default search action
Jee-Gong Chang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j8]Lo-Yao Yeh, Chun-Chuan Yang, Jee-Gong Chang, Yi-Lang Tsai:
A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility (NEMO) in VANETs. J. Netw. Comput. Appl. 36(1): 284-292 (2013) - [p1]Hsien-De Huang, Giovanni Acampora, Vincenzo Loia, Chang-Shing Lee, Hani Hagras, Mei-Hui Wang, Hung-Yu Kao, Jee-Gong Chang:
Fuzzy Markup Language for Malware Behavioral Analysis. On the Power of Fuzzy Markup Language 2013: 113-132 - 2012
- [c4]Lo-Yao Yeh, Jee-Gong Chang, Wei-Cheng Huang, Yi-Lang Tsai:
A localized authentication and billing scheme for proxy mobile IPv6 in VANETs. ICC 2012: 993-998 - [c3]Yi-Lang Tsai, Bo-Yi Lee, Jee-Gong Chang:
Automated Malware Analysis Framework with Honeynet Technology in Taiwan Campuses. ICPADS 2012: 724-725 - 2011
- [j7]Jee-Gong Chang, Hsin-Tsung Chen, Shin-Pon Ju, Ching-Sheng Chang, Meng-Hsiung Weng:
Adsorption and dissociation of NH3 on clean and hydroxylated TiO2 rutile (110) surfaces: A computational study. J. Comput. Chem. 32(6): 1101-1112 (2011) - [c2]Hui-Min Tseng, Hui-Lan Lee, Jen-Wei Hu, Te-Lung Liu, Jee-Gong Chang, Wei-Cheng Huang:
Network Virtualization with Cloud Virtual Switch. ICPADS 2011: 998-1003 - [c1]Hsien-De Huang, Chang-Shing Lee, Hung-Yu Kao, Yi-Lang Tsai, Jee-Gong Chang:
Malware behavioral analysis system: TWMAN. IEEE IA 2011: 1-8 - 2010
- [j6]Jee-Gong Chang, Yu-Bin Fang, Shin-Pon Ju, Jin-Yuan Hsieh:
Random dot generation scheme using molecular dynamics method for illumination design of a round plane LED source light guide. Displays 31(1): 44-53 (2010) - [j5]Hsin-Tsung Chen, Jee-Gong Chang, Shin-Pon Ju, Hui-Lung Chen:
First-principle calculations on CO oxidation catalyzed by a gold nanoparticle. J. Comput. Chem. 31(2): 258-265 (2010)
2000 – 2009
- 2009
- [j4]Jee-Gong Chang, Yu-Bin Fang, Shin-Pon Ju:
Using a generalized molecular dynamics force model for random microstructure generation of different aspect-ratios and orientation for use in the optical design of an LED edge-lit backlight. Comput. Phys. Commun. 180(8): 1259-1270 (2009) - [j3]Hsin-Tsung Chen, Jee-Gong Chang, Hui-Lung Chen, Shin-Pon Ju:
Identifying the O2 diffusion and reduction mechanisms on CeO2 electrolyte in solid oxide fuel cells: A DFT + U study. J. Comput. Chem. 30(15): 2433-2442 (2009) - 2008
- [j2]Jee-Gong Chang, Yu-Bin Fang:
Feasibility study of edge-lit backlight of dual-panel display by a simple configuration model. Displays 29(3): 285-296 (2008) - 2007
- [j1]Jee-Gong Chang, Cheng-Tai Lee, Yu-Bin Fang, Chi-Chuan Hwang:
Generation of random non-overlapping dot patterns for light guides using molecular dynamics simulations with variable r-cut and reflective boundary techniques. Comput. Phys. Commun. 177(11): 851-862 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint