default search action
Chin-Feng Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j49]Chin-Feng Lee, Kuo-Chung Chan:
A Novel Dual Image Reversible Data Hiding Scheme Based on Vector Coordinate With Triangular Order Coding. IEEE Access 12: 90794-90814 (2024) - [c60]Chin-Feng Lee, Ting-Yu Kang, Iuon-Chang Lin:
Dual Medical-Image Reversible Data Embedding Method with Vector Directions. ICMHI 2024: 244-250 - [c59]Chin-Feng Lee, Tzu-Ching Tsai, Iuon-Chang Lin:
The Study of Reversible Data Hiding with Contrast Enhancement for Medical Images. ICMHI 2024: 275-280 - 2023
- [j48]Chin-Feng Lee, Kuo-Chung Chan:
Improved Dual-image Quality with Reversible Data Hiding Using Translocation and Switching Strategy. Comput. Syst. Sci. Eng. 44(2): 1551-1566 (2023) - [c58]Chin-Feng Lee, Kuo-Chung Chan:
Dual Image Reversible Data Hiding Based on Coordinate Vector Directions via Communication Networking. CCIOT 2023: 10-16 - [c57]Chin-Feng Lee, Tz-Ruei Kang, Hsing-Yu Hou:
Investigating Factors Influencing the Retention Intention of Digital Companion for Learning Project: Case of a Technology University in Taiwan. iCAST 2023: 321-325 - [c56]Chin-Feng Lee, Yu-Ming Huang, Zi-Yi Huang:
Healthcare Material Review with Online Chatbot and Care-receiver Sentiment Analysis Information System. ICMHI 2023: 118-122 - [c55]Chin-Feng Lee, Chung-Wei Hsu, Iuon-Chang Lin:
A Novel Reversible Data Hiding Method with Contrast Enhancement for Color Medical Images. ICMHI 2023: 287-292 - 2021
- [j47]Guo-Hua Qiu, Chin-Feng Lee, Chinchen Chang:
Turtle-shell data embedding method with high image fidelity. Int. J. Embed. Syst. 14(2): 149-159 (2021) - [j46]Chin-Feng Lee, Jau-Ji Shen, Somya Agrawal, Yen-Hsi Li:
High-Capacity Embedding Method Based on Double-Layer Octagon-Shaped Shell Matrix. Symmetry 13(4): 583 (2021) - 2020
- [j45]Chin-Feng Lee, Jau-Ji Shen, Somya Agrawal, Ying-Xiang Wang, Yen-Hsi Lee:
Data Hiding Method Based on 3D Magic Cube. IEEE Access 8: 39445-39453 (2020) - [j44]Guo-Hua Qiu, Chin-Feng Lee, Chin-Chen Chang:
Greedy algorithm for image quality optimisation based on turtle-shell steganography. Int. J. Comput. Sci. Eng. 23(1): 50-62 (2020) - [j43]Chin-Feng Lee, Chin-Chen Chang, Guanlong Li:
A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images. KSII Trans. Internet Inf. Syst. 14(6): 2554-2575 (2020) - [j42]Jau-Ji Shen, Chin-Feng Lee, Fang-Wei Hsu, Somya Agrawal:
A self-embedding fragile image authentication based on singular value decomposition. Multim. Tools Appl. 79(35-36): 25969-25988 (2020) - [j41]Chin-Feng Lee, Jau-Ji Shen, Yi-Jhen Wu, Somya Agrawal:
PVO-Based Reversible Data Hiding Exploiting Two-Layer Embedding for Enhancing Image Fidelity. Symmetry 12(7): 1164 (2020) - [j40]Chin-Feng Lee, Jau-Ji Shen, Somya Agrawal, Yu-Ju Tseng, Yu-Chi Kao:
A generalized pixel value ordering data hiding with adaptive embedding capability. J. Supercomput. 76(4): 2683-2714 (2020) - [c54]Chin-Feng Lee, Jau-Ji Shen, Zih-Cyuan Chao, Somya Agrawal:
An Improved Lossless Information Hiding in SMVQ Compressed Images. ICFET 2020: 119-124 - [c53]Jau-Ji Shen, Chin-Feng Lee, Chin-Ting Yeh, Somya Agrawal:
An Image Authentication Method Based on Deep Convolutional Generative Adversarial Network. ICFET 2020: 168-172 - [c52]Jau-Ji Shen, Chin-Feng Lee, Yu-Chuan Chen, Somya Agrawal:
Unsupervised Defect Detection based on Boundary Equilibrium Generative Adversarial Network. ICFET 2020: 178-182
2010 – 2019
- 2019
- [j39]Jianjun Li, Chin-Feng Lee, Chin-Chen Chang, Jiang-Yi Lin, Yun-He Wu:
Reversible Data Hiding Scheme Based on Quad-Tree and Pixel Value Ordering. IEEE Access 7: 142947-142962 (2019) - [j38]Chin-Ling Chen, Yue-Xun Chen, Chin-Feng Lee, Yong-Yuan Deng, Chi-Hua Chen:
An Efficient and Secure Key Agreement Protocol for Sharing Emergency Events in VANET Systems. IEEE Access 7: 148472-148484 (2019) - [j37]Chin-Feng Lee, Jau-Ji Shen, Yu-Chi Kao, Somya Agrawal:
Overlapping pixel value ordering predictor for high-capacity reversible data hiding. J. Real Time Image Process. 16(4): 835-855 (2019) - [j36]Chin-Feng Lee, Jau-Ji Shen, Zhao-Ru Chen, Somya Agrawal:
Self-Embedding Authentication Watermarking with Effective Tampered Location Detection and High-Quality Image Recovery. Sensors 19(10): 2267 (2019) - [j35]Chin-Feng Lee, Chi-Yao Weng, Cheng-Yu Kao:
Reversible data hiding using Lagrange interpolation for prediction-error expansion embedding. Soft Comput. 23(19): 9719-9731 (2019) - [c51]Chin-Ling Chen, Chin-Feng Lee, Fang-Wei Hsu, Yong-Yuan Deng, Ching-Cheng Liu:
Digital Image Anti-counterfeiting Technology. BWCCA 2019: 670-677 - [c50]Chin-Feng Lee, Jau-Ji Shen, Yi-Jhen Wu, Somya Agrawal:
Reversible Data Hiding Scheme Based on Difference Expansion Using Shiftable Block Strategy for Enhancing Image Fidelity. iCAST 2019: 1-6 - [c49]Jau-Ji Shen, Chin-Feng Lee, Yen-Hsi Li, Somya Agrawal:
Image Steganographic Scheme Based on Doublelayer Magic Matrix. iCAST 2019: 1-6 - 2018
- [j34]Chin-Feng Lee, Chin-Chen Chang, Xiaozhu Xie, Ke Mao, Run-Hua Shi:
An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes. Displays 53: 30-39 (2018) - [j33]Jianjun Li, Yun-He Wu, Chin-Feng Lee, Chin-Chen Chang:
Generalized PVO-K Embedding Technique for Reversible Data Hiding. Int. J. Netw. Secur. 20(1): 65-77 (2018) - [j32]Chin-Feng Lee, Ya-Chen Li, Shu-Chuan Chu, John F. Roddick:
Data Hiding Scheme Based on A Flower-Shaped Reference Matrix. J. Netw. Intell. 3(2): 138-151 (2018) - [j31]Chin-Feng Lee, Yi-Jia Wang, Shu-Chuan Chu, John F. Roddick:
An Adaptive Content-Based Image Retrieval Method Exploiting an Affine Invariant Region Based on a VQ-applied Quadtree Robust to Geometric Distortions. J. Netw. Intell. 3(3): 214-234 (2018) - [c48]Chin-Ling Chen, Yue-Xun Chen, Chin-Feng Lee, Yong-Yuan Deng:
A Survey of Authentication Protocols in VANET. BWCCA 2018: 572-577 - [c47]Chin-Feng Lee, Jau-Ji Shen, Fang-Wei Hsu:
A Survey of Semi-fragile Watermarking Authentication. IIH-MSP (1) 2018: 264-271 - [c46]Chin-Feng Lee, Jau-Ji Shen, Ting-Yi Ou-Yang:
A High Payload Edge Detection-Based Image Steganography Robust to RS-Attack by Using LSB Substitution and Pixel Value Differencing. IIH-MSP (1) 2018: 272-279 - [c45]Chin-Feng Lee, Jau-Ji Shen, Yu-Chi Kao:
High-Capacity Reversible Data Hiding Based on Star-Shaped PVO Method. IIH-MSP (1) 2018: 280-288 - 2017
- [j30]Chin-Feng Lee, Chi-Yao Weng, Kuan-Ting Li:
VQ-based Image Embedding Scheme Using Adaptive Codeword Grouping Strategy. J. Inf. Hiding Multim. Signal Process. 8(1): 54-67 (2017) - [j29]Chin-Feng Lee, Chi-Yao Weng, Kai-Chin Chen:
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection. Multim. Tools Appl. 76(7): 9993-10016 (2017) - [c44]Chin-Feng Lee, Ying-Xiang Wang:
An image hiding scheme based on magic square. iCAST 2017: 301-305 - [c43]Chin-Feng Lee, Chin-Chen Chang, Qun-Feng Zeng:
VQ Compression Enhancer with Huffman Coding. ICGEC 2017: 101-108 - [c42]Chi-Yao Weng, Yen-Chia Huang, Chin-Feng Lee, Dong-Peng Lin:
Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing. ICGEC 2017: 109-117 - [c41]Chin-Feng Lee, Jau-Ji Shen, Yu-Hua Lai:
A Survey of Reversible Data Hiding Schemes Based on Two-Dimensional Histogram Modification. IIH-MSP (1) 2017: 3-11 - [c40]Chin-Feng Lee, Jau-Ji Shen, Zhao-Ru Chen:
Steganographic Image Hiding Schemes Based on Edge Detection. IIH-MSP (1) 2017: 12-20 - 2016
- [j28]Ya-Feng Di, Chin-Feng Lee, Zhi-Hui Wang, Chin-Chen Chang, Jianjun Li:
A Robust and Removable Watermarking Scheme Using Singular Value Decomposition. KSII Trans. Internet Inf. Syst. 10(12): 5268-5285 (2016) - [j27]Chin-Feng Lee, Chi-Yao Weng, Aneesh Sharma:
Steganographic access control in data hiding using run-length encoding and modulo-operations. Secur. Commun. Networks 9(2): 139-148 (2016) - [c39]Jau-Ji Shen, Chin-Feng Lee, Kun-Liang Hou:
Improved Productivity of Mosaic Image by K-medoids and Feature Selection Mechanism on a Hadoop-Based Framework. NaNA 2016: 288-293 - [c38]Chin-Feng Lee, Yu-Ju Tseng:
A Pixel Value Ordering Predictor for High-Capacity Reversible Data Hiding. NaNA 2016: 319-324 - 2015
- [j26]Chin-Feng Lee, Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Liu:
Adjustment Hiding Method Based on Exploiting Modification Direction. Int. J. Netw. Secur. 17(5): 607-618 (2015) - [j25]Chin-Feng Lee, Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Liu:
An Adjustable and Reversible Data Hiding Method Based on Multiple-base Notational System without Location Map. J. Inf. Hiding Multim. Signal Process. 6(1): 1-28 (2015) - [c37]Kuo Sheng Deng, Chin-Feng Lee, Jerry Chou, Yi-Chen Shih, Shang Hao Chuang, Po Hsuan Wu:
pNFS-Based Software-Defined Storage for Information Lifecycle Management. CCBD 2015: 89-92 - [c36]Chin-Feng Lee, Si-Ting Chen, Jau-Ji Shen:
Reversible Dual-image Data Embedding on Pixel Differences Using Histogram Modification Shifting and Cross Magic Matrix. IIH-MSP 2015: 113-116 - [c35]Chin-Feng Lee, Yu-Ju Tseng:
An Improvement to Image Interpolating Based Data Embedding Using Reversible Pixel Shifting Modification and Direction Modification Operation. IIH-MSP 2015: 117-120 - 2014
- [c34]Chin-Feng Lee, Jui-Yu Chen, Si-Ting Chen:
A High Capacity Reversible Multiple-Image Hiding Scheme. ICS 2014: 875-884 - 2013
- [j24]Zhi-Hui Wang, Chin-Feng Lee, Ching-Yun Chang:
Histogram-shifting-imitated reversible data hiding. J. Syst. Softw. 86(2): 315-323 (2013) - [j23]Chin-Feng Lee, Yu-Lin Huang:
Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun. Syst. 52(4): 2237-2247 (2013) - [j22]Ya-Ting Chang, Cheng-Ta Huang, Chin-Feng Lee, Shiuh-Jeng Wang:
Image interpolating based data hiding in conjunction with pixel-shifting of histogram. J. Supercomput. 66(2): 1093-1110 (2013) - [c33]Ya-Ting Chang, Min-Ju Chung, Chin-Feng Lee, Cheng-Ta Huang, Shiuh-Jeng Wang:
Memory Forensics for Key Evidence Investigations in Case Illustrations. AsiaJCIS 2013: 96-101 - [c32]Chin-Feng Lee, Chin-Chen Chang, Cheng-You Gao:
A Two-Staged Multi-level Reversible Data Hiding Exploiting Lagrange Interpolation. IIH-MSP 2013: 485-488 - [c31]Yi-Ting Chen, Bin-Yih Liao, Chin-Feng Lee, Wu-Der Tsay, Mei-Chiao Lai:
An Adjustable Frequency Bat Algorithm Based on Flight Direction to Improve Solution Accuracy for Optimization Problems. RVSP 2013: 172-177 - [p1]Chin-Feng Lee, Hsing-Ling Chen:
Lossless Text Steganography in Compression Coding. Recent Advances in Information Hiding and Applications 2013: 155-179 - 2012
- [j21]Chin-Feng Lee, Hsing-Ling Chen:
Adjustable prediction-based reversible data hiding. Digit. Signal Process. 22(6): 941-953 (2012) - [j20]Chin-Feng Lee, Yu-Lin Huang:
An efficient image interpolation increasing payload in reversible data hiding. Expert Syst. Appl. 39(8): 6712-6719 (2012) - [j19]Chin-Feng Lee, Hung-Yu Chien, Chi-Sung Laih:
Server-less RFID authentication and searching protocol with enhanced security. Int. J. Commun. Syst. 25(3): 376-385 (2012) - [c30]Chin-Feng Lee, Ming-Chi Shih, Cheng-Ta Huang:
An Efficient Lossless Data Hiding Scheme on VQ Index Coding. AsiaJCIS 2012: 6-9 - [c29]Chi-Yao Weng, Chun-I Fan, Chin-Feng Lee, Shiuh-Jeng Wang:
Predictive pixel differencing expansion in data reversibility scheme. ICUIMC 2012: 17:1-17:7 - [c28]Cheng-Ta Huang, Wei-Jen Wang, Min-Yi Tsai, Chin-Feng Lee:
Employing LSB and VQ for Undetectable Secret Data Hiding. UIC/ATC 2012: 644-649 - 2011
- [j18]Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng-Cheng Tsai:
A Hierarchical Fragile Watermarking with VQ Index Recovery. J. Multim. 6(3): 277-284 (2011) - [j17]Hung-Yu Chien, Chia-Chuan Yang, Tzong-Chen Wu, Chin-Feng Lee:
Two RFID-based Solutions to Enhance Inpatient Medication Safety. J. Medical Syst. 35(3): 369-375 (2011) - [j16]Hung-Min Sun, Chi-Yao Weng, Chin-Feng Lee, Cheng-Hsing Yang:
Anti-Forensics with Steganographic Data Embedding in Digital Images. IEEE J. Sel. Areas Commun. 29(7): 1392-1403 (2011) - [j15]Chin-Chen Chang, Kuo-Nan Chen, Chin-Feng Lee, Li-Jen Liu:
A secure fragile watermarking scheme based on chaos-and-hamming code. J. Syst. Softw. 84(9): 1462-1470 (2011) - [j14]Chin-Feng Lee, Ying-Hsuan Huang, Chin-Chen Chang, Tien-Chung Liu:
A Prediction-Based Adaptive Reversible Data Embedding Scheme. J. Softw. 6(9): 1813-1820 (2011) - [c27]Chin-Feng Lee, Ming-Chi Shih:
Reversible Data Hiding Based on VQ Compression Code. ICGEC 2011: 208-211 - [c26]Chin-Feng Lee, Kai-Chin Chen:
Reversible Data Hiding by Reduplicated Exploiting Modification Direction Method. IIH-MSP 2011: 256-259 - 2010
- [j13]Hung-Yu Chien, Chin-Feng Lee, Shih-Bin Liu, Tzong-Chen Wu:
Enhancing convenience and situation-aware intelligence of smart home services using passive RFID and intelligent controls. Int. J. Internet Protoc. Technol. 5(3): 166-173 (2010) - [j12]Chin-Feng Lee, Hsing-Ling Chen, Shu-Hua Lai:
An adaptive data hiding scheme with high embedding capacity and visual image quality based on SMVQ prediction through classification codebooks. Image Vis. Comput. 28(8): 1293-1302 (2010) - [j11]Chin-Feng Lee, Wan-Ting Chang:
Recovery of Color Images by Composed Associative Mining and Edge Detection. J. Inf. Hiding Multim. Signal Process. 1(4): 310-324 (2010) - [j10]Chin-Feng Lee, Hsing-Ling Chen:
A novel data hiding scheme based on modulus function. J. Syst. Softw. 83(5): 832-843 (2010) - [j9]Chin-Feng Lee, Hsing-Ling Chen, Hao-Kuan Tso:
Embedding capacity raising in reversible data hiding based on prediction of difference expansion. J. Syst. Softw. 83(10): 1864-1872 (2010) - [c25]Chin-Feng Lee, Chin-Chen Chang, Chun-Yu Wu:
A reversible and multiple-layer embedding strategy with high capacity. ICUIMC 2010: 51
2000 – 2009
- 2009
- [c24]Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng-Cheng Tsai:
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation. IAS 2009: 615-618 - [c23]Chin-Feng Lee, Chin-Chen Chang, Tien-Chung Liu:
A VSS Scheme of Image Size Invariant for Vertical Edge Enhancement. HIS (1) 2009: 13-16 - [c22]Chin-Feng Lee, Kuo-Hua Wang, Chin-Chen Chang, Yu-Lin Huang:
A reversible data hiding scheme based on dual steganographic images. ICUIMC 2009: 228-237 - [c21]Kuo-Nan Chen, Chin-Feng Lee, Chin-Chen Chang:
Embedding secret messages based on chaotic map and Huffman coding. ICUIMC 2009: 336-341 - [c20]Kuo-Nan Chen, Chin-Feng Lee, Chin-Chen Chang, Huang-Ching Lin:
Embedding Secret Messages Using Modified Huffman Coding. IIH-MSP 2009: 278-281 - [c19]Chin-Feng Lee, Jau-Ji Shen, Mei-Chun Chuang:
An Embedding Technique Based upon Block Prediction and Code Cascading Shift. IIH-MSP 2009: 361-364 - [c18]Chin-Feng Lee, Hsing-Ling Chen:
Data Concealment Scheme for HTML Documents Based on Color Code. IIH-MSP 2009: 632-635 - 2008
- [j8]Chin-Feng Lee, Chin-Chen Chang, Kuo-Hua Wang:
An improvement of EMD embedding method for large payloads by pixel segmentation strategy. Image Vis. Comput. 26(12): 1670-1676 (2008) - [c17]Chin-Feng Lee, Lin-Yi Chuang, Chin-Chen Chang:
Hiding Information Employing Reduplicating Embedding. APSCC 2008: 825-828 - [c16]Chin-Chen Chang, Chin-Feng Lee, Yi-Ren Wang:
An Improved EMD Embedding Scheme Based on Secret Image Difference. EUC (1) 2008: 129-135 - [c15]Chin-Feng Lee, Yi-Ren Wang, Chin-Chen Chang:
An adaptive EMD embedding method by condensing secret messages based on consecutive ones transformation and token substitution. ICUIMC 2008: 390-395 - [c14]Chin-Feng Lee, Hsing-Ling Chen:
Reversible Data Embedding Using the Sliding Window. IIH-MSP 2008: 1118-1121 - [c13]Chin-Feng Lee, Huai-En Lee:
A Blind Associative Watermark Detection Scheme Using Self-Embedding Technique. IIH-MSP 2008: 1122-1125 - [c12]Chin-Feng Lee, Pei-Yan Pai, Wen-Hung Huang, Chin-Chen Chang:
An Effective Demosaicking and Zooming Algorithm for CFA Images. IIH-MSP 2008: 1150-1153 - [c11]Chin-Feng Lee, Chin-Chen Chang, Kuo-Hua Wang:
Hiding Data in VQ-Compressed Images Using Pairwise Nearest Codewords Based on Minimum Spanning Tree. IIH-MSP 2008: 1293-1296 - [c10]Chin-Feng Lee, Shu-Ching Wang, Yi-Jia Wang:
Content-Based Image Retrieval Based on Vector Quantization and Affine Invariant Region. ISDA (1) 2008: 287-290 - [c9]Yuan-Liang Tang, Chin-Feng Lee, Huai-En Lee:
Efficient Image Recovery Based on Self-Embedding. ISDA (3) 2008: 398-402 - [c8]Chin-Feng Lee, Tsung-Chia Yang:
A Blind Associative Watermarking Technique Using Self-Embedding. ISDA (3) 2008: 409-413 - [c7]Chin-Feng Lee, Jau-Ji Shen, Hung-Lin Chao:
Complete Double Layered Embedding Scheme for Information Hiding. ISDA (3) 2008: 525-528 - 2007
- [c6]Chin-Feng Lee, Hsing-Ling Chen:
High-Capacity Data Hiding Using Virtual Window Partition. IIH-MSP 2007: 315-318 - [c5]Chin-Chen Chang, Chin-Feng Lee, Lin-Yi Chuang:
Using Dynamic Programming Strategy to Find an Optimal Solution to Exploiting Modification Direction Embedding Method. IIH-MSP 2007: 489-492 - [c4]Chin-Feng Lee, Yi-Ren Wang, Chin-Chen Chang:
A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction. IIH-MSP 2007: 497-500 - 2006
- [j7]Chin-Feng Lee, S. Wesley Changchien, Wei-Tse Wang, Jau-Ji Shen:
A data mining approach to database compression. Inf. Syst. Frontiers 8(3): 147-161 (2006) - [c3]Chin-Feng Lee, Chia-Hsing Tsai:
Efficient Associating Mining Approaches for Compressing Incrementally Updatable Native XML Databases. IMECS 2006: 298-305 - 2005
- [c2]Chin-Feng Lee, Tsung-Hsien Shen:
An FP-split method for fast association rules mining. ITRE 2005: 459-463 - 2004
- [j6]S. Wesley Changchien, Chin-Feng Lee, Yu-Jung Hsu:
On-line personalized sales promotion in electronic commerce. Expert Syst. Appl. 27(1): 35-52 (2004) - 2000
- [j5]Chin-Feng Lee, Chin-Chen Chang:
Breadth-first search oriented symbolic picture representation for spatial match retrieval. J. Syst. Softw. 52(1): 11-23 (2000)
1990 – 1999
- 1998
- [j4]Chin-Chen Chang, Chin-Feng Lee:
A Bin-Tree Oriented Iconic Indexing Scheme for Retrieving Symbolic Pictures. Data Knowl. Eng. 26(2): 121-133 (1998) - [j3]Chin-Chen Chang, Chin-Feng Lee:
A spatial match retrieval mechanism for symbolic pictures. J. Syst. Softw. 44(1): 73-83 (1998) - 1997
- [j2]Chin-Chen Chang, Chin-Feng Lee:
Spatial match retrieval based on direction signatures using multiple key hashing scheme. Int. J. Intell. Syst. 12(10): 777-788 (1997) - 1996
- [c1]Chin-Feng Lee, Chin-Chen Chang:
Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme. CODAS 1996: 526-529 - 1995
- [j1]Chin-Chen Chang, Chin-Feng Lee:
Relative coordinates oriented symbolic string for spatial relationship retrieval. Pattern Recognit. 28(4): 563-570 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint