Skip to main content

previous disabled Page of 5
and
Your search also matched 699 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

A unified framework for multicast forwarding

Include preview-only content
  1. Chapter and Conference Paper

    Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions

    It has recently been shown that when m > 1/2n - 1, the nonlinearity N f of an mth-order correlation immune function f with n variables satisfies the condition of N

    Yuliang Zheng, **an-Mo Zhang in Selected Areas in Cryptography (2001)

  2. Chapter and Conference Paper

    IDSIS: Intelligent Document Semantic Indexing System

    With rapid growth of the Internet, how to get information from this huge information space becomes an even important problem. In this paper, An Intelligence Document Semantic Indexing System: IDSIS is proposed...

    Zhongzhi Shi, Bin Wu, Qing He, **ujun Gong in Intelligent Information Processing (2002)

  3. Chapter

    DVQ: A DTD-Driven Visual Query Interface for XML Database Systems

    XML has been recognized as a promising language for data exchange over the Internet. A number of query languages have been proposed for querying XML data. Most of those languages are path-expression based. One...

    Long Zhang, Shihui Zheng, Aoying Zhou in Visual and Multimedia Information Manageme… (2002)

  4. Chapter and Conference Paper

    An Implementation of Storage-Based Synchronous Remote Mirroring for SANs

    Remote mirroring ensures that all data written to a primary storage device are also written to a remote secondary storage device to support disaster recoverability. In this study, we designed and implemented a...

    Ji-wu Shu, Rui Yan, Dongchan Wen, Weimin Zheng in Network and Parallel Computing (2004)

  5. Chapter and Conference Paper

    Network-Embedded Programmable Storage and Its Applications

    We consider the utility of two key properties of network-embedded storage: programmability and network-awareness. We describe two extensive applications, whose performance and functionalities are significantly...

    Sumeet Sobti, Junwen Lai, Yilei Shao, Nitin Garg, Chi Zhang, Ming Zhang in Networking 2004 (2004)

  6. Chapter and Conference Paper

    MagicStore: A New Out-of-Band Virtualization System in SAN Environments

    In this paper, MagicStore, a new out-of-band virtualization system designed for SAN environments is proposed. Online multiplication of the components in a striped volume can help enhance both the I/O performan...

    Guangyan Zhang, Jiwu Shu, Wei Xue, Weimin Zheng in Network and Parallel Computing (2005)

  7. Chapter and Conference Paper

    A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services

    Today’s grid architecture encompasses a far greater breadth of applications than the traditional grid, which focused on distributed applications processing large amounts of data. Newer grid applications are mo...

    Namje Park, Kiyoung Moon, Kyoil Chung, Dongho Won, Yuliang Zheng in Web Engineering (2005)

  8. Chapter and Conference Paper

    Pattern-Based Specification and Validation of Web Services Interaction Properties

    There have been significant efforts in providing semantic descriptions for Web services, including the approach as exemplified by OWL-S. Part of the semantic description in OWL-S is about the interaction proce...

    Zheng Li, Jun Han, Yan ** in Service-Oriented Computing - ICSOC 2005 (2005)

  9. Chapter and Conference Paper

    Modelling and Analysis of Power Consumption for Component-Based Embedded Software

    With the increasing complexity of the real-time embedded software, the power consumption is becoming a real challenge in the system designs. In this paper, for modelling the component-based embedded software, ...

    Hu Jun, Li Xuandong, Zheng Guoliang in Emerging Directions in Embedded and Ubiqui… (2006)

  10. Chapter and Conference Paper

    An ID-Based Watermarking Scheme for Java Programs

    In this paper, we propose an identities(ID) based watermarking scheme for Java programs. In our scheme, the watermark is generated by participants’ identities, embedded via the watermarked opaque predicates, and ...

