Search For:

Displaying 1-50 out of 167 total
A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
Found in: IEEE Transactions on Mobile Computing
By Chi-Jen Wu, Jan-Ming Ho, Ming-Syan Chen
Issue Date:February 2013
pp. 386-398
Social network applications are becoming increasingly popular on mobile devices. A mobile presence service is an essential component of a social network application because it maintains each mobile user's presence information, such as the current status (o...
 
Approximate Query Processing in Cube Streams
Found in: IEEE Transactions on Knowledge and Data Engineering
By Ming-Jyh Hsieh, Ming-Syan Chen, Philip S. Yu
Issue Date:November 2007
pp. 1557-1570
<p><b>Abstract</b>—Data cubes have become important components in most data warehouse systems and Decision-Support-Systems. In such systems, users usually pose very complex queries to the Online Analytical Processing (OLAP) system, and sy...
 
BIO101 - EST sequence management and annotation system
Found in: International Symposium on Signal Processing and Information Technology
By In-Yee Lee, Wen-Chang Lin, Jan-Ming Ho, Gu-Liang Wang, Ming-Syan Chen
Issue Date:December 2005
pp. 40-45
Laboratories worldwide are working on EST cDNA library and microarray projects, each project involving hundreds to hundreds of thousands of clones. To support the needs of individual laboratories, an efficient EST sequence management system is needed. Here...
 
CLUGO: A Clustering Algorithm for Automated Functional Annotations Based on Gene Ontology
Found in: Data Mining, IEEE International Conference on
By In-Yee Lee, Jan-Ming Ho, Ming-Syan Chen
Issue Date:November 2005
pp. 705-708
We address the issue of providing highly informative and comprehensive annotations using information revealed by the structured vocabularies of Gene Ontology (GO). For a target, a set of candidate terms for inferring target properties is collected and form...
 
GOMIT: A Generic and Adaptive Annotation Algorithm Based on Gene Ontology Term Distributions
Found in: Bioinformatic and Bioengineering, IEEE International Symposium on
By In-Yee Lee, Jan-Ming Ho, Ming-Syan Chen
Issue Date:October 2005
pp. 40-48
We address the issue of providing highly informative annotations using information revealed by the structured vocabularies of Gene Ontology (GO). For a target, a set of candidate terms used to infer the target?s property is collected and forms a unique dis...
 
WISDOM: Web Intrapage Informative Structure Mining Based on Document Object Model
Found in: IEEE Transactions on Knowledge and Data Engineering
By Hung-Yu Kao, Jan-Ming Ho, Ming-Syan Chen
Issue Date:May 2005
pp. 614-627
To increase the commercial value and accessibility of pages, most content sites tend to publish their pages with intrasite redundant information, such as navigation panels, advertisements, and copyright announcements. Such redundant information increases t...
 
Mining Web Informative Structures and Contents Based on Entropy Analysis
Found in: IEEE Transactions on Knowledge and Data Engineering
By Hung-Yu Kao, Shian-Hua Lin, Jan-Ming Ho, Ming-Syan Chen
Issue Date:January 2004
pp. 41-55
<p><b>Abstract</b>—In this paper, we study the problem of mining the informative structure of a news Web site that consists of thousands of hyperlinked documents. We define the informative structure of a news Web site as a set of index pa...
 
Clustering for Web Information Hierarchy Mining
Found in: Web Intelligence, IEEE / WIC / ACM International Conference on
By Hung-Yu Kao, Jan-Ming Ho, Ming-Syan Chen
Issue Date:October 2003
pp. 698
Benefiting from the growth of techniques of dynamic page generation, the amount and the complexity of Web pages increase explosively. The structures of Web pages which are dynamically generated by the same templates are thus similar to one another and are ...
 
