Skip to main content

and
Your search also matched 91 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls

Include preview-only content
  1. Chapter and Conference Paper

    2D to 3D Image Conversion Based on Classification of Background Depth Profiles

    In this paper, a 2D to 3D stereo image conversion scheme is proposed for 3D content creation. The difficulty in this problem lies on depth estimation/assignment from a mono image, which actually does not have ...

    Guo-Shiang Lin, Han-Wen Liu, Wei-Chih Chen in Advances in Image and Video Technology (2012)

  2. Chapter and Conference Paper

    Success Factors and Problems Encountered in the Workplace Learning of University/College of Technology Students in Taiwan: A Five-Star Hotel as an Example

    In order to help students in universities/colleges of technology close the education-employment gaps, Taiwan’s educational authorities promoted workplace-learning programs. However, what are the success factor...

    Mey-Tyng Wang, Guo-Hong Lei in Network and Parallel Computing (2012)

  3. Chapter and Conference Paper

    A Method to Calibrate the Electromagnetic Tracking Instrument When Measuring Branches of Fruit Trees

    To reduce the effect from instrument error when getting characteristic parameters of branches of fruit trees by the electromagnetic tracking instrument, a calibration method was sounded based on a discussion o...

    Ding-Feng Wu, Jian Wang, Guo-Min Zhou in Computer and Computing Technologies in Agr… (2011)

  4. Chapter and Conference Paper

    Design of Integrated Error Compensating System for the Portable Flexible CMMs

    During the working of portable flexible CMM, the mechanical arm’s gravity and operating load generate dynamic strain, the thermal distortion also results in its length change. The caused errors would severely ...

    Qing-Song Cao, Jie Zhu, Zhi-Fan Gao in Computer and Computing Technologies in Agr… (2011)

  5. Chapter and Conference Paper

    The New Method of Fruit Tree Characteristics Acquisition Using Electromagnetic Tracking Instrument

    For settling the problem of acquiring environment parameters quickly and responding in time in greenhouse which has low ability of auto-controlling environment. This paper designed a voice service system which...

    Jian Wang, Ding-feng Wu, Guo-min Zhou in Computer and Computing Technologies in Agr… (2011)

  6. Chapter and Conference Paper

    Reacting with Care: The Hybrid Interaction Types in a Sensible Space

    Our family members are used to interact with virtual characters than real world. One way to solve this problem is to stop using computers. The other solution is a usable communication platform that can take ad...

    Guo-Jhen Yu, Teng-Wen Chang in Human-Computer Interaction. Towards Mobile… (2011)

  7. Chapter and Conference Paper

    Ontology Model-Based Static Analysis of Security Vulnerabilities

    Static analysis technologies and tools have been widely adopted in detecting software bugs and vulnerabilities. However, traditional approaches have their limitations on extensibility and reusability due to th...

    Lian Yu, Shi-Zhong Wu, Tao Guo, Guo-Wei Dong in Information and Communications Security (2011)

  8. Chapter and Conference Paper

    Using SPARQL to Test for Lattices: Application to Quality Assurance in Biomedical Ontologies

    We present a scalable, SPARQL-based computational pipeline for testing the lattice-theoretic properties of partial orders represented as RDF triples. The use case for this work is quality assurance in biomedic...

    Guo-Qiang Zhang, Olivier Bodenreider in The Semantic Web – ISWC 2010 (2010)

  9. Chapter and Conference Paper

    GOOMPI: A Generic Object Oriented Message Passing Interface

    This paper discusses the application of object-oriented and generic programming techniques in high performance parallel computing, then presents a new message-passing interface based on object-oriented and gen...

    Zhen Yao, Qi-long Zheng, Guo-liang Chen in Network and Parallel Computing (2004)

  10. Chapter and Conference Paper

    An IP Traceback Scheme Integrating DPM and PPM

    IP traceback technology is an important means combating Denial of Service (DoS) attacks in Internet. This paper proposes a new IP traceback scheme constituting two parts: the first part is constructing a trace...

    Fan Min, Jun-yan Zhang, Guo-wie Yang in Applied Cryptography and Network Security (2003)