Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    A Gravity-Based Intrusion Detection Method

    It is an important issue for the security of network to detect new intrusions attack. We introduce the idea of the law of gravity to clustering analysis, and present a gravity-based clustering algorithm. At th...

    Sheng-Yi Jiang, Qing-Hua Li in Grid and Cooperative Computing - GCC 2004 Workshops (2004)

  2. No Access

    Chapter and Conference Paper

    Mining Maximal Frequent Itemsets for Intrusion Detection

    It has been the recent research focus and trend to apply data mining techniques in an intrusion detection system for discovering new types of attacks, but it is still in its infancy. This paper presents an inn...

    Hui Wang, Qing-Hua Li, Huanyu **ong in Grid and Cooperative Computing - GCC 2004 … (2004)

  3. No Access

    Chapter and Conference Paper

    Embedded System Design for Network Time Synchronization

    Every computer needs a timer mechanism to keep track of current time and also for various accounting purposes such as calculating the time spent by a process in CPU utilization, disk I/O, and so on, so that th...

    So-Young Hwang, Dong-Hui Yu, Ki-Joune Li in Embedded and Ubiquitous Computing (2004)

  4. No Access

    Chapter and Conference Paper

    A Framework on Compound Knowledge Push System Oriented to Organizational Employees

    Organizational employees have different knowledge demands and the knowledge is compound. So how to push the right compound knowledge to the right organizational employees becomes important. This paper attempts...

    Zhi-** Fan, Yong Feng, Yong-Hong Sun, Bo Feng in Internet and Network Economics (2005)

  5. No Access

    Chapter and Conference Paper

    Web-Based Three-Dimension E-Mail Traffic Visualization

    E-mail pervades many aspects of our lives and is becoming indispensable communication method in areas such as commerce, government, production and general information dissemination. To maintain the security an...

    **ang-hui Wang, Guo-yin Zhang in Advanced Web and Network Technologies, and Applications (2006)

  6. No Access

    Chapter and Conference Paper

    An Open Service Platform at Network Edge

    The last few years, users want various services that fit their needs and preferences. Many services are provided at network edges and are increasing in number. The open framework is needed for efficient servic...

    Dong-Hui Kim, Jae-Oh Lee in Management of Convergence Networks and Services (2006)

  7. No Access

    Chapter and Conference Paper

    Key Agreement Protocols Based on the Center Weighted Jacket Matrix as a Symmetric Co-cyclic Matrix

    In [1], a key agreement protocol between two users, based on the co-cyclic Jacket matrix, was proposed. We propose an improved version of that, based on the same center weighted Jacket matrix but at the point ...

    Chang-hui Choe, Gi Yean Hwang, Sung Hoon Kim in Multimedia Content Representation, Classif… (2006)

  8. No Access

    Chapter and Conference Paper

    Bandwidth Management for Smooth Playback of Video Streaming Services

    In this work we propose an analytic framework for managing the optimal bandwidth required for a smooth playback of a stored video streaming service. First, we argue that the mean buffering delay in the node is...

    Hoon Lee, Yoon Kee Kim, Kwang-Hui Lee in Management of Convergence Networks and Services (2006)

  9. No Access

    Chapter and Conference Paper

    Using Agent Technology to Study Human Action and Perception Through a Virtual Street Simulator

    Human activities are the foundation of the social processes that drive the urban system. The emergence of information technology provides opportunities to extend the transformation of the physical city into th...

    Chiung-Hui Chen, Mao-Lin Chiu in Human-Computer Interaction. Interaction Pl… (2007)

  10. No Access

    Chapter and Conference Paper

    User-Oriented Design (UOD) Patterns for Innovation Design at Digital Products

    Innovation design is the trend of products in the future. User-oriented design (UOD) is a design process which focuses on the needs of the user and develops product concepts for them. The objective of this res...

    Chiou Wen-Ko, Chen Bi-Hui, Wang Ming-Hsu in Human-Computer Interaction. Interaction De… (2007)

  11. No Access

    Chapter and Conference Paper

    Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol

    A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to prese...

    Meng-Hui Lim, Sanggon Lee, Sangjae Moon in Information Systems Security (2007)

  12. Chapter and Conference Paper

    Practical Error Analysis of Cross-Ratio-Based Planar Localization

    Recently, more and more computer vision researchers are paying attention to error analysis so as to fulfill various accuracy requirements arising from different applications. As a geometric invariant under pro...

    Jen-Hui Chuang, Jau-Hong Kao, Horng-Horng Lin in Advances in Image and Video Technology (2007)

  13. No Access

    Chapter and Conference Paper

    Exploiting Spatial Locality for Objects Layout in Virtual Environments

    On-disk sequentiality of requested data, or their spatial locality, is critical to disk performance. Unfornately, spatial locality of cached data is largely ignored, and only temporal locality is considered in...

    Ching-Shun Hsieh, Hui-Ling Lin in Advances in Multimedia Information Process… (2008)

  14. No Access

    Chapter and Conference Paper

    A New Side Information Generation Scheme for Distributed Video Coding

    In this paper, a new side information generation scheme for distributed video coding (DVC) is proposed. The proposed scheme uses classification-based motion estimation and multiple block motion interpolation t...

    Ming-Hui Cheng, **-Jang Leou in Advances in Multimedia Information Processing - PCM 2008 (2008)

  15. No Access

    Chapter and Conference Paper

    Simulation of a Signalized Intersection Delay Model

    Signalized intersection delay is an important evaluation index of the signalized intersection capacity and level of service. This paper presents a signalized intersection delay model for signalized intersectio...

    Minghui Wu, Lian Xue, Hui Yan, Chunyan Yu in Intelligent Computing and Information Science (2011)

  16. No Access

    Chapter and Conference Paper

    A High Performance 50% Clock Duty Cycle Regulator

    A low-jitter clock duty cycle corrector circuit applied in high performance ADC is presented in the paper, such circuits can change low accuracy input signals with different frequencies into 50% pulse width cl...

    Peng Huang, Hong-Hui Deng, Yong-Sheng Yin in Intelligent Computing and Information Science (2011)

  17. Chapter and Conference Paper

    Kinematic Analysis of Remote Target Pointing Hand Movements in a 3D Environment

    The study investigates kinematics of target pointing hand movements in a free-hand, touchless, 3D environment. Consistent with Fitts’ original information processing model, target pointing hand movement time i...

    Yung-Hui Lee, Shu-Kai Wu in HCI International 2011 – Posters’ Extended Abstracts (2011)

  18. No Access

    Chapter and Conference Paper

    A Real-Time Self-adaptive Enhancement Method of Infrared System

    A real-time self-adaptive image enhancement method is proposed, which based on information of the histogram for Infrared Focal Plane Array (IRFPA) system. By analyzing information on the image histogram and ca...

    Bao-Hui Zhang, Peng-Hao **a, Jun-ju Zhang in Computer Science for Environmental Enginee… (2011)

  19. Chapter and Conference Paper

    Can I Help You?: Towards the Improvement of Occupational Experience for Convenience Store Employees in Taiwan

    This article explores the occupational experiences of convenience store frontline service employees in Taiwan. We find that in addition to physical labor, employees must incorporate job crafting to effectively...

    Yuan-Ling Chiao, Ching-Hu Lu, Hui-Wen Yeh in Internationalization, Design and Global De… (2011)

  20. Chapter and Conference Paper

    Soft Power: A Critical Factor for the Effectiveness and Development of a School

    This research aims to explore the contents of a school’s soft power, including culture, strategy, leadership, learning, marketing and innovation. Managing soft power not only is critical for a school’s develop...

    Hui-Min Ko in Network and Parallel Computing (2012)

previous disabled Page of 2