Song Han

According to our database1, Song Han authored at least 215 papers between 1993 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Industrial Internet of Things: Challenges, Opportunities, and Directions.
IEEE Trans. Industrial Informatics, 2018

Guest Editorial From Industrial Wireless Sensor Networks to Industrial Internet of Things.
IEEE Trans. Industrial Informatics, 2018

A Double Disturbance Observer Design for Compensation of Unknown Time Delay in a Wireless Motion Control System.
IEEE Trans. Contr. Sys. Techn., 2018

Angel-Eye: A Complete Design Flow for Mapping CNN Onto Embedded FPGA.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2018

Real-Time Data Retrieval With Multiple Availability Intervals in CPS Under Freshness Constraints.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2018

A Support Vector Learning-Based Particle Filter Scheme for Target Localization in Communication-Constrained Underwater Acoustic Sensor Networks.
Sensors, 2018

Joint resource allocation in underwater acoustic communication networks: A game-based hierarchical adversarial multiplayer multiarmed bandit algorithm.
Inf. Sci., 2018

Game-based hierarchical multi-armed bandit learning algorithm for joint channel and power allocation in underwater acoustic communication networks.
Neurocomputing, 2018

Energy-efficient and secure transmission scheme based on chaotic compressive sensing in underwater wireless sensor networks.
Digital Signal Processing, 2018

HAQ: Hardware-Aware Automated Quantization.
CoRR, 2018

Temporal Shift Module for Efficient Video Understanding.
CoRR, 2018

Communication-Optimal Distributed Dynamic Graph Clustering.
CoRR, 2018

Path-Level Network Transformation for Efficient Architecture Search.
CoRR, 2018

Fast inference of deep neural networks in FPGAs for particle physics.
CoRR, 2018

RT-DAP: A Real-Time Data Analytics Platform for Large-scale Industrial Process Monitoring and Control.
CoRR, 2018

Efficient Sparse-Winograd Convolutional Neural Networks.
CoRR, 2018

ADC: Automated Deep Compression and Acceleration with Reinforcement Learning.
CoRR, 2018

Relay Selection for Underwater Acoustic Sensor Networks: A Multi-User Multi-Armed Bandit Formulation.
IEEE Access, 2018

Application of SVDD Single Categorical Data Description in Motor Fault Identification Based on Health Redundant Data.
Proceedings of the Advances in Swarm Intelligence - 9th International Conference, 2018

FD-PaS: A Fully Distributed Packet Scheduling Framework for Handling Disturbances in Real-Time Wireless Networks.
Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium, 2018

Demo Abstract: Industrial IoT Field Gateway Design for Heterogeneous Process Monitoring and Control.
Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium, 2018

Demo Abstract: 6TiSCH in Full Bloom: From Dynamic Resource Management to Cloud-Based Network Analytics.
Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium, 2018

Path-Level Network Transformation for Efficient Architecture Search.
Proceedings of the 35th International Conference on Machine Learning, 2018

AMC: AutoML for Model Compression and Acceleration on Mobile Devices.
Proceedings of the Computer Vision - ECCV 2018, 2018

Bandwidth-efficient deep learning.
Proceedings of the 55th Annual Design Automation Conference, 2018

Long live TIME: improving lifetime for training-in-memory engines by structured gradient sparsification.
Proceedings of the 55th Annual Design Automation Conference, 2018

Self-triggered Nonsingular Terminal Sliding Mode Control.
Proceedings of the 2018 Annual American Control Conference, 2018

2017
Activity tracking and monitoring of patients with alzheimer's disease.
Multimedia Tools Appl., 2017

Software-Hardware Codesign for Efficient Neural Network Acceleration.
IEEE Micro, 2017

Relay Selection in Underwater Acoustic Cooperative Networks: A Contextual Bandit Approach.
IEEE Communications Letters, 2017

Deep Gradient Compression: Reducing the Communication Bandwidth for Distributed Training.
CoRR, 2017

Deep Generative Adversarial Networks for Compressed Sensing Automates MRI.
CoRR, 2017

Exploring the Regularity of Sparse Structure in Convolutional Neural Networks.
CoRR, 2017

Research for practice: cryptocurrencies, blockchains, and smart contracts; hardware for deep learning.
Commun. ACM, 2017

Regular Composite Resource Partition in Open Systems.
Proceedings of the 2017 IEEE Real-Time Systems Symposium, 2017

Distributed Dynamic Packet Scheduling for Handling Disturbances in Real-Time Wireless Networks.
Proceedings of the 2017 IEEE Real-Time and Embedded Technology and Applications Symposium, 2017

Demo Abstract: A Cross-Device Testing and Reporting System for Large-Scale Real-Time Wireless Networks.
Proceedings of the 2017 IEEE Real-Time and Embedded Technology and Applications Symposium, 2017

An Accurate Calibration Method of a Multi Camera System.
Proceedings of the Advanced Computational Methods in Life System Modeling and Simulation, 2017

Demand response capability of V2G based electric vehicles in distribution networks.
Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe, 2017

ESE: Efficient Speech Recognition Engine with Sparse LSTM on FPGA.
Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2017

An FPGA Design Framework for CNN Sparsification and Acceleration.
Proceedings of the 25th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2017

ARM: A hybrid specification-based intrusion detection system for rank attacks in 6TiSCH networks.
Proceedings of the 22nd IEEE International Conference on Emerging Technologies and Factory Automation, 2017

Exploring the Granularity of Sparsity in Convolutional Neural Networks.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

Classification of Neurological Gait Disorders Using Multi-task Feature Learning.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

Gait-Based Continuous Authentication Using Multimodal Learning.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

Tracking Indoor Activities of Patients with Mild Cognitive Impairment Using Motion Sensors.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Online Mode Switch Algorithms for Maintaining Data Freshness in Dynamic Cyber-Physical Systems.
IEEE Trans. Knowl. Data Eng., 2016

PPM-HDA: Privacy-Preserving and Multifunctional Health Data Aggregation With Fault Tolerance.
IEEE Trans. Information Forensics and Security, 2016

Research for Practice: Cryptocurrencies, Blockchains, and Smart Contracts; Hardware for Deep Learning.
ACM Queue, 2016

Hierarchical-game-based algorithm for downlink joint subchannel and power allocation in OFDMA femtocell networks.
J. Network and Computer Applications, 2016

Trained Ternary Quantization.
CoRR, 2016

Generate Image Descriptions based on Deep RNN and Memory Cells for Images Features.
CoRR, 2016

Classification of Neurological Gait Disorders Using Multi-task Feature Learning.
CoRR, 2016

SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and <1MB model size.
CoRR, 2016

DSD: Regularizing Deep Neural Networks with Dense-Sparse-Dense Training Flow.
CoRR, 2016

EIE: Efficient Inference Engine on Compressed Deep Neural Network.
CoRR, 2016

ESE: Efficient Speech Recognition Engine with Compressed LSTM on FPGA.
CoRR, 2016

Distributed hierarchical game-based algorithm for downlink power allocation in OFDMA femtocell networks.
Computer Networks, 2016

Joint Relay Selection and Power Allocation in Underwater Cognitive Acoustic Cooperative System with Limited Feedback.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

Synchronization Considerations for Real-Time Wireless Sensor and Actuator Networks.
Proceedings of the 22nd IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2016

Angel-Eye: A Complete Design Flow for Mapping CNN onto Customized Hardware.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2016

EIE: Efficient Inference Engine on Compressed Deep Neural Network.
Proceedings of the 43rd ACM/IEEE Annual International Symposium on Computer Architecture, 2016

An empirical study of industrial real-time wireless mesh network in field deployments.
Proceedings of the 14th IEEE International Conference on Industrial Informatics, 2016

Implementation and verification of prognostics and health management system using a configurable system of systems architecture.
Proceedings of the IEEE International Conference on Prognostics and Health Management, 2016

Deep compression and EIE: Efficient inference engine on compressed deep neural network.
Proceedings of the 2016 IEEE Hot Chips 28 Symposium (HCS), 2016

From model to FPGA: Software-hardware co-design for efficient neural network acceleration.
Proceedings of the 2016 IEEE Hot Chips 28 Symposium (HCS), 2016

Real-Time Pedestrian Detection and Tracking on Customized Hardware.
Proceedings of the 14th ACM/IEEE Symposium on Embedded Systems for Real-Time Multimedia, 2016

Real-Time Data-Driven Gait Phase Detection Using Infinite Gaussian Mixture Model and Parallel Particle Filter.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016

2015
Wi-HTest: compliance test suite for diagnosing devices in real-time WirelessHART™ mesh networks.
Wireless Networks, 2015

SmartMood: Toward Pervasive Mood Tracking and Analysis for Manic Episode Detection.
IEEE Trans. Human-Machine Systems, 2015

Approximate path searching for supporting shortest path queries on road networks.
Inf. Sci., 2015

Learning both Weights and Connections for Efficient Neural Networks.
CoRR, 2015

Deep Compression: Compressing Deep Neural Network with Pruning, Trained Quantization and Huffman Coding.
CoRR, 2015

On-Demand Dynamic Branch Prediction.
Computer Architecture Letters, 2015

Optimal centralized renewable energy transfer scheduling for electrical vehicles.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Learning both Weights and Connections for Efficient Neural Network.
Proceedings of the Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, 2015

Delay and power consumption estimation in embedded systems using hierarchical performance modeling.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2015

Optimal renewable energy transfer via electrical vehicles.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

Hierarchical performance modeling of embedded systems.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Network coding based transmission schemes in DTNs with group meetings.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Process Control over Real-Time Wireless Sensor and Actuator Networks.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

On-Line Data Link Layer Scheduling in Wireless Networked Control Systems.
Proceedings of the 27th Euromicro Conference on Real-Time Systems, 2015

Robust time delay compensation in a wireless motion control system with double disturbance observers.
Proceedings of the American Control Conference, 2015

SmartMind: Activity Tracking and Monitoring for Patients with Alzheimer's Disease.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
ColLoc: A collaborative location and tracking system on WirelessHART.
ACM Trans. Embedded Comput. Syst., 2014

Schedulability Analysis of DeferrableScheduling Algorithms for MaintainingReal-Time Data Freshness.
IEEE Trans. Computers, 2014

Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges.
IEEE Systems Journal, 2014

Informed Bond Trading, Corporate Yield Spreads, and Corporate Default Prediction.
Management Science, 2014

Hypergraph-based data link layer scheduling for reliable packet delivery in wireless sensing and control networks with end-to-end delay constraints.
Inf. Sci., 2014

A high-speed, real-time mobile gait rehabilitation system.
ACM Crossroads, 2014

Quantile-DEA classifiers with interval data.
Annals OR, 2014

WirelessCHARM: An open system low cost wireless marshalling module for industrial environments.
Proceedings of the IEEE World Forum on Internet of Things, 2014

Improving Control Performance by Minimizing Jitter in RT-WiFi Networks.
Proceedings of the IEEE 35th IEEE Real-Time Systems Symposium, 2014

Complementary Product Selection in E-Commerce.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2014

Carrying capacity of railway station by microscopic simulation method.
Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, 2014

Checking Integral Real-Time Automata for Extended Linear Duration Invariants.
Proceedings of the Formal Techniques for Safety-Critical Systems, 2014

Time delay compensation in a wireless tracking control system with previewed reference.
Proceedings of the American Control Conference, 2014

Capturing and Analyzing Pervasive Data for SmartHealth.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2013

On Co-Scheduling of Update and Control Transactions in Real-Time Sensing and Control Systems: Algorithms, Analysis, and Performance.
IEEE Trans. Knowl. Data Eng., 2013

RT-WiFi: real-time high speed communication protocol for wireless control systems.
SIGBED Review, 2013

RFID mutual authentication protocols for tags and readers with and without a server.
Comput. Syst. Sci. Eng., 2013

Software Cognitive Information Measure based on Relation Between Structures
CoRR, 2013

An effective fixed priority co-scheduling algorithm for periodic update and application transactions.
Computing, 2013

RT-WiFi: Real-Time High-Speed Communication Protocol for Wireless Cyber-Physical Control Applications.
Proceedings of the IEEE 34th Real-Time Systems Symposium, 2013

Microscopic resource assignment model and Lagrangian relaxation based algorithm for train operation scheduling in railway station.
Proceedings of the 16th International IEEE Conference on Intelligent Transportation Systems, 2013

An approach for estimating mode shape for participation of inter-area oscillation mode.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

WheelLoc: Enabling continuous location service on mobile phone for outdoor scenarios.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Architecture of a cyberphysical avatar.
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (with CPS Week 2013), 2013

Time-domain segmentation based massively parallel simulation for ADCs.
Proceedings of the 50th Annual Design Automation Conference 2013, 2013

2012
Maintaining data temporal consistency in distributed real-time systems.
Real-Time Systems, 2012

Adaptive co-scheduling for periodic application and update transactions in real-time database systems.
Journal of Systems and Software, 2012

Cognitive radio network security: A survey.
J. Network and Computer Applications, 2012

Towards Approximate Model Checking DC and PDC Specifications
CoRR, 2012

Robust Face Recognition using Local Illumination Normalization and Discriminant Feature Point Selection
CoRR, 2012

Towards enhanced key management in multi-phase ZigBee network architecture.
Computer Communications, 2012

Erratum: Self-Healing Key Distribution Schemes for Wireless Networks: A Survey.
Comput. J., 2012

Architecture of a cyberphysical avatar.
Proceedings of the REACTION 2012, 2012

MinMax: A Sampling Interval Control Algorithm for Process Control Systems.
Proceedings of the 2012 IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2012

RoamingHART: A Collaborative Localization System on WirelessHART.
Proceedings of the 2012 IEEE 18th Real Time and Embedded Technology and Applications Symposium, 2012

Design of a network-based mobile gait rehabilitation system.
Proceedings of the 2012 IEEE International Conference on Robotics and Biomimetics, 2012

Measuring WirelessHART against wired fieldbus for control.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012

A New Identity-Based Group Signature Scheme Based on Knapsack ECC.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

On Co-scheduling of Periodic Update and Application Transactions with Fixed Priority Assignment for Real-Time Monitoring.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
Trust-Based Spectrum Sharing for Cognitive Radio Networks.
Journal of Interconnection Networks, 2011

Anomaly detection in wireless sensor networks: A survey.
J. Network and Computer Applications, 2011

A mutual-healing key distribution scheme in wireless sensor networks.
J. Network and Computer Applications, 2011

Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy.
J. Network and Computer Applications, 2011

Self-Healing Key Distribution Schemes for Wireless Networks: A Survey.
Comput. J., 2011

Highly Efficient Distance-Based Anomaly Detection through Univariate with PCA in Wireless Sensor Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Reliable and Real-Time Communication in Industrial Wireless Mesh Networks.
Proceedings of the 17th IEEE Real-Time and Embedded Technology and Applications Symposium, 2011

Generalized hash-binary-tree based self-healing key distribution with implicit authentication.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

On Least Idle Slot First Co-scheduling of Update and Control Tasks in Real-Time Sensing and Control Systems.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

Solving Jimbo-Miwa equation by using the new test function method.
Proceedings of the Seventh International Conference on Natural Computation, 2011

MBStar: A Real-time Communication Protocol for Wireless Body Area Networks.
Proceedings of the 23rd Euromicro Conference on Real-Time Systems, 2011

A Combinational Approach for Trust Establishment in Cognitive Radio Networks.
Proceedings of the International Conference on Complex, 2011

2010
DESH: overhead reduction algorithms for deferrable scheduling.
Real-Time Systems, 2010

A Survey of RFID Authentication Protocols Based on Hash-Chain Method
CoRR, 2010

The EHTA for nonlinear evolution equations.
Applied Mathematics and Computation, 2010

A Virtual Network Approach for Testing Wireless Mesh in Industrial Process Control.
Proceedings of the 16th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2010

Design of a Reliable Communication System for Grid-Style Traffic Light Networks.
Proceedings of the 16th IEEE Real-Time and Embedded Technology and Applications Symposium, 2010

Trust based security for cognitive radio networks.
Proceedings of the iiWAS'2010, 2010

Research on Task Space Model and Contract Mechanism Design of Knowledge Sharing in Supply Chain.
Proceedings of the International Conference on E-Business and E-Government, 2010

An Efficient Self-Healing Key Distribution Scheme with Constant-Size Personal Keys for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Trust-Based Authentication for Secure Communication in Cognitive Radio Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Removal of 3D facial expressions: A learning-based approach.
Proceedings of the Twenty-Third IEEE Conference on Computer Vision and Pattern Recognition, 2010

Wireless Multimedia Sensor Networks Applications and Security Challenges.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

A Secure Key Management Model for Wireless Mesh Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks.
IEEE Trans. Wireless Communications, 2009

Secure web services using two-way authentication and three-party key establishment for service delivery.
Journal of Systems Architecture - Embedded Systems Design, 2009

Energy Efficient Residual Energy Monitoring in Wireless Sensor Networks.
IJDSN, 2009

Simple but Effective Porn Query Recognition by k-NN with Semantic Similarity Measure.
Proceedings of the Advances in Data and Web Management, Joint International Conferences, 2009

Query Recommendation and Its Usefulness Evaluation on Mobile Search Engine.
Proceedings of the IEEE International Conference on Systems, 2009

Security against DOS attack in mobile IP communication.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Online Scheduling Switch for Maintaining Data Freshness in Flexible Real-Time Systems.
Proceedings of the 30th IEEE Real-Time Systems Symposium, 2009

A Location-Determination Application in WirelessHART.
Proceedings of the 15th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2009

Wi-HTest: Compliance Test Suite for Diagnosing Devices in Real-Time WirelessHART Network.
Proceedings of the 15th IEEE Real-Time and Embedded Technology and Applications Symposium, 2009

Cross-Channel Query Recommendation on Commercial Mobile Search Engine: Why, How and Empirical Evaluation.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography.
Proceedings of the Third International Conference on Network and System Security, 2009

A Key Management Scheme for Heterogeneous Sensor Networks Using Keyed-Hash Chain.
Proceedings of the MSN 2009, 2009

Large Scale Analysis of Chinese Mobile Query Behavior.
Proceedings of the 2009 International Conference on Information & Knowledge Engineering, 2009

Application of Numerical Simulation Technique to the Study of Well Killing While Drilling Mud Has Completely Erupted Out from Borehole.
Proceedings of the Fuzzy Information and Engineering, 2009

A Novel Approach to Modeling and Simulating of Underbalanced Drilling Process in Oil and Gas Wells.
Proceedings of the Fuzzy Information and Engineering, 2009

Investigation of Petrophysical Property Distribution of Reservoirs at Exploration Stage with Integration of Fuzzy Methods into Geostatistics.
Proceedings of the Fuzzy Information and Engineering, 2009

2008
Deferrable Scheduling for Maintaining Real-Time Data Freshness: Algorithms, Analysis, and Results.
IEEE Trans. Computers, 2008

Nanoarchitectonics for Heterogeneous Integrated Nanosystems.
Proceedings of the IEEE, 2008

Pairing-based public-key encryption schemes with backward-and-forward security.
Comput. Syst. Sci. Eng., 2008

Pairing-based public-key encryption schemes with backward-and-forward security.
Comput. Syst. Sci. Eng., 2008

A self-healing key distribution scheme based on vector space secret sharing and one way hash chains.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

A complete wirelessHART network.
Proceedings of the 6th International Conference on Embedded Networked Sensor Systems, 2008

WI-HTest: testing suite for diagnosing wirelesshart devices and networks.
Proceedings of the 6th International Conference on Embedded Networked Sensor Systems, 2008

WirelessHART: Applying Wireless Technology in Real-Time Industrial Process Control.
Proceedings of the 14th IEEE Real-Time and Embedded Technology and Applications Symposium, 2008

An Efficient Self-Healing Key Distribution Scheme.
Proceedings of the NTMS 2008, 2008

Coding-Aware Multi-path Routing in Multi-Hop Wireless Networks.
Proceedings of the 2008 IEEE International Performance, 2008

A Self-Healing and Mutual-Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

A Schedulability Analysis of Deferrable Scheduling Using Patterns.
Proceedings of the 20th Euromicro Conference on Real-Time Systems, 2008

Query-biased Near Duplicate Web Document Detecting: Effective, Efficient and Customizable.
Proceedings of The 2008 International Conference on Data Mining, 2008

Hallucinating 3D facial shapes.
Proceedings of the 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2008), 2008

2007
Secure E-Transactions Protocol using Intelligent Mobile Agents with Fair Privacy.
Proceedings of the E-Service Intelligence: Methodologies, Technologies and Applications, 2007

A statistics-based sensor selection scheme for continuous probabilistic queries in sensor networks.
Real-Time Systems, 2007

Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication.
IJISP, 2007

Anonymous Mutual Authentication Protocol for RFID Tag Without Back-End Database.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

A Mobile Ad Hoc Network with Mobile Satellite Earth-stations.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor.
Proceedings of the Computational Science and Its Applications, 2007

2006
An information privacy taxonomy for collaborative environments.
Inf. Manag. Comput. Security, 2006

A framework of authentication and authorization for e-health services.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

Deferrable Scheduling for Temporal Consistency: Schedulability Analysis and Overhead Reduction.
Proceedings of the 12th IEEE Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2006), 2006

Evaluation of Stop Word Lists in Chinese Language.
Proceedings of the Fifth International Conference on Language Resources and Evaluation, 2006

The Architecture and Interlayer Adaptation of Ad Hoc & Sensor Networks.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Defining and Protecting Meta Privacy: A New Conceptual Framework Within Information Privacy.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

Subjective and Objective Watermark Detection Using a Novel Approach - Barcode Watermarking.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Improvement of a Convertible Undeniable Partially Blind Signature Scheme.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Secure Electronic Commerce with Mobile Agents.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005

A Deferrable Scheduling Algorithm for Real-Time Transactions Maintaining Data Freshness.
Proceedings of the 26th IEEE Real-Time Systems Symposium (RTSS 2005), 2005

A Statistics-Based Sensor Selection Scheme for Continuous Probabilistic Queries in Sensor Networks.
Proceedings of the 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2005), 2005

A Framework of Privacy Shield in Organizational Information Systems.
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005

A New Conceptual Framework Within Information Privacy: Meta Privacy.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Probabilistic Continuous Update Scheme in Location Dependent Continuous Queries.
Proceedings of the Advanced Parallel Processing Technologies, 6th International Workshop, 2005

Energy Efficient Multipath Routing in Large Scale Sensor Networks with Multiple Sink Nodes.
Proceedings of the Advanced Parallel Processing Technologies, 6th International Workshop, 2005

2004
Continuous Residual Energy Monitoring in Wireless Sensor Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

Committal deniable signatures over elliptic curves.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Practical Fair Anonymous Undeniable Signatures.
Proceedings of the International Conference on Computational Intelligence, 2004

An Efficient Identity-Based Group Signature Scheme over Elliptic Curves.
Proceedings of the Universal Multiservice Networks: Third European Conference, 2004

2003
Identity-based confirmer signatures from pairings over elliptic curves.
Proceedings of the Proceedings 4th ACM Conference on Electronic Commerce (EC-2003), 2003

Revocable Anonymity of Undeniable Signature Scheme.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2003

2002
Location Caching in the Mobile Middleware Platform.
Proceedings of the Third International Conference on Mobile Data Management (MDM 2002), 2002

1997
3D digitizing made easier by unstructured sketching.
Proceedings of the ACM SIGGRAPH 97 Visual Proceedings: The art and interdisciplinary programs of SIGGRAPH '97, 1997

3DSketch: Modeling by Digitizing with a Smart 3D Pen.
Proceedings of the Fifth ACM International Conference on Multimedia '97, 1997

1996
Triangular NURBS Surface Modeling of Scattered Data.
Proceedings of the Visualization '96, Proceedings, San Francisco, CA, USA, October 27, 1996

Reconstructing free-form surfaces from sparse data.
Proceedings of the 13th International Conference on Pattern Recognition, 1996

Spherical winged B-snakes.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996

1995
On Recovering Hyperquadrics from Range Data.
IEEE Trans. Pattern Anal. Mach. Intell., 1995

1993
Using hyperquadrics for shape recovery from range data.
Proceedings of the Fourth International Conference on Computer Vision, 1993


  Loading...