![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Clustered Routing Protocol with Distributed Intrusion Detection for Wireless Sensor Networks
Clustered routing protocols in wireless sensor networks (WSN) provide significant advantages in energy saving and data preprocessing. However, the communication greatly depends on cluster heads, which leads to...
-
Chapter and Conference Paper
A Public Grid Computing Framework Based on a Hierarchical Combination of Middleware
Grids, as one implementation of public computing, can be deployed by some middleware to integrate all kinds of resources across institutional boundaries, to tackle complex problems in scientific and engineerin...
-
Chapter and Conference Paper
ParaView-Based Collaborative Visualization for the Grid
This paper describes our efforts to develop visualization service on the Grid. The focus of this paper is our work on grid-enabling the ParaView, a widely used parallel visualization software package. Upon the...
-
Chapter and Conference Paper
Inductive Charging with Multiple Charger Nodes in Wireless Sensor Networks
Energy consumption in Wireless Sensor Network (WSN) remains a challenging problem. Better Solutions of this problem not only can prolong the lifetime of WSNs, but also can support more complex protocols to imp...
-
Chapter and Conference Paper
A Comparative Study on Marketing Mix Models for Digital Products
The rise of the Internet and electronic commerce provide a huge marketspace and unique transaction process for digital products. It is significant to discuss whether established marketing models can be revised...
-
Chapter and Conference Paper
Performance-Driven Task and Data Co-scheduling Algorithms for Data-Intensive Applications in Grid Computing
To gain higher performance under many constraints, effective scheduling is a key concern in data-intensive grid computing. Based on a Dual-Component and Dual-Queue Distributed Schedule Model (DCDQDSM), we pres...
-
Chapter and Conference Paper
Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents
Protection of data integrity in mobile agents has drawn much attention in recent years. Various degrees of agent data integrity have been achieved by a number of proposed schemes. A known vulnerability of thes...
-
Chapter and Conference Paper
Secure Client Agent Environment (SCAE) for World Wide Web
The agent programming approach can be beneficial for many new applications on the World Wide Web. We propose a novel agent workspace on the client side for hosting Web agents downloaded from different Web serv...
-
Chapter and Conference Paper
Real-Time Facial Patterns Mining and Emotion Tracking
In this paper, we present a real-time method for mining the facial patterns and tracking the facial emotion. We first recognize the facial patterns based on a nonsupervised idea of pattern mining from video. T...
-
Chapter and Conference Paper
Web Intelligence (WI) Research Challenges and Trends in the New Information Age
This paper is about a new research field called Web Intelligence (WI for short). We try to explain the needs for coining the term as a sub-discipline of computer science for systematic studies on advanced Web rel...
-
Chapter and Conference Paper
Example-Based Chinese Text Filtering Model
This paper briefly describes the background of text filtering and proposes an example-based Chinese text filtering model. It analyzes the structure of the texts as example, extracts the keywords from the texts...