default search action
Dan Chia-Tien Lo
Person information
- affiliation: Kennesaw State University, Marietta, GA, USA
- affiliation (former): Southern Polytechnic State University, Marietta, GA, USA
- affiliation (2002 - 2008): University of Texas-San Antonio, TX, USA
- affiliation (PhD 2001): Illinois Institute of Technology, Chicago, IL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j19]Bobin Deng, Bhargava Nadendla, Kun Suo, Chloe Yixin Xie, Dan Chia-Tien Lo:
Fixed-point Encoding and Architecture Exploration for Residue Number Systems. ACM Trans. Archit. Code Optim. 21(3): 53:1-53:27 (2024) - 2017
- [j18]Liang Hong, Wei Chen, Sachin Shetty, Dan Chia-Tien Lo, Reginald Cooper:
Strong Security Approach with Compromised Nodes Detection in Cognitive Radio Sensor Networks. Int. J. Netw. Comput. 7(1): 50-68 (2017) - 2013
- [j17]Yi-Gang Tai, Chia-Tien Dan Lo, Kleanthis Psarris:
Scalable matrix decompositions with multiple cores on FPGAs. Microprocess. Microsystems 37(8-B): 887-898 (2013) - [j16]Luna Mingyi Zhang, Keqin Li, Dan Chia-Tien Lo, Yanqing Zhang:
Energy-efficient task scheduling algorithms on heterogeneous computers with continuous and discrete speeds. Sustain. Comput. Informatics Syst. 3(2): 109-118 (2013) - 2012
- [j15]Yi-Gang Tai, Chia-Tien Dan Lo, Kleanthis Psarris:
Accelerating Matrix Operations with Improved Deeply Pipelined Vector Reduction. IEEE Trans. Parallel Distributed Syst. 23(2): 202-210 (2012) - 2009
- [j14]Wen-Jyi Hwang, Huang-Chun Roan, Ying-Nan Shih, Chia-Tien Dan Lo, Chien-Min Ou:
FPGA-based ROM-free network intrusion detection using shift-OR circuit. J. Embed. Comput. 3(2): 99-107 (2009) - [j13]Chia-Tien Dan Lo, Yi-Gang Tai:
Space Optimization on Counters for FPGA-Based Perl Compatible Regular Expressions. ACM Trans. Reconfigurable Technol. Syst. 2(4): 23:1-23:18 (2009) - 2008
- [j12]Huang-Chun Roan, Wen-Jyi Hwang, Wei-Jhih Huang, Chia-Tien Dan Lo:
Network Intrusion Detection Based on Shift-OR Circuit. J. Inf. Sci. Eng. 24(4): 1229-1239 (2008) - 2007
- [j11]J. Morris Chang, C. Dan Lo:
FPGA-based reconfigurable computing II. Microprocess. Microsystems 31(2) (2007) - [j10]Chia-Tien Dan Lo, J. Morris Chang:
FPGA-based reconfigurable computing III. Microprocess. Microsystems 31(8): 475-476 (2007) - 2006
- [j9]J. Morris Chang, C. Dan Lo:
FPGA-based reconfigurable computing. Microprocess. Microsystems 30(6): 281-282 (2006) - 2004
- [j8]Chia-Tien Dan Lo, Witawas Srisa-an, J. Morris Chang:
The design and analysis of a quantitative simulator for dynamic memory management. J. Syst. Softw. 72(3): 443-453 (2004) - 2003
- [j7]Witawas Srisa-an, Chia-Tien Dan Lo, J. Morris Chang:
Active Memory Processor: A Hardware Garbage Collector for Real-Time Java Embedded Devices. IEEE Trans. Mob. Comput. 2(2): 89-101 (2003) - 2002
- [j6]J. Morris Chang, Witawas Srisa-an, Chia-Tien Dan Lo, Edward F. Gehringer:
DMMX: Dynamic memory management extensions. J. Syst. Softw. 63(3): 187-199 (2002) - [j5]Witawas Srisa-an, Chia-Tien Dan Lo, J. Morris Chang:
Object resizing and reclamation through the use of hardware bit-maps. Microprocess. Microsystems 25(9-10): 459-467 (2002) - [j4]Witawas Srisa-an, Chia-Tien Dan Lo, J. Morris Chang:
A performance perspective on the Active Memory System. Microprocess. Microsystems 26(9-10): 421-432 (2002) - 2001
- [j3]Chia-Tien Dan Lo, Witawas Srisa-an, J. Morris Chang:
A study of page replacement performance in garbage collection heap. J. Syst. Softw. 58(3): 235-245 (2001) - 2000
- [j2]Witawas Srisa-an, Chia-Tien Dan Lo, J. Morris Chang:
A hardware implementation of realloc function. Integr. 28(2): 173-184 (2000) - 1999
- [j1]Farn Wang, Chia-Tien Dan Lo:
Procedure-Level Verification of Real-time Concurrent Systems. Real Time Syst. 16(1): 81-114 (1999)
Conference and Workshop Papers
- 2024
- [c111]Nobel Dhar, Bobin Deng, Dan C. Lo, Xiaofeng Wu, Liang Zhao, Kun Suo:
An Empirical Analysis and Resource Footprint Study of Deploying Large Language Models on Edge Devices. ACM Southeast Regional Conference 2024: 69-76 - [c110]Kiran Mai Narnavaram, Dan C. Lo:
An Open-Source Chatbot by Using ParlAI. ACM Southeast Regional Conference 2024: 323-324 - 2023
- [c109]Tarun Potluri, Yong Shi, Hossain Shahriar, Dan Chia-Tien Lo, Reza M. Parizi, Hongmei Chi, Kai Qian:
Secure Software Development in Google Colab. AIIoT 2023: 398-402 - [c108]Dhanunjai Bandi, Yong Shi, Hossain Shahriar, Dan C. Lo, Kun Suo, Hongmei Chi, Kai Qian:
Quantum Machine Learning for Security Data Analysis. AIIoT 2023: 460-465 - [c107]Joshua Priest, Cameron Cooper, Savvy Lovell, Yong Shi, Dan Lo:
Design and Implementation of an ERC-20 Smart Contract on the Ethereum Blockchain. IEEE Big Data 2023: 2334-2338 - [c106]Dan Chia-Tien Lo, Bobin Deng, Yong Shi:
Deep Machine Learning on Segmenting and Classifying Crop Images Taken by Unmanned Aerial Vehicle. IEEE Big Data 2023: 3470-3478 - [c105]Yong Shi, Nazmus Sakib, Hossain Shahriar, Dan Lo, Hongmei Chi, Kai Qian:
AI-Assisted Security: A Step towards Reimagining Software Development for a Safer Future. COMPSAC 2023: 991-992 - [c104]Mst. Shapna Akter, Hossain Shahriar, Dan Lo, Nazmus Sakib, Kai Qian, Michael E. Whitman, Fan Wu:
Authentic Learning Approach for Artificial Intelligence Systems Security and Privacy. COMPSAC 2023: 1010-1012 - [c103]Eric Cooper, Eric Weese, Alex Fortson, Dan Lo, Yong Shi:
Cyber Security in Blockchain. DSC 2023: 1-11 - [c102]Muna Jemal, Dan Chia-Tien Lo:
Detection of Ransomware Attack Using Deep Learning. DSC 2023: 1-9 - [c101]Bobin Deng, Xinyue Zhang, Dan Chia-Tien Lo:
Serverless-DFS: Serverless Federated Learning with Dynamic Forest Strategy. ICNCC 2023: 168-174 - [c100]Dan C. Lo, Hossain Shahriar, Kai Qian, Michael E. Whitman, Fan Wu, Cassandra Thomas:
Authentic Learning on Machine Learning for Cybersecurity. SIGCSE (2) 2023: 1299 - [c99]Yong Shi, Hossain Shahriar, Dan C. Lo, Kai Qian, Hongmei Chi:
Collaborative and Active Learning with Portable Online Hands-on Labware for Blockchain Development. SIGCSE (2) 2023: 1307 - 2022
- [c98]Md. Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Michael E. Whitman, Alfredo Cuzzocrea, Fan Wu, Victor Clincy:
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware: Neural Network Algorithms for Network Denial of Service (DOS) Detection. IEEE Big Data 2022: 5715-5720 - [c97]Mohammad Masum, Md. Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan:
Ransomware Classification and Detection With Machine Learning Algorithms. CCWC 2022: 316-322 - [c96]Chunlan Gao, Yanqing Zhang, Dan Lo, Yong Shi, Jian Huang:
