
222:
1370:
ACM Fellows Named for Computing Innovations that Are Advancing Technology in the Digital Age
1202:"Data Infrastructure Buildings Blocks (DIBBs) for Intelligence + Security Informatics (ISI)"
1112:
1036:
949:
664:"National Dragnet Is a Click Away: Authorities to Gain Fast and Expansive Access to Records"
627:
Copenhaver, Larry (2002-10-23). "Tucson Cops, Local Software to Help in D.C. Sniper Probe".
609:
574:
535:
484:
402:
253:), Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security (2008,
1016:
455:
687:
531:
149:
is the Regents' Professor and Thomas R. Brown Chair of Management and Technology at the
859:
277:); and Medical Informatics: Knowledge Management and Data Mining in Biomedicine (2005;
1225:
1085:
261:), Digital Government: E-Government Research, Case Studies, and Implementation (2008;
1409:
1134:
563:"Analyzing IS Research Productivity: An Inclusive Approach to Global IS Scholarship"
182:(ACM TMIS), 2009–2014, and is also founding editor-in-chief of the Springer journal
586:
547:
119:
1060:
722:
Cook, Gareth; et al. (2004-07-24). "Software Helps Police Draw Crime Links".
578:
953:
1116:
738:
505:
473:"An Evaluation of Publication Productivity in Information Systems: 1999 to 2003"
763:"IACP/Motorola Webber Seavey Award: Quality in Law Enforcement: 2003 Abstracts"
539:
472:
39:
332:
Data Infrastructure Building Blocks for Intelligence and Security Informatics
1273:
883:
Rotstein, Arthur (2007-11-11). ""Dark Web" tool seeks online terrorists".
504:
Liu, Xiaoming; Bollen, J; Nelson, M; Vandesompel, H; et al. (2005).
489:
1297:
1201:
428:
613:
602:
Journal of the American Society for Information Science and Technology
199:
Journal of the American Society for Information Science and Technology
379:
1111:. Lecture Notes in Computer Science. Vol. 9545. pp. 3–14.
707:
Sink, Mindy (2002-11-03). "An Electronic Copy That Plays Hunches".
522:
427:. University of Arizona Artificial Intelligence Lab. Archived from
367:
in Taiwan and named a Distinguished University Chair Professor of
642:
506:"Co-authorship Networks in the Digital Library Research Community"
1338:"100 Days of Science: UA professor, TPD Advanced Crime Analysis"
1249:
356:
835:"IBM sells off police data-search software developed at the UA"
458:
449:
186:. He serves or has served on ten editorial boards including:
1180:
245:), Mapping Nanotechnology Innovations and Knowledge (2009;
1254:
AZSecure - Data for Intelligence and Security Informatics
477:
Communications of the Association for Information Systems
1400:
1446:
2015 fellows of the Association for Computing Machinery
292:
Development of COPLINK Software and Commercialization
124:
1456:
Fellows of the American Academy of Arts and Sciences
1431:
New York University Stern School of Business alumni
118:
100:
86:
81:
55:
50:
38:
33:
18:
196:IEEE Transactions on Systems, Man, and Cybernetics
180:ACM Transactions on Management Information Systems
162:and an M.S. and Ph.D. in Information Systems from
178:He was the founding Editor-in-Chief (EIC) of the
662:O'Harrow Jr., Robert; et al. (2008-03-06).
1250:"Data Science Testbed for Security Researchers"
1274:"Intelligence and Security Informatics (ISI)"
310:The "Hacker Web" Project and AZSecure Program
106:
92:
8:
1146:
1144:
809:"Hsinchun Chen's Tech Spinoff Bought by IBM"
1057:"AZSecure Cybersecurity Fellowship Program"
785:"i2 Inc. acquires Knowledge Computing Corp"
1461:Taiwanese expatriates in the United States
919:National Science Foundation (2007-07-18).
898:National Science Foundation (2007-08-07).
15:
1152:"Hsinchun Chen's Exciting Year - A Recap"
521:
488:
229:), Infectious Disease Informatics (2010;
1082:"Smart Health and DiabeticLink Research"
205:International Journal on Digital Library
567:European Journal of Information Systems
561:Gallivan, Michael; et al. (2007).
471:Huang, Hsieh-Hong; et al. (2005).
394:
193:ACM Transactions on Information Systems
1426:National Chiao Tung University alumni
739:"COPLINK helping catch more bad guys"
510:Information Processing and Management
7:
425:"AI Lab Director: Dr. Hsinchun Chen"
1375:Association for Computing Machinery
1298:"MISQ Paper of the Year Recipients"
384:Association for Computing Machinery
338:Data Infrastructure Building Blocks
1206:Artificial Intelligence Laboratory
14:
1441:Information systems researchers
737:Thornton, Susan (2008-03-06).
