Skip to main content

previous disabled Page of 5
and
  1. No Access

    Chapter and Conference Paper

    A scheme for obtaining a message from the digital multisignature

    A new digital multisignature scheme shall be proposed in this paper to allow some members of a group signing the same document and sending it to the receiver, who in turn shall verify and authenticate the sign...

    Chin -Chen Chang, Jyh -Jong Leu, Pai -Cheng Huang, Wei -Bin Lee in Public Key Cryptography (1998)

  2. No Access

    Chapter and Conference Paper

    An End-to-End Delivery Scheme for Robust Video Streaming

    In this paper, we propose a novel robust end-to-end approach, referred to as packet permutation (PP), to deliver pre-compressed video streams over the Internet. We focus on reducing the impact caused by the bu...

    Jen-Wen Ding, Yueh-Min Huang in Advances in Multimedia Information Process… (2001)

  3. No Access

    Chapter and Conference Paper

    MPEG IPMP Concepts and Implementation

    Intellectual Property (IP) protection is a critical element in a multimedia transmission system. Therefore, ISO/IEC MPEG started the IP protection standardization project on MPEG-4 a few years ago. A basic IPM...

    Cheng-Ching Huang, Hsueh-Ming Hang in Advances in Multimedia Information Process… (2002)

  4. No Access

    Chapter and Conference Paper

    Integration of GPRS and Wireless LANs with Multimedia Applications

    This paper presents a gateway approach for the integration of GPRS and wireless LANs (WLANs). The proposed architecture leverages Mobile IP as the mobility management protocol over WLANs. The interworking betw...

    Hong-Wei Lin, Jyh-Cheng Chen in Advances in Multimedia Information Process… (2002)

  5. No Access

    Chapter and Conference Paper

    A Power-Based Clustering Algorithm for Wireless Ad-Hoc Networks

    Energy saving, despite recent advances in extending battery life, is still an important issue in wireless ad hoc networks. An often adopted method is power management, which can help in reducing the transmissi...

    Tsung-Chuan Huang, Liang-Cheng Shiu, Yan-Feng Chen in Embedded and Ubiquitous Computing (2004)

  6. No Access

    Chapter and Conference Paper

    Combined Encryption and Watermarking Approaches for Scalable Multimedia Coding

    Intellectual Property (IP) protection is a critical element in a multimedia transmission system. Conventional IP protection schemes can be categorized into two major branches: encryption and watermarking. In this...

    Feng-Cheng Chang, Hsiang-Cheh Huang in Advances in Multimedia Information Process… (2005)

  7. No Access

    Chapter and Conference Paper

    A Two-Stage Queuing Approach to Support Real-Time QoS Guarantee for Multimedia Services in TDMA Wireless Networks

    This paper presents a two-stage queuing approach (TSQA) to improve the quality of service when real-time service in wireless channels [1]. In the first stage, the required delay, bandwidth, lose and input rate...

    Ren-Hao Cheng, Po-Cheng Huang in Advances in Multimedia Information Process… (2005)

  8. No Access

    Chapter and Conference Paper

    Environment Matting of Transparent Objects Based on Frequency-Domain Analysis

    The paper proposed a new environment matting algorithm to model the appearance of transparent object under different background. We used the frequency response to compute the relationship between the area of f...

    I-Cheng Chang, Tian-Lin Yang in Advances in Multimedia Information Process… (2005)

  9. No Access

    Chapter and Conference Paper

    A Unified Framework Using Spatial Color Descriptor and Motion-Based Post Refinement for Shot Boundary Detection

    We propose a unified framework which combines a novel color representation, i.e. spatial color descriptors, and a post-refinement process to detect various types of shot boundaries, including abrupt shot chang...

    Wei-Ta Chu, Wen-Huang Cheng, Sheng-Fang He in Advances in Multimedia Information Process… (2005)

  10. Chapter and Conference Paper

    MDFM: Multi-domain Fault Management for Internet Services

    New requirements of service-oriented fault management are analyzed and a framework MDFM (Multi-Domain Fault Manager) is proposed in this paper to solve the service fault localization problem in multi-domain co...

    **aohui Huang, Shihong Zou, Wendong Wang in Management of Multimedia Networks and Serv… (2005)

  11. Chapter and Conference Paper

    QoSJava: An End-to-End QoS Solution

    Incompatibility of different QoS (Quality of Service) mechanisms and heterogeneity of different vendors’ network devices are the major obstacles for providing end-to-end QoS in IP network. Inspired by Java, we...

    **aohui Huang, Yu Lin, Wendong Wang in Management of Multimedia Networks and Serv… (2005)

  12. No Access

    Chapter and Conference Paper

    A Smart Schoolbag System for Reminding Pupils of the Forgotten Items

    In this research, a ubiquitous learning support system making use of the schoolbag is presented to assist elementary school pupils in their personal items management. Through some sensors, the micro-computer e...

    Lei **g, Noriko Yamamoto, Zixue Cheng in Ubiquitous Intelligence and Computing (2006)

  13. No Access

    Chapter and Conference Paper

    Develo** and Implementing IHPM on IXP 425 Network Processor Platforms

    This paper describes a technique for tracing attacks back toward the attackers somewhere in the Internet. There are many solutions existing for IP traceback problem, such as packet marking and algebraic approa...

    Bo-Chao Cheng, Ching-Fu Huang, Wei-Chi Chang in Information Security Applications (2006)

  14. No Access

    Chapter and Conference Paper

    Behavior Analysis with Combined RFID and Video Information

    In order for the hidden computer to interact with human beings, a variety of sensors are used to collect data of human behavior. Using video cameras is quite straightforward on this matter. However, it is stil...

    Hui-Huang Hsu, Zixue Cheng, Tongjun Huang, Qiu Han in Ubiquitous Intelligence and Computing (2006)

  15. No Access

    Chapter and Conference Paper

    Film Narrative Exploration Through the Analysis of Aesthetic Elements

    In this paper, we propose a novel method for performing high-level narrative structure extraction of films. Our objective is to utilize the knowledge of film production for analyzing and extracting the structu...

    Chia-Wei Wang, Wen-Huang Cheng, Jun-Cheng Chen in Advances in Multimedia Modeling (2006)

  16. No Access

    Chapter and Conference Paper

    Prediction for Chaotic Time Series Based on Discrete Volterra Neural Networks

    In this paper, based on the Volterra expansion of nonlinear dynamical system functions and the deterministic and nonlinear characterization of chaotic time series, the discrete Volterra neural networks are pro...

    Li-Sheng Yin, **-Yue Huang, Zu-Yuan Yang in Advances in Neural Networks - ISNN 2006 (2006)

  17. No Access

    Chapter and Conference Paper

    Exploiting Spatial-temporal Coherence in the Construction of Multiple Perspective Videos

    We implement an image-based system that constructs multiple perspective videos with active objects using an off-the-shelf PC and digital video camcorders without the need of advanced calibration and 3D model r...

    Mau-Tsuen Yang, Shih-Yu Huang, Kuo-Hua Lo in Advances in Image and Video Technology (2006)

  18. No Access

    Chapter and Conference Paper

    COBRA: Closed Sequential Pattern Mining Using Bi-phase Reduction Approach

    In this work, we study the problem of closed sequential pattern mining. We propose a novel approach which extends a frequent sequence with closed itemsets instead of single items. The motivation is that closed...

    Kuo-Yu Huang, Chia-Hui Chang, Jiun-Hung Tung in Data Warehousing and Knowledge Discovery (2006)

  19. Chapter and Conference Paper

    Function-Level Multitasking Interface Design in an Embedded Operating System with Reconfigurable Hardware

    Reconfigurable architecture provides a high performance computing paradigm. We can implement the compute-intensive functions into reconfigurable devices to optimize the application performance. In current reco...

    I-Hsuan Huang, Chih-Chun Wang, Shih-Min Chu in Embedded and Ubiquitous Computing (2007)

  20. No Access

    Chapter and Conference Paper

    An Architecture Approach to Dynamic Policy in RBAC

    Dynamic policy enables the system to adjust the policies according to the changing circumstance, and makes the system more flexible and adaptive. We have proposed a dynamic model and the idea is to dynamically...

    Cheng Zang, Zhongdong Huang, Ke Chen in Computer Supported Cooperative Work in Des… (2007)

previous disabled Page of 5