Knowledge (XXG)

Hsinchun Chen

Source 📝

328:
assessment and evaluation research. DiabeticLink research includes information extraction, sentiment analysis, and social network analysis to be integrated into the DiabeticLink portal. SilverLink is being developed in the U.S., China, and Taiwan to support senior citizens living independently. SilverLink's capabilities include a home-health system that monitors fall detection, daily health status, and activity levels, and can alert caregivers in the event of anomalous situations. Chen also founded Caduceus Intelligence Corporation (CIC), a UA spinoff company working in the area of healthcare information systems. CIC lists web analytics, smart health, patient support, and knowledge discovery as its areas of expertise.
319:
studying cyber security, in exchange for government service. Students are recruited from across Arizona, including from military bases, community college, and tribal colleges. The program asserts a special emphasis on minority recruitment and retention. Program components are described as including student mentoring and development, independent study and research, internship and post-graduation placement assistance, and program assessment and evaluation. The program is aimed at helping to fill expected federal vacancies in cyber security and related positions over the next 5 years.
297:
enforcement agencies across the United States. COPLINK's functions have been described in numerous local, regional, and national sources including the New York Times, the Boston Globe, and the Denver Post. In 2003, COPLINK was named a finalist for the IACP/Motorola Webber Seavey Award: Quality in Law Enforcement. In July 2009, KCC merged with i2 Inc., a market leader in security analytics. In September 2011, the KCC/i2 firm was acquired by IBM for $ 500 million. In October 2017, IBM sold Coplink to Forensic Logic.
343:
open source and other data, such as network data, data from honeypots, hacker forums, phishing data, and security-related tweets, in numerous languages including English, Arabic, French, Russian, and more. The project is also intended to provide tools and support for social network analysis and data visualization. The project is intended to serve individuals working in "academia, government, and industry to share data, information, and expertise relevant to research in intelligence and security informatics."
363:, and received the IEEE Computer Society Technical Achievement Award in 2006 and the INFORMS Design Science Award in 2008. A paper for which he was co-author was given the MISQ Best Paper Award for 2010 ("Detecting Fake Websites: The Contribution of Statistical Learning Theory", by Ahmed Abbasi, Zhu Zhang, David Zimbra, Hsinchun Chen, and Jay F. Nunamaker Jr., published in volume 34, issue 3 of MIS Quarterly). Also in 2010, he was recognized as "Distinguished Alumnus" of the 315:
Criminology). The Hacker Web project aims to investigate questions regarding hacker behavior, markets, and community structure, among other things. The intended result is a computational framework including algorithms, software, and tools for access and use by other researchers to examine how cyber attacker groups form, develop, and spread their ideas. The project is funded through August 2016.
306:"Writeprint," aims to support authorship identification of online postings and other writings. The Dark Web project is supported by grants from the National Science Foundation and other federal agencies, and has been recognized in the national press including Science News, Wired Magazine, Discover Magazine, and the Toronto Star. 377:
recognized his accomplishments as a top scientist in its 2012 series, "Centennial Salute to Science". In March 2013 he was named the Thomas R. Brown Chair in Management and Technology at the UA, as well as the UA's 2013 Innovator of the Year. In May he was inducted as a University of Arizona Regents'
318:
Chen was also awarded $ 4.2M from NSF (with UA co-PIs Drs. Salim Hariri, Mark Patton, and Paulo Goes) for the AZSecure Cybersecurity Scholarship-for-Service program at The University of Arizona (NSF DUE #1303362). Project funds provide scholarships for undergraduate, graduate, and doctoral students
217:
In 2005, Chen was ranked #8 in publication productivity in Information Systems (CAIS 2005), #1 in Digital Library research (IP&M 2005), and #9 in a list of the "Top 32" most productive information systems researchers (EJIS 2007) in three bibliometric studies. In 2008, Chen was recognized as one
342:
As part of ongoing work in intelligence and security informatics, Chen was awarded over $ 1.4M from NSF for a three-year pilot demonstration project to make available data and analysis tools to serve information and cyber security researchers. The funds are to support the creation of an archive of
314:
Chen was awarded a grant of $ 1.2M from the National Science Foundation (NSF) for “Securing Cyber Space: Understanding the Cyber Attackers and Attacks via Social Media Analytics” (NSF SES #1314631). Co-PIs are Dr. Salim Hariri (UA; ECE); Dr. Ronald Breiger (UA; Sociology); and Dr. Tom Holt (MSU;
296:
In 1997, Chen began development of the COPLINK software, which supports information sharing, analysis, and visualization of law enforcement data. He founded Knowledge Computing Corporation (KCC) to commercialize COPLINK, which then entered the market in 2002 and is now used in thousands of law
174:
Chen's research primarily focuses on data/web/text mining and knowledge management techniques. He has applied his work in the fields of web computing, search engines, digital libraries, health informatics, security informatics, biomedical informatics and business intelligence. His most notable
327:
Chen has developed the "Smart Health" project in his Lab, which lists the following research objectives: (1) developing technical approaches to support cyber-enabled patient empowerment; (2) developing personalized healthcare and community mapping techniques; and (3) conducting theory-driven
305:
Chen is also the director of the Artificial Intelligence Lab's project, "Dark Web Terrorism Research," the goal of which is to develop and use automated tools to systematically collect and analyze terrorist content from the Internet. One software program developed as part of the project,
153:
and the Director and founder of the Artificial Intelligence Lab (AI Lab). He also served as lead program director of the Smart and Connected Health program at the National Science Foundation from 2014 to 2015. He received a B.S. degree from
371:. In 2011, he received the IEEE 2011 Research Achievement and Leadership Award in Intelligence and Security Informatics and was a finalist for the AZ Tech Council's Governor's Innovation of the Year Award. The 1106:
Chuang, Joshua; Maimoon, Lubaina; Yu, Shuo; Hongyi, Zhu; Nybroe, Casper; Hsiao, Owen; Li, Shu-Hsing; Lu, Hsinmin; Chen, Hsinchun (January 20, 2016). "SilverLink: Smart Home Health Monitoring for Senior Care".
1445: 1455: 1430: 221:
Chen has authored or edited more than 40 books and conference proceedings, 30 book chapters, 280 SCI journal articles, and 180 refereed conference articles. His books include: Dark Web (2012;
159: 288:
He spearheaded the development of the International Conference of Asian Digital Library (ICADL) and the IEEE International Conference on Intelligence and Security Informatics (ISI).
1460: 360: 209:
Chen has also served as a Scientific Counselor/Advisor to the United States National Library of Medicine (NLM), Academia Sinica in Taiwan, and the National Library of China.
808: 834: 1425: 1151: 1440: 1435: 1420: 1450: 1124: 282: 274: 266: 258: 250: 242: 234: 226: 218:
of the top-ranked authors in the Management Information Systems field. His "H-index" score from Google Scholar is 90 (as of December 2017).
1368: 1337: 762: 1374: 405:[Lecture by special professor Chen Hsinchun of the Faculty of Information Management]. National Taiwan University. 27 March 2018 383: 352: 337: 378:
Professor. He was elected as a China National 1000-Elite Chair Professor with the Tsinghua University in 2013. In 2015 he was named a
812: 1081: 900:"Award Abstract #0709338: CRI:CRD - Developing a Dark Web Collection and Infrastructure for Computational and Social Sciences" 1056: 364: 155: 87: 44: 101: 1465: 663: 600:
Chua, Alton; Yang, Christopher C.; et al. (2008). "The shift towards multi-disciplinarity in information science".
175:
contributions are in management information systems, digital libraries, health informatics, and security informatics.
1226:"NSF Award Search: Award#1443019 - CIF21 DIBBs: DIBBs for Intelligence and Security Informatics Research Community" 368: 424: 269:); Intelligence and Security Informatics for International Security: Information Sharing and Data Mining (2006; 921:"Award Abstract #0730908: EXP-LA: Explosives and IEDs in the Dark Web: Discovery, Categorization, and Analysis" 386:"for contributions to the research and development of security informatics and health informatics systems." 1415: 1155: 562: 451: 784: 150: 59: 1176: 527: 899: 860:"The Online Hunt for Terrorists: Researchers are using Web spiders to track down terrorists online" 163: 1130: 582: 543: 517: 373: 1378: 1317: 967:"Global Jihad Online: Terrorist Networks Are More Wired Than Ever (Section: START: Infoporn)". 940:
Rehmeyer, Julie (Jan 13, 1007). "Tiny Behavioral Differences Can Reveal Your Identity Online".
1344: 1120: 920: 278: 270: 262: 254: 246: 238: 230: 222: 1370:
ACM Fellows Named for Computing Innovations that Are Advancing Technology in the Digital Age
1202:"Data Infrastructure Buildings Blocks (DIBBs) for Intelligence + Security Informatics (ISI)" 1112: 1036: 949: 664:"National Dragnet Is a Click Away: Authorities to Gain Fast and Expansive Access to Records" 627:
Copenhaver, Larry (2002-10-23). "Tucson Cops, Local Software to Help in D.C. Sniper Probe".
609: 574: 535: 484: 402: 253:), Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security (2008, 1016: 455: 687: 531: 149:
is the Regents' Professor and Thomas R. Brown Chair of Management and Technology at the
859: 277:); and Medical Informatics: Knowledge Management and Data Mining in Biomedicine (2005; 1225: 1085: 261:), Digital Government: E-Government Research, Case Studies, and Implementation (2008; 1409: 1134: 563:"Analyzing IS Research Productivity: An Inclusive Approach to Global IS Scholarship" 182:(ACM TMIS), 2009–2014, and is also founding editor-in-chief of the Springer journal 586: 547: 119: 1060: 722:
Cook, Gareth; et al. (2004-07-24). "Software Helps Police Draw Crime Links".
578: 953: 1116: 738: 505: 473:"An Evaluation of Publication Productivity in Information Systems: 1999 to 2003" 763:"IACP/Motorola Webber Seavey Award: Quality in Law Enforcement: 2003 Abstracts" 539: 472: 39: 332:
Data Infrastructure Building Blocks for Intelligence and Security Informatics
1273: 883:
Rotstein, Arthur (2007-11-11). ""Dark Web" tool seeks online terrorists".
504:
Liu, Xiaoming; Bollen, J; Nelson, M; Vandesompel, H; et al. (2005).
489: 1297: 1201: 428: 613: 602:
Journal of the American Society for Information Science and Technology
199:
Journal of the American Society for Information Science and Technology
379: 1111:. Lecture Notes in Computer Science. Vol. 9545. pp. 3–14. 707:
Sink, Mindy (2002-11-03). "An Electronic Copy That Plays Hunches".
522: 427:. University of Arizona Artificial Intelligence Lab. Archived from 367:
in Taiwan and named a Distinguished University Chair Professor of
642: 506:"Co-authorship Networks in the Digital Library Research Community" 1338:"100 Days of Science: UA professor, TPD Advanced Crime Analysis" 1249: 356: 835:"IBM sells off police data-search software developed at the UA" 458: 449: 186:. He serves or has served on ten editorial boards including: 1180: 245:), Mapping Nanotechnology Innovations and Knowledge (2009; 1254:
AZSecure - Data for Intelligence and Security Informatics
477:
Communications of the Association for Information Systems
1400: 1446:
2015 fellows of the Association for Computing Machinery
292:
Development of COPLINK Software and Commercialization
124: 1456:
Fellows of the American Academy of Arts and Sciences
1431:
New York University Stern School of Business alumni
118: 100: 86: 81: 55: 50: 38: 33: 18: 196:IEEE Transactions on Systems, Man, and Cybernetics 180:ACM Transactions on Management Information Systems 162:and an M.S. and Ph.D. in Information Systems from 178:He was the founding Editor-in-Chief (EIC) of the 662:O'Harrow Jr., Robert; et al. (2008-03-06). 1250:"Data Science Testbed for Security Researchers" 1274:"Intelligence and Security Informatics (ISI)" 310:The "Hacker Web" Project and AZSecure Program 106: 92: 8: 1146: 1144: 809:"Hsinchun Chen's Tech Spinoff Bought by IBM" 1057:"AZSecure Cybersecurity Fellowship Program" 785:"i2 Inc. acquires Knowledge Computing Corp" 1461:Taiwanese expatriates in the United States 919:National Science Foundation (2007-07-18). 898:National Science Foundation (2007-08-07). 15: 1152:"Hsinchun Chen's Exciting Year - A Recap" 521: 488: 229:), Infectious Disease Informatics (2010; 1082:"Smart Health and DiabeticLink Research" 205:International Journal on Digital Library 567:European Journal of Information Systems 561:Gallivan, Michael; et al. (2007). 471:Huang, Hsieh-Hong; et al. (2005). 394: 193:ACM Transactions on Information Systems 1426:National Chiao Tung University alumni 739:"COPLINK helping catch more bad guys" 510:Information Processing and Management 7: 425:"AI Lab Director: Dr. Hsinchun Chen" 1375:Association for Computing Machinery 1298:"MISQ Paper of the Year Recipients" 384:Association for Computing Machinery 338:Data Infrastructure Building Blocks 1206:Artificial Intelligence Laboratory 14: 1441:Information systems researchers 737:Thornton, Susan (2008-03-06). 365:National Chiao Tung University 285:), all published by Springer. 156:National Chiao Tung University 125: 107: 93: 45:National Chiao Tung University 1: 1436:University of Arizona faculty 1421:Taiwanese computer scientists 1037:"NSF Award Abstract #1303362" 1017:"NSF Award Abstract #1314631" 858:Groc, Isabelle (2008-02-27). 783:Darcy, Darlene (2009-07-02). 579:10.1057/palgrave.ejis.3000667 237:), Sports Data Mining (2010; 1451:University at Buffalo alumni 986:"The Future of Terrorists". 954:10.1002/scin.2007.5591710210 459:http://ai.arizona.edu/hchen/ 1117:10.1007/978-3-319-29175-8_1 1001:"Trolling for Terrorists". 789:Washington Business Journal 1482: 369:National Taiwan University 335: 540:10.1016/j.ipm.2005.03.012 140: 136: 132: 114: 77: 73: 69: 65: 29: 25: 461:Retrieved June 22, 2010. 