¡@

¡· Ph.D. students 

l  ªL·¡­}¡]2009¦~5¤ë²M¤j¸ê¤u¨t³Õ¤h¯Z²¦·~¡A³Õ¤h½×¤åÃD¥Ø¡G³nÅé´ú¸Õ»P°£¿ù¶¥¬q¤§¥i¾a«×¶q¤Æ¤ÀªR»PºÞ²z (Reliability Analysis and Management during Software Testing and Debugging)¡F²{¥ô±Ð©ó°ê¥ß¹Å¸q¤j¾Ç¸ê°T¤uµ{¾Ç¨t¡^

l  ³\¥üº_¡]²M¤j¸ê¤u¨t³Õ¤h¯Z¡A2005¦~9¤ë¤J¾Ç¡F 2011¦~7¤ë²¦·~¡A³Õ¤h½×¤åÃD¥Ø¡G°ò©ó¤u§@¶q»P¥i¾a«×¶q´ú¼Ò«¬¤§³nÅé«~½è«OÃÒ¬ã¨s (Model-Based Effort and Reliability Measurement for Software Quality Assurance¡^

l  ±i§g¾§¡]²M¤j¸êÀ³©Ò³Õ¤h¯Z¡A2006¦~9¤ë¤J¾Ç¡F2011¦~7¤ë²¦·~¡A³Õ¤h½×¤åÃD¥Ø¡G¨ã°ª®Ä²v¤Î¦¨¥»®Ä¯q³nÅé´ú¸Õ¤èªk¤§³]­p»P¤ÀªR (Design and Analysis of High-Efficient and Cost-Effective Software Testing Methods¡^

l  ´^«a¤O¡]²M¤j¸ê¤u¨t³Õ¤h¯Z¡A2009¦~9¤ë¤J¾Ç¡F 2015¦~10¤ë²¦·~¡A³Õ¤h½×¤åÃD¥Ø¡G¥HªA°È¬°°ò¦ªº³nÅé¨t²Î¥i¾a«×¼Ò«¬¤Î®e¿ù³]­p (Reliability Modeling and Fault-Tolerant Design of Service-Based Software Systems)¡^

l  ¤è§Ó±j¡]²M¤j¸ê¤u¨t³Õ¤h¯Z¡A2020¦~9¤ë¤J¾Ç¡^

      

¡· MS. Students

¡·  2024¦~¤J¾Ç 

l  ²¥°­õ¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡^

l  ¦ó¨Î¿o¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡^

l  ¹ù­Y´¸¡]²M¤j¸ê¦w©ÒºÓ¤h¯Z¡^

l  ·¨©ö¸©¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡^

 

¡·  2023¦~¤J¾Ç 

l  ¬x±êºð¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡^

l  ³¯«a°a¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡^

l  ±dªåÞ±¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡^

l  ªL¤ß±©¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡^

 

¡·  2022¦~¤J¾Ç 

l  ¼B«Ø½å¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡^

l  ´å­z¦t¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡^

l  ªL¹t»T¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡^

l  ªô¨K»y¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡^

 

¡·  2021¦~¤J¾Ç 

l  ¶À¬fºû¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¥H¼ÒÀÀ¥æ©ö¨Ó°»´ú°ò©ó¦Û°Ê¤Æ³y¥«¾÷¨îªº»ù®æ¹w¨¥¾÷®zÂI¤èªk(A Method of Using Transaction Simulation to Detect AMM-based Price Oracle Vulnerabilities)

l  ±ç´ð±ö¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¦bÂà´«¾¹¤¤¨Ï¥Î«D³Å¨½¸­©M©â¶H»yªk¾ðµ²ºc¬Û¹ï¦ì¸mªí¥Üªk¨Ó¶i¦æµ{¦¡½XºK­n(Applying Non-Fourier and AST-Structural Relative Position Representations in Transformer for Source Code Summarization)¡^¡iºÓ¤h¾Ç¦ì½×¤å¦b2023²Ä¤Q¤»©¡±R¶V½×¤å¤j½à±o¨ì¢Ï¢×¸ê°T²Õ¡mÀuµ¥½×¤å¼ú¡n¡FºÓ¤h¾Ç¦ì½×¤å´Á¥Zª©¥»µoªí©óIEEE Access¡j

 

