default search action
Shih-Wen Ke
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Shih-Wen Ke, Chih-Fong Tsai, Yi-Jun Chen:
Managing Emotion In The Workplace: An Empirical Study With Enterprise Instant Messaging. Appl. Artif. Intell. 38(1) (2024) - 2023
- [c7]Shih-Wen Ke, Yu-Cyuan Lin:
Transformer with Multi-block Encoder for Multi-turn Dialogue Translation. IEEM 2023: 547-551 - 2021
- [c6]Shih-Wen Ke, Wei-Liang Chen:
Stylized Dialogue Generation. IEEM 2021: 1456-1460
2010 – 2019
- 2019
- [c5]Shih-Wen Ke, Chi-Wei Yeh:
Hierarchical Classification and Regression with Feature Selection. IEEM 2019: 1150-1154 - 2017
- [j21]Shih-Wen Ke, Wei-Chao Lin, Chih-Fong Tsai, Ya-Han Hu:
Soft estimation by hierarchical classification and regression. Neurocomputing 234: 27-37 (2017) - [j20]Wei-Chao Lin, Shih-Wen Ke, Chih-Fong Tsai:
When Should We Ignore Examples with Missing Values? Int. J. Data Warehous. Min. 13(4): 53-63 (2017) - [j19]Wei-Chao Lin, Shih-Wen Ke, Chih-Fong Tsai:
Top 10 data mining techniques in business applications: a brief survey. Kybernetes 46(7): 1158-1170 (2017) - 2016
- [j18]Wei-Chao Lin, Shih-Wen Ke, Chih-Fong Tsai:
SAFQuery: a simple and flexible advanced Web search interface. Electron. Libr. 34(1): 155-168 (2016) - [j17]Min-Wei Huang, Wei-Chao Lin, Chih-Wen Chen, Shih-Wen Ke, Chih-Fong Tsai, William Eberle:
Data preprocessing issues for incomplete medical datasets. Expert Syst. J. Knowl. Eng. 33(5): 432-438 (2016) - [j16]Wei-Chao Lin, Chih-Fong Tsai, Zong-Yao Chen, Shih-Wen Ke:
Keypoint selection for efficient bag-of-words feature generation and effective image classification. Inf. Sci. 329: 33-51 (2016) - [j15]Chih-Fong Tsai, Wei-Chao Lin, Shih-Wen Ke:
Big data mining with parallel computing: A comparison of distributed and MapReduce methodologies. J. Syst. Softw. 122: 83-92 (2016) - [j14]Zong-Yao Chen, Wei-Chao Lin, Chih-Fong Tsai, Shih-Wen Ke:
3D model retrieval by sample based alignment. J. Vis. Commun. Image Represent. 40: 721-731 (2016) - [j13]Cheng-Che Shen, Ya-Han Hu, Wei-Chao Lin, Chih-Fong Tsai, Shih-Wen Ke:
Research impact of general and funded papers: A citation analysis of two ACM international conference proceeding series. Online Inf. Rev. 40(4): 472-480 (2016) - [c4]Kun-Hsien Tung, Mei-Yi Huang, Chih-Yi Li, Ting-Lan Lin, Chu-Sui Lin, Yao-Jen Chang, Shih-Lun Chen, Shih-Wen Ke, Ya-Shu Kang, Shaou-Gang Miaou, Yuan-Hsiang Chang, Yu-Chi Chou, Yu-Shan Huang, Xin-Yi Huang, Hui-I Tsai:
Eye detection in CSBS-DP evaluation video. ICCE-TW 2016: 1-2 - 2015
- [j12]Wei-Chao Lin, Chih-Fong Tsai, Shih-Wen Ke, Mon-Loon You:
On learning dual classifiers for better data classification. Appl. Soft Comput. 37: 296-302 (2015) - [j11]Zong-Yao Chen, Wei-Chao Lin, Shih-Wen Ke, Chih-Fong Tsai:
Evolutionary feature and instance selection for traffic sign recognition. Comput. Ind. 74: 201-211 (2015) - [j10]Chih-Fong Tsai, Shih-Wen Ke, Kenneth McGarry, Ming-Yi Lin:
LocalContent: a personal scientific document retrieval system. Electron. Libr. 33(3): 373-385 (2015) - [j9]Wei-Chao Lin, Zong-Yao Chen, Shih-Wen Ke, Chih-Fong Tsai, Wei-Yang Lin:
The effect of low-level image features on pseudo relevance feedback. Neurocomputing 166: 26-37 (2015) - [j8]Wei-Chao Lin, Chih-Fong Tsai, Shih-Wen Ke, Chia-Wen Hung, William Eberle:
Learning to detect representative data for large scale instance selection. J. Syst. Softw. 106: 1-8 (2015) - [j7]Wei-Chao Lin, Shih-Wen Ke, Chih-Fong Tsai:
CANN: An intrusion detection system based on combining cluster centers and nearest neighbors. Knowl. Based Syst. 78: 13-21 (2015) - [j6]Wei-Chao Lin, Chih-Fong Tsai, Shih-Wen Ke:
Correlation analysis for comparison of the citation impact of journals, magazines, and conferences in computer science. Online Inf. Rev. 39(3): 310-325 (2015) - [j5]Zong-Yao Chen, Chih-Fong Tsai, William Eberle, Wei-Chao Lin, Shih-Wen Ke:
Instance selection by genetic-based biological algorithm. Soft Comput. 19(5): 1269-1282 (2015) - 2014
- [j4]Chih-Fong Tsai, Zong-Yao Chen, Shih-Wen Ke:
Evolutionary instance selection for text classification. J. Syst. Softw. 90: 104-113 (2014) - [j3]Wei-Chao Lin, Chih-Fong Tsai, Shih-Wen Ke:
Dimensionality and data reduction in telecom churn prediction. Kybernetes 43(5): 737-749 (2014) - [j2]Chih-Fong Tsai, Ya-Han Hu, George Shih-Wen Ke:
A Borda count approach to combine subjective and objective based MIS journal rankings. Online Inf. Rev. 38(4): 469-483 (2014) - [j1]Shih-Wen Ke, Wei-Chao Lin, Chih-Fong Tsai, Ya-Han Hu:
Citation impact analysis of research papers that appear in oral and poster sessions: A case study of three computer science conferences. Online Inf. Rev. 38(6): 738-745 (2014)
2000 – 2009
- 2008
- [b1]Shih-Wen Ke:
Automatic email classification. University of Sunderland, Tyne and Wear, UK, 2008 - [c3]George Shih-Wen Ke, Michael P. Oakes, Marco A. Palomino, Yan Xu:
Comparison between SVM-Light, a search engine-based approach and the mediamill baselines for assigning concepts to video shot annotations. CBMI 2008: 381-387 - 2006
- [c2]Shih-Wen Ke, Chris Bowerman, Michael P. Oakes:
PERC: A Personal Email Classifier. ECIR 2006: 460-463 - 2005
- [c1]Shih-Wen Ke, Michael P. Oakes, Chris Bowerman:
Mining Personal Data Collections to Discover Categories and Category Labels. RANLP Text Mining Workshop 2005: 17-22
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 20:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint