Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Automatic Information Extraction for Multiple Singular Web Pages

    The World Wide Web is now undeniably the richest and most dense source of information, yet its structure makes it difficult to make use of that information in a systematic way. This paper extends a pattern dis...

    Chia-Hui Chang, Shih-Chien Kuo, Kuo-Yu Hwang in Advances in Knowledge Discovery and Data M… (2002)

  2. No Access

    Chapter and Conference Paper

    Visual Features Extracting & Selecting for Lipreading

    This paper has put forward a way to select and extract visual features effectively for lipreading. These features come from both lowlevel and high-level, those are compensatory each other. There are 41 dimensi...

    Hong-xun Yao, Wen Gao, Wei Shan, Ming-hui Xu in Audio- and Video-Based Biometric Person Au… (2003)

  3. No Access

    Chapter and Conference Paper

    Embedded System Design for Network Time Synchronization

    Every computer needs a timer mechanism to keep track of current time and also for various accounting purposes such as calculating the time spent by a process in CPU utilization, disk I/O, and so on, so that th...

    So-Young Hwang, Dong-Hui Yu, Ki-Joune Li in Embedded and Ubiquitous Computing (2004)

  4. Chapter and Conference Paper

    On Scalability and Mobility Management of Hierarchical Large-Scale Ad Hoc Networks

    With the increased interest in the mobile wireless communication, the development of large-scale ad hoc networks has drawn a lot of attention and the scalability of ad hoc networks has been the subject of exte...

    Ming-Hui Tsai, Tzu-Chiang Chiang in Embedded and Ubiquitous Computing – EUC 20… (2005)

  5. No Access

    Chapter and Conference Paper

    A Hybrid Approach to Determining the Best Combination on Product Form Design

    This paper presents a hybrid approach, using a grey relational analysis (GRA), neural networks (NNs), and a tabu search (TS) algorithm, to determining the best combination of product form design. The GRA model...

    Yang-Cheng Lin, Hsin-Hsi Lai in Knowledge-Based Intelligent Information an… (2005)

  6. No Access

    Chapter and Conference Paper

    A Framework on Compound Knowledge Push System Oriented to Organizational Employees

    Organizational employees have different knowledge demands and the knowledge is compound. So how to push the right compound knowledge to the right organizational employees becomes important. This paper attempts...

    Zhi-** Fan, Yong Feng, Yong-Hong Sun, Bo Feng in Internet and Network Economics (2005)

  7. No Access

    Chapter and Conference Paper

    Adaptive Power-Aware Clustering and Multicasting Protocol for Mobile Ad Hoc Networks

    One of the most critical issues in wireless ad hoc networks is represented by the limited availability of energy within network nodes. Most of the researches focused on the problem of routing issues rather tha...

    James Jiunn Yin Leu, Ming-Hui Tsai in Ubiquitous Intelligence and Computing (2006)

  8. No Access

    Chapter and Conference Paper

    An Open Service Platform at Network Edge

    The last few years, users want various services that fit their needs and preferences. Many services are provided at network edges and are increasing in number. The open framework is needed for efficient servic...

    Dong-Hui Kim, Jae-Oh Lee in Management of Convergence Networks and Services (2006)

  9. Chapter and Conference Paper

    Reliable Transporting and Optimal Routing on Rate-Based for Ad Hoc Networks

    Owing to the inflexibility of the structure, the conventional layered protocols suffer from the inability to distinguish between losses due to route failures and congestion. Recently, in efforts to overcome th...

    Ming-Hui Tsai, Tzu-Chiang Chiang in Emerging Directions in Embedded and Ubiqui… (2006)

  10. No Access

    Chapter and Conference Paper

    Bandwidth Management for Smooth Playback of Video Streaming Services

    In this work we propose an analytic framework for managing the optimal bandwidth required for a smooth playback of a stored video streaming service. First, we argue that the mean buffering delay in the node is...

    Hoon Lee, Yoon Kee Kim, Kwang-Hui Lee in Management of Convergence Networks and Services (2006)

  11. No Access

    Chapter and Conference Paper

    Quantitative Analysis of Single-Level Single-Mediator Multi-agent Systems

    Queueing Theory deals with problems where some restricted resource should be shared between competitive flow of requests. In this paper we use Queueing Theory methods to perform a quantitative analysis of a si...

    Moon Ho Lee, Aliaksandr Birukou in Agent and Multi-Agent Systems: Technologie… (2007)

  12. No Access

    Chapter and Conference Paper

    Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol

    A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to prese...

    Meng-Hui Lim, Sanggon Lee, Sangjae Moon in Information Systems Security (2007)

  13. No Access

    Chapter and Conference Paper

    An Intelligent Traffic Light Control Based on Extension Neural Network

    This paper presents an intelligent traffic light control method based on extension neural network (ENN) theory for crossroads. First, the number of passing vehicles and passing time of one vehicle within green...

    Kuei-Hsiang Chao, Ren-Hao Lee, Meng-Hui Wang in Knowledge-Based Intelligent Information an… (2008)

  14. No Access

    Chapter and Conference Paper

    Ubiquitous and Robust Text-Independent Speaker Recognition for Home Automation Digital Life

    This paper presents a ubiquitous and robust text-independent speaker recognitionarchitecture for home automation digital life. In this architecture, a multiple microphone configuration is adopted to receive th...

    Jhing-Fa Wang, Ta-Wen Kuan, Jia-chang Wang in Ubiquitous Intelligence and Computing (2008)

  15. No Access

    Chapter and Conference Paper

    Multi-media e-Learning Platform Using Green Design with Near-Real Approach

    The most of e-Learning and video conference platform receives the limitation of population and the file format, the inconvenience to the users, and requirement of specific software. This paper proposes an effe...

    Yuan-Hsun Liao, Chia-Ming Liu, Bo-Yen Wang in Learning by Playing. Game-based Education … (2009)

  16. No Access

    Chapter and Conference Paper

    The Experience of Adopting Game-Based Learning in Library Instruction

    The research is based on the course of library instruction and also a pilot study before adopting game-based learning into real library instruction course. The difficulty of the research is how we can make the...

    Sheng-Hui Hsu, Shu-Chen Cheng in Learning by Playing. Game-based Education … (2009)

  17. No Access

    Chapter and Conference Paper

    Evaluation of the Acceptance of Audience Response System by Corporations Using the Technology Acceptance Model

    The purpose of this research is to explore enterprises’ acceptance of Audience Response System (ARS) using Technology Acceptance Model (TAM). The findings show that (1) IT characteristics and facilitating cond...

    Hsing-Hui Chu, Ta-Jung Lu, Jong-Wen Wann in E-business Technology and Strategy (2010)

  18. No Access

    Chapter and Conference Paper

    Quality-of-Service in Wireless Personal Area Networks

    IEEE 802.15.4 standard defines the physical layer and medium access control layer protocols for low-rate wireless personal area networks (LR-WPANs). In IEEE 802.15.4 LR-WPANs, quality-of-service is supported b...

    Teng-Hui Wang, Ming-Yi Shih, Der-Jiunn Deng in Security-Enriched Urban Computing and Smar… (2011)

  19. No Access

    Chapter and Conference Paper

    A Two-Layer Steganography Scheme Using Sudoku for Digital Images

    Steganography is a skill to convey the secret data in the digital images without getting any unexpected notices to attackers. LSB replacement, the simplest method, directly replaces the secret bits with LSB bi...

    Yi-Hui Chen, Ci-Wei Lan, Zhi-Hui Wang in Ubiquitous Intelligence and Computing (2011)

  20. No Access

    Chapter and Conference Paper

    Image Data Hiding Schemes Based on Graph Coloring

    Graph coloring has been applied in a variety of applications, but not for data hiding. Therefore, in this paper, we are proposing two graph coloring-based data hiding schemes that embed secret data in spatial ...

    Shuai Yue, Zhi-Hui Wang, Ching-Yun Chang in Ubiquitous Intelligence and Computing (2011)

previous disabled Page of 2