¡·  2020¦~¤J¾Ç 

l  ¯¬¶ÇÌÉ¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¹B¥Î»~¤ÀÃþ°»´ú»PÂ÷¸s­È­×¥¿©ó²`«×¾Ç²ß¨t²Î¤§¿ù»~­×´_(Adopting Misclassification Detection and Outlier Modification to Fault Correction in Deep Learning System)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEE QRS 2022¡j

l  ³¯©v¼Ý¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¨Ï¥Î°ò©ó¼v¹³¨ãªÅ¶¡ª÷¦r¶ð¦À¤Æ¼hªº¨÷¿n¯«¸gºô¸ô¤§³nÅé¯Ê³´¹w´ú¤èªk(Image-Based Approach for Software Defect Prediction by using CNN with Spatial Pyramid Pooling Layer)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEE QRS 2024¡j

 

¡·  2019¦~¤J¾Ç 

l  ·¨©v¿«¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡Gµ²¦X¦h¼h¦¸¼Ò¶ô¤Æ¤À¸s»P¦h¼Ò¦¡ºtºâªk¥H¼W¶i³nÅé¼Ò²Õ¤Æ«~½è(Incorporating Multi-Level Modularity Clustering into Multi-Pattern algorithms for Improving the Quality of Software Modularization)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEE QRS 2023¡j

l  §õ¯uµØ¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¥Î©ó§ï¶i´ú¸Õ®M¥óºë²®Ä²v¤§°ò©óÂO¶°¤§¤èªk(Cluster-Based Approaches for Improving the Effectiveness of Test Suite Reduction)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óInternational Journal of Performability Engineering¡j

 

¡·  2018¦~¤J¾Ç 

l  ³¯·¢¤å¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡GÀ³¥Î«DºÊ·þ¦¡¾Ç²ß¤èªk©ó¤å¥»»EÃþ»P¦Û°Ê³nÅé¤ÀÃþ¤§¬ã¨s (A Study of Applying Unsupervised Learning Methods for Document Clustering and Automatic Categorization of Software)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEM 2021¡FºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óInternational Journal of Performability Engineering¡j

l  ²ªY§±¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡GÀ³¥Î¤Á¤ù°ò©³¥i´ú¸Õ©ÊÂà´«©ó§ï¶i²Å¸¹°õ¦æ´ú¸Õ¸ê®Æ¥Í¦¨(Applying Slicing-Based Testability Transformation to Improve Test Data Generation with Symbolic Execution)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óInternational Journal of Performability Engineering¡j

l  ´¿¬Rºa¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G°ò©ó¨÷¿n¯«¸gºô¸ô¤ÎÃѧO¦r¤Á³Î¤èªk¥H§ï¶iµ{¦¡½Xµù¸Ñ¤§¦Û°Ê¥Í¦¨(Improving Automatic Generation of Source Code Comments using Convolutional Neural Networks and ID-splitting Method)¡^

 

¡·  2017¦~¤J¾Ç 

l  §d¬F¶§¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¥Î©ó³nÅé¥i¾a«×¤ÀªR¤§¥H²`«×¾Ç²ß¬°°ò¦ªº¥[Åv²Õ¦X¼Ò«¬(Weighted Combinations of Deep-Learning Based Models for Software Reliability Analysis)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óIEEE Transactions on Reliability¡j

l  ¤_®x§°¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡GÀ³¥Î²`«×¾Ç²ß¼Ò«¬»Pª`·N¤O¾÷¨î©ó³nÅé¿ù»~¹w´ú¤§¬ã¨s(Analysis of Applying Deep Learning Model with Attention Mechanism for Software Defect Prediction)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEE DSA 2021¡j

l  ªL¤pªÚ¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¦Ò¶q¦h­««~½è¦]¯À¤§¥H²`«×¾Ç²ß¬°°ò¦ªººô¸ôªA°È¼Ò«¬¤ÀªR»Pµû¦ô(Analysis and evaluation of deep-learning based Web service model considering multiple quality factors)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEE QRS 2021¡j

 

¡·  2016¦~¤J¾Ç 

l  Ĭºû¶v¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G°ò©ó²`«×¾Ç²ß¹B¥Î¥[Åv¿E¬¡¨ç¼Æ§ï¶i³nÅé¿ù»~¹w´ú (Using Weighted Activation Function to Improve Software Defect Prediction Based on Deep Learning )¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEM 2019¡FºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óIEEE Transactions on Reliability¡j

l  ¼B¦A¥Í¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¨Ï¥Î¦Ò¶q¦h­±¦Vª«¥ó¾É¦V¯S©Ê¤§°ÊºA¶q´ú¨Ó§ï¶iÃþ§O½¢¦X¤O(Using Dynamic Measurement to Improve Coupling at the Class Level by Considering Multiple Object-Oriented Features)¡^

l  ªL¤l´­¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G°ò©ó²`«×¾Ç²ß¤§µ{¦¡°£¿ù»P­×´_¹êÃÒ¬ã¨s(An Empirical Investigation of Using Deep Learning-Based Approaches for Program Debugging and Repair)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEE DSA 2023¡j

 

¡·  2015¦~¤J¾Ç 

l  ªL§Ó«H¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¨Ï¥Î¦û¥ý¦¡Àu¥ýÅv±Æ¶¤¼Ò«¬¤Î¥H³t²v¬°°ò¦¤§¼ÒÀÀµ{§Ç©ó³nÅé¥i¾a«×¤ÀªR(Software Reliability Analysis Using Preemptive Priority Queueing Models and Rate-Based Simulation Procedures)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óJournal of Systems & Software¡j

l  ³¯©É´@¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¹B¥Î¦Ò¶q¥i²z¸Ñ©Ê»P«~½èÅX°Ê¼Ò²Õ¤Æ¦h¯S¼xÂO¶°ºtºâªk¥H¼W±j³nÅéºûÅ@«×(Enhancing Software Maintainability by Using Multi-Pattern Clustering Algorithm Considering Both Understandability and Quality Driven Modularization)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óIET Software (predecessor: IEE Proceedings - Software)¡j

l  ¦¿©s¦Ë¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¦Ò¶q¿ù»~¶Ç»¼¤Î³nÅé®e¿ù¤§ªA°È¾É¦V³nÅé¨t²Î¥i¾a«×µû¶q»P±Ó·P«×¤ÀªR(Considering Error Propagation and Fault Tolerance in Reliability Assessment and Sensitivity Analysis of Service Oriented Software Systems)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óIEEE Transactions on Reliability¡j

 

¡·  2014¦~¤J¾Ç 

l  ¿à¹Å®¦¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡GÀ³¥Î¼Ò½k±M®a¨t²Î¤èªk©ó´ú¸Õ®M¥ó精²¤Î´ú¸Õ­Ó®×Àu¥ý±Æ§Ç¥H§ï¶i¬G»Ù°»¿ù¯à力(Improving Fault Detection Capability by Incorporating Fuzzy Expert System Approach into Test Suite Reduction and Test Case Prioritization)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óInformation and Software Technology¡j

l  ½±©u­Û¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡GÀ³¥Î¥[Åv²Õ¦X´ú¸Õ¼Ð·Ç©ó³nÅé´ú¸Õ®M¥ó精²¹êÅç¬ã¨s¤§¤ÀªR(Analysis of Experimental Studies on Weighted Combinatorial Testing Criterion for Software Test Suite Reduction)¡^¡iºÓ¤h¾Ç¦ì½×¤å´Á¥Zª©¥»µoªí©óQuality and Reliability Engineering International¡j

l  «JÅtêd¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¨Ï¥Î²Î­p¸ê®Æ¤ÀªR¤èªk§ï¶i³nÅé¥i¾a«×«Ø¼Ò¤§¥i«H«×(Using the Methods of Statistical Data Analysis to Improve the Trustworthiness of Software Reliability Modeling)¡^¡iºÓ¤h¾Ç¦ì½×¤å´Á¥Zª©¥»µoªí©óIEEE Access¡j

 

¡·  2013¦~¤J¾Ç 

l  ¶µ®a®¦¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¶}·½ª«¥ó¾É¦V¨t²Î¤§½¢¦X¤O¶q¤Æ¶q´ú (Quantitative Measurement of the Coupling of Open Source Object-Oriented System)¡^

l  ³¯©¾ÑÔ¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡GÀ³¥Î¼Ò½k±M®a¨t²Î¤èªk©ó´ú¸Õ®M¥óºë²¤§¬ã¨s(A Study of Test Suite Reduction with the Fuzzy Expert System Approach)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óInformation and Software Technology¡j

l  ½²½Î¿o¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¦Ò¶q¿ù»~¶Ç»¼¼vÅT¤§ªA°È¾É¦V³nÅé¨t²Î¥i¾a«×¹w´ú»Pµû¶q(Reliability Prediction and Assessment of Service-Oriented Software Systems Considering the Effect of Error Propagation)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óIEEE Transactions on Reliability¡j

l  ªôÎë¦Ð¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡GÅv­«²Õ¦Xºtºâªk©ó´ú¸Õ­Ó®×ºë²¤§¤ÀªR»P¤ñ¸û( Analysis and Comparison of Weighted Combinatorial Algorithms for Test Suite Reduction)¡^¡iºÓ¤h¾Ç¦ì½×¤å´Á¥Zª©¥»µoªí©óQuality and Reliability Engineering International¡j

  

¡·  2012¦~¤J¾Ç 

l  ±i®Ñ¸Û¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¹B¥Î§Ö±¶±Æ¶¤²z½×¤èªk©ó³nÅé¶}µo¤H­û°t¸m»PºÞ²z¤§¬ã¨s(A Study of Applying Express Queueing Theoretic Approach to Personal Allocation and Management in Software Development)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEE ICSPCC 2016¡j

l  ³¯«a¾§¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¨Ï¥Î­×¥¿ÂX´²¼Ò«¬©ó¶}©ñ·½³nÅé¨t²Î¤§¥i¾a«×µû¦ô»PºÞ²z(Applying Modified Diffusion Models to Reliability Assessment and Management for Open Source Software System)¡^¡iºÓ¤h¾Ç¦ì½×¤å´Á¥Zª©¥»µoªí©óIEEE Access¡j

l  ¤ý²»¦w¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¨Ï¥Î©¬º¸¦±½uÅÜ°ÊÂI¼Ò«¬¥h¹w´ú¶}·½³nÅé®zÂI¤§¬ã¨s(A Study of Using Parr-Curve Change-Point Model to Predict Vulnerabilities in Open-Source Software)¡^

 

¡·  2011¦~¤J¾Ç 

l  ¥ÛªY®¦¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡GÀ³¥Î¥[±j«¬³æ¤@ÅÜ°ÊÂI¼Ò«¬©ó³nÅé®zÂI¤À§G¤§¤ÀªR»Pµû¦ô( Analysis and Evaluation of Enhanced Single Change-Point Model for Software Vulnerability Distribution)¡^

l  ³¢¤l·ì¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¨Ï¥Î¦³­­¦øªA¾¹±Æ¶¤¼Ò«¬©ó³nÅé°»¿ù»P²¾°£¹Lµ{¤§¥i¾a«×¤ÀªR»PÀ³¥Î(Reliability Analysis and Application of Using Finite Server Queuing Models in the Detection and Removal Processes of Software Faults)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óIEEE Trans. on Emerging Topics in Computing¡j

l  ¶À¸Ö¶{¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¹B¥Î¼Ò«¬²Õ¦X¤èªk©ó¶}©ñ·½½X³nÅé³W¼ÒÅܰʤ§¤ÀªR(Using Model Combinatorial Methods to Analyze Program Size Variation in Open-Source Software)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óIEEE Reliability Digest, Special Issue on Trustworthy Computing and Cybersecurity¡j

l  ´åÂí¬v¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¦Ò¶q¦h­«¥Ø¼Ð³Ì¨Î¤Æ¤§¶}©ñ­ì©l½X³nÅéÄÀ©ñ®É¾÷»PºÞ²z(Open Source Software Release Time and Management Considering Multi-objective Optimization¡^¡^¡iºÓ¤h¾Ç¦ì½×¤å´Á¥Zª©¥»µoªí©óIEEE Access¡j

 