Improving the Machine Learning Prediction Accuracy with Clustering Discretization. CCWC 2022: 513-517 - [c95]Chulan Gao, Hossain Shahriar, Dan Lo, Yong Shi, Kai Qian:
Improving the Prediction Accuracy with Feature Selection for Ransomware Detection. COMPSAC 2022: 424-425 - [c94]Dan Chia-Tien Lo, Kai Qian, Yong Shi, Hossain Shahriar, Chung Ng:
Broaden Multidisciplinary Data Science Research by an Innovative Cyberinfrastructure Platform. COMPSAC 2022: 428-429 - [c93]Md. Jobair Hossain Faruk, Mohammad Masum, Hossain Shahriar, Kai Qian, Dan Lo:
Authentic Learning of Machine Learning to Ransomware Detection and Prevention. COMPSAC 2022: 442-443 - [c92]Mohammad Masum, Hossain Shahriar, Nazmus Sakib, Maria Valero, Kai Qian, Dan Lo, Fan Wu, Mohammed Karim, Parth Bhavsar, Jidong Yang:
Scalable Machine Learning Using PySpark. COMPSAC 2022: 454-455 - [c91]Dan Chia-Tien Lo, Hossain Shahriar, Kai Qian, Michael E. Whitman, Fan Wu, Cassandra Thomas:
Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware. SIGCSE (2) 2022: 1153 - [c90]Dan Chia-Tien Lo, Brian Robert Lawler:
Enhance Capacity to Foster Secondary Computer Science Teachers in Multiple Pathways. SIGCSE (2) 2022: 1157 - 2021
- [c89]Dan Chia-Tien Lo, Brian Robert Lawler:
A study on students' views toward K-12 computer science teaching career. ACM Southeast Conference 2021: 190-193 - [c88]Dan C. Lo, Hossain Shahriar, Kai Qian, Michael E. Whitman, Fan Wu:
Colab Cloud Based Portable and Shareable Hands-on Labware for Machine Learning to Cybersecurity. IEEE BigData 2021: 3311-3315 - [c87]Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha, Shahriar Sobhan, Md Abdullah Khan, Michael E. Whitman, Alfredo Cuzzocrea, Dan C. Lo, Akond Rahman, Fan Wu:
Malware Detection and Prevention using Artificial Intelligence Techniques. IEEE BigData 2021: 5369-5377 - 2020
- [c86]Nusrat Asrafi, Dan Chia-Tien Lo, Reza M. Parizi, Yong Shi, Yu-Wen Chen:
Comparing Performance of Malware Classification on Automated Stacking. ACM Southeast Regional Conference 2020: 307-308 - [c85]Karl Kevin Tiba Fossoh, Dan Lo:
Graphical Representation of Text Semantics. ACM Southeast Regional Conference 2020: 318-319 - [c84]Ava Podrazhansky, Rebekah Roepke, Jennifer Nguyen, Dan Lo:
Utilizing Computer Vision, Clustering and Neural Networks for Melanoma Categorization. ACM Southeast Regional Conference 2020: 322-323 - [c83]Songqiao Yu, Dan Lo:
Disinformation Detection using Passive Aggressive Algorithms. ACM Southeast Regional Conference 2020: 324-325 - [c82]Zhuolin Li, Hao Zhang, Hossain Shahriar, Dan Lo, Kai Qian, Michael E. Whitman, Fan Wu:
Denial of Service (DoS) Attack Detection: Performance Comparison of Supervised Machine Learning Algorithms. DASC/PiCom/CBDCom/CyberSciTech 2020: 469-474 - [c81]Hossain Shahriar, Michael E. Whitman, Dan Lo, Fan Wu, Cassandra Thomas:
Case Study-based Portable Hands-on Labware for Machine Learning in Cybersecurity. SIGCSE 2020: 1273 - [c80]Dan C. Lo, Kai Qian, Hossain Shahriar, Fan Wu, Johng-Chern Chern, Pascal Paschos, Chung Ng:
Information Assurance and Security Education on Undergraduate Computing Degree Programs. SIGCSE 2020: 1274 - [c79]Dan Chia-Tien Lo, Ruth Bearden, Deepa Muralidhar, Hossain Shahriar, Wei Chen, Pascal Paschos, Chung Ng:
A Hands-On Lab for Macro Malware Detection using Machine Learning on Virtual Machines. SIGCSE 2020: 1275 - 2019