323:The Smart Health Project 202:Decision Support Systems 190:IEEE Intelligent Systems 88:Traditional Chinese 975:: 12. December 1, 2006. 688:"i2 Company Management" 158:in Taiwan, an MBA from 102:Simplified Chinese 1377:, 2015, archived from 1318:"Distinguished Alumni" 301:The "Dark Web" Project 151:University of Arizona 60:University of Arizona 1005:. September 8, 2006. 490:10.17705/1CAIS.01531 390:Notes and references 184:Security Informatics 1466:Fellows of the IEEE 643:"COPLINK: About Us" 532:2005cs........2056L 164:New York University 34:Academic background 839:Arizona Daily Star 454:2010-07-08 at the 374:Arizona Daily Star 351:He is a Fellow of 1126:978-3-319-29174-1 988:Discover Magazine 614:10.1002/asi.20929 608:(13): 2156–2170. 431:on 19 August 2016 283:978-0-387-24381-8 275:978-0-387-24379-5 267:978-0-387-71610-7 259:978-0-387-71612-1 251:978-0-387-71619-0 243:978-1-4419-6729-9 235:978-1-4419-1277-0 227:978-1-4614-1556-5 144: 143: 1473: 1389: 1388: 1387: 1386: 1365: 1359: 1358: 1356: 1355: 1349: 1343:. Archived from 1342: 1334: 1328: 1327: 1325: 1324: 1314: 1308: 1307: 1305: 1304: 1294: 1288: 1287: 1285: 1284: 1278:www.linkedin.com 1270: 1264: 1263: 1261: 1260: 1246: 1240: 1239: 1237: 1236: 1222: 1216: 1215: 1213: 1212: 1198: 1192: 1191: 1189: 1188: 1179:. Archived from 1177:"Caduceus Intel" 1173: 1167: 1166: 1164: 1163: 1154:. Archived from 1148: 1139: 1138: 1103: 1097: 1096: 1094: 1093: 1084:. Archived from 1078: 1072: 1071: 1069: 1068: 1059:. Archived from 1053: 1047: 1046: 1044: 1043: 1033: 1027: 1026: 1024: 1023: 1013: 1007: 1006: 998: 992: 991: 983: 977: 976: 964: 958: 957: 937: 931: 930: 928: 927: 916: 910: 909: 907: 906: 895: 889: 888: 880: 874: 873: 871: 870: 855: 849: 848: 846: 845: 833:Wichner, David. 830: 824: 823: 821: 820: 811:. Archived from 805: 799: 798: 796: 795: 780: 774: 773: 771: 770: 759: 753: 752: 750: 749: 734: 728: 727: 719: 713: 712: 704: 698: 697: 695: 694: 684: 678: 677: 675: 674: 659: 653: 652: 650: 649: 639: 633: 632: 624: 618: 617: 597: 591: 590: 558: 552: 551: 525: 516:(6): 1462–1480. 501: 495: 494: 492: 468: 462: 447: 441: 440: 438: 436: 421: 415: 414: 412: 410: 403:"資管系特聘教授陳炘鈞博士演講" 399: 128: 127: 110: 109: 96: 95: 16: 1481: 1480: 1476: 1475: 1474: 1472: 1471: 1470: 1406: 1405: 1397: 1392: 1384: 1382: 1367: 1366: 1362: 1353: 1351: 1347: 1340: 1336: 1335: 1331: 1322: 1320: 1316: 1315: 1311: 1302: 1300: 1296: 1295: 1291: 1282: 1280: 1272: 1271: 1267: 1258: 1256: 1248: 1247: 1243: 1234: 1232: 1224: 1223: 1219: 1210: 1208: 1200: 1199: 1195: 1186: 1184: 1175: 1174: 1170: 1161: 1159: 1150: 1149: 1142: 1127: 1105: 1104: 1100: 1091: 1089: 1080: 1079: 1075: 1066: 1064: 1055: 1054: 1050: 1041: 1039: 1035: 1034: 1030: 1021: 1019: 1015: 1014: 1010: 1000: 999: 995: 985: 984: 980: 966: 965: 961: 939: 938: 934: 925: 923: 918: 917: 913: 904: 902: 897: 896: 892: 882: 881: 877: 868: 866: 857: 856: 852: 843: 841: 832: 831: 827: 818: 816: 807: 806: 802: 793: 791: 782: 781: 777: 768: 766: 761: 760: 756: 747: 745: 736: 735: 731: 721: 720: 716: 706: 705: 701: 692: 690: 686: 685: 681: 672: 670: 668:Washington Post 661: 660: 656: 647: 645: 641: 640: 636: 626: 625: 621: 599: 598: 594: 560: 559: 555: 503: 502: 498: 470: 469: 465: 456:Wayback Machine 448: 444: 434: 432: 423: 422: 418: 408: 406: 401: 400: 396: 392: 349: 340: 334: 325: 312: 303: 294: 215: 172: 21: 12: 11: 5: 1479: 1477: 1469: 1468: 1463: 1458: 1453: 1448: 1443: 1438: 1433: 1428: 1423: 1418: 1408: 1407: 1404: 1403: 1401:AI Lab website 1396: 1395:External links 1393: 1391: 1390: 1360: 1329: 1309: 1289: 1265: 1241: 1217: 1193: 1168: 1140: 1125: 1098: 1073: 1048: 1028: 1008: 993: 978: 969:Wired Magazine 959: 932: 911: 890: 875: 850: 825: 800: 775: 754: 729: 714: 709:New York Times 699: 679: 654: 634: 629:Tucson Citizen 619: 592: 553: 496: 463: 442: 416: 393: 391: 388: 348: 345: 336:Main article: 333: 330: 324: 321: 311: 308: 302: 299: 293: 290: 214: 211: 207: 206: 203: 200: 197: 194: 191: 171: 168: 142: 141: 138: 137: 134: 133: 130: 129: 122: 116: 115: 112: 111: 104: 98: 97: 90: 84: 83: 79: 78: 75: 74: 71: 70: 67: 66: 63: 62: 57: 53: 52: 48: 47: 42: 36: 35: 31: 30: 27: 26: 23: 22: 19: 13: 10: 9: 6: 4: 3: 2: 1478: 1467: 1464: 1462: 1459: 1457: 1454: 1452: 1449: 1447: 1444: 1442: 1439: 1437: 1434: 1432: 1429: 1427: 1424: 1422: 1419: 1417: 1416:Living people 1414: 1413: 1411: 1402: 1399: 1398: 1394: 1381:on 2015-12-09 1380: 1376: 1372: 1371: 1364: 1361: 1350:on 2014-03-25 1346: 1339: 1333: 1330: 1319: 1313: 1310: 1299: 1293: 1290: 1279: 1275: 1269: 1266: 1255: 1251: 1245: 1242: 1231: 1227: 1221: 1218: 1207: 1203: 1197: 1194: 1183:on 2014-03-25 1182: 1178: 1172: 1169: 1158:on 2014-03-25 1157: 1153: 1147: 1145: 1141: 1136: 1132: 1128: 1122: 1118: 1114: 1110: 1102: 1099: 1088:on 2014-03-25 1087: 1083: 1077: 1074: 1063:on 2014-01-21 1062: 1058: 1052: 1049: 1038: 1032: 1029: 1018: 1012: 1009: 1004: 997: 994: 989: 982: 979: 974: 970: 963: 960: 955: 951: 947: 943: 936: 933: 922: 915: 912: 901: 894: 891: 886: 885:Business Week 879: 876: 865: 861: 854: 851: 840: 836: 829: 826: 815:on 2012-02-01 814: 810: 804: 801: 790: 786: 779: 776: 764: 758: 755: 744: 740: 733: 730: 725: 718: 715: 710: 703: 700: 689: 683: 680: 669: 665: 658: 655: 644: 638: 635: 630: 623: 620: 615: 611: 607: 603: 596: 593: 588: 584: 580: 576: 572: 568: 564: 557: 554: 549: 545: 541: 537: 533: 529: 524: 519: 515: 511: 507: 500: 497: 491: 486: 482: 478: 474: 467: 464: 460: 457: 453: 450: 446: 443: 430: 426: 420: 417: 404: 398: 395: 389: 387: 385: 381: 376: 375: 370: 366: 362: 358: 354: 346: 344: 339: 331: 329: 322: 320: 316: 309: 307: 300: 298: 291: 289: 286: 284: 280: 276: 272: 268: 264: 260: 256: 252: 248: 244: 240: 236: 232: 228: 224: 219: 212: 210: 204: 201: 198: 195: 192: 189: 188: 187: 185: 181: 176: 169: 167: 165: 161: 157: 152: 148: 147:Hsinchun Chen 139: 135: 131: 123: 121: 117: 113: 105: 103: 99: 91: 89: 85: 80: 76: 72: 68: 64: 61: 58: 54: 51:Academic work 49: 46: 43: 41: 37: 32: 28: 24: 20:Hsinchun Chen 17: 1383:, retrieved 1379:the original 1369: 1363: 1352:. Retrieved 1345:the original 1332: 1321:. Retrieved 1312: 1301:. Retrieved 1292: 1281:. Retrieved 1277: 1268: 1257:. Retrieved 1253: 1244: 1233:. Retrieved 1229: 1220: 1209:. Retrieved 1205: 1196: 1185:. Retrieved 1181:the original 1171: 1160:. Retrieved 1156:the original 1109:Smart Health 1108: 1101: 1090:. Retrieved 1086:the original 1076: 1065:. Retrieved 1061:the original 1051: 1040:. Retrieved 1031: 1020:. Retrieved 1011: 1003:Toronto Star 1002: 996: 990:. July 2006. 987: 981: 972: 968: 962: 945: 942:Science News 941: 935: 924:. Retrieved 914: 903:. Retrieved 893: 884: 878: 867:. Retrieved 863: 853: 842:. Retrieved 838: 828: 817:. Retrieved 813:the original 803: 792:. Retrieved 788: 778: 767:. Retrieved 757: 746:. Retrieved 742: 732: 724:Boston Globe 723: 717: 708: 702: 691:. Retrieved 682: 671:. Retrieved 667: 657: 646:. Retrieved 637: 628: 622: 605: 601: 595: 570: 566: 556: 513: 509: 499: 480: 476: 466: 445: 433:. Retrieved 429:the original 419: 407:. Retrieved 397: 372: 350: 341: 326: 317: 313: 304: 295: 287: 220: 216: 213:Productivity 208: 183: 179: 177: 173: 160:SUNY Buffalo 146: 145: 120:Hanyu Pinyin 82:Chinese name 56:Institutions 864:PC Magazine 743:Denver Post 126:Chén Xīnjūn 1410:Categories 1385:2015-12-09 1354:2012-08-17 1323:2014-03-24 1303:2012-03-16 1283:2016-06-21 1259:2016-06-21 1235:2016-06-21 1211:2016-06-21 1187:2014-01-17 1162:2014-01-17 1092:2014-01-17 1067:2014-01-17 1042:2014-01-17 1022:2014-01-14 926:2010-11-12 905:2010-11-12 869:2010-10-12 844:2017-12-27 819:2012-03-16 794:2010-10-11 769:2010-10-12 748:2010-10-11 693:2010-10-11 673:2010-10-11 648:2010-10-11 523:cs/0502056 40:Alma mater 573:: 36–53. 1135:17442817 948:(2): 2. 452:Archived 170:Research 1230:nsf.gov 587:1072246 548:2536130 528:Bibcode 435:19 July 382:of the 1133:  1123:  765:. 2003 585:  546:  409:29 May 380:fellow 347:Awards 281:  273:  265:  257:  249:  241:  233:  225:  1348:(PDF) 1341:(PDF) 1131:S2CID 583:S2CID 544:S2CID 518:arXiv 1121:ISBN 437:2016 411:2018 361:AAAS 359:and 357:IEEE 279:ISBN 271:ISBN 263:ISBN 255:ISBN 247:ISBN 239:ISBN 231:ISBN 223:ISBN 1113:doi 950:doi 946:171 610:doi 575:doi 536:doi 485:doi 353:ACM 108:陈炘钧 94:陳炘鈞 1412:: 1373:, 1276:. 1252:. 1228:. 1204:. 1143:^ 1129:. 1119:. 973:14 971:. 944:. 862:. 837:. 787:. 741:. 666:. 606:59 604:. 581:. 571:16 569:. 565:. 542:. 534:. 526:. 514:41 512:. 508:. 483:. 481:15 479:. 475:. 355:, 166:. 1357:. 1326:. 1306:. 1286:. 1262:. 1238:. 1214:. 1190:. 1165:. 1137:. 1115:: 1095:. 1070:. 1045:. 1025:. 956:. 952:: 929:. 908:. 887:. 872:. 847:. 822:. 797:. 772:. 751:. 726:. 711:. 696:. 676:. 651:. 631:. 616:. 612:: 589:. 577:: 550:. 538:: 530:: 520:: 493:. 487:: 439:. 413:.

Index

Alma mater
National Chiao Tung University
University of Arizona
Traditional Chinese
Simplified Chinese
Hanyu Pinyin
University of Arizona
National Chiao Tung University
SUNY Buffalo
New York University
ISBN
978-1-4614-1556-5
ISBN
978-1-4419-1277-0
ISBN
978-1-4419-6729-9
ISBN
978-0-387-71619-0
ISBN
978-0-387-71612-1
ISBN
978-0-387-71610-7
ISBN
978-0-387-24379-5
ISBN
978-0-387-24381-8
Data Infrastructure Building Blocks
ACM
IEEE
AAAS

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.