Page 68 - profile2012.indd
P. 68

Research Faculty  研究人員


                                                 研究員                                                                                  研究員
                                                        徐讚昇 Tsan-sheng Hsu                                                                   高明達 Ming-Tat Ko



                                                 Research Fellow                                                                      Research Fellow
                                                 Ph.D., Computer Sciences, University of Texas at Austin                              Ph.D., Computer Science, National Tsing-Hua University


                                                 Tel: +886-2-2788-3799 ext. 1701      Fax: +886-2-2782-4814                           Tel: +886-2-2788-3799 ext. 1821      Fax: +886-2-2782-4814
                                                 Email: tshsu@iis.sinica.edu.tw                                                       Email: mtko@iis.sinica.edu.tw
                                                 http://www.iis.sinica.edu.tw/pages/tshsu                                             http://www.iis.sinica.edu.tw/pages/mtko




                ● Research Fellow, IIS, Academia Sinica (2003-)      ● Ph.D., Computer Sciences, University of Texas at Austin (1993)    ● Ph. D., Computer Science, National Tsing-Hua University  (1988)  Technology (Feb. 1998 – July 1998)
                ● Director, Computing Center, Academia Sinica (2008-2010)    ● M.S., Computer Sciences, University of Texas at Austin (1990)    ● M. S.  Mathematics, National Taiwan University (1982)    ● Associate Professor, Department of Mathematics, Fu-Jen Catholic
                ● Deputy Director, IIS, Academia Sinica (2002-2004)    ● B.S., Computer Science and Information Engineering, National     ● B. S.  Mathematics, National Taiwan University (1979)  University (Aug. 1994 – July 1996)
                ● Associate Research Fellow, IIS, Academia Sinica (1997-2003)  Taiwan University (1985)                                  ● Associate Research Fellow, IIS, Academia Sinica (1988 – 2000)    ● Associate Professor, Department of Information Education, Na-
                ● Assistant Research Fellow, IIS, Academia Sinica (1993- 1997)                                                           ● Associate Professor, National Taiwan University of Science and   tional Taiwan Normal University (Feb. 1989 – July 1989)
             Research Description                                Publications                                                         Research Description                                Publications


             My current work concerns graph theory and its applica-  1.  Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, and Jeremy     My research interest is in the design and analysis of algo-  1.  Yue-Li Wang, Cheng-Ju Hsu, Jia-Jie Liu, Ming-Tat Ko, Fu-
             tions, the design, analysis, implementation and perfor-  K.-P. Chen, “Value and Damage of Information: A Data Secu-      rithms and graph theory with application to the real-world   Hsing  Wang, “The  Composition  Problem and Its  Applica-
             mance evaluation of algorithms, and data-intensive com-  rity Perspective,” International Journal of Approximate Rea-    problems.  The algorithm research has been on the theo-  tions,” To Appear in IEEE Transactions on Computers.
             puting.                                                 soning, pages 179-201, 2006.                                     retical  problems,  such  as  facility  location  problem,  geo-  2.  Chia-Hao Chin, Chin-Wen Ho, Ming-Tat Ko and Chung-Yen

             Graph theory and its applications:                  2.  Da-Wei Wang, Churn-Jung Liau, and Tsan-sheng Hsu, “An            metrical network design, and optimization problems on   Lin,  “A hub-attachment  based  method  to  detect  functional
                                                                     Epistemic  Framework for Privacy Protection  in Database         special graphs, with applications to VLSI design and multi-  modules from confidence-scored protein interactions and ex-

             Graphs model many important applications and are also   Linking,” Data and Knowledge Engineering, pages 176-205,                                                                 pression profiles,” BMC Bioinformatics, volume 11, number

             tools to solve many other theoretical problems.  We often   2007.                                                        media network design.                                   S1, pages S25, January 2010.
             start with probing fundamental theoretical problems such   3.  Pei-Chi Huang, Hsin-Wen  Wei,  Yen-Chiu Lu, Ming-Yang     Recently, my research interests focus on the algorithmic   3.  Lin, C. Y.*, Chin, C. H., Wu, H. H., Chen, S. H., Ho, C. W.,*
             as the structures of graphs with certain properties. With   Kao, Wei-Kuan Shih and Tsan-sheng Hsu, “Two-Vertex Con-      problems  arisen  from  bioinformatics,  especially  on  phy-  Ko, M. T.*, “Hubba: Hub Objects Analyzer : A Framework of


             these properties, we then usually design e cient algo-  nectivity  Augmentations  for Graphs with a Partition  Con-      logeny construction and biological network analysis.  Over   Interactome Hubs Identification for Network Biology,” Nucle-

             rithms and solve applications. One important problem we   straint (Extended Abstract),” Proceedings of the 20  Interna-  past few years, we have studied a fundamental phylogeny   ic Acids Research, volume 36, number 2008 Web application
                                                                                                          th


             are interested right now is e cient epidemic simulation.   tional Symposium on Algorithms and Computation (ISAAC),       construction problem, the Steiner root problem that is to   Issue, pages W438-W443, July 2008.
                                                                     Springer-Verlag LNCS# 5878, pages 1195--1204, 2009.
             Design, analysis, implementation and performance                                                                          nd a phylogenetic tree such that its power contains the   4.  Hsin-Hung Chou, Ming-Tat Ko, Chin-Wen Ho, and Gen-Huey

             evaluation of algorithms:                           4.  Pei-Chi Huang, Hsin-Wen Wei, Wan-Chen Lu, Wei-Kuan Shih          given graph as an induced subgraph.  On the biological   Chen, “Node- Searching Problem on Block Graphs,” Discrete
                                                                     and Tsan-sheng Hsu, “Smallest Bipartite Bridge-connectivity                                                              Applied Mathematics, volume 156, number 1, pages 55-75,
             Algorithm is one of the cores of computer sciences.  We are   Augmentation,”  Algorithmica,  volume  54,  number  3,  pages   network analysis, we have studied the topological char-  January 2008.
             interested in all aspects of researches in algorithms which   353-378, 2009.                                             acteristic of protein objects, such as essential proteins,

             include  nding new algorithms for interesting problems                                                                   protein functional module, in protein-protein interaction   5.  Maw-Shang Chang and Ming-Tat Ko and Hsueh-I Lu, “Linear
                                                                                                                                                                                                                                         th

             and designing e cient implementations to solve real-  5.  I-Cheng  Wang, Chih-Hao Shen, Justin Zhan,  Tsan-sheng         networks of model organisms and tried to yield decent   Time Algorithms for Tree Root Problems,” Proceedings of 10

                                                                     Hsu, Churn-Jung Liau and Da-Wei Wang, “Towards Empiri-
                                                                                                                                                                                              Scandinavian Workshop on Algorithm Theory (SWAT2006),
             world applications.  We are interested in both sequential,   cal Aspects of Secure Scalar Product,” IEEE Transactions on   prediction methods for such protein objects.  The research   July 6-8, 2006, Riga, Latvia.
             parallel and distributed algorithms.                    Systems, Man, and Cybernetics Part C: Applications and Re-       interest is extended to analysis of large evolving networks
             Data-intensive computing:                               views, pages 440-447, 2009.                                      such as social networks, communication networks.    6.  Han-Kuen Liang, Chia-Mao Huang, Ming-Tat Ko, Jenn-Kang
                                                                                                                                                                                              Hwang, “Amino acid-coupling patterns in thermophilic pro-
             With the rapid development of computer and communi-  6.  Yen-Chiu  Chen,  Hsin-Wen  Wei,  Pei-Chi  Huang,  Wei-Kuan                                                              teins,” Proteins: Structure, Function and Genetics, vol.59, is-
             cation technology, it has become much easier to access or   Shih and Tsan-sheng Hsu, “The Bridge-connectivity Augmen-                                                            sue 1, April, 2005, pp. 58-63.
                                                                     tation with a General Partition Constraint,” Theoretical Com-
             store massive amounts of data electronically. We are inter-  puter Science, volume 411, pages 2878--2889, 2010.                                                              7.  Sun-Yuan Hsieh, Chin-Wen Ho, Tsan-sheng Hsu and Ming-


             ested in the research problems concerning e cient com-                                                                                                                           Tat  Ko,  “Characterization  of  Efficiently  Solvable  Problems

             putation of massive data which include data privacy, is-  7.  Bo-Nian Chen, Bing-Jie Shen and  Tsan-sheng Hsu,  “Chi-                                                            on Distance-Hereditary Graphs,” SIAM Journal on Discrete
             sues in large scale social networks and classical computer   nese Dark Chess,” International Computer Game Association                                                           Mathematics, vol. 15, No. 4, 2002, pp. 488 – 518.
             games.  In data privacy, we are developing formal models   (ICGA) Journal, volume 33, number 2, pages 93-106, 2010.                                                          8.  Li-Fen Chen, Hong-Yuan Mark Liao, Ming-Tat Ko, Ja-Chen
             and practical systems for privacy protection. We also wish   8.  M.-T. Tsai, T.-C. Chern, J.-H. Chung, C.-W. Hsueh, H.-S. Kuo,                                                   Lin and Gwo-Jong Yu, “A New LDA-based Face Recognition


             to  nd e cient algorithms for secure multi-party com-   C.-J. Liau, S. Riley, B.-J. Shen, D.-W. Wang, C.-h. Shen and                                                             System Which Can Solve the Small Sample Size Problem,”


             putation.  In large scale social network, we wish to study   Tsan-sheng Hsu, “Efficient Simulation of the Spatial Trans-                                                          Pattern Recognition, vol. 33, 2000, pp. 1713-1726.


             various issues which include e cient simulation and dy-  mission Dynamics of Influenza”, PLoS ONE , 5(11):e13292,                                                             9.  Sun-Yuan Hsieh, Chin-Wen Ho, Tsan-sheng Hsu,  Ming-Tat

             namic processing of social networks. In classical computer   2010.                                                                                                               Ko and Gen-Huey Chen, “A Faster Implementation of Parallel
             games, we study memory-e cient algorithms for solving   9.  Meng-Tsung Tsai and Tsan-sheng Hsu, “Scalable Space-effi-                                                             Tree Contraction Scheme and Its Applications on Distance-



             interesting games that may have applications.           cient Algorithms for Triangle Counting,” Proceedings of the                                                              Hereditary Graphs,” Journal of Algorithms, 35, 2000, pp. 50-
                                                                     Third Workshop on Massive Data Algorithmics (MASSIVE),                                                                   81.
                                                                     June 2011.
                                                                                                                                                                                          10.  Jen-Duo Liu, Ming-Tat Ko and Ruei-Chuan Chang, “A Simple
                                                                 10.  Bo-Nian Chen, Pangfeng Liu, Shun-Chin Hsu and Tsan-sheng                                                                Self-Collision Avoidance  for  Cloth Animation,”  Computers
                                                                     Hsu, “Aggregating Consistent Endgame Knowledge in Chi-                                                                   and Graphics, Vol. 22, No. 1, Feb., 1998, pp. 117-128.
                                                                     nese Chess”, Knowledge-Based Systems, 2012, to appear.
               研究人員
         68    Research Faculty
                                                                                                                                                                                                                                            69
   63   64   65   66   67   68   69   70   71   72   73