Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    A Gravity-Based Intrusion Detection Method

    It is an important issue for the security of network to detect new intrusions attack. We introduce the idea of the law of gravity to clustering analysis, and present a gravity-based clustering algorithm. At th...

    Sheng-Yi Jiang, Qing-Hua Li in Grid and Cooperative Computing - GCC 2004 Workshops (2004)

  2. No Access

    Chapter and Conference Paper

    Mining Maximal Frequent Itemsets for Intrusion Detection

    It has been the recent research focus and trend to apply data mining techniques in an intrusion detection system for discovering new types of attacks, but it is still in its infancy. This paper presents an inn...

    Hui Wang, Qing-Hua Li, Huanyu **ong in Grid and Cooperative Computing - GCC 2004 … (2004)

  3. No Access

    Chapter and Conference Paper

    Embedded System Design for Network Time Synchronization

    Every computer needs a timer mechanism to keep track of current time and also for various accounting purposes such as calculating the time spent by a process in CPU utilization, disk I/O, and so on, so that th...

    So-Young Hwang, Dong-Hui Yu, Ki-Joune Li in Embedded and Ubiquitous Computing (2004)

  4. Chapter and Conference Paper

    On Scalability and Mobility Management of Hierarchical Large-Scale Ad Hoc Networks

    With the increased interest in the mobile wireless communication, the development of large-scale ad hoc networks has drawn a lot of attention and the scalability of ad hoc networks has been the subject of exte...

    Ming-Hui Tsai, Tzu-Chiang Chiang in Embedded and Ubiquitous Computing – EUC 20… (2005)

  5. No Access

    Chapter and Conference Paper

    A Cluster-Based QoS Multipath Routing Protocol for Large-Scale MANET

    To support oS routing in MANET (Mobile Ad hoc Networks) is a core issue in the research of MANET. Numerous studies have shown the difficulty for provision of Quality-of-Service (QoS) guarantee in Mobile Ad hoc...

    Hui-Yao An, **-Cheng Lu, Zheng-hu Gong in High Performance Computing and Communicati… (2005)

  6. No Access

    Chapter and Conference Paper

    A Framework on Compound Knowledge Push System Oriented to Organizational Employees

    Organizational employees have different knowledge demands and the knowledge is compound. So how to push the right compound knowledge to the right organizational employees becomes important. This paper attempts...

    Zhi-** Fan, Yong Feng, Yong-Hong Sun, Bo Feng in Internet and Network Economics (2005)

  7. No Access

    Chapter and Conference Paper

    Adaptive Power-Aware Clustering and Multicasting Protocol for Mobile Ad Hoc Networks

    One of the most critical issues in wireless ad hoc networks is represented by the limited availability of energy within network nodes. Most of the researches focused on the problem of routing issues rather tha...

    James Jiunn Yin Leu, Ming-Hui Tsai in Ubiquitous Intelligence and Computing (2006)

  8. No Access

    Chapter and Conference Paper

    Web-Based Three-Dimension E-Mail Traffic Visualization

    E-mail pervades many aspects of our lives and is becoming indispensable communication method in areas such as commerce, government, production and general information dissemination. To maintain the security an...

    **ang-hui Wang, Guo-yin Zhang in Advanced Web and Network Technologies, and Applications (2006)

  9. No Access

    Chapter and Conference Paper

    An Open Service Platform at Network Edge

    The last few years, users want various services that fit their needs and preferences. Many services are provided at network edges and are increasing in number. The open framework is needed for efficient servic...

    Dong-Hui Kim, Jae-Oh Lee in Management of Convergence Networks and Services (2006)

  10. No Access

    Chapter and Conference Paper

    Key Agreement Protocols Based on the Center Weighted Jacket Matrix as a Symmetric Co-cyclic Matrix

    In [1], a key agreement protocol between two users, based on the co-cyclic Jacket matrix, was proposed. We propose an improved version of that, based on the same center weighted Jacket matrix but at the point ...

    Chang-hui Choe, Gi Yean Hwang, Sung Hoon Kim in Multimedia Content Representation, Classif… (2006)

  11. Chapter and Conference Paper

    Reliable Transporting and Optimal Routing on Rate-Based for Ad Hoc Networks

    Owing to the inflexibility of the structure, the conventional layered protocols suffer from the inability to distinguish between losses due to route failures and congestion. Recently, in efforts to overcome th...

    Ming-Hui Tsai, Tzu-Chiang Chiang in Emerging Directions in Embedded and Ubiqui… (2006)

  12. No Access

    Chapter and Conference Paper

    Bandwidth Management for Smooth Playback of Video Streaming Services

    In this work we propose an analytic framework for managing the optimal bandwidth required for a smooth playback of a stored video streaming service. First, we argue that the mean buffering delay in the node is...

    Hoon Lee, Yoon Kee Kim, Kwang-Hui Lee in Management of Convergence Networks and Services (2006)

  13. No Access

    Chapter and Conference Paper

    Portable Patient Information Integration System for Patient Safety Improvement

    Nowadays, medical centers are working on setting a safe medicating environment by using information technology. This study tried to improve patients’ safety environment, communications among medical workers an...

    Tu-Bin Chu, Ming-Hui **, Li-**n Xu in Frontiers of High Performance Computing an… (2007)

  14. No Access

    Chapter and Conference Paper

    Positioning System in Taipei Children’s Museum of Transportation and Communication

    This paper presents a 802.11-based positioning system developed and demonstrated in the Taipei Children’s Museum of Transportation and Communication. Our positioning system partitions the service area into sev...

    Tzu-Hsiang Chou, Ming-Hui ** in Frontiers of High Performance Computing an… (2007)

  15. No Access

    Chapter and Conference Paper

    Zigbee Positioning System for Smart Home Application

    This paper presents a smart home system prototype which employs an indoor positioning system called the Best Beacon Match (BBM) positioning method to intelligently trigger the appropriately services for the ho...

    Ming-Hui **, Chih-Hao Yu, Hung-Ren Lai in Frontiers of High Performance Computing an… (2007)

  16. No Access

    Chapter and Conference Paper

    Multigroup Rekeying for a Wireless Network

    In the context of secure group communication, a shared secret key is generated anew for data protection whenever group membership changes. This paper presents an approach to fast rekeying in a wireless network...

    Kuang-Hui Chi, Ji-Han Jiang, Yu-Ching Hsu in Network-Based Information Systems (2007)

  17. No Access

    Chapter and Conference Paper

    Ubiquitous and Robust Text-Independent Speaker Recognition for Home Automation Digital Life

    This paper presents a ubiquitous and robust text-independent speaker recognitionarchitecture for home automation digital life. In this architecture, a multiple microphone configuration is adopted to receive th...

    Jhing-Fa Wang, Ta-Wen Kuan, Jia-chang Wang in Ubiquitous Intelligence and Computing (2008)

  18. No Access

    Chapter and Conference Paper

    Exploiting Spatial Locality for Objects Layout in Virtual Environments

    On-disk sequentiality of requested data, or their spatial locality, is critical to disk performance. Unfornately, spatial locality of cached data is largely ignored, and only temporal locality is considered in...

    Ching-Shun Hsieh, Hui-Ling Lin in Advances in Multimedia Information Process… (2008)

  19. No Access

    Chapter and Conference Paper

    A New Side Information Generation Scheme for Distributed Video Coding

    In this paper, a new side information generation scheme for distributed video coding (DVC) is proposed. The proposed scheme uses classification-based motion estimation and multiple block motion interpolation t...

    Ming-Hui Cheng, **-Jang Leou in Advances in Multimedia Information Processing - PCM 2008 (2008)

  20. Chapter and Conference Paper

    A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves

    Key agreement protocol is of fundamental importance in providing data confidentiality and integrity between two or more parties over an insecure network. In 2004, Popescu [14] proposed an authenticated key agr...

    Meng-Hui Lim, Chee-Min Yeoh, Sanggon Lee in NETWORKING 2008 Ad Hoc and Sensor Networks… (2008)

previous disabled Page of 3