Chinese
English
Research Fellow  |  Wang, Da-Wei  
 
contact
vita
education
experience
interests
descriptions
activities
invited_visit
publications
 
 
 
 
 
Publications
 
Journal Articles
 
1. Chia-Tung Kuo, Da-Wei Wang and Tsan-sheng Hsu, "Simple and efficient algorithms to get finer resolution in a stochastic discrete time agent-based simulation," to appear in Advances in Intelligent and Soft Computing, volume 4240.
2. T.-s. Hsu, C.J. Liau, and D.W. Wang, "A logical framework for privacy-preserving social network publication," Journal of Applied Logic, volume 12, number 2, pages 151-174, June 2014.
3. Yang-chih Fu, Da-Wei Wang, Jen-Hsiang Chuang, "Representative Contact Diaries for Modeling the Spread of Infectious Diseases in Taiwan," PLoS ONE, volume 7, number 10, pages e45113, October 2012. :::icon
4. Ting-Yu Liu, Yu Chen, Huai-Hsien Wang, Yen-Lin Huang, Yuan-Chun Chao, Kun-Tong Tsai, Wei-Chih Cheng, Chih-Yuan Chuang, Yi-Ho Tsai, Chung-Yueh Huang, Da-Wei Wang, Chi-Hung Lin, Juen-Kai Wang, and Yuh-Lin Wang, "Differentiation of Bacteria Cell Wall Using Raman Scattering Enhanced by Nanoparticle Array," Journal of Nanoscience and Nanotechnology, volume 12, number 6, pages 5004-5008, June 2012.
5. Meng-Tsung Tsai, Tsurng-Chen Chern, Jen-Hsiang Chuang, Chih-Wen Hsueh, Hsu-Sung Kuo, Churn-Jung Liau, Steven Riley, Bing-Jie Shen, Chih-Hao Shen, Da-Wei Wang, Tsan-Sheng Hsu, "Efficient Simulation of the Spatial Transmission Dynamics of Influenza," PLoS ONE, volume DOI: 10.1371, pages journal.pone.0013292, November 2010.
6. Kung Chen, Yuan-Chun Chang, Da-Wei Wang, "Aspect-oriented design and implementation of adaptable access control for Electronic Medical Records," International Journal of Medical Informatics, volume 79, number 3, pages 181-203, March 2010.
7. J. Zhan, C.L. Hsieh, I.C. Wang, T.-s. Hsu, C.J. Liau and D.W. Wang, "Privacy-preserving collaborative recommender systems," IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews, pages 472--476, 2010.
8. K. Chen and D.W. Wang, ,, "Supporting Patients' Privacy Preferences Using Aspects," Japan Journal of Medical Informatics, volume 29, number 3, pages 117-128, December 2009.
9. I-C. Wang, C.-H. Shen, T.-s. Hsu, C.J. Liau, D.W. Wang, and J. Zhan, "Towards empirical aspects of secure scalar product," IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews, volume 39, pages 440-447, July 2009.
10. Ta-Chien Chan, Mei-Lien Chen, I-Feng Lin, Cheng-Hua Lee, Po-Huang Chiang, Da-Wei Wang, and Jen-Hsiang Chuang, "Spatiotemporal analysis of air pollution and asthma patient visits in Taipei, Taiwan," International Journal of Health Geographics, volume 8, number 26, May 2009.
11. Jan-Jan Wu, Yi-Fang Lin, Da-Wei Wang, Chien-Min Wang, "Optimizing Server Placement for Parallel I/O in Switch-Based Clusters," Journal of Parallel and Distributed Computing, volume 69, number 3, pages 266-281, March 2009, doi:10.1016/j.jpdc.2008.10.001 :::icon
12. Lien-Wu Chen, Yu-Chee Tseng, You-Chiun Wang, Da-Wei Wang and Jan-Jan Wu, "Exploiting Spectral Reuse in Routing, Resource Allocation, and Scheduling for IEEE 802.16 Mesh Networks," IEEE Transactions on Vehicular Technology, volume 58, number 1, pages 301-313, January 2009.
13. Pang-Feng Liu, May-Chen Kuo, and Da-Wei Wang, "An Approximation Algorithm and Dynamic Programming for Reduction in Heterogeneous Environments," Algorithmica, volume 53, number 3, pages 425-453, 2009. :::icon
14. Ting-Ting Liu, You-Hsuan Lin, Chia-Sui Hung, Tian-Jiun Liu, Yu Chen, Yung-Ching Huang, Tsung-Heng Tsai, Huai-Hsien Wang, Da-Wei Wang, Juen-Kai Wang, Yuh-Lin Wang, and Chi-Hung Lin, "A high speed detection platform based on surface-enhanced Raman scattering for monitoring antibiotic-induced chemical changes in bacteria cell wall," PloS ONE,, volume 4, pages e5470-1 ~ e5470-10, 2009.
15. Chang, Polun; Sheng, Yu-Hsiang; Sang, Yiing-Yiing; Wang, Da-Wei, "Developing a Wireless Speech- and Touch-Based Intelligent Comprehensive Triage Support System," CIN: Computers, Informatics, Nursing, volume 26, number 1, pages 31-38, January 2008.
16. D.W. Wang, C.J. Liau, and T.-s. Hsu, "Granulation as a privacy protection mechanism," Transactions on Rough Sets, volume VII, pages 256-273, January 2007.
17. D.W. Wang, C.J. Liau, and T.-s. Hsu, "An epistemic framework for privacy protection in database linking," Data and Knowledge Engineering, volume 61, pages 176-205, 2007. :::icon
18. Chia-Fen Hsieh, Bo-Jui Chang, Chyi-Huey Pai, Hsuan-Yi Chen, Jin-Wu Tsai, Yung-Hsiang Yi, Yi-Ting Chiang, Da-Wei Wang, Sien Chi, Long Hsu, and Chi-Hung Lin, "Stepped Changes of Monovalent Ligand-binding Force during Ligand-induced Clustering of Integrin IIB3," The Journal of Biological Chemistry, volume 281, pages 25466-25474, September 2006.
19. Cho-chin Lin, Da-Wei Wang and Tsan-sheng Hsu, "Bounds on the Client-Server Incremental Computing," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, volume E89-A, number 5, pages 1198-1206, May 2006.
20. Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P Chen, "Value versus damage of information release: A data privacy perspective," International Journal of Approximate Reasoning, 2006.
21. Tsan-Sheng Hsu, Kuo-Hui Tsai, Da-Wei Wang and D. T. Lee, "Two Variations of the Minimum," Journal of Combinatorial Optimization, volume 9, number 1, pages 101-120, January 2005.
22. Ean-wen Huang Da-Wei Wang, Der-Ming Liou, "Development of a Deterministic XML Schema by Resolving Structure Ambiguity of HL7 Messages," Computer Mehods and Programs in Biomedicine, volume 80, pages 1-15, 2005.
23. Da-Wei Wang, C. J. Liau, and T.-S. Hsu, "Medical Privacy Protection Based on Granular Computing," Artificial Intelligence in Medicine, volume 32, number 2, pages 137-149, 2004.
24. Pangfeng Liu, Da-wei Wang and Yi-heng Guo, "An approximation algorithm for broadcast scheduling in heterogeneous," Lecture Notes in Computer Science, volume 2968, pages 38-52, 2004.
25. Y.C. Chiang, T.-s. Hsu, S. Kuo, C.J. Liau, and D.W. Wang, "Preserving Confidentiality When Sharing Medical Database with the Cellsecu System," International Journal of Medical Informatics, volume 71, pages 17-23, January 2003.
26. Kuo-Hui Tsai, Da-Wei Wang, and Frank Hwang, "Lower Bounds for Nonblocking Clos Network," Theoretical Computer Science, volume 261, pages 323-328, January 2001.
27. Xiao Yun Lu, Da-Wei Wang, C. K. Wong, "Rooted Spanning Trees in Torunaments," Graphs and Comlinatorics, Springer-Verlag, volume 16, pages 411-427, January 2000.
28. Xiao Yun Lu, Da-Wei Wang, C. K. Wong, "On the Bounded Domination Number for Tournaments," Discrete Mathematics, volume 220, number 257-261, January 2000.
29. Da-Wei Wang, Duen-Ren Liu, Yi-Chang Chen, "A Mechanism to Verify the Integrity of Computer-based Patient Records," The Journal of Taiwan Association for Medical Informatics, number 10, pages 71-84, December 1999.
30. Xiaoyun Lu, Da-Wei Wang, Gerard J. Chang, In-Jen Lin, C.K. Wong, "On k-Ary Spanning Trees of Tournaments," Graph Theory March, pages 167-176, 1999.
31. Xiao Yun Lu, Da-Wei Wang, C.K. Wong, "The Strong Hall Property and Symmetric Chain Orders," Discrete Mathematics, volume 203, pages 161-168, 1999.
32. Den-Ruen Liu, Sung-Ting Hsieh, Hsu-Sung Kuo, Da-Wei Wang, Mei-Yu Wu, "Integrating Healthcare EDI and SET and Its Application," The Journal of Taiwan Association for Medical Informatics, volume 8, pages 1-18, December 1998.
33. Xiao Yun Lu, Da-Wei Wang, C.K Wong, "On Avoidable and Unavoidable Claws," Discrete Mathematics, volume 184, pages 259-265, 1998.
34. Wang Da-Wei, Chen Yu-Chung, Chung Jen-Hisang, Kuo Sung H., Chnag Polum, Liou Der-Ming, "Integrating GIS and WWW for medical informatics application," Journal of Geographical Information Science, volume 1, pages 125-131, December 1997.
35. Yehuda Afek, Hagit Attiya, Allan Fekete, Michael J. Fischer, Nancy Lynch, Yishay Mansour, Da-Wei Wang, and Lenore D. Zuck, "Reliable Communication Over Unreliable Channels," J. of the ACM 41, volume 6, pages 1237-1297, 1994.
36. Da Wei Wang and Yue-sun Kuo, "A Study On Two Geometric Location Problems," Information Processing Letters, August 1988.
 
 
Conference Papers
 
1. Hung-Jui Chang, Jen-Hsiang Chuang, Tsurng-Chen Chern, Mart Stein, Richard Coker, Da-Wei Wang, Tsan-sheng Hsu, "A Comparison Between a Deterministic, Compartmental Model and an Individual Based-stochastic Model for Simulating the Transmission Dynamics of Pandemic Influenza," Proceedings of the 4th International Conference Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH), pages 586--594, August 2014.
2. T.-s. Hsu, C.J. Liau and D.W. Wang, "Privacy-preserving social network publication based on positional indiscernibility," Proceedings of the 7th International Conference on Scalable Uncertainty Management (SUM), Lecture Notes in Artificial Intelligence, 8078, V.S. Subrahmanian and W. Liu and J. Wijsen, editors, Springer-Verlag, pages 311-324, Washington DC Area, USA, September 2013.
3. Ching-Ju Hsieh, Fung-Rong Hu, Da-Wei Wang, Juen-Kai Wang, Yuh-Lin Wang, Chi-Hung Lin, "A High Speed Detection Platform Based on Surface-Enhanced Raman Scattering for Rapid Diagnosis of Bacterial Endophthalmitis," ARVO 2013 Annual Meeting, May 2013.
4. W.-C. Cheng, Y. Chen, Y.-M. Deng, T.K. Jan, W.N. Lian, H.H. Wang, C.-H. Lin, Y.-L. Wang, J.-K. Wang, D.-W. Wang, J. Twu, R. Jou, "Species Identification and Drug resistance Determination of Mycobacteria Using Raman Spectroscopy," 23rd European Congress of Clinical Microbiology and Infectious Diseases, April 2013.
5. Chia-Tung Kuo, Da-Wei Wang and Tsan-sheng Hsu, "A simple efficient technique to adjust the time step size in a stochastic discrete agent-based simulation," Proceedings of the 2012 International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH), pages 42-48, September 2012. :::icon
6. T.-s. Hsu, C.J. Liau and D.W. Wang, "A probabilistic hybrid logic for sanitized information systems," Proceedings of the 6th International Conference on Scalable Uncertainty Management (SUM), Lecture Notes in Computer Science, 7520, E. Hüllermeier, S. Link, T. Fober and and B. Seeger, editors, Springer, pages 500-513, September 2012.
7. Te-Kang Jan, Da-Wei Wang, Chi-Hung Lin and Hsuan-Tien Lin, "A Simple Methodology of Soft Cost-sensitive Classification," ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (ACM KDD), August 2012.
8. T.-s. Hsu, C.J. Liau and D.W. Wang, "Logic, probability, and privacy: A framework for specifying privacy requirements," Turing-100. The Alan Turing Centenary, volume 10, EasyChair Proceedings in Computing (EPiC), A. Voronkov, editor, pages 157-167, June 2012.
9. K. Chen, T.-s. Hsu, W.K. Huang, C.J. Liau and D.W. Wang, "Towards a scripting language for automating secure multiparty computation," 2012 Asia-Pacific Programming Languages and Compilers Workshop (APPLC), June 2012.
10. Te-Kang Jan and Hsuan-Tien Lin and Hsin-Pai Chen and Tsung-Chen Chern and Chung-Yueh Huang and Bing-Cheng Wen and Chia-Wen Chung and Yung-Jui Li and Ya-Ching Chuang and Li-Li Li and Yu-Jiun Chan and Juen-Kai Wang and Yuh-Lin Wang and Chi-Hung Lin and Da-Wei Wang, "Cost-Sensitive Classification on Pathogen Species of Bacterial Meningitis by Surface Enhanced Raman Scattering," BIBM 2011, pages 390-393, November 2011. :::icon
11. Chung-Yueh Huang, Tsung-Heng Tsai, Bing-Cheng Wen, Chia-Wen Chung, Yung-Jui Li, Ya-Ching Chuang, Wen-Jie Lin, Li-Li Li, Juen-Kai Wang, Yuh-Lin Wang, Chi-Hung Lin, Da-Wei Wang, "Hybrid SVM/CART classification of pathogenic species of bacterial meningitis with surface-enhanced Raman scattering," Bioinformatics and Biomedicine (BIBM), 2010 IEEE International Conference on, pages 406-409, December 2010. :::icon
12. M.T. Tsai, D.W. Wang, C.J.Liau and T.-s. Hsu,, "Heterogeneous subset sampling," The 16th Annual International Computing and Combinatorics Conference (COCOON), Lecture Notes in Computer Science, 5196, pages 500-509, July 2010.
13. Tsung-Heng Tsai, Da-Wei Wang, Ting-Ting Liu, You-Hsuan Lin, Yung-Ching Huang, Tian-Jiun Liu, Yu Chen, Chi-Hung Lin, Juen-Kai Wang and Yuh-Lin Wang, "Multiscale Peak Identification for Bacterial SERS Spectra," The 3rd International Conference on Bioinformatics and Biomedical Engineering (iCBBE), 2009.
14. I.-C. Wang, C.-H. Shen, K. Chen, T.-s. Hsu, C.-J. Liau, and D.-W. Wang, "An empirical study on privacy and secure multi-party computation using exponentiation," Proc. of the 12th IEEE International Conference on Computational Science and Engineering (CSE09), pages 182--188, 2009.
15. Tsung-Heng Tsai, Ting-Ting Liu, Yung-Ching Huang, Yu Chen, Tian-Jiun Liu, You-Hsuan Lin, Chi-Hung Lin, Yuh-Lin Wang, Juen-Kai Wang, Da-Wei Wang, "A Multiscale Approach for Surface-enhanced Raman Spectroscopy (SERS) Spectrum Representation and its Application to Bacterial Discrimination," 2008 International Conference on BioMedical Engineering and Informatics, pages 328-333, May 2008.
16. I-Cheng Wang, Chih-Hao Shen, Tsan-Sheng Hsu, Churn-Chung Liao, Da-Wei Wang, Justin Zhan, "Towards Empirical Aspects of Secure Scalar Product," Information Security and Assurance, 2008, pages 573-578, April 2008.
17. Kung Chen, Da-Wei Wang, "An Aspect-Oriented Approach to Privacy-Aware Access Control," 2007 International Conference on Machine Learning and Cybernetics, volume 5, pages 3016-3021, August 2007.
18. Da-Wei Wang, Chrun-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu, "Information Theoretical Analysis of Two-Party Secret Computation," Data and Application Security, Lecture Notes in Computer Science, number 4127, Lecture notes in computer science, Ernesto Damiani and Peng Liu, editors, Springer, pages 310-317, July 2006.
19. D.W. Wang, C.J. Liau, Y.T. Chiang, and T.-s. Hsu, "Information theoretical analysis of two-party secret computation," Proc. 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Lecture Notes in Computer Science, 4127, pages 310--317, 2006. :::icon
20. D.W. Wang, C.J. Liau, and T.-s. Hsu, "A GrC-based approach to social network data protection," Proc. 5th International Conference on Rough Sets and Current Trends in Computing, Lecture Notes in Artificial Intelligence, 4259, pages 438--447, 2006. :::icon
21. Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, "Attribute-oriented Granulation for Privacy Protection," IEEE International Conference on Granular Computing, pages 726-731, 2006.
22. Chun-Chen Hsu, Pangfeng Liu, Da-wei Wang, and Jan-Jan Wu, "Generalized Edge Coloring for Channel Assignment in Wireless Networks," Proceedings of the 2006 International Conference on Parallel Processing (ICPP2006), IEEE Computer Society, pages 82-92, 2006.
23. Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, "Privacy Protection in Social Network Data Disclosure Based on Granular Computing," IEEE International Conference on Fuzzy Systems, pages 5485-5491, 2006.
24. Seventeen Chen, Yu-Chuan (Jack) Li, Li (David) Liu, Feipei Lai, and Da-Wei Wang, "Building a Legal and Ethical Taiwan Health Grid for Medical Decision Making," HealthGrid 2004, France, January 2004.
25. Da-Wei Wang, Churn-Jung Liau, Tsan-Sheng Hsu and Jeremy K.-P. Chen, "On the Damage and Compensation of Privacy Leakage," Proc. 18th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pages 311-324, 2004.
26. Cho-Chin Lin, Tsan-Sheng Hsu and Da-Wei Wang, "Bounds on the Client-Server Incremental Computing," Proc. 7th International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN), pages 86-91, 2004.
27. Jan-Jan Wu, Da-Wei Wang, and Y.-F. Lin, "Placement of I/O Servers to Improve Parallel I/O Performance on Switch-Based Clusters," International Conference on Supercomputing, 2003.
28. P. Liu, Da-Wei Wang, and Jan-Jan Wu, "Efficient Parallel I/O Scheduling in the Presence of Data Duplication," International Conference on Parallel Processing (ICPP), 2003.
29. P. Liu, Da-Wei Wang, and Yi-Heng Guo, "An Approximation Algorithm for Broadcast Scheduling in Heterogeneous Environments," The 9th International Conference on Real-Time Computing Systems and Applications (RTCSA 2003), 2003.
30. T.-S. Hsu, C.-J. Liau, D.-W. Wang, and Jeremy K.-P. Chen, "Quantifying Privacy Leakage Through Answering Database Queries," Proc. of the 5th International Conference on Information Security, Lecture Notes in Computer Science, 2433, Agnes Chan and virgil Gligor, editor, Springer-Verlag, pages 162-175, January 2002.
31. Y.-T. Chiang, Y. -C. Chiang, T.-S. Hsu, C.-J. Liau, and D.-W. Wang, "How Much Privacy? -- a System to Safe guard Personal Privacy While Releasing Databases," Proceedings of the 3rd International Conference on Rough Sets and Current Trends in Computing, Lecture Notes in Computer Science, 2475, number 226-233, Springer-Verlag, New York, 2002.
32. Chia- Ting Tsai, Da-Wei Wang, Hsu-Sung Kuo, "台灣醫療資訊安全之立法與實踐研究-由個資法的經驗到推動HIPAA 之可行性," MIST2002, Taipei, Taiwan, 2002.
33. Hsiang-Yu Yeh, Hsu-Sung Kuo, and Da-Wei Wang, "運用BS7799 檢測醫療院所資訊安全管理作業文件之研究," MIST2002, Taipei Taiwan, 2002.
34. Tsan-Sheng Hsu, Churn-Jung Liau and Da-Wai Wang, "A Logical Model for Privacy," Proc. Information Security Conference (ISC), Lecture Notes in Computer Science, 2200, number 110-124, Springer-Verlag, 2001.
35. J. W. Tsai, B. Y. Liao, C. C. Huang, W. L. Hwang, D. W. Wang, Chiou3, and C. H. Lin, "Applications of Optical Tweezers and an Integrated Force Measurement Module for Biomedical," Proc. SPIE, volume 4082, number 213-221, 2000.
36. Yu-Cheng Chiang, Tsan-Sheng Hsu, Sun Kuo, and Da-Wei Wang, "Preserving Confidentiality When Sharing Medical Database with the Cellsecu System," APAMI-MIC2000, HongKong, 2000.
37. Pang-Feng Liu and Da-Wei Wang, "Reduction Optimization in Heterogeneous Cluster," 2000 International Parallel and Distributed Processing, Cancun, Mexico, 2000.
38. C.Y, Liu and Da-Wei Wang, "Legal and technical framework for protecting personal health information," Inet99 SanJose, 1999.
39. Kuo-Hui Tsai, Da-Wei Wang, Frank Hwang, "Lower Bounds for Nonblocking Clos network," Cocoon98, Taipei, January 1998, Theoretical Computer Science
40. Den-Ruen Liu, Sung-Ting Hsieh, Hsu-Sung Kuo, Da-Wei Wang, Mei-Yu Wu, "Integrating Healthcare EDI and SET and Its Application," MIST98, Taipei Taiwan, 1998.
41. Polun Chang, Hsu-Sung Kuo, Shiao-Chi Wu, Der-Ming Liou, Jen-Hsiang Chuang, Da-Wei Wang, Mei-Shu Lai, "Prediction of Breast Cancer Prevalence and Effect of Annual Mam-mographic," Medinfo98, Seoul Korea, 1998.
42. Tsai-Kuo Hui, Da-Wei Wang,, "Linear time algorithm for point location problem on a circle," Computing and Combinatorics, Lecture Notes in Computer Science, 1276, 1997.
43. P. Chang, C.H. Liu, D.M. Liou, J.H. Chuang, D.W.Wang, H.S. Kuo, "User-Oriented breasts cancer prevention and treatment decision support WWW homepahe(abstract﹞," AMIA Annual Fall Sympositm, Washington, D.C, October 1996.
44. Tsan-Sheng Hsu, D. T. Lee, Kuo-Hui Tasi, Da-Wei Wang, "Steiner Problems on Directed Acyclic Graphs," roc. 2nd International Computing and Combinatorics Conf. (COCOON), Lecture Notes in Computer Science, 1090, pages 21-30, January 1996.
45. Tsai-Kuo Hui, Da-Wei Wang, Ming-Ta Ko, "On Point Location Problems on a Circle with applications to Synchronous Ethernet," the Fourteenth IASTED International Conference, 1996.
46. Kuo-Hui Tsai, Chia-Shang Chang, Jan-Ming Ho, Da-Wei Wang, Mei-Wen Li, Kuo-Fend Huang, "Synchronous Ethernet-A network supporting real-time communiction," First workshop on real-time and media systems, Taipei Taiwan, 1995.
47. Chia-Hsiang Chang, Meng-Chen Chen, Jan-Ming Ho, Kuo-Hui Tsai, Chiu-Feng Wang, Da-Wei Wang, "ASIS-Academia Sinica Multimedia Interactive System," First workshop on real-time and media systems, Taipei Taiwan, 1995.
48. Chia-Hsiang Chang, Jan-Ming Ho, Ming-Tat Ko, Kuo-Hui Tsai, Da-Wei Wang, "Minimum Delay of Nonpreemptive Real-Time Schedulings," First workshop on real-time and media systems, Taipei Taiwan, 1995.
49. David Greenberg, Gadi Taubenfeld, and Da-Wei Wang, "Ghoice Coordination With Multiple Alternatives," Workshop on Algorithm and Protocol, 1992.
50. Da-Wei Wang,Lenore D.Zuck and Nicd Reingold, "Games I/O Automata Play," 3rd International Conference on Concurrency Theory, 1992.
51. Da-Wei Wang and Lenore D.Zuck, "Real-time Sequence Transmission Problem," ACM Symposium on Principles of Distributed Computing, 1991.
52. Da-Wei Wang and Lenore D. Zuck, "Tight Bound for the Sequence Transmission Problem," ACM Symposium on Principles of Distributed Computing, 1989.
 
 
Others
 
1. Chia-Tung Kuo, Da-Wei Wang and Tsan-sheng Hsu, "Simple and efficient algorithms to get finer resolution in a stochastic discrete time agent-based simulation," Simulation and Modeling Methodologies, Technologies and Applications Advances in Intelligent Systems and Computing, volume 256, Springer, January 2014.
2. Ching-Yi Liu, Da-Wei Wang, Tyng-Ruey Chuang, and Shih-Kun Huang, "The Resident Information System, Personal Data Protection, and Personal Identification: Issues in the Utilizations of the Resident Information System," February 2001.
 
 
bg