¡·  2010¦~¤J¾Ç 

l  ÷á²Ð»Z¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¹B¥Î¨ã³æÅÜ´«ÂIÂù°Ñ¼Æ¼s¸q¬f©Ô¹Ï¼Ò«¬©ó¶}©ñ·½½X³nÅ餧¿ù»~¤À§G¤ÀªR(Applying 2-Parameter Generalized Pareto Model with Single Change-Point to Analyze the Fault Distribution of Open Source Software)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óIEEE Transactions on Reliability¡j

l  ¬_°a³y¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¨ã©¬º¸¦±½u´ú¸Õ¤u§@¶q¤À§G¤ÎÅÜ°ÊÂIªº³nÅé¥i¾a«×¼Ò«¬¤§¶q´ú»P¤ÀªR(Measurement and Analysis of Software Reliability Model with Parr-Curve Testing-Effort Distribution and Change-Points)¡^¡iºÓ¤h¾Ç¦ì½×¤å´Á¥Zª©¥»µoªí©óQuality and Reliability Engineering International¡j

l  ´å©y¾Ë¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¥Î©ó³nÅé°£¿ù¤§­×¥¿¬Û¦ü«Y¼ÆÀWÃЦ¡¿ù»~©w¦ì¤èªk¤§¤ÀªR(Analysis of Spectrum-Based Fault Localization Methods with Modified Similarity Coefficients for Software Debugging)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEE COMPSAC 2013¡j

 

¡·  2009¦~¤J¾Ç 

l  §õ®a»¨¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¹B¥Î¥H¬G»Ù¬°°ò©³¤§Ãþ°ò¦]³W¹º¤èªk©ó³nÅé¦Û°Ê­×´_¤§¤ÀªR (Analysis of Automatic Software Correction Using a Fault-Based Genetic-Like Programming Approach)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óInternational Journal of Performability Engineering¡j

l  ³¯«aÀM¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¹B¥Î¤¶­±¤¬°Ê¼Ò«¬©ó´O¤J¦¡³nÅé¦Û°Ê¤Æ´ú¸Õ (Automated Testing of Embedded Software Using an Interface Interaction Model)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óICSSC 2015¡j

l  ¤ý«~Ò²¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¨ã®e¿ù³]­p¤§ºô¸ôªA°È¨t²Î¥i¾a«×¤ÀªR»Pµû¦ô (Reliability Analysis and Assessment of Web Services-based System with Fault Tolerance Design)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óFSE InnoSWDev 2014¡j

l  §õ¬f¿ª¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¥Î©ó³nÅé´ú¸Õ­×¥¿±ø¥ó/§PÂ_Âл\·Ç«h¤§³g°ý¦¡ºtºâªk¬ã¨s( Analysis of a Greedy-Based Algorithm for Modified Condition/Decision Coverage Criteria in Software Testing)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEE SRDS 2017¡j

 

¡·  2008¦~¤J¾Ç 

l  ®}·Ï²M¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡GÀ³¥ÎÄY­«©ÊÅv­«³g°ýºtºâªk©ó´ú¸Õ®×¨Ò±Æ§Ç¤§®Ä¯àµû¦ô (Performance Assessment of Applying Severity-Weighted Greedy Algorithm to Test Case Prioritization)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEM 2014¡j

 

¡·  2007¦~¤J¾Ç 

l  ¶À¬R»ô¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¹B¥Î°ò¦]ºtºâªk»P´ú¸Õ¾ú¥v©ó¦¨¥»»{ª¾ªº´ú¸Õ­Ó®×±Æ§Ç¤§³]­p»P¤ÀªR (Design and Analysis of Cost-Cognizant Test Case Prioritization Using Genetic Algorithm with Test History)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEE COMPSAC 2010¡j

l  ¼B­³¨k¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¹B¥ÎÂл\²v¸ê°T©ó¾ú¥v¼Æ­È¤èªk¤§´ú¸Õ­Ó®×Àu¥ý±Æ¦C (Applying Coverage Information for Historical Value Approach Test Case Prioritizationg)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEE DSN 2011¡j

l  Urbina Nancy Ofelia¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡A¨Ó¦Û§»³£©Ô´µHonduras¡AºÓ¤h½×¤åÃD¥Ø¡G§Q¥Î½u©ÊÅv­«²Õ¦X¼Ò«¬§ï¶i³nÅé¶}µo¤u§@¶q¹w¦ôºë½T«×ªº¬[ºc (A Framework for Improving the Accuracy of Software Effort Estimation Using Linearly Weighted Combinational Models)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEE BINDIS 2010¡j

 

