Skip to main content

previous disabled Page of 6
and
  1. No Access

    Chapter and Conference Paper

    A Framework for Background Detection in Video

    This paper presents a framework for background detection in video. First, key frames are extracted to capture background change in video and reduce the magnitude of the data. Then we analyze the content of the...

    Laiyun Qing, Weiqiang Wang, Tiejun Huang in Advances in Multimedia Information Process… (2002)

  2. No Access

    Chapter and Conference Paper

    A Gravity-Based Intrusion Detection Method

    It is an important issue for the security of network to detect new intrusions attack. We introduce the idea of the law of gravity to clustering analysis, and present a gravity-based clustering algorithm. At th...

    Sheng-Yi Jiang, Qing-Hua Li in Grid and Cooperative Computing - GCC 2004 Workshops (2004)

  3. No Access

    Chapter and Conference Paper

    Mining Maximal Frequent Itemsets for Intrusion Detection

    It has been the recent research focus and trend to apply data mining techniques in an intrusion detection system for discovering new types of attacks, but it is still in its infancy. This paper presents an inn...

    Hui Wang, Qing-Hua Li, Huanyu **ong in Grid and Cooperative Computing - GCC 2004 … (2004)

  4. No Access

    Chapter and Conference Paper

    Study on a Secure Access Model for the Grid Catalogue

    To solve the security of access to meta-data in computational Grids, by modifying model BLP, a secure access model named GBLP is introduced to support access control to Grid catalogue. In the computational Gri...

    Bing **e, **ao-Lin Gui, Qing-Jiang Wang in Grid and Cooperative Computing (2004)

  5. No Access

    Chapter and Conference Paper

    Coarse-Grained Distributed Parallel Programming Interface for Grid Computing

    In this paper, a practical coarse-grained distributed parallel programming interface for grid computing (PI4GC) is introduced. It provides a group of generic and abstract function prototypes with well-specifie...

    Yongwei Wu, Qing Wang, Guangwen Yang, Weiming Zheng in Grid and Cooperative Computing (2004)

  6. No Access

    Article

    New approach to WLAN security with synchronized pseudo random

    Wireless transmission is becoming increasing ubiquitous, but there is a big black hole in the security of this kind of network. Although IEEE 802.11 provides an optionalWired Equivalent Privacy (WEP), to implemen...

    Qing-Hua Zheng, David L. Pepyne, Qing Wang in Journal of Computer Science and Technology (2004)

  7. No Access

    Article

    Extracting frequent connected subgraphs from large graph sets

    Mining frequent patterns from datasets is one of the key success of data mining research. Currently, most of the studies focus on the data sets in which the elements are independent, such as the items in the m...

    Wei Wang, Qing-Qing Yuan, Hao-Feng Zhou in Journal of Computer Science and Technology (2004)

  8. No Access

    Chapter and Conference Paper

    A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers

    In this paper we present a novel robust coalition-resistant (t, n) threshold signature scheme with anonymous signers. Only t or more group members can generate signatures on behalf of a group with n members, w...

    Ming-wen Wang, Qing-xin Zhu, Li Qing in Parallel and Distributed Processing and Ap… (2005)

  9. No Access

    Chapter and Conference Paper

    Designing Adaptive PI Algorithm Based on Single Neuron

    PI is a newly proposed Active Queue Management algorithm that has many important applications. But in case of heavy congestion its response is sluggish, and because of its static parameter’s setting PI is sens...

    Li Qing, Qingxin Zhu, Mingwen Wang in Networking and Mobile Computing (2005)

  10. No Access

    Chapter and Conference Paper

    A Hybrid Approach to Detect Adult Web Images

    This paper presents a hybrid approach to discriminate benign images from adult images. Different from previously published works, our approach combines face detection and adaptive skin detection. First, face d...

    Qing-Fang Zheng, Ming-Ji Zhang in Advances in Multimedia Information Process… (2005)

  11. No Access

    Chapter and Conference Paper

    What Can Expressive Semantics Tell: Retrieval Model for a Flash-Movie Search Engine

    Flash, as a multimedia format, becomes more and more popular on the Web. However, previous works on Flash are unpractical to build a content-based Flash search engine. To address this problem, our paper propos...

    Dawei Ding, Jun Yang, Qing Li, Wenyin Liu, Li** Wang in Image and Video Retrieval (2005)

  12. No Access

    Chapter and Conference Paper

    Virtual Biology Modeling Method Based on Validity Confirmation Mechanism

    The problem of the existing constructing process for virtual biology model is that it is not analyzed whether the enacted initial condition of the judgment model is reasonable or satisfying with the natural bi...

    Ying Liang, Wen-Yong Wang, Shao-Chun Zhong in Advances in Artificial Reality and Tele-Ex… (2006)

  13. No Access

    Chapter and Conference Paper

    Email Community Detection Using Artificial Ant Colony Clustering

    The investigation of community structures in networks is an important issue in many domains and disciplines. Several types of algorithms exist for revealing the community structure in networks. However, Most o...

    Yan Liu, Qing**an Wang, Qiang Wang, Qing Yao in Advances in Web and Network Technologies, … (2007)

  14. Chapter and Conference Paper

    An Epileptic Seizure Prediction Algorithm from Scalp EEG Based on Morphological Filter and Kolmogorov Complexity

    Epilepsy is the most common neurological disorder in the world, second only to stroke. There are nearly 15 million patients suffer from refractory epilepsy, with no available therapy. Although most seizures ar...

    Guanghua Xu, **g Wang, Qing Zhang, Junming Zhu in Digital Human Modeling (2007)

  15. No Access

    Chapter and Conference Paper

    QoS-Based Services Selecting and Optimizing Algorithms on Grid

    QoS-Based Services Selecting and Optimizing Composition between the peers play an increasingly important role to ensure interoperability on Grid environment. However, the prohibitive cost of selecting, matchin...

    Qing Zhu, Shan Wang, Guorong Li in Advances in Web and Network Technologies, … (2007)

  16. No Access

    Article

    ID-Based Fair Off-Line Electronic Cash System with Multiple Banks

    ID-based public key cryptography (ID-PKC) has many advantages over certificate-based public key cryptography (CA-PKC), and has drawn researchers’ extensive attention in recent years. However, the existing elec...

    Chang-Ji Wang, Yong Tang, Qing Li in Journal of Computer Science and Technology (2007)

  17. No Access

    Chapter and Conference Paper

    The Research on the Algorithms of Keyword Search in Relational Database

    With the development of relational database, people require better database not only in the aspect of database performance, but also in the aspect of the database’s interactive ability. So that the database is...

    Peng Li, Qing Zhu, Shan Wang in Advanced Web and Network Technologies, and Applications (2008)

  18. No Access

    Chapter and Conference Paper

    Online Generation and Dissemination of Disaster Information Based on Satellite Remote Sensing Data

    This paper aims to introduce a system framework for online generation and dissemination of disaster information based on satellite remote sensing data, that is, the design and application of the WEB-based Disa...

    Chao-Yang Fang, Hui Lin, Qing Xu in Web and Wireless Geographical Information … (2008)

  19. No Access

    Chapter and Conference Paper

    An Energy-Efficiency Route Protocol for MIMO-Based Wireless Sensor Networks

    A novel multihop energy-efficiency routing protocol for MIMO-based WSN is proposed in this paper. The protocol integrates cooperative MIMO technology with the multihop routing and energy consumption. When buil...

    Qing-Hua Wang, Yu-Gui Qu, Zhi-Ting Lin in Challenges for Next Generation Network Ope… (2008)

  20. No Access

    Chapter and Conference Paper

    E-Scheme in Delay-Tolerant Networks

    Delay Tolerant Networks (DTNs) are characterized by very long delay paths and frequent network partitions. In this paper, a novel E-Scheme is proposed which can be utilized by most of the existing routing appr...

    Zhi-Ting Lin, Yu-Gui Qu, Qing-Hua Wang in Challenges for Next Generation Network Ope… (2008)

previous disabled Page of 6