Skip to main content

Page of 639
and
  1. No Access

    Chapter and Conference Paper

    System for screening objectionable images using Daubechies' wavelets and color histograms

    This paper describes WIPETM (Wavelet Image Pornography Elimination), an algorithm capable of classifying an image as objectionable or benign. The algorithm uses a combination of Daubechies' wavelets, normalized c...

    James Ze Wang, Gio Wiederhold in Interactive Distributed Multimedia Systems… (1997)

  2. No Access

    Chapter and Conference Paper

    A matrix representation of phylogenetic trees

    In this paper we begin by describing two currently used methods for evaluating phylogenetic trees, one proposed by Fitch and Margoliash [5] and the other proposed by Saitou and Nei [7]. Both methods are heuris...

    Sanzheng Qiao, W. S-Y Wang in Computing and Combinatorics (1997)

  3. No Access

    Chapter and Conference Paper

    High-level execution time analysis

    A compositional algebra, called mMCAN, for the execution time analysis of highlevel software processes is introduced. In mMCAN, processes can be concatenated, concurrently executed, and recursively invoked. We...

    Farn Wang in Transformation-Based Reactive Systems Development (1997)

  4. No Access

    Chapter and Conference Paper

    A redundant hierarchical structure for a distributed continuous media server

    The growing number of digital audio and video repositories has resulted in a desperate need for effective techniques to deliver data to users in a timely manner. Due to geographical distribution of users, it i...

    Cyrus Shahabi, Mohammad H. Alshayeji in Interactive Distributed Multimedia Systems… (1997)

  5. No Access

    Chapter

    Domain model based hypertext for collaborative authoring

    Domain information models reflect the common structural and semantic characteristics of information organization in particular domains. This chapter describes the creation of a domain model based hypertext and...

    Weigang Wang, Claude Ghaoui, Roy Rada in Intelligent Hypertext (1997)

  6. Chapter

    Study of Multiplexing for Group-based Quality of Service Delivery

    In this work, the problem of scheduling packets with a group as opposed to an individual deadline is considered. Packets of the same group are supposed to belong in the same application data unit for which a d...

    **n Wang, Ioannis Stavrakakis in ATM Networks (1997)

  7. Chapter

    USD: Scalable Bandwidth Allocation for the Internet

    In this paper, we present a differentiated service scheme called “User-Share Differentiation (USD)”. The USD scheme is designed for long-term bandwidth allocation without per-session signaling. The scheme allo...

    Zheng Wang in High Performance Networking (1998)

  8. No Access

    Chapter and Conference Paper

    On Zhang's nonrepudiable proxy signature schemes

    In 1997, Zhang proposed two new nonrepudiable proxy signature schemes to delegate signing capability. Both schemes claimed to have a property of knowing that a proxy signature is generated by either the origin...

    Nam -Yih Lee, Tzonelih Hwang, Chih -Hung Wang in Information Security and Privacy (1998)

  9. Chapter and Conference Paper

    A secure intelligent trade agent system

    In this paper, a secure intelligent trade agent system is developed. In this system, an intelligent trade agent can be authenticated and supplied certain authorized agent execution environment for it to run by...

    X. Yi, X. F. Wang, K. Y. Lam in Trends in Distributed Systems for Electronic Commerce (1998)

  10. No Access

    Chapter and Conference Paper

    Classifying objectionable websites based on image content

    This paper describes IBCOW (Image-based Classification of Objectionable Websites), a system capable of classifying a website as objectionable or benign based on image content. The system uses WIPE (Wavelet Image...

    James Ze Wang, Jia Li, Gio Wiederhold in Interactive Distributed Multimedia Systems… (1998)

  11. Chapter and Conference Paper

    New results on multi-receiver authentication codes

    Multi-receiver authentication is an extension of traditional point-to-point message authentication in which a sender broadcasts a single authenticated message such that all the receivers can independently veri...

    R. Safavi-Naini, H. Wang in Advances in Cryptology — EUROCRYPT'98 (1998)

  12. No Access

    Chapter and Conference Paper

    Lower Bounds for Wide-Sense Non-blocking Clos Network

    The 3-stage Clos network is generally considered the most basic multistage interconnecting network(MIN). The nonblocking property of such network has been extensively studied in the past. However there are only a...

    Kuo-Hui Tsai, Da-Wei Wang in Computing and Combinatorics (1998)

  13. No Access

    Chapter and Conference Paper

    A New Family of Optimal 1-Hamiltonian Graphs with Small Diameter

    In this paper, we construct a family of graphs denoted by Eye(s) that are 3-regualr, 3-connected, planar, hamiltonian, edge hamiltonian, and also optimal 1-hamiltonian. Furthermore, the diameter of Eye(s) is O(lo...

    Jeng-Jung Wang, Ting-Yi Sung, Lih-Hsing Hsu, Men-Yang Lin in Computing and Combinatorics (1998)

  14. No Access

    Chapter and Conference Paper

    A Graph Optimization Problem in Virtual Colonoscopy

    This paper studies a graph optimization problem occurring in virtual colonoscopy, which concerns finding the central path of a colon model created from helical computed tomography (CT) image data. The central ...

    Jie Wang, Yaorong Ge in Computing and Combinatorics (1998)

  15. No Access

    Chapter and Conference Paper

    Efficient minimization of numerical summation errors

    Given a multiset X={x 1,... x n } of real numbers, the floating-point set summation (FPS) problem asks for S n ...

    Ming-Yang Kao, Jie Wang in Automata, Languages and Programming (1998)

  16. No Access

    Chapter and Conference Paper

    Business-Object Semantics Communication Model in Distributed Environment

    Object communication usually uses message passing to transfer the request and the reply. However, in business applications many of the object requests are in fact events which trigger other business objects, a...

    Hei-Chia Wang, V. Karakostas in Object-Oriented Technology: ECOOP’98 Workshop Reader (1998)

  17. No Access

    Chapter and Conference Paper

    On construction of cumulative secret sharing schemes

    Secret sharing schemes are one of the most important primitives in distributed systems. Cumulative secret sharing schemes provide a method to share a secret among a number of participants with arbitrary access...

    Hossein Ghodosi, Josef Pieprzyk, Rei Safavi-Naini in Information Security and Privacy (1998)

  18. No Access

    Chapter and Conference Paper

    Maximum Weight Triangulation and Its Application on Graph Drawing

    In this paper, we investigate the maximum weight triangulation of a polygon inscribed in a circle (simply inscribed polygon). A complete characterization of maximum weight triangulation of such polygons has be...

    Cao An Wang, Francis Y. Chin, Bo Ting Yang in Computing and Combinatorics (1998)

  19. No Access

    Chapter and Conference Paper

    Measuring the Quality of Service of Optimistic Replication

    In large systems, replication is a useful technique for improving information accessibility and surviving network unreliability. Optimistic replication trades of consistency for availability, allowing updates ...

    Geoffrey H. Kuenning, Rajive Bagrodia in Object-Oriented Technology: ECOOP’98 Works… (1998)

  20. No Access

    Chapter and Conference Paper

    Bounds and constructions for A3-code with multi-senders

    We extend authentication codes with arbiter to the scenario where there are multiple senders and none of the participants, including the arbiter, is trusted. In this paper we derive bounds on the probability o...

    Rei Safavi-Naini, Ye**g Wang in Information Security and Privacy (1998)

Page of 639