    Zheng Yuan, Qiaoyan Wen, Wenling Wu in Emerging Directions in Embedded and Ubiqui… (2006)

  11. Chapter and Conference Paper

    Performance and Analysis of CDM-FH-OFDMA for Broadband Wireless Systems

    Frequency-hop** (FH) methods in the Orthogonal frequency division multiplexing access(OFDMA) system,which are to assign user-specific subcarrier to the active users, have been paid much attention to in the b...

    Kan Zheng, Lu Han, Jianfeng Wang, Wenbo Wang in NETWORKING 2006. Networking Technologies, … (2006)

  12. Chapter and Conference Paper

    Chinese Visible Human Data Sets and Their Applications

    The research on digital visible human is of great significance and application value. The US VHP created the first digital image data set of complete human (male and female) in 1995. To promote worldwide appli...

    Shao-**ang Zhang, Pheng Ann Heng, Zheng-** Liu, Li-Wen Tan in Digital Human Modeling (2007)

  13. Chapter and Conference Paper

    Layered Peer to Peer Streaming Using Hidden Markov Models

    A fundamental problem in peer-to-peer streaming is how to select peers from a large network to request their media data. Due to the heterogeneity and the time-varying features of shared resources between peers...

    Sheng-De Wang, Zheng-Yi Huang in Emerging Directions in Embedded and Ubiquitous Computing (2007)

  14. Chapter and Conference Paper

    EEGFGR: An Energy-Efficient Greedy-Face Geographic Routing for Wireless Sensor Networks

    The geographic routing technology is good for the self-organizing and large-scale Wireless Sensor Networks(WSNs), and the energy-limited sensor nodes require the energy used for routing to be minimum. In this ...

    Tao Zi-**, Wu Yi, Gong Zheng-Hu in Network and Parallel Computing (2007)

  15. Chapter and Conference Paper

    Extracting Realistic Textures from Reference Spheres

    This paper proposes a method for extracting realistic textures from real-world reference spheres. The BRDF parameters of fundamental materials, as well as a material weight map for the sphere are obtained thro...

    Zuoyong Zheng, Lizhuang Ma, Zhou Zeng in Entertainment Computing – ICEC 2007 (2007)

  16. Chapter and Conference Paper

    Linkable Ring Signatures from Linear Feedback Shift Register

    Linkable ring signatures can simultaneously provide the properties of anonymity, spontaneity as well as linkability. Linear feedback shift register (LFSR) sequence can be used to shorten the representation of ...

    Dong Zheng, **angxue Li, Kefei Chen in Emerging Directions in Embedded and Ubiqui… (2007)

  17. Chapter and Conference Paper

    Enhanced Sleep Mode Operations for Energy Saving in IEEE 802.16e

    The broadband wireless access (BWA) network, such as IEEE 802.16e, becomes more and more popular in recent years. According to the IEEE 802.16e specifications, mobile subscriber stations (MSSs) with energy con...

    Sixian Zheng, Kuochen Wang, Shiao-Li Tsao in Emerging Directions in Embedded and Ubiqui… (2007)

  18. Chapter and Conference Paper

    WebELS: A Content-Centered E-Learning Platform for Postgraduate Education in Engineering

    This paper proposes a general purpose e-Learning platform WebELS to support higher education in engineering and science especially for PhD education. WebELS consists of three major modules, i.e., Learning for ...

    Haruki Ueno, Zheng He, **gxia Yue in Human-Computer Interaction. Interacting in… (2009)

  19. Chapter and Conference Paper

    Managing Long-Tail Processes Using FormSys

    Efforts and tools aiming to automate business processes promise the highest potential gains on business processes with a well-defined structure and high degree of repetition [1]. Despite successes in this area...

    Ingo Weber, Hye-Young Paik, Boualem Benatallah in Service-Oriented Computing (2010)

  20. Chapter and Conference Paper

    Provenance-Aware Faceted Search in Drupal

    As the web content is increasingly generated in more diverse situations, provenance is becoming more and more critical. While a variety of approaches have been investigated for capturing and making use of prov...

    Zhenning Shangguan, **guang Zheng in Provenance and Annotation of Data and Proc… (2010)

previous disabled Page of 5