365:National Chiao Tung University
285:), all published by Springer.
156:National Chiao Tung University
125:
107:
93:
45:National Chiao Tung University
1:
1436:University of Arizona faculty
1421:Taiwanese computer scientists
1037:"NSF Award Abstract #1303362"
1017:"NSF Award Abstract #1314631"
858:Groc, Isabelle (2008-02-27).
783:Darcy, Darlene (2009-07-02).
579:10.1057/palgrave.ejis.3000667
237:), Sports Data Mining (2010;
1451:University at Buffalo alumni
986:"The Future of Terrorists".
954:10.1002/scin.2007.5591710210
459:http://ai.arizona.edu/hchen/
1117:10.1007/978-3-319-29175-8_1
1001:"Trolling for Terrorists".
789:Washington Business Journal
1482:
369:National Taiwan University
335:
540:10.1016/j.ipm.2005.03.012
140:
136:
132:
114:
77:
73:
69:
65:
29:
25:
461:Retrieved June 22, 2010.
323:The Smart Health Project
202:Decision Support Systems
190:IEEE Intelligent Systems
88:Traditional Chinese
975:: 12. December 1, 2006.
688:"i2 Company Management"
158:in Taiwan, an MBA from
102:Simplified Chinese
1377:, 2015, archived from
1318:"Distinguished Alumni"
301:The "Dark Web" Project
151:University of Arizona
60:University of Arizona
1005:. September 8, 2006.
490:10.17705/1CAIS.01531
390:Notes and references
184:Security Informatics
1466:Fellows of the IEEE
643:"COPLINK: About Us"
532:2005cs........2056L
164:New York University
34:Academic background
839:Arizona Daily Star
454:2010-07-08 at the
374:Arizona Daily Star
351:He is a Fellow of
1126:978-3-319-29174-1
988:Discover Magazine
614:10.1002/asi.20929
608:(13): 2156–2170.
431:on 19 August 2016
283:978-0-387-24381-8
275:978-0-387-24379-5
267:978-0-387-71610-7
259:978-0-387-71612-1
251:978-0-387-71619-0
243:978-1-4419-6729-9
235:978-1-4419-1277-0
227:978-1-4614-1556-5
144:
143:
1473:
1389:
1388:
1387:
1386:
1365:
1359:
1358:
1356:
1355:
1349:
1343:. Archived from
1342:
1334:
1328:
1327:
1325:
1324:
1314:
1308:
1307:
1305:
1304:
1294:
1288:
1287:
1285:
1284:
1278:www.linkedin.com
1270:
1264:
1263:
1261:
1260:
1246:
1240:
1239:
1237:
1236:
1222:
1216:
1215:
1213:
1212:
1198:
1192:
1191:
1189:
1188:
1179:. Archived from
1177:"Caduceus Intel"
1173:
1167:
1166:
1164:
1163:
1154:. Archived from
1148:
1139:
1138:
1103:
1097:
1096:
1094:
1093:
1084:. Archived from
1078:
1072:
1071:
1069:
1068:
1059:. Archived from
1053:
1047:
1046:
1044:
1043:
1033:
1027:
1026:
1024:
1023:
1013:
1007:
1006:
998:
992:
991:
983:
977:
976:
964:
958:
957:
937:
931:
930:
928:
927:
916:
910:
909:
907:
906:
895:
889:
888:
880:
874:
873:
871:
870:
855:
849:
848:
846:
845:
833:Wichner, David.
830:
824:
823:
821:
820:
811:. Archived from
805:
799:
798:
796:
795:
780:
774:
773:
771:
770:
759:
753:
752:
750:
749:
734:
728:
727:
719:
713:
712:
704:
698:
697:
695:
694:
684:
678:
677:
675:
674:
659:
653:
652:
650:
649:
639:
633:
632:
624:
618:
617:
597:
591:
590:
558:
552:
551:
525:
516:(6): 1462–1480.
501:
495:
494:
492:
468:
462:
447:
441:
440:
438:
436:
421:
415:
414:
412:
410:
403:"資管系特聘教授陳炘鈞博士演講"
399:
128:
127:
110:
109:
96:
95:
16:
1481:
1480:
1476:
1475:
1474:
1472:
1471:
1470:
1406:
1405:
1397:
1392:
1384:
1382:
1367:
1366:
1362:
1353:
1351:
1347:
1340:
1336:
1335:
1331:
1322:
1320:
1316:
1315:
1311:
1302:
1300:
1296:
1295:
1291:
1282:
1280:
1272:
1271:
1267:
1258:
1256:
1248:
1247:
1243:
1234:
1232:
1224:
1223:
1219:
1210:
1208:
1200:
1199:
1195:
1186:
1184:
1175:
1174:
1170:
1161:
1159:
1150:
1149:
1142:
1127:
1105:
1104:
1100:
1091:
1089:
1080:
1079:
1075:
1066:
1064:
1055:
1054:
1050:
1041:
1039:
1035:
1034:
1030:
1021:
1019:
1015:
1014:
1010:
1000:
999:
995:
985:
984:
980:
966:
965:
961:
939:
938:
934:
925:
923:
918:
917:
913:
904:
902:
897:
896:
892:
882:
881:
877:
868:
866:
857:
856:
852:
843:
841:
832:
831:
827:
818:
816:
807:
806:
802:
793:
791:
782:
781:
777:
768:
766:
761:
760:
756:
747:
745:
736:
735:
731:
721:
720:
716:
706:
705:
701:
692:
690:
686:
685:
681:
672:
670:
668:Washington Post
661:
660:
656:
647:
645:
641:
640:
636:
626:
625:
621:
599:
598:
594:
560:
559:
555:
503:
502:
498:
470:
469:
465:
456:Wayback Machine
448:
444:
434:
432:
423:
422:
418:
408:
406:
401:
400:
396:
392:
349:
340:
334:
325:
312:
303:
294:
215:
172:
21:
12:
11:
5:
1479:
1477:
1469:
1468:
1463:
1458:
1453:
1448:
1443:
1438:
1433:
1428:
1423:
1418:
1408:
1407:
1404:
1403:
1401:AI Lab website
1396:
1395:External links
1393:
1391:
1390:
1360:
1329:
1309:
1289:
1265:
1241:
1217:
1193:
1168:
1140:
1125:
1098:
1073:
1048:
1028:
1008:
993:
978:
969:Wired Magazine
959:
932:
911:
890:
875:
850:
825:
800:
775:
754:
729:
714:
709:New York Times
699:
679:
654:
634:
629:Tucson Citizen
619:
592:
553:
496:
463:
442:
416:
393:
391:
388:
348:
345:
336:Main article:
333:
330:
324:
321:
311:
308:
302:
299:
293:
290:
214:
211:
207:
206:
203:
200:
197:
194:
191:
171:
168:
142:
141:
138:
137:
134:
133:
130:
129:
122:
116:
115:
112:
111:
104:
98:
97:
90:
84:
83:
79:
78:
75:
74:
71:
70:
67:
66:
63:
62:
57:
53:
52:
48:
47:
42:
36:
35:
31:
30:
27:
26:
23:
22:
19:
13:
10:
9:
6:
4:
3:
2:
1478:
1467:
1464:
1462:
1459:
1457:
1454:
1452:
1449:
1447:
1444:
1442:
1439:
1437:
1434:
1432:
1429:
1427:
1424:
1422:
1419:
1417:
1416:Living people
1414:
1413:
1411:
1402:
1399:
1398:
1394:
1381:on 2015-12-09
1380:
1376:
1372:
1371:
1364:
1361:
1350:on 2014-03-25
1346:
1339:
1333:
1330:
1319:
1313:
1310:
1299:
1293:
1290:
1279:
1275:
1269:
1266:
1255:
1251:
1245:
1242:
1231:
1227:
1221:
1218:
1207:
1203:
1197:
1194:
1183:on 2014-03-25
1182:
1178:
1172:
1169:
1158:on 2014-03-25
1157:
1153:
1147:
1145:
1141:
1136:
1132:
1128:
1122:
1118:
1114:
1110:
1102:
1099:
1088:on 2014-03-25
1087:
1083:
1077:
1074:
1063:on 2014-01-21
1062:
1058:
1052:
1049:
1038:
1032:
1029:
1018:
1012:
1009:
1004:
997:
994:
989:
982:
979:
974:
970:
963:
960:
955:
951:
947:
943:
936:
933:
922:
915:
912:
901:
894:
891:
886:
885:Business Week
879:
876:
865:
861:
854:
851:
840:
836:
829:
826:
815:on 2012-02-01
814:
810:
804:
801:
790:
786:
779:
776:
764:
758:
755:
744:
740:
733:
730:
725:
718:
715:
710:
703:
700:
689:
683:
680:
669:
665:
658:
655:
644:
638:
635:
630:
623:
620:
615:
611:
607:
603:
596:
593:
588:
584:
580:
576:
572:
568:
564:
557:
554:
549:
545:
541:
537:
533:
529:
524:
519:
515:
511:
507:
500:
497:
491:
486:
482:
478:
474:
467:
464:
460:
457:
453:
450:
446:
443:
430:
426:
420:
417:
404:
398:
395:
389:
387:
385:
381:
376:
375:
370:
366:
362:
358:
354:
346:
344:
339:
331:
329:
322:
320:
316:
309:
307:
300:
298:
291:
289:
286:
284:
280:
276:
272:
268:
264:
260:
256:
252:
248:
244:
240:
236:
232:
228:
224:
219:
212:
210:
204:
201:
198:
195:
192:
189:
188:
187:
185:
181:
176:
169:
167:
165:
161:
157:
152:
148:
147:Hsinchun Chen
139:
135:
131:
123:
121:
117:
113:
105:
103:
99:
91:
89:
85:
80:
76:
72:
68:
64:
61:
58:
54:
51:Academic work
49:
46:
43:
41:
37:
32:
28:
24:
20:Hsinchun Chen
17:
1383:, retrieved
1379:the original
1369:
1363:
1352:. Retrieved
1345:the original
1332:
1321:. Retrieved
1312:
1301:. Retrieved
1292:
1281:. Retrieved
1277:
1268:
1257:. Retrieved
1253:
1244:
1233:. Retrieved
1229:
1220:
1209:. Retrieved
1205:
1196:
1185:. Retrieved
1181:the original
1171:
1160:. Retrieved
1156:the original
1109:Smart Health
1108:
1101:
1090:. Retrieved
1086:the original
1076:
1065:. Retrieved
1061:the original
1051:
1040:. Retrieved
1031:
1020:. Retrieved
1011:
1003:Toronto Star
1002:
996:
990:. July 2006.
987:
981:
972:
968:
962:
945:
942:Science News
941:
935:
924:. Retrieved
914:
903:. Retrieved
893:
884:
878:
867:. Retrieved
863:
853:
842:. Retrieved
838:
828:
817:. Retrieved
813:the original
803:
792:. Retrieved
788:
778:
767:. Retrieved
757:
746:. Retrieved
742:
732:
724:Boston Globe
723:
717:
708:
702:
691:. Retrieved
682:
671:. Retrieved
667:
657:
646:. Retrieved
637:
628:
622:
605:
601:
595:
570:
566:
556:
513:
509:
499:
480:
476:
466:
445:
433:. Retrieved
429:the original
419:
407:. Retrieved
397:
372:
350:
341:
326:
317:
313:
304:
295:
287:
220:
216:
213:Productivity
208:
183:
179:
177:
173:
160:SUNY Buffalo
146:
145:
120:Hanyu Pinyin
82:Chinese name
56:Institutions
864:PC Magazine
743:Denver Post
126:Chén Xīnjūn
1410:Categories
1385:2015-12-09
1354:2012-08-17
1323:2014-03-24
1303:2012-03-16
1283:2016-06-21
1259:2016-06-21
1235:2016-06-21
1211:2016-06-21
1187:2014-01-17
1162:2014-01-17
1092:2014-01-17
1067:2014-01-17
1042:2014-01-17
1022:2014-01-14
926:2010-11-12
905:2010-11-12
869:2010-10-12
844:2017-12-27
819:2012-03-16
794:2010-10-11
769:2010-10-12
748:2010-10-11
693:2010-10-11
673:2010-10-11
648:2010-10-11
523:cs/0502056
40:Alma mater
573:: 36–53.
1135:17442817
948:(2): 2.
452:Archived
170:Research
1230:nsf.gov
587:1072246
548:2536130
528:Bibcode
435:19 July
382:of the
1133:
1123:
765:. 2003
585:
546:
409:29 May
380:fellow
347:Awards
281:
273:
265:
257:
249:
241:
233:
225:
1348:(PDF)
1341:(PDF)
1131:S2CID
583:S2CID
544:S2CID
518:arXiv
1121:ISBN
437:2016
411:2018
361:AAAS
359:and
357:IEEE
279:ISBN
271:ISBN
263:ISBN
255:ISBN
247:ISBN
239:ISBN
231:ISBN
223:ISBN
1113:doi
950:doi
946:171
610:doi
575:doi
536:doi
485:doi
353:ACM
108:陈炘钧
94:陳炘鈞
1412::
1373:,
1276:.
1252:.
1228:.
1204:.
1143:^
1129:.
1119:.
973:14
971:.
944:.
862:.
837:.
787:.
741:.
666:.
606:59
604:.
581:.
571:16
569:.
565:.
542:.
534:.
526:.
514:41
512:.
508:.
483:.
481:15
479:.
475:.
355:,
166:.
1357:.
1326:.
1306:.
1286:.
1262:.
1238:.
1214:.
1190:.
1165:.
1137:.
1115::
1095:.
1070:.
1045:.
1025:.
956:.
952::
929:.
908:.
887:.
872:.
847:.
822:.
797:.
772:.
751:.
726:.
711:.
696:.
676:.
651:.
631:.
616:.
612::
589:.
577::
550:.
538::
530::
520::
493:.
487::
439:.
413:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.