Author of the publication

Amortized Efficiency of Ranking and Unranking Left-Child Sequences in Lexicographic Order.

, , , and . COCOA, volume 10043 of Lecture Notes in Computer Science, page 505-518. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Chang, Shun-Chieh
add a person with the name Chang, Shun-Chieh
 

Other publications of authors with the same name

ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family., , , , , and . PRDC, page 257-262. IEEE, (2018)Memory forensics using virtual machine introspection for Malware analysis., , , and . DSC, page 518-519. IEEE, (2017)Efficient binary search space-structured VQ encoder applied to a line spectral frequency quantisation in G.729 standard., , , and . IET Communications, 10 (10): 1183-1188 (2016)Early load: Hiding load latency in deep pipeline processor., , , and . ACSAC, page 1-8. IEEE Computer Society, (2008)Application of Optimization Technique for GPS Navigation Kalman Filter Adaptation., and . ICIC (1), volume 5226 of Lecture Notes in Computer Science, page 227-234. Springer, (2008)A consistency analysis on an acoustic module for Mandarin text-to-speech., , and . Speech Communication, 55 (2): 266-277 (2013)Amortized Efficiency of Ranking and Unranking Left-Child Sequences in Lexicographic Order., , , and . COCOA, volume 10043 of Lecture Notes in Computer Science, page 505-518. Springer, (2016)The connected p-median problem on block graphs., , , and . Optimization Letters, 10 (6): 1191-1201 (2016)A scalable and accurate feature representation method for identifying malicious mobile applications., , , , , and . SAC, page 1182-1189. ACM, (2019)The Symmetric NAT and its Traversal Method., and . International Conference on Internet Computing, page 44-48. CSREA Press, (2010)