Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Gravity-Based Intrusion Detection Method

    It is an important issue for the security of network to detect new intrusions attack. We introduce the idea of the law of gravity to clustering analysis, and present a gravity-based clustering algorithm. At th...

    Sheng-Yi Jiang, Qing-Hua Li in Grid and Cooperative Computing - GCC 2004 Workshops (2004)

  2. No Access

    Chapter and Conference Paper

    Mining Maximal Frequent Itemsets for Intrusion Detection

    It has been the recent research focus and trend to apply data mining techniques in an intrusion detection system for discovering new types of attacks, but it is still in its infancy. This paper presents an inn...

    Hui Wang, Qing-Hua Li, Huanyu **ong in Grid and Cooperative Computing - GCC 2004 … (2004)

  3. No Access

    Chapter and Conference Paper

    Embedded System Design for Network Time Synchronization

    Every computer needs a timer mechanism to keep track of current time and also for various accounting purposes such as calculating the time spent by a process in CPU utilization, disk I/O, and so on, so that th...

    So-Young Hwang, Dong-Hui Yu, Ki-Joune Li in Embedded and Ubiquitous Computing (2004)

  4. No Access

    Chapter and Conference Paper

    Web-Based Three-Dimension E-Mail Traffic Visualization

    E-mail pervades many aspects of our lives and is becoming indispensable communication method in areas such as commerce, government, production and general information dissemination. To maintain the security an...

    **ang-hui Wang, Guo-yin Zhang in Advanced Web and Network Technologies, and Applications (2006)

  5. No Access

    Chapter and Conference Paper

    An Open Service Platform at Network Edge

    The last few years, users want various services that fit their needs and preferences. Many services are provided at network edges and are increasing in number. The open framework is needed for efficient servic...

    Dong-Hui Kim, Jae-Oh Lee in Management of Convergence Networks and Services (2006)

  6. No Access

    Chapter and Conference Paper

    Bandwidth Management for Smooth Playback of Video Streaming Services

    In this work we propose an analytic framework for managing the optimal bandwidth required for a smooth playback of a stored video streaming service. First, we argue that the mean buffering delay in the node is...

    Hoon Lee, Yoon Kee Kim, Kwang-Hui Lee in Management of Convergence Networks and Services (2006)

  7. Chapter and Conference Paper

    Kinematic Analysis of Remote Target Pointing Hand Movements in a 3D Environment

    The study investigates kinematics of target pointing hand movements in a free-hand, touchless, 3D environment. Consistent with Fitts’ original information processing model, target pointing hand movement time i...

    Yung-Hui Lee, Shu-Kai Wu in HCI International 2011 – Posters’ Extended Abstracts (2011)

  8. Chapter and Conference Paper

    Can I Help You?: Towards the Improvement of Occupational Experience for Convenience Store Employees in Taiwan

    This article explores the occupational experiences of convenience store frontline service employees in Taiwan. We find that in addition to physical labor, employees must incorporate job crafting to effectively...

    Yuan-Ling Chiao, Ching-Hu Lu, Hui-Wen Yeh in Internationalization, Design and Global De… (2011)

  9. No Access

    Article

    Factors influencing the intention of children to use video-sharing tools in elementary integrated curriculum

    In line with the upward trend of applying online video in education, this study examined factors influencing the behavioral intention of children to use video-sharing tools in an integrated elementary curricul...

    Chi Chiao, Chiung-Hui Chiu, Hsin-Wen Hu in Universal Access in the Information Society (2023)