: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
An efficient indexing method is essential for content-based image retrieval with the exponential growth in large-scale videos and photos. Recently, hash-based methods (e.g., local...
This paper presents a novel motion detection scheme by using the Momentum of Received Signal Strength (MRSS) to improve the quality of handoff in a general wireless network. MRSS ...
Tein-Yaw Chung, Chih-Hung Hsu, Yung-Mu Chen, K. Ro...
Real-time data services can benefit data-intensive real-time applications, e.g., e-commerce, via timely transaction processing using fresh data, e.g., the current stock prices. T...
The recent emergence of location-based social networking services is revolutionizing web-based social networking allowing users to share real-life experiences via geo-tagged user-...