Search For:

Displaying 1-13 out of 13 total
Intrusion Detection Based on Cross-Correlation of System Call Sequences
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Xiaoqiang Zhang, Zhongliang Zhu, Pingzhi Fan
Issue Date:November 2005
pp. 277-283
A new light-weight approach, based on the cross-correlation of system call sequences, is presented to identify normal or intrusive program behavior. The program behavior is represented by the cross-correlation value which can be used to indicate the simila...
 
Copyright Protection for E-Government Document Images
Found in: IEEE MultiMedia
By Didi Rosiyadi,Shi-Jinn Horng,Pingzhi Fan,Xian Wang,Muhammad Khurram Khan,Yi Pan
Issue Date:July 2012
pp. 62-73
The proposed copyright protection scheme combines the discrete cosine transform (DCT) and singular value decomposition (SVD) using a control parameter to avoid the false-positive problem.
 
An Efficient Run Time Control Flow Errors Detection by DCT Technique
Found in: Biometrics and Security Technologies, International Symposium on
By Hung-Chuan Lai,Shi-Jinn Horng,Pingzhi Fan,Xian Wang,Yi Pan
Issue Date:March 2012
pp. 134-150
DCT is usually used in image processing but in this paper we use it to detect the run time control errors. In this paper, using the branch instruction, a program is first divided into several data computing blocks (DCBs), each DCB can then be recognized as...
 
Call dropping performance analysis of the eNB-first channel access policy in LTE-Advanced relay networks
Found in: Wireless and Mobile Computing, Networking and Communication, IEEE International Conference on
By Xian Wang, Shi-Jinn Horng, Ray-Guang Cheng, Pingzhi Fan
Issue Date:October 2011
pp. 43-50
Relay is one of the key technologies used by both the Third Generation Partnership Project (3GPP) Long Term Evolution-Advanced (LTE-Advanced) and IEEE 802.16m to ameliorate cell edge throughput. Despite the throughput enhancement achieved by deploying rela...
 
Construction of Anti-Collusion Codes Based on Cover-Free Families
Found in: Information Technology: New Generations, Third International Conference on
By Qiaoliang Li, Xiaoming Wang, Yingshu Li, Yi Pan, Pingzhi Fan
Issue Date:April 2009
pp. 362-365
Digital fingerprinting is a technique for identifying users who use multimedia content for unintended purpose, such as redistribution. In order to characterize the fingerprints that can withstand collusion attack, Dittmann et. al proposed the definition of...
 
A More Realistic Thinning Scheme for Call Admission Control in Multimedia Wireless Networks
Found in: IEEE Transactions on Computers
By Xian Wang, Pingzhi Fan, Yi Pan
Issue Date:August 2008
pp. 1143-1147
In [7], Fang proposed a call admission control scheme called thinning scheme. For tractability, Fang made some restrict assumptions on the mobility and traffic models. The characteristics of multimedia services are not differentiated. In this paper, we stu...
 
A New Concurrent Detection of Control Flow Errors Based on DCT Technique
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Hung-Chuan Lai, Shi-Jinn Horng, Yong-Yuan Chen, Pingzhi Fan, Yi Pan
Issue Date:December 2007
pp. 201-209
In this paper, a program is first divided into several data computing blocks (DCBs) by the branch instruction; each DCB can then be recognized as an image. We then use the one dimension discrete cosine transform (1-D DCT) to compute each DCB to generate se...
 
An Enhanced Anti-collision Algorithm in RFID Based on Counter and Stack
Found in: Systems and Networks Communication, International Conference on
By Wei-Chih Chen, Shi-Jinn Horng, Pingzhi Fan
Issue Date:August 2007
pp. 21
Radio Frequency Identification has been developed for many years and it got much attention from researchers recently as there are lots of applications being used practically in the real world. Owing to the shared wireless channel between tags and reader du...
 
Comments on
Found in: IEEE Transactions on Computers
By Qingchun Chen, Kam-Yiu Lam, Pingzhi Fan
Issue Date:September 2005
pp. 1182-1183
In this correspondence, several errors related to the distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor networks in [1] are spotted and corrected.
 
A Three-Stage Heuristic Combined Genetic Algorithm Strategy to the Channel-Assignment Problem
Found in: Parallel and Distributed Processing Symposium, International
By Xiannong Fu, Yi Pan, Anu G. Bourgeois, Pingzhi Fan
Issue Date:April 2003
pp. 145b
The Channel Assignment Problem (CAP) is to assign a minimum number of channels to requested calls in a cellular radio system while satisfying certain constraints. It is proven to be NP-complete. Considering Sivarajan?s benchmark 21-cell system assignment p...
 
Performance Evaluation of a Hierarchical Cellular System with Mobile Velocity-Based Bidirectional Call-Overflow Scheme
Found in: IEEE Transactions on Parallel and Distributed Systems
By Wenhao Shan, Pingzhi Fan, Yi Pan
Issue Date:January 2003
pp. 72-83
<p><b>Abstract</b>—With the increase of teletraffic demands in mobile cellular system, hierarchical cellular systems (HCSs) have been adopted extensively for more efficient channel utilization and better GoS (Grade of Services). A practic...
 
Impact of rateless codes on system delay and throughout for network-coded multi-source and multi-destination scenarios
Found in: 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
By Zheng Ma,Zhiguo Ding, Pingzhi Fan
Issue Date:October 2012
pp. 240-244
Existing work has demonstrated that network coding can significantly reduce system delay in multi-source and multi-destination scenarios. However, such a scheme doesn't take consideration in terms of throughput In this paper, we propose to use rateless cod...
 
Simulation of Multipath-Tolerant Binary Signal Design for Approximately Synchronized CDMA Mobile Communication without Co-Channel Interference nor Detection Sidelobe Using Complete Complementary Codes
Found in: Computers and Communications, IEEE Symposium on
By Toshiaki Imoto, Naoki Suehiro, Noriyoshi Kuroyanagi, Pingzhi Fan
Issue Date:July 1999
pp. 317
A signal design method for the uplink in the cellular mobile CDMA systems is simulated. The simulated method uses binary complete complementary code as comb-spectrum pseudo-periodic sequences. The designed signals are without co-channel interference nor in...
 
 1