- Consumer Market Behavior and Pricing
- Information and Cyber Security
- Digital Filter Design and Implementation
- Network Security and Intrusion Detection
- Digital Marketing and Social Media
- Auction Theory and Applications
- Digital Platforms and Economics
- Advanced Malware Detection Techniques
- Image and Signal Denoising Methods
- Open Source Software Innovations
- Advanced Data Compression Techniques
- Technology Adoption and User Behaviour
- Infrastructure Resilience and Vulnerability Analysis
- PAPR reduction in OFDM
- Mobile Crowdsensing and Crowdsourcing
- Customer Service Quality and Loyalty
- Advanced Adaptive Filtering Techniques
- Supply Chain and Inventory Management
- Cybercrime and Law Enforcement Studies
- Copyright and Intellectual Property
- Speech and dialogue systems
- Consumer Retail Behavior Studies
- Complexity and Algorithms in Graphs
- Healthcare Policy and Management
- Housing Market and Economics
Delft University of Technology
2022-2025
Arizona State University
2006-2022
National Kaohsiung University of Science and Technology
2022
William Carey University
2020
National Yang Ming Chiao Tung University
2008-2019
National Taipei University
2019
Xidian University
2018
National Tsing Hua University
2017
National Taiwan University
2010-2015
Institute for Information Industry
2011-2014
The ability to retain and lock in customers the face of competition is a major concern for online businesses, especially those that invest heavily advertising customer acquisition. In this paper, we develop implement an approach measuring magnitudes switching costs brand loyalty service providers based on random utility modeling framework. We then examine how systems usage, design, other firm individual-level factors affect retention. Using data brokerage industry, find significant variation...
Online product ratings offer information on quality. Scholars have recently proposed the potential of designing multidimensional rating systems to better convey multiple dimensions products. This study investigates whether and how affect consumer satisfaction (measured by ratings), based both observational data two randomized experiments. Our identification strategy hinges a natural experiment TripAdvisor when website started allow consumers rate restaurants, as opposed only providing an...
Electronic health records (EHR) are often presumed to reduce the significant and accelerating healthcare costs in United States. However, evidence on relationship between EHR adoption is mixed, leading skepticism about effectiveness of decreasing costs. We argue that simply looking at hospital-level effects can be misleading because benefits go beyond adopting hospital by creating regional spillovers via information patient sharing. When patients move hospitals, timely high-quality received...
Efficient titanium nitride/titanium oxide composite photoanode separately renders good performance to a dye-sensitized solar cell and water splitting electrochemical device.
Contests have long existed to source ideas and solutions. The emergence of crowdsourcing contest platforms greatly reduces the costs broadens reach running contests by facilitating access a large pool labor, making cost‐efficient approach procure ideas/solutions even for employers limited resources. As result, use surges there is flux small‐to‐medium size these platforms. This study focuses on new waves small‐to‐medium‐size extends literature in several ways: First, prior extensively prize,...
An abundance of flawed software has been identified as the main cause poor security computer networks because major viruses and worms exploit vulnerabilities such software. As an incentive mechanism for quality improvement, liability intensely discussed among both academics practitioners a long time. alternative approach to managing is patch release, which widely adopted in practice. In this paper, we examine these two different ways mitigating customer risk market: release. We study impact...
This study investigates the effectiveness of digital nudging for users’ social sharing online platform content. In collaboration with a leading career and education platform, we conducted large-scale randomized experiment using website popups. Grounding on Social Capital Theory individual motivation mechanism, proposed tested four kinds messages: simple request, monetary incentive, relational capital, cognitive capital. We find that messages capital framings lead to increase in behavior,...
This paper presents two-dimensional (2-D) VLSI digital filter structures possessing various symmetries in the magnitude response. For this purpose, four Type-1 and Type-2 power-efficient cost-effective 2-D symmetry architectures diagonal, fourfold rotational, quadrantal, octagonal with reduced number of multipliers one multimode are given. By combining identities structures, proposed is capable providing different operation modes: diagonal mode (DSM), rotational (FRSM), quadrantal (QSM),...
A dynamic time warping (DTW) algorithm has been suggested for the purpose of devising a motion-sensitive microelectronic system realization remote motion abnormality detection. In combination with an inertial measurement unit (IMU), is potentially applicable remotely monitoring patients who are at risk certain exceptional motions. The fixed interval signal sampling mechanism normally adopted when detection systems; however, dynamically capturing particular patterns from IMU sensor can be...
Piracy has been a major problem for perpetually licensed software. Usage-based licensing architecture such as pay-per-use or software-as-a-service can offer technology-based protection against piracy. We provide an analytical framework to examine the economic implications of versus perpetual in market with potential piracy, network effect, and heterogeneous consumers terms marginal usage benefit acquisition costs pirated show that piracy rate, user inconvenience cost licensing, consumer...
Abstract Inadequate software security is blamed for poor network when viruses and worms cause major disruptions. However, vendors have little incentive to improve the quality of their products because they are not directly liable losses incurred due security. The concept liability has been intensely discussed by computer scientists jurists years as a possible solution improving This paper examines risk-sharing mechanism between vendor its customers way implement liability. It considers both...
Professor Fettweis as far back 1977 published a paper generalizing McClellan transformation to obtain circular symmetry in 2-D and spherical, hyper-spherical symmetries multidimensional digital filters [1]. This survey presents stateof-the-art two-dimensional (2-D) VLSI filter architectures possessing various the magnitude response. Preceding structures, generalized formulation is given that allows derivation of new structures any order without global broadcast. Following this, two types...
In this paper, two area-efficient two-dimensional (2-D) IIR filter architectures for 2-D transfer function with diagonal and four-fold rotational symmetries are proposed image processing. For purpose, different intermediate functions applied the corresponding new obtained. Under satisfactory average error performance, we determine that structure requires less multiplier wordlength than previously published Type-1 structure. With features of numerator shorter critical path, symmetry can...
This paper provides a detailed survey of synthetic data techniques. We first discuss the expected goals using in augmentation, which can be divided into four parts: 1) Improving Diversity, 2) Data Balancing, 3) Addressing Domain Shift, and 4) Resolving Edge Cases. Synthesizing are closely related to prevailing machine learning techniques at time, therefore, we summarize domain categories: Expert-knowledge, Direct Training, Pre-train then Fine-tune, Foundation Models without Fine-tuning....