Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Reducing the Location Query Cost Based on Behavior-Based Strategy

    In a location query process the most expensive procedure is maintaining the location information of mobiles. To reduce the expensive cost, we adopt the profile-based approach to design a behavior-based strateg...

    Ming-Hui **, Jorng-Tzong Horng, Hsiao-Kwang Wu in Database and Expert Systems Applications (2000)

  2. No Access

    Chapter and Conference Paper

    Location Query Based on Moving Behaviors

    The importance of location prediction is rapidly increasing with the current trend of database applications in mobile computing environment. However, current personal communication services (PCS) could only pr...

    Ming-Hui **, Eric Hsiao-Kuang Wu in Database and Expert Systems Applications (2003)

  3. No Access

    Chapter and Conference Paper

    A Gravity-Based Intrusion Detection Method

    It is an important issue for the security of network to detect new intrusions attack. We introduce the idea of the law of gravity to clustering analysis, and present a gravity-based clustering algorithm. At th...

    Sheng-Yi Jiang, Qing-Hua Li in Grid and Cooperative Computing - GCC 2004 Workshops (2004)

  4. No Access

    Chapter and Conference Paper

    Mining Maximal Frequent Itemsets for Intrusion Detection

    It has been the recent research focus and trend to apply data mining techniques in an intrusion detection system for discovering new types of attacks, but it is still in its infancy. This paper presents an inn...

    Hui Wang, Qing-Hua Li, Huanyu **ong in Grid and Cooperative Computing - GCC 2004 … (2004)

  5. No Access

    Chapter and Conference Paper

    Embedded System Design for Network Time Synchronization

    Every computer needs a timer mechanism to keep track of current time and also for various accounting purposes such as calculating the time spent by a process in CPU utilization, disk I/O, and so on, so that th...

    So-Young Hwang, Dong-Hui Yu, Ki-Joune Li in Embedded and Ubiquitous Computing (2004)

  6. No Access

    Chapter and Conference Paper

    Constructing a SCORM-Compliant Intelligent Strategy Repository

    Develo** a pedagogical learning content that can be delivered among different Learning Management Systems (LMSs) is a critical task for most instructors. Although the Sharable Content Object Reference Model ...

    Yi-Chun Chang, Ching-Pao Chang in Advances in Web-Based Learning – ICWL 2005 (2005)

  7. No Access

    Chapter and Conference Paper

    A Hybrid Approach to Determining the Best Combination on Product Form Design

    This paper presents a hybrid approach, using a grey relational analysis (GRA), neural networks (NNs), and a tabu search (TS) algorithm, to determining the best combination of product form design. The GRA model...

    Yang-Cheng Lin, Hsin-Hsi Lai in Knowledge-Based Intelligent Information an… (2005)

  8. No Access

    Chapter and Conference Paper

    A Framework on Compound Knowledge Push System Oriented to Organizational Employees

    Organizational employees have different knowledge demands and the knowledge is compound. So how to push the right compound knowledge to the right organizational employees becomes important. This paper attempts...

    Zhi-** Fan, Yong Feng, Yong-Hong Sun, Bo Feng in Internet and Network Economics (2005)

  9. No Access

    Chapter and Conference Paper

    Web-Based Three-Dimension E-Mail Traffic Visualization

    E-mail pervades many aspects of our lives and is becoming indispensable communication method in areas such as commerce, government, production and general information dissemination. To maintain the security an...

    **ang-hui Wang, Guo-yin Zhang in Advanced Web and Network Technologies, and Applications (2006)

  10. No Access

    Chapter and Conference Paper

    An Open Service Platform at Network Edge

    The last few years, users want various services that fit their needs and preferences. Many services are provided at network edges and are increasing in number. The open framework is needed for efficient servic...

    Dong-Hui Kim, Jae-Oh Lee in Management of Convergence Networks and Services (2006)

  11. No Access

    Chapter and Conference Paper

    Key Agreement Protocols Based on the Center Weighted Jacket Matrix as a Symmetric Co-cyclic Matrix

    In [1], a key agreement protocol between two users, based on the co-cyclic Jacket matrix, was proposed. We propose an improved version of that, based on the same center weighted Jacket matrix but at the point ...

    Chang-hui Choe, Gi Yean Hwang, Sung Hoon Kim in Multimedia Content Representation, Classif… (2006)

  12. No Access

    Chapter and Conference Paper

    Bandwidth Management for Smooth Playback of Video Streaming Services

    In this work we propose an analytic framework for managing the optimal bandwidth required for a smooth playback of a stored video streaming service. First, we argue that the mean buffering delay in the node is...

    Hoon Lee, Yoon Kee Kim, Kwang-Hui Lee in Management of Convergence Networks and Services (2006)

  13. No Access

    Chapter and Conference Paper

    Muscle Loadings While Using Finger as Input Device

    Finger-operated input device (FOID) might provide effective pointing and dragging control. However, it was suspected that the repetitive nature of the pointing and dragging tasks while operating the FOID would...

    Yung-Hui Lee, Wei-Yow Chen, Yi-Cherng Su in Computer-Human Interaction (2008)

  14. No Access

    Chapter and Conference Paper

    Exploiting Spatial Locality for Objects Layout in Virtual Environments

    On-disk sequentiality of requested data, or their spatial locality, is critical to disk performance. Unfornately, spatial locality of cached data is largely ignored, and only temporal locality is considered in...

    Ching-Shun Hsieh, Hui-Ling Lin in Advances in Multimedia Information Process… (2008)

  15. No Access

    Chapter and Conference Paper

    A New Side Information Generation Scheme for Distributed Video Coding

    In this paper, a new side information generation scheme for distributed video coding (DVC) is proposed. The proposed scheme uses classification-based motion estimation and multiple block motion interpolation t...

    Ming-Hui Cheng, **-Jang Leou in Advances in Multimedia Information Processing - PCM 2008 (2008)

  16. No Access

    Chapter and Conference Paper

    Feature Selection Method Combined Optimized Document Frequency with Improved RBF Network

    Feature selection is the core research topic in text categorization. Firstly, it combined word frequency with document frequency and presented an optimized document frequency (ODF) method. Then it proposed an ...

    Hao-Dong Zhu, **ang-Hui Zhao, Yong Zhong in Advanced Data Mining and Applications (2009)

  17. No Access

    Chapter and Conference Paper

    Simulation of a Signalized Intersection Delay Model

    Signalized intersection delay is an important evaluation index of the signalized intersection capacity and level of service. This paper presents a signalized intersection delay model for signalized intersectio...

    Minghui Wu, Lian Xue, Hui Yan, Chunyan Yu in Intelligent Computing and Information Science (2011)

  18. No Access

    Chapter and Conference Paper

    A High Performance 50% Clock Duty Cycle Regulator

    A low-jitter clock duty cycle corrector circuit applied in high performance ADC is presented in the paper, such circuits can change low accuracy input signals with different frequencies into 50% pulse width cl...

    Peng Huang, Hong-Hui Deng, Yong-Sheng Yin in Intelligent Computing and Information Science (2011)

  19. Chapter and Conference Paper

    Kinematic Analysis of Remote Target Pointing Hand Movements in a 3D Environment

    The study investigates kinematics of target pointing hand movements in a free-hand, touchless, 3D environment. Consistent with Fitts’ original information processing model, target pointing hand movement time i...

    Yung-Hui Lee, Shu-Kai Wu in HCI International 2011 – Posters’ Extended Abstracts (2011)

  20. No Access

    Chapter and Conference Paper

    A Real-Time Self-adaptive Enhancement Method of Infrared System

    A real-time self-adaptive image enhancement method is proposed, which based on information of the histogram for Infrared Focal Plane Array (IRFPA) system. By analyzing information on the image histogram and ca...

    Bao-Hui Zhang, Peng-Hao **a, Jun-ju Zhang in Computer Science for Environmental Enginee… (2011)

previous disabled Page of 3