Skip to main content

and
Your search also matched 4 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

A Gravity-Based Intrusion Detection Method

Include preview-only content
  1. Chapter and Conference Paper

    The Secret and Beauty of Ancient Chinese Padlocks

    Most ancient Chinese padlocks are key-operated locks with splitting springs, and partially keyless letter-combination locks. They can be characterized based on the types of locks, the shapes of locks, the engr...

    Hong-Sen Yan, Hsing-Hui Huang in Advances in Cryptology - ASIACRYPT 2003 (2003)

  2. Chapter and Conference Paper

    Soft Power: A Critical Factor for the Effectiveness and Development of a School

    This research aims to explore the contents of a school’s soft power, including culture, strategy, leadership, learning, marketing and innovation. Managing soft power not only is critical for a school’s develop...

    Hui-Min Ko in Network and Parallel Computing (2012)

  3. Chapter and Conference Paper

    The Effects of Governmental Subsidy on the Quality of Education in Taiwan’s Private Universities and Colleges

    The government arranges subsidies for private colleges annually with excellent academic performance. In order to justify if government subsidies can enhance the quality of education, this paper will investigat...

    Ching-Hui Shih in Network and Parallel Computing (2012)

  4. Chapter and Conference Paper

    Accelerating Parallel Frequent Itemset Mining on Graphics Processors with Sorting

    Frequent Itemset Mining (FIM) is one of the most investigated fields of data mining. The goal of Frequent Itemset Mining (FIM) is to find the most frequently-occurring subsets from the transactions within a da...

    Yuan-Shao Huang, Kun-Ming Yu, Li-Wei Zhou in Network and Parallel Computing (2013)

  5. Chapter and Conference Paper

    Analyzing the Characteristics of Memory Subsystem on Two Different 8-Way NUMA Architectures

    Two NUMA architectures with different memory subsystems are experimentally analyzed in this paper. By applying the benchmark with various access patterns, it shows much different characteristics of memory syst...

    Qiuming Luo, Yuanyuan Zhou, Chang Kong, Guoqiang Liu in Network and Parallel Computing (2013)

  6. Article

    Novel design of cryptosystems for video/audio streaming via dynamic synchronized chaos-based random keys

    In this paper, a novel chaos-based cryptosystem is proposed to ensure the communication security of video/audio streaming in the network environment. Firstly, by the proposed synchronization controller for the...

    Chih-Hsueh Lin, Guo-Hsin Hu, Jie-Sheng Chen, Jun-Juh Yan in Multimedia Systems (2022)