![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Reducing the Location Query Cost Based on Behavior-Based Strategy
In a location query process the most expensive procedure is maintaining the location information of mobiles. To reduce the expensive cost, we adopt the profile-based approach to design a behavior-based strateg...
-
Chapter and Conference Paper
Location Query Based on Moving Behaviors
The importance of location prediction is rapidly increasing with the current trend of database applications in mobile computing environment. However, current personal communication services (PCS) could only pr...
-
Chapter and Conference Paper
A Gravity-Based Intrusion Detection Method
It is an important issue for the security of network to detect new intrusions attack. We introduce the idea of the law of gravity to clustering analysis, and present a gravity-based clustering algorithm. At th...
-
Chapter and Conference Paper
Mining Maximal Frequent Itemsets for Intrusion Detection
It has been the recent research focus and trend to apply data mining techniques in an intrusion detection system for discovering new types of attacks, but it is still in its infancy. This paper presents an inn...
-
Chapter and Conference Paper
Embedded System Design for Network Time Synchronization
Every computer needs a timer mechanism to keep track of current time and also for various accounting purposes such as calculating the time spent by a process in CPU utilization, disk I/O, and so on, so that th...
-
Chapter and Conference Paper
Constructing a SCORM-Compliant Intelligent Strategy Repository
Develo** a pedagogical learning content that can be delivered among different Learning Management Systems (LMSs) is a critical task for most instructors. Although the Sharable Content Object Reference Model ...
-
Chapter and Conference Paper
A Hybrid Approach to Determining the Best Combination on Product Form Design
This paper presents a hybrid approach, using a grey relational analysis (GRA), neural networks (NNs), and a tabu search (TS) algorithm, to determining the best combination of product form design. The GRA model...
-
Chapter and Conference Paper
A Framework on Compound Knowledge Push System Oriented to Organizational Employees
Organizational employees have different knowledge demands and the knowledge is compound. So how to push the right compound knowledge to the right organizational employees becomes important. This paper attempts...
-
Chapter and Conference Paper
Web-Based Three-Dimension E-Mail Traffic Visualization
E-mail pervades many aspects of our lives and is becoming indispensable communication method in areas such as commerce, government, production and general information dissemination. To maintain the security an...
-
Chapter and Conference Paper
An Open Service Platform at Network Edge
The last few years, users want various services that fit their needs and preferences. Many services are provided at network edges and are increasing in number. The open framework is needed for efficient servic...
-
Chapter and Conference Paper
Key Agreement Protocols Based on the Center Weighted Jacket Matrix as a Symmetric Co-cyclic Matrix
In [1], a key agreement protocol between two users, based on the co-cyclic Jacket matrix, was proposed. We propose an improved version of that, based on the same center weighted Jacket matrix but at the point ...
-
Chapter and Conference Paper
Bandwidth Management for Smooth Playback of Video Streaming Services
In this work we propose an analytic framework for managing the optimal bandwidth required for a smooth playback of a stored video streaming service. First, we argue that the mean buffering delay in the node is...
-
Chapter and Conference Paper
U-Multimedia Retrieval System Using MPEG-7 Visual Descriptor and Hippocampal Neural Network
In this paper, a retrieval system which enables to retrieval digital video and image compressed by MPEG and database divided 6 categories is implemented. Video retrieval detects content-based features value by...
-
Chapter and Conference Paper
A Parallel Independent Component Implement Based on Learning Updating with Forms of Matrix Transformations
PVM (Parallel virtual machine) library is a tool which used processes large amounts of data sets. This paper wants to achieve a high performance solution that exploits PVM library and parallel computers to sol...
-
Chapter and Conference Paper
Using Agent Technology to Study Human Action and Perception Through a Virtual Street Simulator
Human activities are the foundation of the social processes that drive the urban system. The emergence of information technology provides opportunities to extend the transformation of the physical city into th...
-
Chapter and Conference Paper
User-Oriented Design (UOD) Patterns for Innovation Design at Digital Products
Innovation design is the trend of products in the future. User-oriented design (UOD) is a design process which focuses on the needs of the user and develops product concepts for them. The objective of this res...
-
Chapter and Conference Paper
Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to prese...
-
Chapter and Conference Paper
Practical Error Analysis of Cross-Ratio-Based Planar Localization
Recently, more and more computer vision researchers are paying attention to error analysis so as to fulfill various accuracy requirements arising from different applications. As a geometric invariant under pro...
-
Chapter and Conference Paper
Muscle Loadings While Using Finger as Input Device
Finger-operated input device (FOID) might provide effective pointing and dragging control. However, it was suspected that the repetitive nature of the pointing and dragging tasks while operating the FOID would...
-
Chapter and Conference Paper
Exploiting Spatial Locality for Objects Layout in Virtual Environments
On-disk sequentiality of requested data, or their spatial locality, is critical to disk performance. Unfornately, spatial locality of cached data is largely ignored, and only temporal locality is considered in...