CS Store Search
Displaying 1-6 out of 6 total
An Agent-Based Approach to Developing Intelligent Virtual Reality-Based Training Systems
Tools with Artificial Intelligence, IEEE International Conference on
By Fuhua Lin, Chuan-Jun Su, Mitchell M. Tseng
Issue Date:November 1999
This paper presents an agent-based approach to developing intelligent Virtual Reality-based training systems. The architecture of an intelligent Virtual Reality-based training system is modeled as five collaborative agents: training task-planning agent, si...
Mining Sequential Mobile Access Patterns Efficiently in Mobile Web Systems
Advanced Information Networking and Applications, International Conference on
By Vincent S. M. Tseng, Kawuu W. C. Lin
Issue Date:March 2005
The rapid advance of wireless and web technologies enable the mobile web applications to provide plenty kinds of services for mobile users. Under a mobile Web system, analyzing mobile user's movement sequences and requested services is important for wide a...
ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System
Computer Security Applications Conference, Annual
By Y.-M. Tseng, J.-K. Jan
Issue Date:December 1998
No summary available.
Accountability Centered Approach to Business Process Reengineering
Hawaii International Conference on System Sciences
By Mitchell M. Tseng, Chuan-Jun Su, Ma Qinhai
Issue Date:January 1998
In this paper, Accountability Centered Approach (ACA) is proposed for business process engineering. The ACA approach enables the designers and users to focus on the requirements and rationales of the process design, before settling into selecting and commi...
A Framework for Personal Mobile Commerce Pattern Mining and Prediction
IEEE Transactions on Knowledge and Data Engineering
By E. H-C Lu, Wang-Chien Lee,V. S-M Tseng
Issue Date:May 2012
Due to a wide range of potential applications, research on mobile commerce has received a lot of interests from both of the industry and academia. Among them, one of the active topic areas is the mining and prediction of users' mobile commerce behaviors su...
Global Wireless Machine-to-Machine Standardization
IEEE Internet Computing
By Kim Chang,A Soong,M Tseng, Zhixian Xiang
Issue Date:March 2011
Machine-to-machine (M2M) communications are gaining more prominence in wireless communication. However, the current systems are optimized more for human-to-human (H2H) than M2M communications. Therefore it's important that wireless technologies evolve and ...
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.