default search action
Jin-Cherng Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2010
- [j5]Jin-Cherng Lin, Kuo-Chiang Wu:
Analyze on the Learning Behavior of E-Learning. J. Digit. Content Technol. its Appl. 4(5): 118-123 (2010)
2000 – 2009
- 2009
- [j4]Jin-Cherng Lin, Jan-Min Chen:
An Automated Mechanism for Secure Input Handling. J. Comput. 4(9): 837-844 (2009) - [c32]Jin-Cherng Lin, Jan-Min Chen, Chou-Chuan Chen, Yu-Shu Chien:
A Game Theoretic Approach to Decision and Analysis in Strategies of Attack and Defense. SSIRI 2009: 75-81 - 2008
- [c31]Jin-Cherng Lin, Chun-Lun Chou, Cheng-Hsiung Liu:
Performance Evaluation for Scheduling Algorithms in WiMAX Network. AINA Workshops 2008: 68-74 - [c30]Jin-Cherng Lin, Jan-Min Chen, Cheng-Hsiung Liu:
An Automatic Mechanism for Adjusting Validation Function. AINA Workshops 2008: 602-607 - [c29]Jin-Cherng Lin, Kuo-Chiang Wu:
Evaluation of software understandability based on fuzzy matrix. FUZZ-IEEE 2008: 887-892 - [c28]Jin-Cherng Lin, Jan-Min Chen, Cheng-Hsiung Liu:
An Automatic Mechanism for Sanitizing Malicious Injection. ICYCS 2008: 1470-1475 - [c27]Yucheng Kao, Jin-Cherng Lin, Shin-Chia Huang:
Fuzzy Clustering by Differential Evolution. ISDA (1) 2008: 246-250 - 2007
- [j3]Jin-Cherng Lin, Kuo-Chiang Wu:
Using Rough Set and Fuzzy Method to Discover the Effects of Acid Rain on the Plant Growth. J. Convergence Inf. Technol. 2(1): 40-48 (2007) - [c26]Jin-Cherng Lin, Jan-Min Chen:
The Automatic Defense Mechanism for Malicious Injection Attack. CIT 2007: 709-714 - [c25]Jin-Cherng Lin, Kuo-Chiang Wu:
Design of Embedded Software Based on Rough Set and Neural Network. FSKD (3) 2007: 141-145 - [c24]Jin-Cherng Lin, Kuo-Chiang Wu:
Finding a Fitting Learning Path in E-learning for Juvenile. ICALT 2007: 449-453 - [c23]Jin-Cherng Lin, Jan-Min Chen, Hsing-Kuo Wong:
An Automatic Meta-revised Mechanism for Anti-malicious Injection. NBiS 2007: 98-107 - [c22]Jin-Cherng Lin, Yung-Hsin Li, Cheng-Hsiung Liu:
Building Time Series Forecasting Model By Independent Component Analysis Mechanism. World Congress on Engineering 2007: 1010-1015 - 2006
- [c21]Jin-Cherng Lin, Yu-Hsin Kao, Chen-Wei Yang:
Secure Enhanced Wireless Transfer Protocol. ARES 2006: 536-543 - [c20]Jin-Cherng Lin, Jan-Min Chen:
An Automatic Revised Tool for Anti-Malicious Injection. CIT 2006: 164 - [c19]Jin-Cherng Lin, Kuo-Chiang Wu:
A Model for Measuring Software Understandability. CIT 2006: 192 - [c18]Jin-Cherng Lin, Kuo-Chiang Wu:
Predication of Software Reliability Based on Grey System. CIT 2006: 193 - [c17]Jin-Cherng Lin, Kuo-Chiang Wu:
Digging High Risk Defects Out in Software Engineering. Intelligent Information Processing 2006: 549-554 - [c16]Jin-Cherng Lin, Kuo-Chiang Wu:
Fuzzy Control Chart for Software Defect Management. IMECS 2006: 86-91 - [c15]Jin-Cherng Lin, Kuo-Chiang Wu:
A Defect Indicator for Software Quality Assurance. IMECS 2006: 850-855 - [c14]Jin-Cherng Lin, Yu-Hsin Kao:
Burglarproof WEP Protocol on Wireless Infrastructure. PACIS 2006: 9 - 2005
- [c13]Jin-Cherng Lin, Yun-Liang Huang, Cheng-Hsiung Liu:
Testability Analysis for Polymorphism. Automation, Control, and Information Technology 2005: 98-103 - 2003
- [c12]Jin-Cherng Lin, Ching-Tien Chang, Wei-Tao Chung:
Design, Implementation and Performance Evaluation of IP-VPN. AINA 2003: 206-210 - 2002
- [c11]Jin-Cherng Lin, Szu-Wen Lin:
An Analytic Software Testability Model. Asian Test Symposium 2002: 278-283 - [c10]Jin-Cherng Lin, Ling-Hsuan Huang:
A Table Reduction Approach for Software Structure Testing. ICSM 2002: 414-421 - 2001
- [j2]Jin-Cherng Lin, Pu-Lin Yeh:
Automatic test data generation for path testing using GAs. Inf. Sci. 131(1-4): 47-64 (2001) - 2000
- [c9]Jin-Cherng Lin, Pu-Lin Yeh:
Using genetic algorithms for test case generation in path testing. Asian Test Symposium 2000: 241- - [c8]Jin-Cherng Lin, Ian Ho:
A New Framework for Testing Real-Time Software. COMPSAC 2000: 337-342 - [c7]Jin-Cherng Lin, Ian Ho:
A New Perspective on Formal Testing Method for Real-Time Software. EUROMICRO 2000: 2270-2276
1990 – 1999
- 1999
- [c6]Ian Ho, Jin-Cherng Lin:
Generating Test Cases for Real-Time Software by Time Petri Nets Model. Asian Test Symposium 1999: 295-300 - [c5]Pu-Lin Yeh, Jin-Cherng Lin:
Toward Precise Measurements Using Software Normalization. ICSE 1999: 736-737 - 1998
- [c4]Pu-Lin Yeh, Jin-Cherng Lin:
Software Testability Measurements Derived from Data Flow Analysis. CSMR 1998: 96-103 - [c3]Ian Ho, Jin-Cherng Lin:
A Method of Test Cases Generation for Real-Time Systems. ISORC 1998: 249- - 1997
- [c2]Jin-Cherng Lin, Szu-Wen Lin, Louis Huang:
An Approach to Software Testability Measurement. APSEC 1997: 515-516 - 1994
- [j1]Jin-Cherng Lin:
Optimal Task Assignment with Precedence in Distributed Computing Systems. Inf. Sci. 78(1-2): 1-18 (1994)
1980 – 1989
- 1989
- [c1]Jin-Cherng Lin, Chyan-Goei Chung:
Zero-one integer programming model in path selection problem of structural testing. COMPSAC 1989: 618-627
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint