Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    A Gravity-Based Intrusion Detection Method

    It is an important issue for the security of network to detect new intrusions attack. We introduce the idea of the law of gravity to clustering analysis, and present a gravity-based clustering algorithm. At th...

    Sheng-Yi Jiang, Qing-Hua Li in Grid and Cooperative Computing - GCC 2004 Workshops (2004)

  2. No Access

    Chapter and Conference Paper

    Mining Maximal Frequent Itemsets for Intrusion Detection

    It has been the recent research focus and trend to apply data mining techniques in an intrusion detection system for discovering new types of attacks, but it is still in its infancy. This paper presents an inn...

    Hui Wang, Qing-Hua Li, Huanyu **ong in Grid and Cooperative Computing - GCC 2004 … (2004)

  3. No Access

    Chapter and Conference Paper

    Embedded System Design for Network Time Synchronization

    Every computer needs a timer mechanism to keep track of current time and also for various accounting purposes such as calculating the time spent by a process in CPU utilization, disk I/O, and so on, so that th...

    So-Young Hwang, Dong-Hui Yu, Ki-Joune Li in Embedded and Ubiquitous Computing (2004)

  4. No Access

    Chapter and Conference Paper

    Constructing a SCORM-Compliant Intelligent Strategy Repository

    Develo** a pedagogical learning content that can be delivered among different Learning Management Systems (LMSs) is a critical task for most instructors. Although the Sharable Content Object Reference Model ...

    Yi-Chun Chang, Ching-Pao Chang in Advances in Web-Based Learning – ICWL 2005 (2005)

  5. Chapter and Conference Paper

    On Scalability and Mobility Management of Hierarchical Large-Scale Ad Hoc Networks

    With the increased interest in the mobile wireless communication, the development of large-scale ad hoc networks has drawn a lot of attention and the scalability of ad hoc networks has been the subject of exte...

    Ming-Hui Tsai, Tzu-Chiang Chiang in Embedded and Ubiquitous Computing – EUC 20… (2005)

  6. No Access

    Chapter and Conference Paper

    Adaptive Power-Aware Clustering and Multicasting Protocol for Mobile Ad Hoc Networks

    One of the most critical issues in wireless ad hoc networks is represented by the limited availability of energy within network nodes. Most of the researches focused on the problem of routing issues rather tha...

    James Jiunn Yin Leu, Ming-Hui Tsai in Ubiquitous Intelligence and Computing (2006)

  7. No Access

    Chapter and Conference Paper

    Web-Based Three-Dimension E-Mail Traffic Visualization

    E-mail pervades many aspects of our lives and is becoming indispensable communication method in areas such as commerce, government, production and general information dissemination. To maintain the security an...

    **ang-hui Wang, Guo-yin Zhang in Advanced Web and Network Technologies, and Applications (2006)

  8. No Access

    Chapter and Conference Paper

    An Open Service Platform at Network Edge

    The last few years, users want various services that fit their needs and preferences. Many services are provided at network edges and are increasing in number. The open framework is needed for efficient servic...

    Dong-Hui Kim, Jae-Oh Lee in Management of Convergence Networks and Services (2006)

  9. No Access

    Chapter and Conference Paper

    An Adaptive Control Using Multiple Neural Networks for the Variable Displacement Pump

    A model following adaptive controller made-up by neural networks is proposed to control the angular displacement of swashplate in a variable displacement axial piston pump (VDAPP), which consists of multiple n...

    Ming-Hui Chu, Yuan Kang, Yuan-Liang Liu in Advances in Applied Artificial Intelligence (2006)

  10. Chapter and Conference Paper

    Reliable Transporting and Optimal Routing on Rate-Based for Ad Hoc Networks

    Owing to the inflexibility of the structure, the conventional layered protocols suffer from the inability to distinguish between losses due to route failures and congestion. Recently, in efforts to overcome th...

    Ming-Hui Tsai, Tzu-Chiang Chiang in Emerging Directions in Embedded and Ubiqui… (2006)

  11. No Access

    Chapter and Conference Paper

    Continuous Function Optimization Using Hybrid Ant Colony Approach with Orthogonal Design Scheme

    A hybrid Orthogonal Scheme Ant Colony Optimization (OSACO) algorithm for continuous function optimization (CFO) is presented in this paper. The methodology integrates the advantages of Ant Colony Optimization ...

    Jun Zhang, Wei-neng Chen, **g-hui Zhong, Xuan Tan in Simulated Evolution and Learning (2006)

  12. No Access

    Chapter and Conference Paper

    Bandwidth Management for Smooth Playback of Video Streaming Services

    In this work we propose an analytic framework for managing the optimal bandwidth required for a smooth playback of a stored video streaming service. First, we argue that the mean buffering delay in the node is...

    Hoon Lee, Yoon Kee Kim, Kwang-Hui Lee in Management of Convergence Networks and Services (2006)

  13. No Access

    Chapter and Conference Paper

    Using Agent Technology to Study Human Action and Perception Through a Virtual Street Simulator

    Human activities are the foundation of the social processes that drive the urban system. The emergence of information technology provides opportunities to extend the transformation of the physical city into th...

    Chiung-Hui Chen, Mao-Lin Chiu in Human-Computer Interaction. Interaction Pl… (2007)

  14. No Access

    Chapter and Conference Paper

    User-Oriented Design (UOD) Patterns for Innovation Design at Digital Products

    Innovation design is the trend of products in the future. User-oriented design (UOD) is a design process which focuses on the needs of the user and develops product concepts for them. The objective of this res...

    Chiou Wen-Ko, Chen Bi-Hui, Wang Ming-Hsu in Human-Computer Interaction. Interaction De… (2007)

  15. No Access

    Chapter and Conference Paper

    Quantitative Analysis of Single-Level Single-Mediator Multi-agent Systems

    Queueing Theory deals with problems where some restricted resource should be shared between competitive flow of requests. In this paper we use Queueing Theory methods to perform a quantitative analysis of a si...

    Moon Ho Lee, Aliaksandr Birukou in Agent and Multi-Agent Systems: Technologie… (2007)

  16. No Access

    Chapter and Conference Paper

    AIMED- A Personalized TV Recommendation System

    Previous personalized DTV recommendation systems focus only on viewers’ historical viewing records or demographic data. This study proposes a new recommending mechanism from a user oriented perspective. The re...

    Shang H. Hsu, Ming-Hui Wen, Hsin-Chieh Lin in Interactive TV: a Shared Experience (2007)

  17. No Access

    Chapter and Conference Paper

    Research on Management of Resource Virtualization Based on Network

    In order to satisfy the demands of individualized learning for various learners, it is necessary to reform the traditional resource management pattern to provide various learners an individualized learning pla...

    Gui-Lin Chen, Sheng-Hui Zhao, Li-Sheng Ma in Technologies for E-Learning and Digital En… (2008)

  18. No Access

    Chapter and Conference Paper

    Muscle Loadings While Using Finger as Input Device

    Finger-operated input device (FOID) might provide effective pointing and dragging control. However, it was suspected that the repetitive nature of the pointing and dragging tasks while operating the FOID would...

    Yung-Hui Lee, Wei-Yow Chen, Yi-Cherng Su in Computer-Human Interaction (2008)

  19. No Access

    Chapter and Conference Paper

    A Strategy for Selecting Super-Peer in P2P and Grid Based Hybrid System

    With the explosive increase of digital resources, the efficiency of searching resources has become a key problem. Both P2P and Grid are distributed network system, which provide good platforms for storing reso...

    Sheng-Hui Zhao, Gui-Lin Chen, Guo-**n Wu in Technologies for E-Learning and Digital En… (2008)

  20. No Access

    Chapter and Conference Paper

    Ubiquitous and Robust Text-Independent Speaker Recognition for Home Automation Digital Life

    This paper presents a ubiquitous and robust text-independent speaker recognitionarchitecture for home automation digital life. In this architecture, a multiple microphone configuration is adopted to receive th...

    Jhing-Fa Wang, Ta-Wen Kuan, Jia-chang Wang in Ubiquitous Intelligence and Computing (2008)

previous disabled Page of 3