In ubiquitous computing environments like smart home, residents can conveniently enjoy various home entertainments, such as watching TV, listening music, etc, through invisible an...
Securing multimedia transmission has become a challenging issue due to the popularization of real-time multimedia applications such as video surveillance, satellite communication ...
Recently, there has been an increased interest in the query reformulation using relevance feedback with evolutionary techniques such as genetic algorithm for multimedia informatio...
With the developments of related techniques in telecommunication and computer sciences, wireless sensor networks have been used more and more widely. While sensor nodes in wireles...
Min Meng, Hui Xu, Byeong-Soo Jeong, Sungyoung Lee,...
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
We propose a predictive location based relaying for hybrid cellular and ad-hoc systems that can provide interference minimization to uplink transmission. In the case of dense netw...
Conference keys are secret keys used by a group of users commonly and with which they can encipher (or decipher) messages such that communications are secure. Based on the Diffie ...
Using simulation environments to support mobile distributed application development has many benefits. Since mobile devices can be modeled as autonomous intelligent agents, the mu...
In this paper, agent based process management model is proposed, which is for the process management of knowledge worker and service workers in order to establish the basis for th...
The 4th generation mobile communication system certainly will have a lot of improvement such as supporting higher multimedia loading, offering faster transmission rate, and the im...
Tin Yu Wu, Diego Chung, Chi-Yuan Chen, Han-Chieh C...