¡·  2006¦~¤J¾Ç 

l  ªL«TÞ³¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡GÀ³¥Î§ï¨}¦¡¥­¤â§P§O§Þ¥©©ó´ú¸Õ­Ó®×ºë²ºtºâªk¤§¤ÀªR (Test Suite Reduction Analysis with Enhanced Tie-Breaking Techniques)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óInformation and Software Technology¡j

l  §d©ø¿Ù¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡GÀ³¥Î©â¶H©w¸q¤Î¾Ö¦³ªÌ¼Ò«¬¥H¤ÀªR«ü¼Ð¦æ¬°¤§¹ê§@¤èªk (Implementation of Pointer Analysis with Abstract Domain and Owner Sets Model)¡^

l  ±i¥ÃªY¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¨Ï¥ÎÅv­«¤èªk©ó¹Ï§Î¨Ï¥ÎªÌ¤¶­±´ú¸Õ­Ó®×Àu¥ý±Æ§Ç¤§¤ÀªR»P³]­p (Analysis and Design of GUI Test Case Prioritization Using Weight-Based Methods)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óJournal of Systems and Software¡j

 

¡·  2005¦~¤J¾Ç 

l  ½²©v¿«¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¹B¥Î©µ¦ùªºPIE§Þ³N©ó³nÅé¥i´ú¸Õ©Ê¤ÀªR¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEE COMPSAC 2009¡j

l  ¤è«a²Î¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G´£¤É¤¾¾l°O¾ÐÅé¥i¾a«×¤§¼W±j¤Á³Îºtºâªk³]­p»P¤ÀªR (Design and Analysis of Enhanced Cutting Algorithms for Increasing the Reliability of Redundant Memories)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óInternational Journal of Systems Science¡j

l  Áé¦t¶{¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¥H´ú¸Õ¬°°ò¦ªº³nÅé¿ù»~©w¦ì­×¥¿¤èªk¤Î¨äÀ³¥Î (A Modified Testing-Based Fault Localization Method and Its Application)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEE PRDC 2008¡j

l  ¬x»Aîû¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡GÀ³¥Î¦³­­¤ÎµL­­±Æ¶¤理論¼Ò«¬©ó´ú¸Õ»P¾Þ§@¶¥¬q¤§³nÅé¥i¾a度¶ì¼Ò (Software Reliability Modeling During the Test and Operational Phases, Using Finite and Infinite Server Queueing Models)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEE SSIRI 2009¡FºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óComputers & Mathematics with Applications¡j

l  ³¯ÃÙ¤¸¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡AºÓ¤h½×¤åÃD¥Ø¡G¨Ï³nÅé¥i¾a度¼Ò«¬¤§參數µû¦ô更¦³®Ä¥B§Ö³tªº°ò¦]ºtºâªk(A More Effective and Faster Genetic Algorithm for Parameter Estimation of Software Reliability Growth Models)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEE COMPSAC 2010¡j

 

¡·  2004¦~¤J¾Ç 

l  ³¯·q¾±¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡FºÓ¤h½×¤åÃD¥Ø¡G¤@­Ó°ò©óEDCA¤§µL½u°Ï°ìºô¸ô¤Wªº³\¥i±±¨î¾÷¨î (An Admission Control Mechanism for VoIP and Video based on EDCA over Wireless LAN)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEE ICMIT 2008¡j

l  ±i§g¾§¡]²M¤j¸ê¤u¨tºÓ¤h¯Z¡FºÓ¤h½×¤åÃD¥Ø¡G¥Î©ó¦w¥þÃöÁä³nÅé´ú¸Õ¤§¼W±j¦¡MC/DCÂл\¼Ð·Çªº¹ê°Èµû¦ô (A Pragmatic Evaluation of the Enhanced MC/DC Coverage Criterion for the Testing of Safety-Critical Software)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§°ê»Ú·|ijª©¥»µoªí©óIEEE COMPSAC 2007¡j

l  ¶À«Â´¼¡]²M¤j¸ê¤u¨tºÓ¤h¯Z²¦·~¡FºÓ¤h½×¤åÃD¥Ø¡G¹B¥Î¦³­­©MµL­­±Æ¶¤²z½×¤èªk»P¼ÒÀÀµ{§Ç©ó³nÅé¥i¾a«×¤§¹w´ú©Mµû¦ô (Software Reliability Prediction and Assessment by Using Both Finite and Infinite Server Queuing Approaches and Simulation Procedures)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óIEEE Transactions on Reliability¡j

 

¡·  2003¦~¤J¾Ç

l  ªL·¡­}¡]2004¦~ª½¤É³Õ¤h¯Z¡^

l  Ĭ¨|¥È¡]²M¤j¸êÀ³©ÒºÓ¤h¯Z²¦·~¡FºÓ¤h½×¤åÃD¥Ø¡GÀ³¥Î類神¸gºô路©ó³nÅé¥i¾a度¤uµ{¤Î¨äÀ³¥Î (Applying Neural Network Approach to Software Reliability Engineering and Its Application)¡^¡iºÓ¤h¾Ç¦ì½×¤å¤§´Á¥Zª©¥»µoªí©óJournal of Systems and Software¡j

l  ù²»·_¡]²M¤j¸ê¤u¨tºÓ¤h¯Z²¦·~¡FºÓ¤h½×¤åÃD¥Ø¡G¨Ï¥Î°ÊºA¬G»Ù¾ð©ó´O¤J¦¡¨t²Î¤§¥i¾a©Ê»P±Ó·P度µû¦ô (Reliability and Sensitivity Analysis of Embedded Systems Using Dynamic Fault Trees )¡^

l  ªL¬f§Ê¡]²M¤j¸ê¤u¨tºÓ¤h¯Z²¦·~¡FºÓ¤h½×¤åÃD¥Ø¡G¥Î©ó´O¤J¦¡µwÅé¬G»Ù°»¿ù¤§³nÅé¶}µo¤èªk (A Software Development Methodology for Embedded Hardware Fault Detection)¡^

l  ·¨ªøªl¡]²M¤j¸ê¤u¨tºÓ¤h¯Z²¦·~¡FºÓ¤h½×¤åÃD¥Ø¡G¦b¯S©wÀ³¥Î¾É¦V¤U精²«ü令¶°³B理¾¹§ï¶i«á¤§®Ä¯àµû¦ô (Performance Evaluation of Application-Specific RISC Processor Improvements)¡^

l  §d«Ø¾±¡]²M¤j¸ê¤u¨tºÓ¤h¯Z²¦·~¡FºÓ¤h½×¤åÃD¥Ø¡G°w¹ï»y­µ¸Ñ½X³B²z¤§ºë²«ü¥O¶°³B²z¾¹¬[ºc (Application-Specific RISC Architecture for Speech Decoding Processing)¡^

 

¡·  Undergraduate project students 

l  ¶ÀÃv¸©¡]2004.2~2005.1 ¡^

l  ³¯«Ø¹Å¡]2005.2~2006.1¡AÀò°ê¬ì·|¢¸¢³¦~«×¤j±M¾Ç¥Í°Ñ»P±MÃD¬ã¨s­pµe¼ú¾Çª÷¡^

l  ¶À¤hºû¡]2005.2~2006.1¡^

l  §E®aªY¡]2006.2~2006.6¡^

l  ¶À§Ó¸«¡]2007.3~2007.6¡^

l  ´å³ì²a¡]2007.3~2007.6¡^

l  ·¨±¶¡]2007.3~2007.6¡^

l  ³¢ª¾¹|¡]2009.9~2010.6¡AÀò°ê¬ì·|¢¸¢¸¦~«×¤j±M¾Ç¥Í°Ñ»P±MÃD¬ã¨s­pµe¼ú¾Çª÷¡^

l  ¥ÛªY®¦¡]2010.3~2011.1¡AÀò°ê¬ì·|¢¸¢¸¦~«×¤j±M¾Ç¥Í°Ñ»P±MÃD¬ã¨s­pµe¼ú¾Çª÷¡^

l  ´ö¤h½n¡]2010.3~2011.1¡^

l  ¼B¥¿¨¹¡]2010.3~2011.1¡^

l  ù³e¤å¡]2012.3~2013.1¡^

l  ½²©M®e¡]2016.3~2017.1¡^

l  §d«a½J¡]2016.3~2017.1¡^

l  ªô¬f´Ë¡]2016.3~2017.1¡^

l  §d©sÀM¡]2017.2~2018.1¡^

l  ³¯·¢¤å¡]2017.2~2018.1¡^

l  ³¯¬êèû¡]2017.2~2018.1¡^

 

Last Updated: August 21, 2024