On the Mining of Substitution Rules for Statistically Dependent Items
Found in: Data Mining, IEEE International Conference on
By Wei-Guang Teng, Ming-Jyh Hsieh, Ming-Syan Chen
Issue Date:December 2002
pp. 442
In this paper, a new mining capability, called mining of substitution rules, is explored. A substitution refers to the choice made by a customer to replace the purchase of some items with that of others. The process of mining substitution rules can be deco...
 
SIFA: A Scalable File System with Intelligent File Allocation
Found in: Computer Software and Applications Conference, Annual International
By Hsiao-Ping Tsai, Jiun-Long Huang, Cheng-Ming Chao, Ming-Syan Chen, Cheen Liao
Issue Date:August 2002
pp. 793
In this paper, we propose and evaluate a new NAS based system which is a consolidated file system in a network environment. The consolidated file system utilizes storage boxes cooperating as peers to provide all file system services, and presents itself to...
 
Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme
Found in: IEEE Transactions on Knowledge and Data Engineering
By Chi-Yao Tseng, Pin-Chieh Sung, Ming-Syan Chen
Issue Date:May 2011
pp. 669-682
E-mail communication is indispensable nowadays, but the e-mail spam problem continues growing drastically. In recent years, the notion of collaborative spam filtering with near-duplicate similarity matching scheme has been widely discussed. The primary ide...
 
Exploring Application-Level Semantics for Data Compression
Found in: IEEE Transactions on Knowledge and Data Engineering
By Hsiao-Ping Tsai, De-Nian Yang, Ming-Syan Chen
Issue Date:January 2011
pp. 95-109
Natural phenomena show that many creatures form large social groups and move in regular patterns. However, previous works focus on finding the movement patterns of each single object or all objects. In this paper, we first propose an efficient distributed ...
 
Mining Group Movement Patterns for Tracking Moving Objects Efficiently
Found in: IEEE Transactions on Knowledge and Data Engineering
By Hsiao-Ping Tsai, De-Nian Yang, Ming-Syan Chen
Issue Date:February 2011
pp. 266-281
Existing object tracking applications focus on finding the moving patterns of a single object or all objects. In contrast, we propose a distributed mining algorithm that identifies a group of objects with similar movement patterns. This information is impo...
 
A General Model for Sequential Pattern Mining with a Progressive Database
Found in: IEEE Transactions on Knowledge and Data Engineering
By Jen-Wei Huang, Chi-Yao Tseng, Jian-Chih Ou, Ming-Syan Chen
Issue Date:September 2008
pp. 1153-1167
To capture the dynamic nature of data addition and deletion, we propose a general model of sequential pattern mining with a progressive database while the data in the database may be static, inserted or deleted. In addition, we present a progressive algori...
 
Optimal Design of Multiple Hash Tables for Concurrency Control
Found in: IEEE Transactions on Knowledge and Data Engineering
By Ming-Syan Chen, Philip S. Yu
Issue Date:May 1997
pp. 384-390
<p><b>Abstract</b>—In this paper, we propose the approach of using multiple hash tables for lock requests with different data access patterns to minimize the number of false contentions in a data sharing environment. We first derive some ...
 
Catching the Trend: A Framework for Clustering Concept-Drifting Categorical Data
Found in: IEEE Transactions on Knowledge and Data Engineering
By Hung-Leng Chen, Ming-Syan Chen, Su-Chen Lin
Issue Date:May 2009
pp. 652-665
Although the problem of clustering numerical time-evolving data is well-explored, the problem of clustering categorical time-evolving data remains as a challenge issue. In this paper, we propose a generalized clustering framework which utilizes existing cl...
 
An Adaptive Transmission Scheme for Audio and Video Synchronization based on Real-time Transport Protocol
Found in: Multimedia and Expo, IEEE International Conference on
By Chia-Chen Kuo, Ming-Syan Chen, Jeng-Chun Chen
Issue Date:August 2001
pp. 104
Multimedia streams impose tight temporal constraints since different kinds of continuous multimedia streams have to be played synchronously. We devise in this paper an adaptive transmission scheme to ensure the continuous and synchronous playback of audio ...
 
Applying Segmented Right-Deep Trees to Pipelining Multiple Hash Joins
Found in: IEEE Transactions on Knowledge and Data Engineering
By Ming-Syan Chen, Mingling Lo, Philip S. Yu, Honesty C. Young
Issue Date:August 1995
pp. 656-668
<p><it>Abstract</it>—The pipelined execution of multijoin queries in a multiprocessor-based database system is explored in this paper. Using hash-based joins, multiple joins can be pipelined so that the early results from a join, before t...
 
ConvenienceProbe: A Phone-Based System for Retail Trade-Area Analysis
Found in: IEEE Pervasive Computing
By Chuang-Wen You,Hsin-Liu Cindy Kao,Bo-Jhang Ho,Yu-Han Tiffany Chen,Wei-Fehng Wang,Lien-Ti Bei,Hao-Hua Chu,Ming-Syan Chen
Issue Date:January 2014
pp. 64-71
Systematically and quantitatively determining patterns in consumer flow is an important problem in marketing research. Identifying these patterns can facilitate an understanding of where and when consumers purchase products and services at physical retail ...
 
An Efficient Approach to Updating Closeness Centrality and Average Path Length in Dynamic Networks
Found in: 2013 IEEE International Conference on Data Mining (ICDM)
By Chia-Chen Yen,Mi-Yen Yeh,Ming-Syan Chen
Issue Date:December 2013
pp. 867-876
Closeness centrality measures the communication efficiency of a specific vertex within a network while the average path length (APL) measures that of the whole network. Since the nature of these two measurements is based on the computation of all-pair shor...
 
On Generalizable Low False-Positive Learning Using Asymmetric Support Vector Machines
Found in: IEEE Transactions on Knowledge and Data Engineering
By Shan-Hung Wu,Keng-Pei Lin,Hao-Heng Chien,Chung-Min Chen,Ming-Syan Chen
Issue Date:May 2013
pp. 1083-1096
The Support Vector Machines (SVMs) have been widely used for classification due to its ability to give low generalization error. In many practical applications of classification, however, the wrong prediction of a certain class is much severer than that of...
 
SocFeedViewer: A Novel Visualization Technique for Social News Feeds Summarization on Social Network Services
Found in: 2012 IEEE 19th International Conference on Web Services (ICWS)
By Chi-Yao Tseng,Yu-Jen Chen,Ming-Syan Chen
Issue Date:June 2012
pp. 616-617
Online social network services, such as Facebook and Twitter, have become increasingly popular recently. More and more users are accustomed to regularly reading the latest news feeds and interacting with friends on these social websites. However, when the ...
 
Using Mobile Phones to Monitor Shopping Time at Physical Stores
Found in: IEEE Pervasive Computing
By Chuang-Wen You, Chih-Chiang Wei, Yi-Ling Chen, Hao-hua Chu, Ming-Syan Chen
Issue Date:April 2011
pp. 37-43
<p>A phone-based shopping tracker transforms the problem of monitoring shopping time into a classification problem. It uses motif groups to identify movement trajectories based on spatial and temporal features embedded in each motif.</p>
 
An Asymmetric and Asynchronous Energy Conservation Protocol for Vehicular Networks
Found in: IEEE Transactions on Mobile Computing
By Shan-Hung Wu, Chung-Min Chen, Ming-Syan Chen
Issue Date:January 2010
pp. 98-111
Intelligent Transportation Systems (ITS) improve passenger/pedestrian safety and transportation productivity through the use of vehicle-to-vehicle and vehicle-to-roadside wireless communication technologies. Communication protocols in these environments mu...
 
On the Energy Efficiency for Heterogeneous Data Broadcasting
Found in: Mobile Data Management, IEEE International Conference on
By Chung-Hua Chu, Ming-Syan Chen, Yu-Fen Chen
Issue Date:May 2009
pp. 92-101
Data broadcast is an advanced technique to realize large scalability and bandwidth utilization in a mobile computing environment. In the heterogeneous data broadcast, the data size is variant with time in multiple broadcast channels. However, traditional i...
 
A Novel Language-Model-Based Approach for Image Object Mining and Re-ranking
Found in: Data Mining, IEEE International Conference on
By Jen-Hao Hsiao, Chu-Song Chen, Ming-Syan Chen
Issue Date:December 2008
pp. 243-252
One leading framework for image object mining is the bag-of-words (BOW) approach. The idea is to encode an image as a collection of visual words of the quantized local patches. Objects in the image can then be retrieved through inferring the semantic topic...
 
Reducing Redundancy in Subspace Clustering
Found in: IEEE Transactions on Knowledge and Data Engineering
By Yi-Hong Chu, Ying-Ju Chen, De-Nian Yang, Ming-Syan Chen
Issue Date:October 2009
pp. 1432-1446
In this paper, we first study an important but unsolved dilemma in the literature of subspace clustering, which is referred to as “information overlapping-data coverage” challenge. Current solutions of subspace clustering usually invoke a grid-based Aprior...
 
Fully Adaptive Power Saving Protocols for Ad Hoc Networks Using the Hyper Quorum System
Found in: Distributed Computing Systems, International Conference on
By Shan-Hung Wu, Ming-Syan Chen, Chung-Min Chen
Issue Date:June 2008
pp. 785-792
Quorum-based Power Saving (QPS) protocols have been proposed for ad hoc networks (e.g., IEEE 802.11 ad hoc mode) to increase energy efficiency and prolong the operational time of mobile stations. These protocols assign to each station a cycle pattern that ...
 
On Data Labeling for Clustering Categorical Data
Found in: IEEE Transactions on Knowledge and Data Engineering
By Hung-Leng Chen, Kun-Ta Chuang, Ming-Syan Chen
Issue Date:November 2008
pp. 1458-1472
Sampling has been recognized as an important technique to improve the efficiency of clustering. However, with sampling applied, those points which are not sampled will not have their labels after the normal process. Although there is a straightforward appr...
 
Toward the Optimal Itinerary-Based KNN Query Processing in Mobile Sensor Networks
Found in: IEEE Transactions on Knowledge and Data Engineering
By Shan-Hung Wu, Kun-Ta Chuang, Chung-Min Chen, Ming-Syan Chen
Issue Date:December 2008
pp. 1655-1668
Current approaches to K Nearest Neighbor (KNN) search in mobile sensor networks require certain kind of indexing support. Creation and maintenance of these index structures, to reflect the network dynamics due to sensor node mobility, may result in long qu...
 
User-Assisted Image Classification on Personal Photo Collections
Found in: Multimedia and Expo, IEEE International Conference on
By Wei-ta Chen, Ying-hsiang Wen, Ming-syan Chen
Issue Date:July 2006
pp. 1945-1948
Image classification on personal photo collections can be extremely useful to various management tasks. However, there is little progress made forwarding it due to (1) lack of training data, and (2) subjectivity inherent in a user's photo-organizing behavi...
 
Labeling Unclustered Categorical Data into Clusters Based on the Important Attribute Values
Found in: Data Mining, IEEE International Conference on
By Hung-Leng Chen, Kun-Ta Chuang, Ming-Syan Chen
Issue Date:November 2005
pp. 106-113
Sampling has been recognized as an important technique to improve the efficiency of clustering. However, with sampling applied, those points which are not sampled will not have their labels. Although there is a straightforward approach in the numerical dom...
 
MULTIMEDIA OVER IP FOR THIN CLIENTS : BUILDING A COLLABORATIVE RESOURCE-SHARING PROTOTYPE
Found in: Multimedia and Expo, IEEE International Conference on
By Janet Chen, Golden Hou, Ming-Syan Chen
Issue Date:August 2001
pp. 111
This paper describes the issues and the techniques of enabling multimedia applications with thin-client/server computing. A prototype of a video communication system based on H.323 family of ITU-T recommendations has been developed to demonstrate the effic...
 
Error-Resilient Real-Time Video Communications over IP-Based lans
Found in: Multimedia and Expo, IEEE International Conference on
By Guo-Shiang Ma, Ming-Syan Chen, Jeng-Chun Chen
Issue Date:August 2001
pp. 21
Video communication over IP networks involves more issues Than that over ATM networks in terms of error control. First, IP networks provide neither prioritized transmission nor guaranteed QOS for data packets. Second, video streams need to be packetized we...
 
On General Results for All-to-All Broadcast
Found in: IEEE Transactions on Parallel and Distributed Systems
By Ming-Syan Chen, Jeng-Chun Chen, Philip S. Yu
Issue Date:April 1996
pp. 363-370
<p><b>Abstract</b>—All-to-all broadcast refers to the process by which every node broadcasts its certain piece of information to all other nodes in the system. In this paper, we develop all-to-all broadcast schemes by dealing with two cla...
 
Identity Protection in Sequential Releases of Dynamic Networks
Found in: IEEE Transactions on Knowledge and Data Engineering
By Chih-Hua Tai,Peng-Jui Tseng,Philip S. Yu,Ming-Syan Chen
Issue Date:March 2014
pp. 635-651
Social networks model the social activities between individuals, which change as time goes by. In light of useful information from such dynamic networks, there is a continuous demand for privacy-preserving data sharing with analyzers, collaborators or cust...
 
Rate Adaptation for 802.11 Multiuser MIMO Networks
Found in: IEEE Transactions on Mobile Computing
By Wei-Liang Shen,Kate Ching-Ju Lin,Shyamnath Gollakota,Ming-Syan Chen
Issue Date:January 2014
pp. 35-47
In multiuser MIMO (MU-MIMO) networks, the optimal bit rate of a user is highly dynamic and changes from one packet to the next. This breaks traditional bit rate adaptation algorithms, which rely on recent history to predict the best bit rate for the next p...
 
Structural Diversity for Resisting Community Identification in Published Social Networks
Found in: IEEE Transactions on Knowledge and Data Engineering
By Chih-Hua Tai,Philip S. Yu,De-Nian Yang,Ming-Syan Chen
Issue Date:January 2014
pp. 235-252
As an increasing number of social networking data is published and shared for commercial and research purposes, privacy issues about the individuals in social networks have become serious concerns. Vertex identification, which identifies a particular user ...
 
On Pattern Preserving Graph Generation
Found in: 2013 IEEE International Conference on Data Mining (ICDM)
By Hong-Han Shuai,De-Nian Yang,Philip S. Yu,Chih-Ya Shen,Ming-Syan Chen
Issue Date:December 2013
pp. 677-686
Real datasets always play an essential role in graph mining and analysis. However, nowadays most available real datasets only support millions of nodes. Therefore, the literature on Big Data analysis utilizes statistical graph generators to generate a mass...
 
Profiling Moving Objects by Dividing and Clustering Trajectories Spatiotemporally
Found in: IEEE Transactions on Knowledge and Data Engineering
By Huey-Ru Wu,Mi-Yen Yeh,Ming-Syan Chen
Issue Date:November 2013
pp. 2615-2628
An object can move with various speeds and arbitrarily changing directions. Given a bounded area where a set of objects moving around, there are some typical moving styles of the objects at different local regions due to the geography nature or other spati...
 
Query by Impression: A Novel Place Query System with Adjacency Constraints
Found in: 2013 14th IEEE International Conference on Mobile Data Management (MDM)
By Chi-Yao Tseng,Shih-Han Lin,Ming-Syan Chen
Issue Date:June 2013
pp. 85-90
Place query is one of the most fundamental applications, and traditional use cases include finding the exact spatial location of a place and searching for a specific type of places in a given spatial range. On the other hand, there is another possibility t...
 
Privacy-Preserving SimRank over Distributed Information Network
Found in: 2012 IEEE 12th International Conference on Data Mining (ICDM)
By Yu-Wei Chu,Chih-Hua Tai,Ming-Syan Chen,Philip S. Yu
Issue Date:December 2012
pp. 840-845
Information network analysis has drawn a lot attention in recent years. Among all the aspects of network analysis, similarity measure of nodes has been shown useful in many applications, such as clustering, link prediction and community identification, to ...
 
Collaborative and Distributed Search System with Mobile Devices
Found in: IEEE Transactions on Mobile Computing
By Chih-Ya Shen,De-Nian Yang,Ming-Syan Chen
Issue Date:October 2012
pp. 1478-1493
With the advances of communications, computing, and positioning technologies, mobile devices have been regarded as mobile computing platforms for various kinds of location-based and human-computation services. However, most existing applications regard eac...
 
An efficient sequential pattern mining algorithm for motifs with gap constraints
Found in: 2012 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
By Vance Chiang-Chi Liao,Ming-Syan Chen
Issue Date:October 2012
pp. 1
Mining biological data can provide insight into various realms of biology, such as finding co-occurring biosequences, which is essential for biological analyses and data mining. Sequential pattern mining reveals all-length implicit motifs, which have speci...
 
On reconfigurable association rule mining
Found in: 2012 IEEE International Conference on Granular Computing (GrC-2012)
By Wen-Tsai Liao,Ming-Syan Chen
Issue Date:August 2012
pp. 1-4
As one of the most important techniques for knowledge discovery, association rule mining is known to be very computational intensive. Many hardware architectures were proposed to speed up association rule mining. Generally, theses methods are based on the ...
 
Identities Anonymization in Dynamic Social Networks
Found in: Data Mining, IEEE International Conference on
By Chih-Hua Tai,Peng-Jui Tseng,Philip S. Yu,Ming-Syan Chen
Issue Date:December 2011
pp. 1224-1229
Privacy in social network data publishing is always an important concern. Nowadays most prior privacy protection techniques focus on static social networks. However, there are additional privacy disclosures in dynamic social networks due to the sequential ...
 
FISIP: A Distance and Correlation Preserving Transformation for Privacy Preserving Data Mining
Found in: Technologies and Applications of Artificial Intelligence, International Conference on
By Jen-Wei Huang,Jun-Wei Su,Ming-Syan Chen
Issue Date:November 2011
pp. 101-106
This paper devises a transformation scheme to protect data privacy in the case that data have to be sent to the third party for the analysis purpose. Most conventional transformation schemes suffer from two limits, i.e., the algorithm dependency and the in...
 
Photo identity tag suggestion using only social network context on large-scale web services
Found in: Multimedia and Expo, IEEE International Conference on
By Chi-Yao Tseng, Ming-Syan Chen
Issue Date:July 2011
pp. 1-4
Recently, uploading photos and adding identity tags on social network services are prevalent. Although some researchers have considered leveraging context to facilitate the process of tagging, these approaches still rely mainly on face recognition techniqu...
 
On the Design and Analysis of the Privacy-Preserving SVM Classifier
Found in: IEEE Transactions on Knowledge and Data Engineering
By Keng-Pei Lin,Ming-Syan Chen
Issue Date:November 2011
pp. 1704-1717
The support vector machine (SVM) is a widely used tool in classification problems. The SVM trains a classifier by solving an optimization problem to decide which instances of the training data set are support vectors, which are the necessarily informative ...
 
Incremental SVM Model for Spam Detection on Dynamic Email Social Networks
Found in: Computational Science and Engineering, IEEE International Conference on
By Chi-Yao Tseng, Ming-Syan Chen
Issue Date:August 2009
pp. 128-135
Recently, the huge number of email spams has caused serious problems in essential email communication. Traditional spam filters aim at analyzing email content to characterize the features that are commonly included in spams. However, it is observed that cr...
 
 1  2 Next >>