- [c78]Dan Chia-Tien Lo, Charles Garnder, Pascal Paschos, Chung Ng:
Subject-Oriented Data Retrieval and Analysis on Sina Weibo. IEEE BigData 2019: 4431-4434 - [c77]Hossain Shahriar, Michael E. Whitman, Dan Chia-Tien Lo, Fan Wu, Cassandra Thomas, Alfredo Cuzzocrea:
Experiential Learning: Case Study-Based Portable Hands-on Regression Labware for Cyber Fraud Prediction. IEEE BigData 2019: 5814-5818 - [c76]Zhengwu Sun, Dan Chia-Tien Lo, Yong Shi:
Big Data Analysis on Social Networking. IEEE BigData 2019: 6220-6222 - [c75]Dan Lo, Karl Kevin Tiba, Sergiu Buciumas, Frank Ziller:
An Emperical Study on Application of Big Data Analytics to Automate Service Desk Business Process. COMPSAC (2) 2019: 670-675 - [c74]Hao Zhang, Zhuolin Li, Hossain Shahriar, Dan Lo, Fan Wu, Ying Qian:
Protecting Data in Android External Data Storage. COMPSAC (1) 2019: 924-925 - 2018
- [c73]Xianyong Meng, Kai Qian, Dan Chia-Tien Lo, Hossain Shahriar, Md Arabin Islam Talukder, Prabir Bhattacharya:
Secure Mobile IPC Software Development with Vulnerability Detectors in Android Studio. COMPSAC (1) 2018: 829-830 - [c72]Kai Qian, Reza M. Parizi, Dan Chia-Tien Lo:
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development. DSC 2018: 1-2 - [c71]Kai Qian, Dan Chia-Tien Lo, Reza M. Parizi, Fan Wu, Emmanuel Agu, Bei-Tseng Chu:
Authentic Learning Secure Software Development (SSD) in Computing Education. FIE 2018: 1-9 - [c70]Xianyong Meng, Kai Qian, Dan Chia-Tien Lo, Prabir Bhattacharya:
Detectors for Intent ICC Security Vulnerability with Android IDE. ICUFN 2018: 355-357 - [c69]Xianyong Meng, Kai Qian, Dan Chia-Tien Lo, Prabir Bhattacharya, Fan Wu:
Secure Mobile Software Development with Vulnerability Detectors in Static Code Analysis. ISNCC 2018: 1-4 - [c68]Hossain Shahriar, Kai Qian, Md Arabin Islam Talukder, Dan Chia-Tien Lo, Nidhibahen Patel:
Mobile Software Security with Dynamic Analysis. PRDC 2018: 223-224 - 2017
- [c67]Joel Kamdem Teto, Ruth Bearden, Dan Chia-Tien Lo:
The Impact of Defensive Programming on I/O Cybersecurity Attacks. ACM Southeast Regional Conference 2017: 102-111 - [c66]Michael Kranzlein, Dan Chia-Tien Lo:
Training on the poles for review sentiment polarity classification. IEEE BigData 2017: 3934-3937 - [c65]Ruth Bearden, Dan Chia-Tien Lo:
Automated microsoft office macro malware detection using machine learning. IEEE BigData 2017: 4448-4452 - [c64]Jhu-Sin Luo, Dan Chia-Tien Lo:
Binary malware image classification using machine learning with local binary pattern. IEEE BigData 2017: 4664-4667 - [c63]Kai Qian, Dan Chia-Tien Lo, Hossain Shahriar, Lei Li, Fan Wu, Prabir Bhattacharya:
Learning database security with hands-on mobile labs. FIE 2017: 1-6 - 2016
- [c62]Carlos Cepeda, Dan Chia-Tien Lo, Pablo Ordóñez:
Feature Selection and Improving Classification Performance for Malware Detection. BDCloud-SocialCom-SustainCom 2016: 560-566 - [c61]Chia-Tien Dan Lo, Pablo Ordóñez, Carlos Cepeda Mora:
Towards an effective and efficient malware detection system. IEEE BigData 2016: 3648-3655 - [c60]Tianda Yang, Kai Qian, Dan Chia-Tien Lo, Ying Xie, Yong Shi, Lixin Tao:
Improve the Prediction Accuracy of Naïve Bayes Classifier with Association Rule Mining. BigDataSecurity/HPSC/IDS 2016: 129-133 - [c59]Yong Shi, Dan Chia-Tien Lo, Kai Qian:
Teaching Secure Cloud Computing Concepts with Open Source CloudSim Environment. COMPSAC Workshops 2016: 247-252 - [c58]Dan Chia-Tien Lo, Kai Qian, Wei Chen:
Hardware Attacks and Security Education. COMPSAC Workshops 2016: 253-257 - [c57]Christopher Francis-Christie, Dan Lo:
A Combination of Active and Passive Video Steganalysis to Fight Sensitive Data Exfiltration through Online Video. COMPSAC Workshops 2016: 371-376 - [c56]Jing He, Dan Chia-Tien Lo, Ying Xie, Jonathan W. Lartigue:
Integrating Internet of Things (IoT) into STEM undergraduate education: Case study of a modern technology infused courseware for embedded system course. FIE 2016: 1-9 - [c55]Wei Chen, Liang Hong, Sachin Shetty, Dan Chia-Tien Lo, Reginald Cooper:
Cross-Layered Security Approach with Compromised Nodes Detection in Cooperative Sensor Networks. IPDPS Workshops 2016: 499-508 - [c54]Kai Qian, Dan Lo, Wei Chen, Ying Qian:
Promote Self-efficacy in Learning of Mobile App and Security with real-world Relevant Laboratory (Abstract Only). SIGCSE 2016: 691 - [c53]Tianda Yang, Kai Qian, Lei Li, Dan Chia-Tien Lo, Lixin Tao:
Static Mining and Dynamic Taint for Mobile Security Threats Analysis. SmartCloud 2016: 234-240 - 2015
- [c52]Wanqing You, Kai Qian, Chia-Tien Dan Lo, Prabir Bhattacharya, Minzhe Guo, Ying Qian:
Web Service-Enabled Spam Filtering with Naïve Bayes Classification. BigDataService 2015: 99-104 - [c51]Amir Atabekov, Marcel Starosielsky, Dan Chia-Tien Lo, Jing (Selena) He:
Internet of Things-Based Temperature Tracking System. COMPSAC Workshops 2015: 493-498 - [c50]Chia-Tien Dan Lo, Kai Qian, Wei Chen, Tamara Rogers, Kuosheng Ma:
Learning Hands-on Information Assurance and Security on Mobile Devices. COMPSAC 2015: 874-879 - [c49]Dan Chia-Tien Lo, Kai Qian, Wei Chen:
Mobile security education on portable labs. FIE 2015: 1-4 - [c48]Teng Zhao, Dan Chia-Tien Lo, Kai Qian:
A Neural-Network Based DDoS Detection System Using Hadoop and HBase. HPCC/CSS/ICESS 2015: 1326-1331 - [c47]Tianda Yang, Yu Yang, Kai Qian, Dan Chia-Tien Lo, Ying Qian, Lixin Tao:
Automated Detection and Analysis for Android Ransomware. HPCC/CSS/ICESS 2015: 1338-1343 - [c46]Chia-Tien Dan Lo, Kai Qian, Wei Chen, Tamara Rogers:
A Low Cost, Portable Platform for Information Assurance and Security Education. ICALT 2015: 111-113 - 2014
- [c45]Chia-Tien Dan Lo, Kai Qian, Victor Clincy, Hossain Shahriar, Wei Chen:
Labware for networking protocols and wireless security using Android-enabled mobile devices. ACM Southeast Regional Conference 2014: 13:1-13:6 - [c44]Chia-Tien Dan Lo, Kai Qian, Kuosheng Ma:
A multidisciplinary project for undergraduate summer research in computer systems. ACM Southeast Regional Conference 2014: 32:1-32:2 - [c43]Dan Chia-Tien Lo, Kai Qian, Wei Chen, Hossain Shahriar, Victor Clincy:
Authentic learning in network and security with portable labs. FIE 2014: 1-5 - [c42]Minzhe Guo, Prabir Bhattacharya, Kai Qian, Chia-Tien Dan Lo, Xi He:
Enhancing the information assurance and security (IAS) in CS education with mobile-device based hands-on labs. ITiCSE 2014: 343 - 2013
- [c41]Minzhe Guo, Kai Qian, Ming Yang, Chia-Tien Dan Lo, Kuosheng Ma, Liang Hong, Li Yang:
Android-Based Mobile Sensory System Labware for Embedded System Education. ICALT 2013: 118-119 - [c40]Chia-Tien Dan Lo, Orlando Karam:
Enhance Capstone Projects with a New Online Collaboration System. ICALT 2013: 217-218 - 2012
- [c39]Dan Chia-Tien Lo, Kai Qian, Gang Quan, Liang Hong:
Work in progress: Enhance CS/CE student learning in computer architecture and organization through a remote instrument control lab with mixed reality. FIE 2012: 1-2 - [c38]Kai Qian, Chia-Tien Dan Lo, Yi Pan, Yanqing Zhang, Xiaolin Hu, Liang Hong:
Real-World Relevant Learning with Android Smartphones. ICALT 2012: 476-477 - [c37]Kai Qian, Chia-Tien Dan Lo, Yi Pan, Yanqing Zhang, Xiaolin Hu, Liang Hong:
The cross-curriculum mobile computing labware for CS (abstract only). SIGCSE 2012: 664 - 2011
- [c36]Chia-Tien Dan Lo, Kai Qian, Yan-Qing Zhang:
Teaching operating systems with simple low-cost portable energy efficient devices. ACM Southeast Regional Conference 2011: 25-30 - [c35]Chia-Tien Dan Lo:
Performance-aware multicore programming. ACM Southeast Regional Conference 2011: 126-131 - [c34]Dan Lo, Larry Wang:
An online tutoring system with instant responses. ACM Southeast Regional Conference 2011: 316-317 - [c33]Dan Lo, Andy Wang, Sarah M. North, Max M. North:
A new curriculum for hardware-based network intrusion detection. ACM Southeast Regional Conference 2011: 318-319 - [c32]Yi-Gang Tai, Kleanthis Psarris, Chia-Tien Dan Lo:
Synthesizing Tiled Matrix Decomposition on FPGAs. FPL 2011: 464-469 - [c31]Chia-Tien Dan Lo, Kai Qian, Yanqing Zhang:
A Simple Low-Cost Portable Energy Efficient Device to Supplement Operating System Curriculum. ICALT 2011: 76-77 - 2010
- [c30]Kai Qian, Chia-Tien Dan Lo:
A novel embedded system curriculum with portable hands-on labs in a box. ACM Southeast Regional Conference 2010: 53 - [c29]Kai Qian, Chia-Tien Dan Lo:
Leveraging CS capstone project and green smart energy computing with WSN in a box. ACM Southeast Regional Conference 2010: 84 - [c28]Chia-Tien Dan Lo, Kai Qian:
Green Computing Methodology for Next Generation Computing Scientists. COMPSAC 2010: 250-251 - [c27]Yi-Gang Tai, Chia-Tien Dan Lo, Kleanthis Psarris:
Multiple data set reduction on FPGAs. FPT 2010: 45-52 - [c26]Chia-Tien Dan Lo, Kai Qian, Li Yang:
Innovative CS capstone projects on green energy applications with WSN in a box. ITiCSE 2010: 307 - [c25]Kai Qian, Chia-Tien Dan Lo, Li Yang, Jigang Liu:
Inquiry-based active learning in introductory programming courses. ITiCSE 2010: 312 - [c24]Kai Qian, Chia-Tien Dan Lo, Xiaolin Hu:
Portable labs in a box for embedded system education. ITiCSE 2010: 318 - 2009
- [c23]Yi-Gang Tai, Chia-Tien Dan Lo, Kleanthis Psarris:
An Improved Reduction Algorithm With Deeply Pipelined Operators. SMC 2009: 3060-3065 - 2008
- [c22]Chia-Tien Dan Lo, Yi-Gang Tai:
Highly Space Efficient Counters for Perl Compatible Regular Expressions in FPGAs. ARC 2008: 51-62 - [c21]Yi-Gang Tai, Chia-Tien Dan Lo, Kleanthis Psarris:
Accelerating matrix decomposition with replications. IPDPS 2008: 1-8 - [c20]Chia-Tien Dan Lo, Yi-Gang Tai, Kleanthis Psarris:
Hardware implementation for network intrusion detection rules with regular expression support. SAC 2008: 1535-1539 - 2007
- [c19]Mayumi Kato, Chia-Tien Dan Lo:
Compression for Low Power Consumption in Battery-powered Handsets. DCC 2007: 386 - [c18]Yi-Gang Tai, Chia-Tien Dan Lo, Kleanthis Psarris:
Applying Out-of-Core QR Decomposition Algorithms on FPGA-Based Systems. FPL 2007: 86-91 - 2006
