Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Investigating the Mental Workload of Experiencing Virtual Reality on People with Mild Cognitive Impairment

    As the proportion of the aging population increases year by year, Taiwan is about to become a super-aging society. Among multiple problems faced by the elderly, dementia is an important but easy-to-be-neglecte...

    Pei-Fen Wu, Shao-Wei Yen, Kuang-Yi Fan in Human Aspects of IT for the Aged Population (2023)

  2. No Access

    Chapter and Conference Paper

    Types of Mobile Retail Consumers’ Shop** Behaviors from the Perspective of Time

    The aim of this research is to explore consumers’ shop** behavior on mobile apps and to mine different types of consumers. We have selected the mobile Taobao app as our research target and designed two simul...

    I-Chin Wu, Hsin-Kai Yu, Shao-I. Lien in HCI in Business, Government and Organizations (2023)

  3. No Access

    Chapter and Conference Paper

    Prediction Traffic Flow with Combination Arima and PageRank

    Modern traffic network information is similar to the complex network structure in that the links between the sections are quite complex. Therefore, predicting the traffic flow between sections can effectively ...

    Cheng-fan Li, Jia-xin Huang, Shao-chun Wu in Smart Grid and Internet of Things (2020)

  4. No Access

    Chapter and Conference Paper

    A New Design of Online/Offline Signatures Based on Lattice

    With the rapid development of mobile internet, a large number of lightweight devices are widely used. Therefore, lightweight cryptographic primitives are urgently demanded. Among these primitives, online/offli...

    Mingmei Zheng, Shao-Jun Yang, Wei Wu in Information Security Practice and Experien… (2018)

  5. No Access

    Chapter and Conference Paper

    Linearly Homomorphic Signatures with Designated Entities

    As a kind of homomorphic signatures, linearly homomorphic signatures allow any entity to linearly combine the signed data and produce a valid signature of the new data. Motivated by the open problem given by R...

    Cheng-Jun Lin, **nyi Huang, Shitang Li in Information Security Practice and Experien… (2017)

  6. No Access

    Chapter and Conference Paper

    Efficient Network Structure of 5G Mobile Communications

    5G mobile communications requires system and network considerations from many aspects. Instead of high spectral efficient physical layer communication, We introduce efficient network structure supplying a new ...

    Kwang-Cheng Chen, Whai-En Chen in Wireless Algorithms, Systems, and Applicat… (2015)

  7. No Access

    Chapter and Conference Paper

    High Performance DDDT-CWT Based Compressed Sensing Recovery of Images via Structured Sparsity

    Due to its low encoding complexity, compressed sensing (CS) has gained wide attention in image processing related areas such as image compression, medical imaging and remote sensing. In existing research on CS...

    Hai-xu Wang, Shao-hua Wu, **g-ran Yang in Wireless Algorithms, Systems, and Applicat… (2015)

  8. No Access

    Chapter and Conference Paper

    A New Cellular Automaton Model with Spatiotemporal Process of Lane Changing Execution

    In this paper, the spatiotemporal process of lane changing is considered in the cellular automaton models for traffic flow. The lane-changing time and the space required depend on the instantaneous velocity of...

    Hui-xuan Li, Chun-fu Shao, Hao-ling Wu, Jun-fang Tian, Xun Ji in Cellular Automata (2014)

  9. No Access

    Chapter and Conference Paper

    Grid Workflow Based on Performance Evaluation

    As the complexity of Grid applications increase, it becomes more important and urgent to provide grid workflow to construct and manage the applications. The grid workflow based on dynamic scheduling and perfor...

    Shao-hua Zhang, Yu-** Wu, Ning Gu, Wei Wang in Grid and Cooperative Computing (2004)

  10. Chapter and Conference Paper

    Establishing Chain of Evidence as a Base for Non-Repudiation Services

    Disputes are inevitable in business. Disputes in the real world are resolved in various ways. Similarly, in the virtual world, there is a variety of non-repudiation services as defined in the ISO/IEC standards...

    **g-Jang Hwang, Min-Hua Shao, Soushan Wu in Security and Privacy in the Age of Uncertainty (2003)