![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Gravity-Based Intrusion Detection Method
It is an important issue for the security of network to detect new intrusions attack. We introduce the idea of the law of gravity to clustering analysis, and present a gravity-based clustering algorithm. At th...
-
Chapter and Conference Paper
Mining Maximal Frequent Itemsets for Intrusion Detection
It has been the recent research focus and trend to apply data mining techniques in an intrusion detection system for discovering new types of attacks, but it is still in its infancy. This paper presents an inn...
-
Chapter and Conference Paper
Embedded System Design for Network Time Synchronization
Every computer needs a timer mechanism to keep track of current time and also for various accounting purposes such as calculating the time spent by a process in CPU utilization, disk I/O, and so on, so that th...
-
Chapter and Conference Paper
An Open Service Platform at Network Edge
The last few years, users want various services that fit their needs and preferences. Many services are provided at network edges and are increasing in number. The open framework is needed for efficient servic...
-
Chapter and Conference Paper
Key Agreement Protocols Based on the Center Weighted Jacket Matrix as a Symmetric Co-cyclic Matrix
In [1], a key agreement protocol between two users, based on the co-cyclic Jacket matrix, was proposed. We propose an improved version of that, based on the same center weighted Jacket matrix but at the point ...
-
Chapter and Conference Paper
Bandwidth Management for Smooth Playback of Video Streaming Services
In this work we propose an analytic framework for managing the optimal bandwidth required for a smooth playback of a stored video streaming service. First, we argue that the mean buffering delay in the node is...
-
Chapter and Conference Paper
Exploiting Spatial Locality for Objects Layout in Virtual Environments
On-disk sequentiality of requested data, or their spatial locality, is critical to disk performance. Unfornately, spatial locality of cached data is largely ignored, and only temporal locality is considered in...
-
Chapter and Conference Paper
A New Side Information Generation Scheme for Distributed Video Coding
In this paper, a new side information generation scheme for distributed video coding (DVC) is proposed. The proposed scheme uses classification-based motion estimation and multiple block motion interpolation t...
-
Chapter and Conference Paper
Simulation of a Signalized Intersection Delay Model
Signalized intersection delay is an important evaluation index of the signalized intersection capacity and level of service. This paper presents a signalized intersection delay model for signalized intersectio...
-
Chapter and Conference Paper
A High Performance 50% Clock Duty Cycle Regulator
A low-jitter clock duty cycle corrector circuit applied in high performance ADC is presented in the paper, such circuits can change low accuracy input signals with different frequencies into 50% pulse width cl...
-
Chapter and Conference Paper
Kinematic Analysis of Remote Target Pointing Hand Movements in a 3D Environment
The study investigates kinematics of target pointing hand movements in a free-hand, touchless, 3D environment. Consistent with Fitts’ original information processing model, target pointing hand movement time i...
-
Chapter and Conference Paper
A Real-Time Self-adaptive Enhancement Method of Infrared System
A real-time self-adaptive image enhancement method is proposed, which based on information of the histogram for Infrared Focal Plane Array (IRFPA) system. By analyzing information on the image histogram and ca...
-
Chapter and Conference Paper
Can I Help You?: Towards the Improvement of Occupational Experience for Convenience Store Employees in Taiwan
This article explores the occupational experiences of convenience store frontline service employees in Taiwan. We find that in addition to physical labor, employees must incorporate job crafting to effectively...
-
Chapter and Conference Paper
The Design of the Underlying Network Communication Module Based on IOCP
The I/O completion port(IOCP) mechanism is adopted in the design, on the basis of it, many optimization technology of the system performance are integrated, such as multithreaded, object pool and the ring buff...
-
Chapter and Conference Paper
Improved Trusted Storage Key Authorization Management Scheme Based on Timestamp
One of the important functionalities in trusted computing platform is secure storage. Although the technologies about secure storage in trusted computing platform become more sophisticated, and the application...
-
Chapter and Conference Paper
Graph-Based Hybrid Recommendation Using Random Walk and Topic Modeling
In this paper, we propose a graph-based method for hybrid recommendation. Unlike a simple linear combination of several factors, our method integrates user-based, item-based and content-based techniques more f...
-
Chapter and Conference Paper
PDMA: A Probabilistic Framework for Diversifying Recommendation Lists
In this paper, we derive a probabilistic ranking framework for diversifying the recommendations of baseline methods. Unlike conventional approaches to balance relevance and diversity, we produce the diversifie...