Skip to main content

previous disabled Page of 15
and
Your search also matched 2,377 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Analysis of some experimental results for the TDM

Include preview-only content
  1. Chapter and Conference Paper

    The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks

    At the 1990 EuroCrypt Conference, Niemi proposed a new publickey cryptosystem based on modular knapsacks. Y.M. Chee in Singapore, A. Joux and J. Stern in Paris independently found that this cryptosystem is ins...

    Yeow Meng Chee, Antoine Joux, Jacques Stern in Advances in Cryptology — CRYPTO ’91 (1992)

  2. Chapter

    Chinese Full-Text Retrieval Technology Applied in National Occupational Training and Testing Network in WWW Environment

    This paper describes how CGI and API techniques are used to realize fast indexing and remote retrieving vast quantity original data on personal computers.

    Qingyuan Meng, Min Chen, **gsheng Li in Information Systems in the WWW Environment (1998)

  3. Chapter and Conference Paper

    Using Time over Threshold to Reduce Noise in Performance and Fault Management Systems

    Fault management systems detect performance problems and intermittent failures by periodically examining a metric (such as the utilization of a link),and raising an alarm if the value is above a threshold. Suc...

    Mark Sylor, Lingmin Meng in Services Management in Intelligent Networks (2000)

  4. Chapter

    Develo** a Distributed Meeting Service to Support Mobile Meeting Participants

    Future 3rd+ generation mobile wireless systems are been designed to support high data rates in comparison to existing voice based wireless systems. The success of these new systems will partly be based on the dat...

    Seamus Hickey MEng in Intelligence in Networks (2000)

  5. Chapter and Conference Paper

    A Spectral Element Method for Oldroyd-B Fluid in a Contraction Channel

    A spectral element method coupled with the EVSS method for computing viscoelastic flows is presented. The nonlinear rheological model, Oldroyd-B, is chosen to simulate the flow of a viscoelastic fluid based on...

    Sha Meng, **n Kai Li, Gwynne Evans in Computational Science — ICCS 2001 (2001)

  6. Chapter and Conference Paper

    Admission Control and Capacity Management for Advance Reservations with Uncertain Service Duration

    Different from Immediate Request (IR) service in packet-switched networks, admission control for Advance Reservation (AR) service is more complex - the decision points include not only the start time of the ne...

    Yeali S. Sun, Yung-Cheng Tu, Meng Chang Chen in NETWORKING 2002: Networking Technologies, … (2002)

  7. Chapter and Conference Paper

    A Ground-Truthing Tool for Layout Analysis Performance Evaluation

    There is a significant need for performance evaluation of Layout Analysis methods. The greatest stumbling block is the lack of sufficient ground truth. In particular, there is currently no ground-truth for the...

    A. Antonacopoulos, H. Meng in Document Analysis Systems V (2002)

  8. Chapter and Conference Paper

    Business Agent

    The Internet and World Wide Web represent an increasingly important channel for retail commerce as well as business transactions. However, there are almost 5 billion pages or sites on the Internet and WWW. The...

    I.-Heng Meng, Wei-Pang Yang, Wen-Chih Chen in Computational Science — ICCS 2002 (2002)

  9. Chapter and Conference Paper

    Smooth Interfaces for Spectral Element Approximations of Navier-Stokes Equations

    A smoothing technique is developed to calculate the interface conditions of spectral element method for solving the incompressible Navier-Stokes equations. The first derivative of spectral element solution at ...

    Sha Meng, **n Kai Li, Gwynne Evans in Computational Science — ICCS 2002 (2002)

  10. Chapter and Conference Paper

    An Overlay for Ubiquitous Streaming over Internet

    Conventional distribution of real-time multimedia data uses multicasting or a series of relays and tunnels for unicast networks. The former is a capability not popularly enabled by a lot of networks while the ...

    Chai Kiat Yeo, Bu Sung Lee, Meng Hwa Er in NETWORKING 2002: Networking Technologies, … (2002)

  11. Chapter and Conference Paper

    Intrusion Masking for Distributed Atomic Operations

    Distributed database transactions are treated as atomic operations. This paper considers intrusion masking atomic operations among replica groups. The paper proposes two Byzantine fault tolerant two-phase comm...

    Meng Yu, Peng Liu, Wanyu Zang in Security and Privacy in the Age of Uncertainty (2003)

  12. Chapter and Conference Paper

    Life Cycle Modeling of News Events Using Aging Theory

    In this paper, an adaptive news event detection method is proposed. We consider a news event as a life form and propose an aging theory to model its life span. A news event becomes popular with a burst of news...

    Chien Chin Chen, Yao-Tsung Chen, Yeali Sun, Meng Chang Chen in Machine Learning: ECML 2003 (2003)

  13. Chapter and Conference Paper

    TCP Friendly Rate Adaptation for Multimedia Streaming in Mobile ad hoc Networks

    Transport protocol for supporting multimedia streaming in mobile ad hoc networks has to cope with the rich dynamics, such as mobility-induced disconnection and reconnection, high out-of-order delivery ratios, ...

    Zhenghua Fu, **aoqiao Meng, Songwu Lu in Management of Multimedia Networks and Services (2003)

  14. Chapter and Conference Paper

    A Method on Solving Multiobjective Conditional Value-at-Risk

    This paper studies Conditional Value-at-Risk (CVaR) with multiple losses. We introduce the concept of α-CVaR for the case of multiple losses under the confidence level vector α. The α-CVaR indicates the condition...

    Min Jiang, Qiying Hu, Zhiqing Meng in Computational Science - ICCS 2004 (2004)

  15. Chapter and Conference Paper

    SuperNBD: An Efficient Network Storage Software for Cluster

    Networked storage has become an increasingly common and essential component for cluster. In this environment, the network storage software through which the client nodes can directly access remote network atta...

    Rongfeng Tang, Dan Meng, ** **ong in Network and Parallel Computing (2004)

  16. Chapter and Conference Paper

    ALiCE: A Scalable Runtime Infrastructure for High Performance Grid Computing

    This paper discusses a Java-based grid computing middleware, ALiCE, to facilitate the development and deployment of generic grid applications on heterogeneous shared computing resources. The ALiCE layered grid...

    Yong-Meng Teo, **anbing Wang in Network and Parallel Computing (2004)

  17. Chapter and Conference Paper

    Fair and Performance Guaranteed Methods for Flat-Rate Unlimited Access Service Plan

    Simplicity in administration and operation is the choice for production networks. Hence, flat-rate unlimited access service plan is the predominant form of retail pricing in Broadband Internet access services....

    Yeali S. Sun, Pei-Wen Chen, Meng Chang Chen in Networking 2004 (2004)

  18. Chapter and Conference Paper

    Multi-level Fusion of Audio and Visual Features for Speaker Identification

    This paper explores the fusion of audio and visual evidences through a multi-level hybrid fusion architecture based on dynamic Bayesian network (DBN), which combines model level and decision level fusion to ac...

    Zhiyong Wu, Lianhong Cai, Helen Meng in Advances in Biometrics (2005)

  19. Chapter and Conference Paper

    Technology Evaluations on the TH-FACE Recognition System

    For biometric person authentication, evaluations on a biometric system are very essential parts of the entire process. This paper presents the technology evaluations on the TH-FACE recognition system. The main...

    Congcong Li, Guangda Su, Kai Meng, Jun Zhou in Advances in Biometrics (2005)

  20. Chapter and Conference Paper

    Design and Implementation of a SAN Agent for Windows NT Architecture

    In an out-of-band SAN virtualization system, the virtualization appliance maintains metadata, and the agents inside the kernel of servers use that data to supply virtual storage devices and to perform the mapp...

    Ran Meng, Jiwu Shu, Wei Xue in Network and Parallel Computing (2005)

previous disabled Page of 15