Skip to main content

Page of 2 next disabled
and
  1. Chapter and Conference Paper

    Web-Based Training System for Improving Aviation Maintenance Performance

    To increase aviation maintenance and inspection safety, we propose a web-based training system (WBTS) for technician training and performing maintenance tasks. Toward this goal, the risks of human errors were ...

    Guo-Feng Liang, Jhih-Tsong Lin in Human-Computer Interaction. Interacting in… (2009)

  2. Chapter and Conference Paper

    Model and Dynamic Behavior of Malware Propagation over Wireless Sensor Networks

    Based on the inherent characteristics of wireless sensor networks (WSN), the dynamic behavior of malware propagation in flat WSN is analyzed and investigated. A new model is proposed using 2-D cellular automat...

    Yurong Song, Guo-** Jiang in Complex Sciences (2009)

  3. Chapter and Conference Paper

    The Incompatible Knowledge Elimination in Knowledge-Integration

    Knowledge base is the foundation of intelligent system. It is very important to insure the consistency and non-redundancy of knowledge in knowledge base. The redundant, inclusive and incompatible knowledge mus...

    ** Guo, Lian Ye, Li Fan in Artificial Intelligence Applications and Innovations (2005)

  4. Chapter and Conference Paper

    GOOMPI: A Generic Object Oriented Message Passing Interface

    This paper discusses the application of object-oriented and generic programming techniques in high performance parallel computing, then presents a new message-passing interface based on object-oriented and gen...

    Zhen Yao, Qi-long Zheng, Guo-liang Chen in Network and Parallel Computing (2004)

  5. Chapter and Conference Paper

    An IP Traceback Scheme Integrating DPM and PPM

    IP traceback technology is an important means combating Denial of Service (DoS) attacks in Internet. This paper proposes a new IP traceback scheme constituting two parts: the first part is constructing a trace...

    Fan Min, Jun-yan Zhang, Guo-wie Yang in Applied Cryptography and Network Security (2003)

Page of 2 next disabled