Skip to main content

previous disabled Page of 6
and
  1. No Access

    Chapter and Conference Paper

    Intelligent routing for global broadband satellite internet

    With the fast development of internet, the multicasting applications (such as Distant Learning) have become more and more important. Since multicasting multimedia information over the wired links might generat...

    Chao-Hsu Chang, Hsiao-kuang Wu, Ming-Hui ** in High-Performance Computing and Networking (1999)

  2. No Access

    Chapter and Conference Paper

    Phylogenetic k-Root and Steiner k-Root

    Given a graph G = (V,E) and a positive integer k, the Phylogenetic k-Root Problem asks for a (unrooted) tree T without degree-2 nodes such that its leaves are labeled by V and (u, v)E if and only if d ...

    Guo-Hui Lin, Paul E. Kearney, Tao Jiang in Algorithms and Computation (2000)

  3. Chapter and Conference Paper

    The Secret and Beauty of Ancient Chinese Padlocks

    Most ancient Chinese padlocks are key-operated locks with splitting springs, and partially keyless letter-combination locks. They can be characterized based on the types of locks, the shapes of locks, the engr...

    Hong-Sen Yan, Hsing-Hui Huang in Advances in Cryptology - ASIACRYPT 2003 (2003)

  4. No Access

    Chapter and Conference Paper

    Visual Features Extracting & Selecting for Lipreading

    This paper has put forward a way to select and extract visual features effectively for lipreading. These features come from both lowlevel and high-level, those are compensatory each other. There are 41 dimensi...

    Hong-xun Yao, Wen Gao, Wei Shan, Ming-hui Xu in Audio- and Video-Based Biometric Person Au… (2003)

  5. No Access

    Chapter and Conference Paper

    A Gravity-Based Intrusion Detection Method

    It is an important issue for the security of network to detect new intrusions attack. We introduce the idea of the law of gravity to clustering analysis, and present a gravity-based clustering algorithm. At th...

    Sheng-Yi Jiang, Qing-Hua Li in Grid and Cooperative Computing - GCC 2004 Workshops (2004)

  6. No Access

    Chapter and Conference Paper

    Mining Maximal Frequent Itemsets for Intrusion Detection

    It has been the recent research focus and trend to apply data mining techniques in an intrusion detection system for discovering new types of attacks, but it is still in its infancy. This paper presents an inn...

    Hui Wang, Qing-Hua Li, Huanyu **ong in Grid and Cooperative Computing - GCC 2004 … (2004)

  7. No Access

    Chapter and Conference Paper

    Embedded System Design for Network Time Synchronization

    Every computer needs a timer mechanism to keep track of current time and also for various accounting purposes such as calculating the time spent by a process in CPU utilization, disk I/O, and so on, so that th...

    So-Young Hwang, Dong-Hui Yu, Ki-Joune Li in Embedded and Ubiquitous Computing (2004)

  8. Chapter and Conference Paper

    On Scalability and Mobility Management of Hierarchical Large-Scale Ad Hoc Networks

    With the increased interest in the mobile wireless communication, the development of large-scale ad hoc networks has drawn a lot of attention and the scalability of ad hoc networks has been the subject of exte...

    Ming-Hui Tsai, Tzu-Chiang Chiang in Embedded and Ubiquitous Computing – EUC 20… (2005)

  9. No Access

    Chapter and Conference Paper

    Identity Based Delegation Network

    Delegation of authorities is a common practice in various organizations. The way delegation is performed can be quite complicated. To capture possible delegation structures, the concept of delegation network is p...

    Sherman S. M. Chow, Richard W. C. Lui in Progress in Cryptology – Mycrypt 2005 (2005)

  10. No Access

    Chapter and Conference Paper

    A Cluster-Based QoS Multipath Routing Protocol for Large-Scale MANET

    To support oS routing in MANET (Mobile Ad hoc Networks) is a core issue in the research of MANET. Numerous studies have shown the difficulty for provision of Quality-of-Service (QoS) guarantee in Mobile Ad hoc...

    Hui-Yao An, **-Cheng Lu, Zheng-hu Gong in High Performance Computing and Communicati… (2005)

  11. No Access

    Chapter and Conference Paper

    A Framework on Compound Knowledge Push System Oriented to Organizational Employees

    Organizational employees have different knowledge demands and the knowledge is compound. So how to push the right compound knowledge to the right organizational employees becomes important. This paper attempts...

    Zhi-** Fan, Yong Feng, Yong-Hong Sun, Bo Feng in Internet and Network Economics (2005)

  12. No Access

    Chapter and Conference Paper

    Select the Size of Training Set for Financial Forecasting with Neural Networks

    The performance of financial forecasting with neural networks dependents on the particular training set. We design mean-change-point test to divide the original dataset into different training sets. The experi...

    Wei Huang, Yoshiteru Nakamori, Shouyang Wang in Advances in Neural Networks – ISNN 2005 (2005)

  13. No Access

    Chapter and Conference Paper

    Scale A street case library for environmental design with agent interfaces

    Chiung-Hui Chen, Mao-Lin Chiu in Innovations in Design & Decision Support S… (2006)

  14. No Access

    Chapter and Conference Paper

    Adaptive Power-Aware Clustering and Multicasting Protocol for Mobile Ad Hoc Networks

    One of the most critical issues in wireless ad hoc networks is represented by the limited availability of energy within network nodes. Most of the researches focused on the problem of routing issues rather tha...

    James Jiunn Yin Leu, Ming-Hui Tsai in Ubiquitous Intelligence and Computing (2006)

  15. No Access

    Chapter and Conference Paper

    Web-Based Three-Dimension E-Mail Traffic Visualization

    E-mail pervades many aspects of our lives and is becoming indispensable communication method in areas such as commerce, government, production and general information dissemination. To maintain the security an...

    **ang-hui Wang, Guo-yin Zhang in Advanced Web and Network Technologies, and Applications (2006)

  16. No Access

    Chapter and Conference Paper

    An Open Service Platform at Network Edge

    The last few years, users want various services that fit their needs and preferences. Many services are provided at network edges and are increasing in number. The open framework is needed for efficient servic...

    Dong-Hui Kim, Jae-Oh Lee in Management of Convergence Networks and Services (2006)

  17. No Access

    Chapter and Conference Paper

    New Criteria of Global Exponential Stability for a Class of Generalized Neural Networks with Time-Varying Delays

    In this paper, we essentially drop the requirement of Lipschitz condition on the activation functions. By employing Lyapunov functional and several new inequalities, some new criteria concerning global exponen...

    Gang Wang, Hua-Guang Zhang, Chong-Hui Song in Advances in Neural Networks - ISNN 2006 (2006)

  18. No Access

    Chapter and Conference Paper

    Design and Simulation of a Neural-PD Controller for Automatic Balancing of Rotor

    In this paper, the automatic balancing method is studied at constant speed or acceleration operation for rotor systems. The magnitude and phase of original imbalance is determined by the influence coefficient ...

    Yuan Kang, Tsu-Wei Lin, Ming-Hui Chu in Advances in Neural Networks - ISNN 2006 (2006)

  19. No Access

    Chapter and Conference Paper

    Vibration Fault Diagnosis of Large Generator Sets Using Extension Neural Network-Type 1

    This paper proposes a novel neural network called Extension Neural Network-Type 1 (ENN1) for vibration fault recognition according to generator vibration characteristic spectra. The proposed ENN1 has a very si...

    Meng-hui Wang in Advances in Neural Networks - ISNN 2006 (2006)

  20. No Access

    Chapter and Conference Paper

    LMI Approach to Robust Stability Analysis of Cohen-Grossberg Neural Networks with Multiple Delays

    Robust stability analysis of a class of Cohen-Grossberg neural networks with multiple delays is given. An approach combining the Lyapunov functional with the linear matrix inequality (LMI) is taken to obtain t...

    Ce Ji, Hua-Guang Zhang, Chong-Hui Song in Advances in Neural Networks - ISNN 2006 (2006)

previous disabled Page of 6