Search For:

Displaying 1-50 out of 71 total
Traffic Signal Synchronization of a Small Urban Network Using Cellular Automaton
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Yang Yingxiang, Yang Min, Sun Lei, Sun Jian, Wang Yong
Issue Date:January 2011
pp. 1035-1039
Cellular automaton is a hotspot of traffic flow research in recent years. In this paper we build a simple network of two intersections using cellular automaton. In this model each road has multiple lanes. Turning at intersections and both directions are in...
 
Secure and Efficient Handover Schemes for Heterogeneous Networks
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Hung-Min Sun, Shuai-Min Chen, Yao-Hsin Chen, Heng-Jeng Chung, I-Hung Lin
Issue Date:December 2008
pp. 205-210
With the rapid development of wireless communication, mobile users are able to manually switch their network interfaces to different types of networks. The IEEE 802.21 Draft Standard was proposed to integrate the Media Independent Handover (MIHs) between t...
 
An Efficient Rekeying Scheme for Multicast and Broadcast (M&B) in Mobile WiMAX
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Hung-Min Sun, Shih-Ying Chang, Shuai-Min Chen, Chien-Chien Chiu
Issue Date:December 2008
pp. 199-204
Mobile WiMAX (IEEE 802.16e) is an emerging technology for wireless broadband access network. It provides wider converge and higher bandwidth than conventional wireless technologies. Multicast and Broadcast (M&B) in WiMAX are suitable for multimedia app...
 
Ant Algorithm for File Replica Selection in Data Grid
Found in: Semantics, Knowledge and Grid, International Conference on
By Min Sun, Jizhou Sun, Efeng Lu, Ce Yu
Issue Date:November 2005
pp. 64
Replication of data helps a lot to enable highthroughput file transfer and scalable resource storage in distributed Data Grid environment. The selection of a data replica is critical for users to effectively access a data file. Within this paper, an ant al...
 
Conditional regression forests for human pose estimation
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Min Sun,P. Kohli,J. Shotton
Issue Date:June 2012
pp. 3394-3401
Random forests have been successfully applied to various high level computer vision tasks such as human pose estimation and object segmentation. These models are extremely efficient but work under the assumption that the output variables (such as body part...
 
Recognition the Spatio-temporal Patterns of Low-flow Changes in the Yellow River over the Last Half Century
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Tao Yang, Zhen-Chun Hao, Li-Min Sun
Issue Date:August 2009
pp. 593-598
Low flow is widely regarded as the primary flow conditions for the anthropogenic and aquatic communities in most rivers, particularly in such an arid and semi-arid area as the Yellow River. In this study, a procedure combining Mann-Kendall trend test, wave...
 
Make3D: Learning 3D Scene Structure from a Single Still Image
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Ashutosh Saxena, Min Sun, Andrew Y. Ng
Issue Date:May 2009
pp. 824-840
We consider the problem of estimating detailed 3D structure from a single still image of an unstructured environment. Our goal is to create 3D models that are both quantitatively accurate as well as visually pleasing. For each small homogeneous patch in th...
 
Find the Best Path: An Efficient and Accurate Classifier for Image Hierarchies
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Min Sun,Wan Huang,Silvio Savarese
Issue Date:December 2013
pp. 265-272
Many methods have been proposed to solve the image classification problem for a large number of categories. Among them, methods based on tree-based representations achieve good trade-off between accuracy and test time efficiency. While focusing on learning...
 
CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks
Found in: IEEE Transactions on Knowledge and Data Engineering
By Yue-Hsun Lin,Shih-Ying Chang,Hung-Min Sun
Issue Date:July 2013
pp. 1471-1483
For wireless sensor networks, data aggregation scheme that reduces a large amount of transmission is the most practical technique. In previous studies, homomorphic encryptions have been applied to conceal communication during aggregation such that encipher...
 
An Efficient Time-Bound Hierarchical Key Management Scheme without Tamper-Resistant Devices
Found in: Computing, Measurement, Control and Sensor Network, International Conference on
By Chien-Ming Chen,Tsu-Yang Wu,Bing-Zhe He,Hung-Min Sun
Issue Date:July 2012
pp. 285-288
Time-bound hierarchical key management mechanisms are widely discussed in several environments and applications. Obviously, the collusion attacks are the serious problems in the time-bound hierarchical key management schemes. In the collusion attacks, two ...
 
Mobile object detection through client-server based vote transfer
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By S. S. Kumar, Min Sun,S. Savarese
Issue Date:June 2012
pp. 3290-3297
Mobile platforms such as smart-phones and tablet computers have attained the technological capacity to perform tasks beyond their intended purposes. The steady increase of processing power has enticed researchers to attempt increasingly challenging tasks o...
 
Articulated part-based model for joint object detection and pose estimation
Found in: Computer Vision, IEEE International Conference on
By Min Sun,Silvio Savarese
Issue Date:November 2011
pp. 723-730
Despite recent successes, pose estimators are still somewhat fragile, and they frequently rely on a precise knowledge of the location of the object. Unfortunately, articulated objects are also very difficult to detect. Knowledge about the articulated natur...
 
A Lightweight Secure Data Aggregation Protocol for Wireless Sensor Networks
Found in: Parallel Processing Workshops, International Conference on
By Hung-Min Sun,Chiung-Hsun Chen,Po-Chi Li
Issue Date:September 2011
pp. 101-107
Data aggregation is a widely used technique in wireless sensor networks. There has been many related work proposed to address the data aggregation. However less of them pay attention to the property of data integrity. An attacker can simply forge data to a...
 
RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Chien-Ming Chen,Yue-Hsun Lin,Ya-Ching Lin,Hung-Min Sun
Issue Date:April 2012
pp. 727-734
Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster ...
 
Toward Automatic 3D Generic Object Modeling from One Single Image
Found in: 3D Imaging, Modeling, Processing, Visualization and Transmission, International Conference on
By Min Sun,Shyam Sunder Kumar,Gary Bradski,Silvio Savarese
Issue Date:May 2011
pp. 9-16
We present a novel method for solving the challenging problem of generating 3D models of generic object categories from just one single un-calibrated image. Our method leverages the algorithm proposed in [1] which enables a partial reconstruction of the ob...
 
A Native APIs Protection Mechanism in the Kernel Mode against Malicious Code
Found in: IEEE Transactions on Computers
By Hung-Min Sun, Hsun Wang, King-Hang Wang, Chien-Ming Chen
Issue Date:June 2011
pp. 813-823
As new vulnerabilities on Windows systems are reported endlessly, it is more practical to stop polymorphic malicious code from exploiting these vulnerabilities by building an behavior-based monitor, rather than adopting a signature-based detection system o...
 
Improving VQ Index Compression with Modified Relative Index Table
Found in: Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, IACIS International Symposium on
By Hung-Min Sun, Bying-He Ku, Chung-Chi Wu, Ting-Yu Lin
Issue Date:October 2010
pp. 221-225
Image Vector Quantization (VQ) has many current applications, like speech and image compression, and envisioned applications, such as digital watermarking, data hiding and speaker identification. Given an image, VQ produce an index map by quantizing the im...
 
SPATE: Small-Group PKI-Less Authenticated Trust Establishment
Found in: IEEE Transactions on Mobile Computing
By Yue-Hsun Lin, Ahren Studer, Yao-Hsin Chen, Hsu-Chun Hsiao, Li-Hsiang Kuo, Jason Lee, Jonathan M. McCune, King-Hang Wang, Maxwell Krohn, Phen-Lan Lin, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang
Issue Date:December 2010
pp. 1666-1681
Establishing trust between a group of individuals remains a difficult problem. Prior works assume trusted infrastructure, require an individual to trust unknown entities, or provide relatively low probabilistic guarantees of authenticity (95 percent for re...
 
Toward coherent object detection and scene layout understanding
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Sid Ying-Ze Bao, Min Sun, Silvio Savarese
Issue Date:June 2010
pp. 65-72
Detecting objects in complex scenes while recovering the scene layout is a critical functionality in many vision-based applications. Inspired by the work of [18], we advocate the importance of geometric contextual reasoning for object recognition. We start...
 
Decomposable Forward Error Correction Codes Based on Chinese Remainder Theorem
Found in: Parallel Architectures, Algorithms, and Networks, International Symposium on
By Hung-Min Sun, Shih-Ying Chang, Yu-Hsiang Hung, Yu-Kai Tseng, Hsin-Ta Chiao
Issue Date:December 2009
pp. 260-265
Several applications benefited from multicast data distribution because a sender can concurrently transmit data to multiple receivers using fewer bandwidth. However, reliability is an important issue in multicast because retransmission is not very efficien...
 
A Study of User-Friendly Hash Comparison Schemes
Found in: Computer Security Applications Conference, Annual
By Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassandra Studer, King-Hang Wang, Hiroaki Kikuchi, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang
Issue Date:December 2009
pp. 105-114
Several security protocols require a human to compare two hash values to ensure successful completion. When the hash values are represented as long sequences of numbers, humans may make a mistake or require significant time and patience to accurately compa...
 
A Pair-wise Key Establishment for Wireless Sensor Networks
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Hung-Min Sun, Yue-Hsun Lin, Cheng-Ta Yang, Mu-En Wu
Issue Date:September 2009
pp. 1152-1155
Random key pre-distribution scheme is a flexible key management scheme for wireless sensor networks. Recently, numerous related studies have been proposed. However, most of them have weaknesses. First of all, sensors require large storage to store keys in ...
 
A Scheme of Modulo-Based Capacity-improvement upon EMD Systems
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang
Issue Date:September 2009
pp. 365-368
To enlarge the capacity of the hidden secrete, a steganographic approach using modification pixels in conjunction with [1, -1] is proposed in this paper. The underlying concept of our scheme is that 3n variations of modification to n cover pixels correspon...
 
Common Friends Discovery with Privacy and Authenticity
Found in: Information Assurance and Security, International Symposium on
By Shin-Yan Chiou, Shih-Ying Chang, Hung-Min Sun
Issue Date:August 2009
pp. 337-340
In this paper, we propose a common friend discovery algorithm considering the privacy of users and the authenticity of friend relationships. The privacy means users’ other friends’ information does not be leaked except their common friends. The authenticit...
 
A Real-Time Selective Video Encryption Using Context-Key Control
Found in: Information Assurance and Security, International Symposium on
By Hung-Min Sun, Muh-Chyi Leu
Issue Date:August 2009
pp. 114-117
In recent years, as video technologies have been broadly used in TV, communication and multimedia, video security has been gaining in importance. This paper proposes a real-time selective video encryption using context-key control. The new context-key cont...
 
An empirical study on a computer-based corpus approach to English vocabulary teaching and learning
Found in: Computer Science and Information Technology, International Conference on
By Song Yunxia, Yang Min, Sun Zhuo
Issue Date:August 2009
pp. 218-221
This paper investigates the effectiveness of a computer-based corpus approach to English vocabulary teaching and learning. The empirical study in this paper illustrates that corpus does benefit English vocabulary teaching and learning but there are some pr...
 
Using L-moments Approach to Conduct Regional Flood Frequency and Associated Spatial Patterns Analysis in the Pearl River Delta Region
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Tao Yang, Zhen-Chun Hao, Li-Min Sun
Issue Date:August 2009
pp. 628-632
The Pearl River Delta (PRD) has one of the most complicated deltaic drainage systems with probably the highest density of crisscross-river network in the world. In this study, the index flood L-moments approach is applied to the regional flood analysis and...
 
On the Security of Chien's Ultralightweight RFID Authentication Protocol
Found in: IEEE Transactions on Dependable and Secure Computing
By Hung-Min Sun,Wei-Chih Ting,King-Hang Wang
Issue Date:March 2011
pp. 315-317
Security issues become more and more significant in RFID development. Recently, Chien proposed an ultralightweight RFID authentication protocol in order to achieve privacy and authenticity with limited computation and transmission resources. However, we fi...
 
A Trustable Reputation Scheme Based on Private Relationships
Found in: Social Network Analysis and Mining, International Conference on Advances in
By Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, Hung-Min Sun
Issue Date:July 2009
pp. 19-24
Online reviews are widely used for purchase decisions. Their trustworthiness is limited, however, by fake reviews. Fortunately, opinions from friends in a social network are more reliable but less convenient to obtain. Combining the advantages of online re...
 
Comparing Subjective Perceived Quality with Objective Video Quality by Content Characteristics and Bit Rates
Found in: New Trends in Information and Service Science, International Conference on
By Huey-Min Sun, Yan-Kai Huang
Issue Date:July 2009
pp. 624-629
Different content characteristics and bit rates affecting the perceived quality of video has been verified in this study. We select 93 video sequences encoded/decoded by the Microsoft MPEG-4 software and make use of the Principal Component Analysis(PCA) me...
 
A multi-view probabilistic model for 3D object classes
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Min Sun, Hao Su, S. Savarese, Li Fei-Fei
Issue Date:June 2009
pp. 1247-1254
We propose a novel probabilistic framework for learning visual models of 3D object categories by combining appearance information and geometric constraints. Objects are represented as a coherent ensemble of parts that are consistent under 3D viewpoint tran...
 
An Optimized Image Retrieval Method Based on Hierarchal Clustering and Genetic Algorithm
Found in: Information Technology and Applications, International Forum on
By Huang Min, Sun Bo, Xi Jianqing
Issue Date:May 2009
pp. 747-749
Image search on web is very familiar to various users, and improving the efficiency and accuracy of image search has become more and more a hotpot in this research field. For different commercial image engines use different retrieval techniques respectivel...
 
Harmonic Prediction Control for Time Delay Canceling and its Realization in Distribution Static Synchronous Compensator
Found in: Intelligent Systems, WRI Global Congress on
By Ruixiang Fan, An Luo, Min Sun, Zhikang Shuai
Issue Date:May 2009
pp. 56-60
This paper presents a prediction method for obtaining harmonic reference of distribution static synchronous compensator (DSTATCOM) control. It is a new use of adaptive predictive filter based on FIR in DSTATCOM control for harmonic suppression. Not only th...
 
E-Alarm: An Anomaly Detection System on Large Network
Found in: Artificial Intelligence, International Joint Conference on
By Min Sun,Yuanzhi Wang,Yun Luo
Issue Date:April 2009
pp. 555-558
In recent years, several worms attacked the Internet and caused serious global damage. We consider that if we can detect the worm in its early spreading stage and perform the access control policy on the related routers immediately, the disaster may be all...
 
A Data Fusion Approach Based on Parallel Support Vector Machine
Found in: Artificial Intelligence, International Joint Conference on
By Yun Luo,Yuanzhi Wang,Min Sun
Issue Date:April 2009
pp. 324-326
Support Vector Machine has some advantages, such as simple structure and good generalization, which is one implementation in Statistical Learning Theory. SVM offers a kind of effective way for the data fusion problem of little sample, non-linear and high d...
 
On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme
Found in: IEEE Transactions on Dependable and Secure Computing
By Hung-Min Sun, King-Hang Wang, Chien-Ming Chen
Issue Date:April 2009
pp. 159-160
Recently, Bertino et al. proposed a new time-bound key management scheme for broadcasting. The security of their scheme is planted on the hardness breaking of elliptic curve discrete log problem, HMAC, and tamper-resistance devices. They claimed that as lo...
 
A Gen2-Based RFID Authentication Protocol for Security and Privacy
Found in: IEEE Transactions on Mobile Computing
By Hung-Min Sun, Wei-Chih Ting
Issue Date:August 2009
pp. 1052-1062
EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as ISO18000-6C for global use, but the identity of tag (TID) is transmitted in plaintext which makes the tag traceable and clonable. Several solutions have been proposed based o...
 
A Computer Simulation Laboratory for Social Theories
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Joseph M. Whitmeyer, Moutaz Khouja, Ted Carmichael, Amar Saric, Chris Eichelberger, Min Sun, Mirsad Hadzikadic
Issue Date:December 2008
pp. 512-515
We present an agent-based model that allows the user to employ different social theories to try to explain and predict social changes. The model is set in the context of an armed insurgency in a developing country. We demonstrate the capabilities of the mo...
 
Efficient Authentication Schemes for Handover in Mobile WiMAX
Found in: Intelligent Systems Design and Applications, International Conference on
By Hung-Min Sun, Shih-Ying Chang, Yue-Hsun Lin, Shin-Yan Chiou
Issue Date:November 2008
pp. 235-240
Mobile WiMAX is the next generation of broadband wireless network. It allows users to roam over the network under vehicular speeds. However, when a mobile station changes from one base station to another, it should be authenticated again. This may lead to ...
 
Improvement of VQ Index Compression with Relative Index Tables
Found in: Computer Science and Information Technology, International Conference on
By Hung-Min Sun,Bying-He Ku,Chung-Chi Wu,Ting-Yu Lin
Issue Date:September 2008
pp. 492-496
Image Vector Quantization (VQ) has many current applications, like speech and image compression, and envisioned applications, such as digital watermarking, data hiding and speaker identification. In this paper, we propose a novel lossless compression algor...
 
Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack
Found in: Electronic Commerce and Security, International Symposium
By Hung-Min Sun, King-Hang Wang
Issue Date:August 2008
pp. 385-389
The security of a two-party authentication protocol relies on the stored secrets of each entity are not easily compromised by adversaries. However, in the real world, hackers can always divulge the stored secrets. In this paper, we introduce the concept of...
 
An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks
Found in: Embedded Software and Systems, Second International Conference on
By Hung-Min Sun, Ying-Chu Hsiao, Yue-Hsun Lin, Chien-Ming Chen
Issue Date:July 2008
pp. 19-26
Data aggregation is one of the most important techniques in wireless sensor networks to save energy through reducing lots of transmission. However, plaintext aggregation is insecure since eavesdropping or modifying messages is possible. Due to this, concea...
 
The Input-Interface of Webcam Applied in the Digital Content Interaction
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Huey-Min Sun, Wen-Lin Cheng
Issue Date:November 2007
pp. 31-34
Our research explores a virtual reality application based on Web camera (Webcam). The interface can replace with mouse by the frame difference method. We divide a frame into nine grids from Webcam and make use of the back- ground registration to compute mo...
 
3-D Reconstruction from Sparse Views using Monocular Vision
Found in: Computer Vision, IEEE International Conference on
By Ashutosh Saxena, Min Sun, Andrew Y. Ng
Issue Date:October 2007
pp. 1-8
We consider the task of creating a 3-d model of a large novel environment, given only a small number of images of the scene. This is a difficult problem, because if the images are taken from very different viewpoints or if they contain similar-looking stru...
 
Learning 3-D Scene Structure from a Single Still Image
Found in: Computer Vision, IEEE International Conference on
By Ashutosh Saxena, Min Sun, Andrew Y. Ng
Issue Date:October 2007
pp. 1-8
We consider the problem of estimating detailed 3-d structure from a single still image of an unstructured environment. Our goal is to create 3-d models which are both quantitatively accurate as well as visually pleasing. For each small homogeneous patch in...
 
Real-time Gait Generation for Humanoid Robot Based on Fuzzy Neural Networks
Found in: International Conference on Natural Computation
By Shouwen Fan, Min Sun, Mingquan Shi
Issue Date:August 2007
pp. 343-348
Gait parameters of humanoid robot are optimized by introducing three energy consumption indexes, calculation formulas of driving torque for each joint of humanoid robot are derived based on Lagrange dynamics equation, mathematic models for gait optimizatio...
 
Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Hung-Min Sun, Shih-Pu Hsu, Chien-Ming Chen
Issue Date:May 2007
pp. 457-462
Denial-of-Service (DoS) attacks are serious threats due to the resources constrained property in wireless sensor networks. Jamming attacks are the representative energy-consumption DoS attacks that can be launched easily. Hence, many countermeasures have b...
 
Cryptanalysis of Aydos et al.?s ECC-Based Wireless Authentication Protocol
Found in: e-Technology, e-Commerce, and e-Services, IEEE International Conference on
By Hung-Min Sun, Bin-Tsan Hsieh, Shin-Mu Tseng
Issue Date:March 2004
pp. 565-568
With the rapid development of communication technology, wireless technology has become more and more important, and has been widely used in personal communication. Recently, Aydos et al. proposed an ECC-based authenticated key agreement protocol for wirele...
 
High-performance IPv4/IPv6 Dual-stack Routing Lookup
Found in: Advanced Information Networking and Applications, International Conference on
By Zhen-Xing Wang, He-Ming Wang, Ya-Min Sun, Yan-Xiao Zhang, Jiang-Xing Wu
Issue Date:March 2004
pp. 476
IP routing lookup Schemes using single-step TCAM used in core routers demand entries being sorted according to prefix lengths in descending order relative to TCAM addresses. The sorting operations related to addresses have disadvantageous affections to the...
 
Component Metrics to Measure Component Quality
Found in: Asia-Pacific Software Engineering Conference
By Eun Sook Cho, Min Sun Kim, Soo Dong Kim
Issue Date:December 2001
pp. 419
<p>Recently, component-based software development is getting accepted in industry as a new effective software development paradigm. Since the introduction of component-based software engineering (CBSE) in later 90's, the CBSD research has focused lar...
 
 1  2 Next >>