![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Gravity-Based Intrusion Detection Method
It is an important issue for the security of network to detect new intrusions attack. We introduce the idea of the law of gravity to clustering analysis, and present a gravity-based clustering algorithm. At th...
-
Chapter and Conference Paper
Mining Maximal Frequent Itemsets for Intrusion Detection
It has been the recent research focus and trend to apply data mining techniques in an intrusion detection system for discovering new types of attacks, but it is still in its infancy. This paper presents an inn...
-
Chapter and Conference Paper
Embedded System Design for Network Time Synchronization
Every computer needs a timer mechanism to keep track of current time and also for various accounting purposes such as calculating the time spent by a process in CPU utilization, disk I/O, and so on, so that th...
-
Chapter and Conference Paper
On Scalability and Mobility Management of Hierarchical Large-Scale Ad Hoc Networks
With the increased interest in the mobile wireless communication, the development of large-scale ad hoc networks has drawn a lot of attention and the scalability of ad hoc networks has been the subject of exte...
-
Chapter and Conference Paper
A Cluster-Based QoS Multipath Routing Protocol for Large-Scale MANET
To support oS routing in MANET (Mobile Ad hoc Networks) is a core issue in the research of MANET. Numerous studies have shown the difficulty for provision of Quality-of-Service (QoS) guarantee in Mobile Ad hoc...
-
Chapter and Conference Paper
A Framework on Compound Knowledge Push System Oriented to Organizational Employees
Organizational employees have different knowledge demands and the knowledge is compound. So how to push the right compound knowledge to the right organizational employees becomes important. This paper attempts...
-
Chapter and Conference Paper
Adaptive Power-Aware Clustering and Multicasting Protocol for Mobile Ad Hoc Networks
One of the most critical issues in wireless ad hoc networks is represented by the limited availability of energy within network nodes. Most of the researches focused on the problem of routing issues rather tha...
-
Chapter and Conference Paper
Web-Based Three-Dimension E-Mail Traffic Visualization
E-mail pervades many aspects of our lives and is becoming indispensable communication method in areas such as commerce, government, production and general information dissemination. To maintain the security an...
-
Chapter and Conference Paper
An Open Service Platform at Network Edge
The last few years, users want various services that fit their needs and preferences. Many services are provided at network edges and are increasing in number. The open framework is needed for efficient servic...
-
Chapter and Conference Paper
Key Agreement Protocols Based on the Center Weighted Jacket Matrix as a Symmetric Co-cyclic Matrix
In [1], a key agreement protocol between two users, based on the co-cyclic Jacket matrix, was proposed. We propose an improved version of that, based on the same center weighted Jacket matrix but at the point ...
-
Chapter and Conference Paper
Reliable Transporting and Optimal Routing on Rate-Based for Ad Hoc Networks
Owing to the inflexibility of the structure, the conventional layered protocols suffer from the inability to distinguish between losses due to route failures and congestion. Recently, in efforts to overcome th...
-
Chapter and Conference Paper
Bandwidth Management for Smooth Playback of Video Streaming Services
In this work we propose an analytic framework for managing the optimal bandwidth required for a smooth playback of a stored video streaming service. First, we argue that the mean buffering delay in the node is...
-
Chapter and Conference Paper
Portable Patient Information Integration System for Patient Safety Improvement
Nowadays, medical centers are working on setting a safe medicating environment by using information technology. This study tried to improve patients’ safety environment, communications among medical workers an...
-
Chapter and Conference Paper
Positioning System in Taipei Children’s Museum of Transportation and Communication
This paper presents a 802.11-based positioning system developed and demonstrated in the Taipei Children’s Museum of Transportation and Communication. Our positioning system partitions the service area into sev...
-
Chapter and Conference Paper
Zigbee Positioning System for Smart Home Application
This paper presents a smart home system prototype which employs an indoor positioning system called the Best Beacon Match (BBM) positioning method to intelligently trigger the appropriately services for the ho...
-
Chapter and Conference Paper
Multigroup Rekeying for a Wireless Network
In the context of secure group communication, a shared secret key is generated anew for data protection whenever group membership changes. This paper presents an approach to fast rekeying in a wireless network...
-
Chapter and Conference Paper
Ubiquitous and Robust Text-Independent Speaker Recognition for Home Automation Digital Life
This paper presents a ubiquitous and robust text-independent speaker recognitionarchitecture for home automation digital life. In this architecture, a multiple microphone configuration is adopted to receive th...
-
Chapter and Conference Paper
Exploiting Spatial Locality for Objects Layout in Virtual Environments
On-disk sequentiality of requested data, or their spatial locality, is critical to disk performance. Unfornately, spatial locality of cached data is largely ignored, and only temporal locality is considered in...
-
Chapter and Conference Paper
A New Side Information Generation Scheme for Distributed Video Coding
In this paper, a new side information generation scheme for distributed video coding (DVC) is proposed. The proposed scheme uses classification-based motion estimation and multiple block motion interpolation t...
-
Chapter and Conference Paper
A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves
Key agreement protocol is of fundamental importance in providing data confidentiality and integrity between two or more parties over an insecure network. In 2004, Popescu [14] proposed an authenticated key agr...