- [c17]Huang-Chun Roan, Chien-Min Ou, Wen-Jyi Hwang, Chia-Tien Dan Lo:
Efficient Logic Circuit for Network Intrusion Detection. EUC 2006: 776-784 - [c16]Huang-Chun Roan, Wen-Jyi Hwang, Chia-Tien Dan Lo:
Shift-Or Circuit for Efficient Network Intrusion Detection Pattern Matching. FPL 2006: 1-6 - [c15]Chia-Tien Dan Lo, Yi-Gang Tai, Kleanthis Psarris, Wen-Jyi Hwang:
Super fast hardware string matching. FPT 2006: 385-388 - 2005
- [c14]Mayumi Kato, Chia-Tien Dan Lo:
Hardware Solution to Java Compressed Heap. FCCM 2005: 307-308 - [c13]Mayumi Kato, Chia-Tien Dan Lo:
Impact of Java Compressed Heap on Mobile/Wireless Communication. ITCC (2) 2005: 2-7 - 2004
- [c12]Mayumi Kato, Chia-Tien Dan Lo:
Growing adaptation of computer science in Bioinfomatics. ISICT 2004: 226-231 - [c11]Mayumi Kato, Chia-Tien Dan Lo:
A heap de/compression module for wireless Java. PPPJ 2004: 91-99 - 2003
- [c10]Chia-Tien Dan Lo:
The Design of a Self-Maintained Memory Module for Real-Time Systems. IWSOC 2003: 337-342 - 2002
- [c9]Witawas Srisa-an, Chia-Tien Dan Lo, J. Morris Chang:
Performance Enhancements to the Active Memory System. ICCD 2002: 249- - [c8]Chia-Tien Dan Lo, Witawas Srisa-an, J. Morris Chang:
A Multithreaded Concurrent Garbage Collector Parallelizing the New Instruction in Java. IPDPS 2002 - [c7]Chia-Tien Dan Lo, J. Morris Chang, Ophir Frieder, David A. Grossman:
The Object Behavior of Java Object-Oriented Database Management Systems. ITCC 2002: 247-253 - 2001
- [c6]Witawas Srisa-an, Chia-Tien Dan Lo, J. Morris Chang:
A Performance Analysis of the Active Memory System. ICCD 2001: 493-496 - 2000
- [c5]Witawas Srisa-an, Chia-Tien Dan Lo, J. Morris Chang:
Scalable Hardware-Algorithm for Mark-Sweep Garbage Collection. EUROMICRO 2000: 1274-1281 - [c4]J. Morris Chang, Witawas Srisa-an, Chia-Tien Dan Lo:
Architectural Support for Dynamic Memory Management. ICCD 2000: 99-104 - [c3]Witawas Srisa-an, J. Morris Chang, Chia-Tien Dan Lo:
Do generational schemes improve the garbage collection efficiency? ISPASS 2000: 58-63 - [c2]Chia-Tien Dan Lo, Witawas Srisa-an, J. Morris Chang:
A quantitative simulator for dynamic memory managers. ISPASS 2000: 64-69 - 1996
- [c1]Farn Wang, Chia-Tien Dan Lo:
Procedure-Level Verification of Real-time Concurrent Systems. FME 1996: 682-701
Editorship
- 2020
- [e2]J. Morris Chang, Dan Lo, Eric Gamess:
Proceedings of the 2020 ACM Southeast Conference, ACM SE '20, Tampa, FL, USA, April 2-4, 2020. ACM 2020, ISBN 978-1-4503-7105-6 [contents] - 2019
- [e1]Dan Lo, Donghyun Kim, Eric Gamess:
Proceedings of the 2019 ACM Southeast Conference, ACM SE '19, Kennesaw, GA, USA, April 18-20, 2019. ACM 2019, ISBN 978-1-4503-6251-1 [contents]
Informal and Other Publications
- 2022
- [i2]Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha, Shahriar Sobhan, Md Abdullah Khan, Michael E. Whitman, Alfredo Cuzzocrea, Dan Chia-Tien Lo, Akond Rahman, Fan Wu:
Malware Detection and Prevention using Artificial Intelligence Techniques. CoRR abs/2206.12770 (2022) - [i1]Mohammad Masum, Md. Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan C. Lo, Muhaiminul Islam Adnan:
Ransomware Classification and Detection With Machine Learning Algorithms. CoRR abs/2207.00894 (2022)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint