Search For:

Displaying 1-6 out of 6 total
An Agent-Based Approach to Developing Intelligent Virtual Reality-Based Training Systems
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Fuhua Lin, Chuan-Jun Su, Mitchell M. Tseng
Issue Date:November 1999
pp. 253
This paper presents an agent-based approach to developing intelligent Virtual Reality-based training systems. The architecture of an intelligent Virtual Reality-based training system is modeled as five collaborative agents: training task-planning agent, si...
Mining Sequential Mobile Access Patterns Efficiently in Mobile Web Systems
Found in: Advanced Information Networking and Applications, International Conference on
By Vincent S. M. Tseng, Kawuu W. C. Lin
Issue Date:March 2005
pp. 762-767
The rapid advance of wireless and web technologies enable the mobile web applications to provide plenty kinds of services for mobile users. Under a mobile Web system, analyzing mobile user's movement sequences and requested services is important for wide a...
ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System
Found in: Computer Security Applications Conference, Annual
By Y.-M. Tseng, J.-K. Jan
Issue Date:December 1998
pp. 237
No summary available.
Accountability Centered Approach to Business Process Reengineering
Found in: Hawaii International Conference on System Sciences
By Mitchell M. Tseng, Chuan-Jun Su, Ma Qinhai
Issue Date:January 1998
pp. 0345
In this paper, Accountability Centered Approach (ACA) is proposed for business process engineering. The ACA approach enables the designers and users to focus on the requirements and rationales of the process design, before settling into selecting and commi...
A Framework for Personal Mobile Commerce Pattern Mining and Prediction
Found in: IEEE Transactions on Knowledge and Data Engineering
By E. H-C Lu, Wang-Chien Lee,V. S-M Tseng
Issue Date:May 2012
pp. 769-782
Due to a wide range of potential applications, research on mobile commerce has received a lot of interests from both of the industry and academia. Among them, one of the active topic areas is the mining and prediction of users' mobile commerce behaviors su...
Global Wireless Machine-to-Machine Standardization
Found in: IEEE Internet Computing
By Kim Chang,A Soong,M Tseng, Zhixian Xiang
Issue Date:March 2011
pp. 64-69
Machine-to-machine (M2M) communications are gaining more prominence in wireless communication. However, the current systems are optimized more for human-to-human (H2H) than M2M communications. Therefore it's important that wireless technologies evolve and ...