Jing-Chiou Liou

Learn More
For task clustering with no duplication, the DSC algorithm of Gerasoulis and Yang is empirically the best known algorithm to date in terms of both speed and solution quality. The DSC algorithm is based on the critical path method. In this paper, we present an algorithm called CASS-II for task clustering with no duplication which is competitive to DSC in(More)
In this paper, we present an efficient algorithm, called CASS-II, for task clustering without task duplication. Unlike the DSC algorithm, which is empirically the best known algorithm to date in terms of both speed and solution quality, CASS-II uses only limited ``global'' information and does not recompute the critical path in each refinement step.(More)
Authentication is the process of verifying a user's identity when the user is requesting services from any secure IT system. By far, the most popular authentication is a basic username-password based method that is commonly considered to be a weak technique of authentication. A more secure method is the multi-factor authentication that verifies not only the(More)
The thesis of this research is that the task of exposing the parallelism in a given application should be left to the algorithm designer, who has intimate knowledge of the application characteristics. On the other hand, the task of limiting the parallelism in a chosen parallel algorithm is best handled b y the compiler or operating system for the target MPP(More)
Online service is an important driving force behind many of today’s Web 2.0 applications. For security and privacy concerns, authentication is required for all of services that involve online transactions. Authentication is the process of verifying a user’s identity when the user is requesting services from any secure Information System (IS). By far, the(More)