Fang-Yie Leu

According to our database1, Fang-Yie Leu authored at least 202 papers between 1990 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
MIH and CRRM Handover in Trusted or Untrusted Environments.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

A LoRaWAN Based Energy Efficient Data Encryption Method.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Firewall Services Provided by Edge Computers Under AMF and gNB in 5G.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Air Pollution Source Identification by Using Neural Network with Bayesian Optimization.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Revealing Storage and Speed Transmission Emerging Technology of Big Data.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
Comments on "SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".
IEEE Systems Journal, 2018

Secure and efficient protocol for fast handover in 5G mobile Xhaul networks.
J. Network and Computer Applications, 2018

Healthcare-based on Cloud Electrocardiogram System: A Medical Center Experience in Middle Taiwan.
J. Medical Systems, 2018

An MFCC-based text-independent speaker identification system for access control.
Concurrency and Computation: Practice and Experience, 2018

A smartphone-based wearable sensors for monitoring real-time physiological data.
Computers & Electrical Engineering, 2018

AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments.
IEEE Access, 2018

MIH-Based eNB Selection for Untrusted Networks.
Proceedings of the Wireless Internet - 11th EAI International Conference, 2018

Clickbait Detection Based on Word Embedding Models.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

The Study of MME Pool Management and Fault Tolerance in 5G Networks with SDN Controllers.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

A Study on Firewall Services with Edge Computers of vEPC in 5G Networks.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

A Micro Services Quality Measurement Model for Improving the Efficiency and Quality of DevOps.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Self-parameter Based Bilateral Session Key Exchange Method.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

High Performance Grid Computing: Challenges and Opportunities of High Speed Networking.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

Migration of Edge Computing Services in 5G Networks - Firewall as a Service Example.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

A Banking Chatbot Security Control Procedure for Protecting User Data Security and Privacy.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

Analyzing Attributes of Successful Learners by Using Machine Learning in an Undergraduate Computer Course.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
GA-SVM modeling of multiclass seizure detector in epilepsy analysis system using cloud computing.
Soft Comput., 2017

Prediction of technical efficiency and financial crisis of Taiwan's information and communication technology industry with decision tree and DEA.
Soft Comput., 2017

An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques.
IEEE Systems Journal, 2017

Secure data-sharing using distributed environmental matching keys.
Pervasive and Mobile Computing, 2017

Enabling in-network aggregation by diffusion units for urban scale M2M networks.
J. Network and Computer Applications, 2017

Spatial analysis and data mining techniques for identifying risk factors of Out-of-Hospital Cardiac Arrest.
Int J. Information Management, 2017

Implementation of a virtual switch monitoring system using OpenFlow on cloud.
IJAHUC, 2017

Square Key Matrix Management Scheme in Wireless Sensor Networks.
Computing and Informatics, 2017

Generating Dynamic Box by Using an Input String.
Proceedings of the Mobile Internet Security - Second International Symposium, 2017

An Overview of 802.21a-2012 and Its Incorporation into IoT-Fog Networks Using Osmotic Framework.
Proceedings of the IoT as a Service - Third International Conference, 2017

IP-based seamless handover scheme using ANDSF in an untrusted environment.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Healthcare Based on Cloud Electrocardiogram System: A Medical Center Experience in Middle Taiwan.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

MIH-Based Congestion Control with Seamless Handover in Untrusted Networks.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

An Iterative and Incremental Data Preprocessing Procedure for Improving the Risk of Big Data Project.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Prediction of the Fragment of Video Streamed to Mobile Phones Under a 5G Network Base Station.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

A 3D encryption with shifting mapping substitution mechanism.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Implement of agent with role-based hierarchy access control for secure grouping IoTs.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Implement of agent with role-based hierarchy access control for secure grouping IoTs.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Relay Base-Station Handover in a 5G Environment.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

A Light Weight Data Encryption Method for WSN Communication.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

A Critical Quality Measurement Model for Managing and Controlling Big Data Project Risks.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

Predicting Video Stream Fragments in a Reactive Mode.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

An MFCC-Based Speaker Identification System.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Special issue on natural and secure computing in modern soft computing application.
Soft Comput., 2016

Approaching green sensor field using queue-based optimization technique.
J. Network and Computer Applications, 2016

Editorial.
J. Internet Serv. Inf. Secur., 2016

Android vs iOS or Others? SMD-OS Security Issues: Generation Y Perception.
IJTD, 2016

An ECC-based secure EMR transmission system with data leakage prevention scheme.
Int. J. Comput. Math., 2016

Data Encryption Method Using Environmental Secret Key with Server Assistance.
Intelligent Automation & Soft Computing, 2016

Impacts of Task Re-Execution Policy on MapReduce Jobs.
Comput. J., 2016

Residence Energy Control System Based on Wireless Smart Socket and IoT.
IEEE Access, 2016

TTP Based High-Efficient Multi-Key Exchange Protocol.
IEEE Access, 2016

Random Cladding with Feedback Mechanism for encrypting mobile messages.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Secure Mobile Instant Messaging key exchanging protocol with One-Time-Pad substitution transposition cryptosystem.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Cloud Encryption Using Distributed Environmental Keys.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Finite State Machine Based Real Time Scheduling for Microchip.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A Version Control-Based Continuous Testing Frame for Improving the IID Process Efficiency and Quality.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A Wireless Body Sensor Network and Its Applications: Rehearsal with a Smartphone.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A Secure and High Performance Wireless Sensor Network Based on Symmetric Key Matrix.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A Secure Official Vehicle Communication Protocol for VANET.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Device Parameter based Secure User Authentication.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Enhancing Security of LTE using a Double Masking Technique.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Data Preprocessing Quality Management Procedure for Improving Big Data Applications Efficiency and Practicality.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Inferring Smartphone User Demographics from Wi-Fi trace Logs: A Study of Users' Privacy Concerns.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Applying Data Mining to Explore Students' Self-Regulation in Learning Contexts.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Pareto-based cache replacement for YouTube.
World Wide Web, 2015

Impact of MapReduce Policies on Job Completion Reliability and Job Energy Consumption.
IEEE Trans. Parallel Distrib. Syst., 2015

Analyzing job completion reliability and job energy consumption for a heterogeneous MapReduce cluster under different intermediate-data replication policies.
The Journal of Supercomputing, 2015

Secure ubiquitous computing.
Pervasive and Mobile Computing, 2015

S-PMIPv6: An intra-LMA model for IPv6 mobility.
J. Network and Computer Applications, 2015

Improving Multi-path Congestion Control for Event-driven Wireless Sensor Networks by using TDMA.
J. Internet Serv. Inf. Secur., 2015

PAReS: A Proactive and Adaptive Redundant System for MapReduce.
J. Inf. Sci. Eng., 2015

A secure data encryption method employing a sequential-logic style mechanism for a cloud system.
IJWGS, 2015

Accessing medical image file with co-allocation HDFS in cloud.
Future Generation Comp. Syst., 2015

A Secure M-Commerce System based on credit card transaction.
Electronic Commerce Research and Applications, 2015

A Wireless Physiological Sensor Area Network.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

The untrusted handover security of the S-PMIPv6 on LTE-A.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Constructing Military Smartphone Usage Criterion of Cloud-DEFSOP for Mobile Security.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

A Security Threats Measurement Model for Reducing Cloud Computing Security Risk.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

An AP Selection with RSS Standard Deviation for Indoor Positioning in Wi-Fi.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Applying Web Crawlers to Develop a Sale Management System for Online Malls.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

ReMBF: A Reliable Multicast Brute-Force Co-allocation Scheme for Multi-user Data Grids.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Construction of a Green Power Virtual Machine Management Method on OpenStack.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Secure Power Management Scheme for WSN.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

Cluster-RLM: Establishing a Routing Path with Cluster-Based Redundant Link Minimization in Wireless Sensor Networks.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Applying Continuous Integration for Reducing Web Applications Development Risks.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Implementation of a Software-Defined Storage Service with Heterogeneous Storage Technologies.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Heterogeneous Network Handover Using 3GPP ANDSF.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment.
The Journal of Supercomputing, 2014

The simulation of an emotional robot implemented with fuzzy logic.
Soft Comput., 2014

Guest Editorial: Emerging Software Reliability and System Security Technologies.
JoWUA, 2014

A Secure ECC-based Electronic Medical Record System.
J. Internet Serv. Inf. Secur., 2014

A Grid System Detecting Internal Malicious Behaviors at System Call Level.
J. Internet Serv. Inf. Secur., 2014

Editorial.
IJCNDS, 2014

Designing A Healthcare Authorization Model Based On Cloud Authentication.
Intelligent Automation & Soft Computing, 2014

Special Issue: Mobile Internet Technologies and Services - Editorial.
Comput. Syst. Sci. Eng., 2014

A true Random-Number Encryption Method employing block cipher and PRNG.
Comput. Sci. Inf. Syst., 2014

Implementation of an environmental quality and harmful gases monitoring system.
Proceedings of the International Conference on Smart Computing, 2014

A Group File Encryption Method using Dynamic System Environment Key.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

An Environmental Monitoring System for Air Quality Control.
Proceedings of the Intelligent Systems and Applications, 2014

Developing a Performance-Analysis Model for a Star-Topology Data Grid from Multi-user Perspective.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

A Secure Mobile Shopping System Based on Credit Card Transaction.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

A Secure Traffic Control System with Emergency Handling for Ambulances.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Research on Comparison and Analysis of the DEFSOP, NIST Cell SOP, and ISO27037 SOP.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A Multi-layer Secure Prevention Scheme for Improving e-Commerce Security.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A Secure Authentication Scheme of Health Care Based on the Cloud.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Minimum Cost Content Object Reconstruction in Multi-tier Servers.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a Grid.
Proceedings of the Information and Communication Technology, 2014

A random wrapping encryption method.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

S-PMIPv6: Efficient Handover of Proxy Mobile IPv6 by Using SCTP.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Improving Multi-path Congestion Control for Event-Driven Wireless Sensor Networks by Using TDMA.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Combining IID with BDD to Enhance the Critical Quality of Security Functional Requirements.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

A Wandering Path Tracking and Fall Detection System for People with Dementia.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Impact of MapReduce Task Re-execution Policy on Job Completion Reliability and Job Completion Time.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

Cache Replacement Algorithms for YouTube.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
Toward green sensor field by optimizing power efficiency using D-policy M/G/1 queuing systems.
Mobile Information Systems, 2013

Special Issue on "Advances in mobile, ubiquitous and cognitive computing".
Mathematical and Computer Modelling, 2013

A secure communication over wireless environments by using a data connection core.
Mathematical and Computer Modelling, 2013

Analyzing job completion reliability and job energy consumption for a general MapReduce infrastructure.
J. High Speed Networks, 2013

Special issue on cloud, wireless and e-commerce security.
J. Ambient Intelligence and Humanized Computing, 2013

Modern cognitive and ubiquitous computing.
Neurocomputing, 2013

On Construction of an Intelligent Environmental Monitoring System for Healthcare.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013

Implementation of a Virtual Switch Monitor System Using OpenFlow on Cloud.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

TSR: Topology Reduction from Tree to Star Data Grids.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A True Random-Number Encryption Method.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Block Cipher Mode of Operation with Two Keys.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Implementation of Cloud IaaS for Virtualization with Live Migration.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

A Software Security Requirement Quality Improvement Procedure to Increase E-Commerce Security.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

A Handover Scheme for LTE Wireless Networks under the Assistance of GPS.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

The Simulation of a Robot with Emotions Implemented with Fuzzy Logic.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

An Interdisciplinary Analysis of Servitization and Active Aging in Taiwan's Senior Care Market: A Case Study of Fitness Equipment Industry.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Improve Two Remote User Authentication Scheme Using Smart Card.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Deriving Job Completion Reliability and Job Energy Consumption for a General MapReduce Infrastructure from Single-Job Perspective.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Analyzing the Internet Stability in Presence of Disasters.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

A Multiple-Key Management Scheme in Wireless Sensor Networks.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Lifetime elongation for wireless sensor network using queue-based approaches.
The Journal of Supercomputing, 2012

PFRF: An adaptive data replication algorithm based on star-topology data grids.
Future Generation Comp. Syst., 2012

A rate-allocation based multi-path control scheme for event-driven wireless sensor networks on constant event packet rates.
Comput. Syst. Sci. Eng., 2012

A Semi-Preemptive Computational Service System with Limited Resources and Dynamic Resource Ranking.
Algorithms, 2012

A Secure Communication over Wireless Environments by Using a Data Connection Core.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Improving security level of LTE authentication and key agreement procedure.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

The IPSec Security Problems and a Cross-layer Security Mechanism for PMIPv6 Handover when an IPSec Security Association is Established on an L2 Direct Link.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

Controlling Traffic Lights for Ambulances.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Emerging Wireless and Mobile Technologies.
Mobile Information Systems, 2011

A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks.
Mobile Information Systems, 2011

Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS.
J. UCS, 2011

Emerging Security Technologies and Applications.
JoWUA, 2011

Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other.
JoWUA, 2011

A coordinated multiple channel assignment scheme and AP deployment for channel reuse in metropolitan scale wireless networks.
J. Network and Computer Applications, 2011

Resource brokering using a multi-site resource allocation strategy for computational grids.
Concurrency and Computation: Practice and Experience, 2011

A path switching scheme for SCTP based on round trip delays.
Computers & Mathematics with Applications, 2011

A Location-Based Handoff Scheme Based on IEEE 802.21 in Heterogeneous Wireless Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

A Semi-preemptive Ad Hoc Computational Service System with Limited Resources.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

An AC LED Smart Lighting System with Visible Light Time-Division Multiplexing Free Space Optical Communication.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

An Improvement of Chen Et al.'s Scheme for Mobile Pay-TV.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Verification of a Batch of Bad Signatures by Using the Matrix-Detection Algorithm.
Proceedings of the First International Conference on Data Compression, 2011

Improving Data Grids Performance by Using Popular File Replicate First Algorithm.
Proceedings of the 2011 International Conference on Broadband, 2011

A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
Network Bandwidth-aware job scheduling with dynamic information model for Grid resource brokers.
The Journal of Supercomputing, 2010

An Automated Term Definition Extraction System Using the Web Corpus in the Chinese Language.
J. Inf. Sci. Eng., 2010

Predicting vertebrate promoters using heterogeneous clusters.
IJAHUC, 2010

Improving reliability of a heterogeneous grid-based intrusion detection platform using levels of redundancies.
Future Generation Comp. Syst., 2010

A Channel Assignment and AP Deployment Scheme for Concentric-Hexagon Based Multi-channel Wireless Networks.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

An Event-Driven Mobile Assistant Control Protocol for Wireless Sensor Networks.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS.
Proceedings of the CISIS 2010, 2010

Constructing a Secure Point-to-Point Wireless Environments by Integrating Diffie-Hellman PKDS and Stream Ciphering.
Proceedings of the CISIS 2010, 2010

Mutual Authentication with Dynamic Keys in an IEEE802.16e PKM Environment.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
A novel network mobility handoff scheme using SIP and SCTP for multimedia applications.
J. Network and Computer Applications, 2009

A Routing Scheme with Localized Movement in Event-Driven Wireless Sensor Networks.
Proceedings of the Advances in Data and Web Management, Joint International Conferences, 2009

A Coordinating Multiple Channel Assignment Scheme and AP Deployment in Wireless Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Detecting DoS and DDoS Attacks Using Chi-Square.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention System.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A Path Switching Scheme for SCTP Based on Round Trip Delay.
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009

2008
Detection workload in a dynamic grid-based intrusion detection environment.
J. Parallel Distrib. Comput., 2008

Maximum capacity in chain-topology wireless mesh networks.
Proceedings of the Wireless Telecommunications Symposium, 2008

A Novel Network Mobility Scheme Using SIP and SCTP for Multimedia Applications.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

An Autonomous Energy-Aware Routing Scheme: a Supplementary Routing Approach for Path-Preserving Wireless Sensor Networks.
Proceedings of the Advances in Ad Hoc Networking, 2008

A Network Bandwidth-Aware Job Scheduling with Dynamic Information Model for Grid Resource Brokers.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
A scalable sensor network using a polar coordinate system.
Signal Processing, 2007

An Improved Bandwidth-Use Method on IEEE 802.11e Standard over Wireless LAN.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007

Intrusion Detection and Identification System Using Data Mining and Forensic Techniques.
Proceedings of the Advances in Information and Computer Security, 2007

An Enhanced DGIDE Platform for Intrusion Detection.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
A Wireless Grid Service Platform Using SIP and Agents.
Proceedings of the Seventh International Conference on Software Engineering, 2006

2005
Predicting vertebrate promoters with heterogeneous cluster computing.
Proceedings of the 1st International Conference on Signal-Image Technology and Internet-Based Systems, 2005

Garanteed non dropping mechanism deploying IEEE802.11e standard.
Proceedings of the 1st International Conference on Signal-Image Technology and Internet-Based Systems, 2005

Mobile Agent Communication Using SIP.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January, 2005

IFTS: Intrusion Forecast and Traceback based on Union Defense Environment.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Distributed Sendbox Scheme for Mobile Agent Communication.
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005

Fuzzy-Based Dynamic Bandwidth Allocation System.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

Intrusion Detection with CUSUM for TCP-Based DDoS.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

A Performance-Based Grid Intrusion Detection System.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

Integrating Grid with Intrusion Detection.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Compressing a Directed Massive Graph using Small World Model.
Proceedings of the 2004 Data Compression Conference (DCC 2004), 2004

Compressing an Inverted File with LCS.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

1995
A Validation Assistant for A Distributed Office Information System Modeled by Office Procedure Model.
J. Inf. Sci. Eng., 1995

1990
Automatic Rule Base Inspection for Data-Access Oriented Knowledge-based Systems.
Proceedings of the SEKE'90, 1990

Rule base inspection using algorithmic approach for data-access oriented knowledge-based systems.
Proceedings of the Fourteenth Annual International Computer Software and Applications Conference, 1990


  Loading...