Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    An Efficient Algorithm for Fingercode-Based Biometric Identification

    With the emerging trend of incorporating biometrics information in e-financial and e-government systems arisen from international efforts in anti-money laundering and counter-terrorism, biometric identificatio...

    Hong-Wei Sun, Kwok-Yan Lam, Ming Gu in On the Move to Meaningful Internet Systems… (2006)

  2. No Access

    Chapter and Conference Paper

    Surface Fitting to Curves with Energy Control

    An algorithm for surface fitting to curves with energy control is proposed in this paper. Given four boundary curves and a set of unorganized curves, we impose the constrained energy on the desired surface, an...

    Wen-Ke Wang, Hui Zhang, Jun-Hai Yong, Jia-Guang Sun in Advances in Visual Computing (2006)

  3. No Access

    Chapter and Conference Paper

    MuSQL: A Music Structured Query Language

    A music structured query language, called MuSQL, is presented in this paper. MuSQL consists of a schema definition sub-language and a data manipulation sub-language. The former is composed of schema-setup stat...

    Chaokun Wang, Jianmin Wang, Jianzhong Li, Jia-Guang Sun in Advances in Multimedia Modeling (2006)

  4. No Access

    Chapter and Conference Paper

    Bilateral Filter for Meshes Using New Predictor

    A new predictor of bilateral filter for smoothing meshes is presented. It prevents shrinkage of corners. A major feature of mesh smoothing is to move every vertex along the direction determined by the mean cur...

    Yu-Shen Liu, Pi-Qiang Yu, Jun-Hai Yong, Hui Zhang in Computational and Information Science (2005)

  5. No Access

    Chapter and Conference Paper

    Shelling Algorithm in Solid Modeling

    Shelling is a powerful modeling operation in current CAD /CAM systems. In this paper, we present a new shelling algorithm for regular B-Rep solids. We first generate an initial offset solid, then correct the s...

    Dong-Ming Yan, Hui Zhang, Jun-Hai Yong, Yu Peng in Computational and Information Science (2005)

  6. No Access

    Chapter and Conference Paper

    Alternate Pattern Fill

    An algorithm for alternate pattern fill on arbitrary line segments, circular arcs and elliptical arcs is proposed in this paper. The algorithm creates an external loop which is a minimal loop that contains a g...

    **ao-**n Zhang, Jun-Hai Yong, Lie-Hang Gong in Computational and Information Science (2005)

  7. No Access

    Chapter and Conference Paper

    Real-Time Texture Synthesis with Patch Jump Maps

    This paper presents a real-time method for synthesizing texture. The algorithm consists of two stages: a preprocess stage and a real-time synthesis stage. In the preprocess stage, jump lists are built for each...

    Bin Wang, Jun-Hai Yong, Jia-Guang Sun in Computational and Information Science (2005)

  8. No Access

    Chapter and Conference Paper

    An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems

    This paper proposes a new algorithm that improves the efficiency of the anomaly detection stage of a vector-based intrusion detection scheme. In general, intrusion detection schemes are based on the hypothesis...

    Hong-Wei Sun, Kwok-Yan Lam, Siu-Leung Chung, Ming Gu in Networking and Mobile Computing (2005)

  9. No Access

    Chapter and Conference Paper

    Up to Face Extrusion Algorithm for Generating B-Rep Solid

    Up to face extrusion (UTFE) is an effective operation to extrude the profile from a sketch plane to a selected face. An up to face extrusion algorithm is presented in this paper. The algorithm first generates ...

    Yu Peng, Hui Zhang, Jun-Hai Yong, Jia-Guang Sun in Computational and Information Science (2005)

  10. No Access

    Chapter and Conference Paper

    Convergence Analysis of Discrete Differential Geometry Operators over Surfaces

    In this paper, we study the convergence property of several discrete schemes of the surface normal. We show that the arithmetic mean, area-weighted averaging, and angle-weighted averaging schemes have quadrati...

    Zhiqiang Xu, Guoliang Xu, Jia-Guang Sun in Mathematics of Surfaces XI (2005)

  11. No Access

    Chapter and Conference Paper

    Alternating Direction Finite Element Method for a Class of Moving Boundary Problems

    An alternating direction finite element scheme for a class of moving boundary problems is studied. Using coordinate transformations of the spatial variants, a new domain independent of the time is obtained and...

    Xu-Zheng Liu, **a Cui, Jun-Hai Yong, Jia-Guang Sun in Computational and Information Science (2005)

  12. No Access

    Chapter and Conference Paper

    Application of Content Computing in Honeyfarm

    Currently there are a wide range of techniques dedicated to network security among which honeyfarm is one of the newest development. Honeyfarm provides replication of web sites aiming to redirect hackers from ...

    Yi-Yuan Huang, Kwok-Yan Lam, Siu-Leung Chung in Information Security Applications (2005)

  13. No Access

    Chapter and Conference Paper

    Anomaly Detection in Grid Computing Based on Vector Quantization

    An efficient and effective intrusion detection model based the Vector Quantization (VQ) technique is proposed. This model is suitable for security monitoring in the grid computing environment. Experimental res...

    Hong-Wei Sun, Kwok-Yan Lam, Siu-Leung Chung in Grid and Cooperative Computing - GCC 2004 (2004)

  14. No Access

    Chapter and Conference Paper

    Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes

    With the rapid development of the global information infrastructure, the use of virtual organization (VO) is gaining increasing importance as a model for studying business and organizational structures. The no...

    Kwok-Yan Lam, **-Bin Zhao, Siu-Leung Chung, Ming Gu in Information Security Applications (2004)

  15. No Access

    Chapter and Conference Paper

    Enhancing the Scalability of the Community Authorization Service for Virtual Organizations

    Grid computing has emerged as a special form of distributed computing and is distinguished from conventional distributed computing by its focus on dynamic, large-scale resource sharing over a wide geographic d...

    Jian-** Yong, Kwok-Yan Lam, Siu-Leung Chung, Ming Gu, Jia-Guang Sun in Content Computing (2004)

  16. No Access

    Chapter and Conference Paper

    Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems

    With the rapid development of the global information infrastructure, the use of virtual organization (VO) is gaining increasing importance as a model for building large-scale business information systems. The ...

    **-Bin Zhao, Kwok-Yan Lam, Siu-Leung Chung, Ming Gu in Information Security and Privacy (2004)

  17. No Access

    Chapter and Conference Paper

    Real-Time Emulation of Intrusion Victim in HoneyFarm

    Security becomes increasingly important. However, existing security tools, almost all defensive, have many vulnerabilities which are hard to overcome because of the lack of information about hackers techniques...

    **ng-Yun He, Kwok-Yan Lam, Siu-Leung Chung, Chi-Hung Chi in Content Computing (2004)

  18. Chapter and Conference Paper

    Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services

    This paper presents an efficient implementation technique for presenting multivariate audit data needed by statistical-based intrusion detection systems. Multivariate data analysis is an important tool in stat...

    Zhi Guo, Kwok-Yan Lam, Siu-Leung Chung in Applied Cryptography and Network Security (2003)