144 Publications (Page 4 of 6)
2013
Geo-Store: A Framework for Supporting Semantics-Enabled Location-Based ServicesKu, Wei Shinn⋅Chen, Haiquan⋅Wang, Chih-Jye and Liu, Chuan-MingIEEE Internet Computing, vol. 17, (no. 2), pp. 35-43, 2013.
| Journal Article
LAVI: A location aware virtual infrastructure for VANETsGolatkar, R.B.⋅Chen, Y. and Ku, W. S.(pp. 1-6)
LinkProbe: Probabilistic inference on large-scale social networksChen, H.⋅Ku, W. S.⋅Wang, H.⋅Tang, L. and Sun, M.-T.(pp. 290-301)
Privacy preserving continuous multimedia streaming in MANETsSakai, Kazuya⋅Ku, Wei Shinn⋅Sun, Min-Te and Zimmermann, RogerACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), vol. 9, (no. 4), pp. 22, 08-01-2013.
| Journal Article
Randomized Skip Lists-based private authentication for large-scale RFID systemsSakai, K.⋅Sun, M.-T.⋅Ku, W. S. and Lai, T.H.(pp. 277-280)
Spatial Query Integrity with Voronoi NeighborsHu, Ling⋅Ku, Wei Shinn⋅Bakiras, S and Shahabi, CIEEE Transactions on Knowledge and Data Engineering, vol. 25, (no. 4), pp. 876, 2013-April.
| Journal Article
2012
Anonymous sensory data collection approach for mobile participatory sensingWang, C.-J. and Ku, W. S.(pp. 220-227)
Caching support for skyline query processing with partially-ordered domainsHsueh, Y.-L.⋅Zimmermann, R. and Ku, W. S.(pp. 386-389)
Efficient evaluation of skyline queries in wireless data broadcast environmentsWang, C.-J. and Ku, W. S.(pp. 442-445)
Enforcing k nearest neighbor query integrity on road networksHu, L.⋅Jing, Y.⋅Ku, W. S. and Shahabi, C.(pp. 422-425)
Geo-Store: A spatially-augmented SPARQL query evaluation systemWang, C.-J.⋅Ku, W. S. and Chen, H.(pp. 562-565)
2011
A location aware virtual infrastructure for VANETsChen, Y.⋅Wang, C.-J.⋅Ku, W. S. and Su, Z.(pp. 820-821)
BMF: Bitmapped Mass Fingerprinting for fast protein identificationYu, Weikuan⋅Yu, W.⋅Yu, W.⋅Wu, K.J.⋅Wu, K.J.⋅Wu, K. John⋅Ku, W.-S.⋅Ku, W. S.⋅Ku, Wei-Shinn⋅Xu, C.⋅Xu, C.⋅Xu, Cong⋅Gao, Juan⋅Gao, J. and Gao, J.(pp. 17-25)
Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocolFeng, J.⋅Chen, Y.⋅Summerville, D.⋅Ku, W. S. and Su, Z.(pp. 521-522)
Mitigating DDoS attacks using protection nodes in mobile ad hoc networksXiang, M.⋅Chen, Y.⋅Ku, W. S. and Su, Z.
Querying uncertain data with aggregate constraintsYang, M.⋅Wang, H.⋅Chen, H. and Ku, W. S.(pp. 817-828)
Secure Distributed Data Storage in Cloud ComputingChen, Y.⋅Ku, W. S.⋅Feng, J.⋅Liu, P. and Su, Z.(pp. 221-248)
SkyEngine: Efficient skyline search engine for continuous skyline computationsHsueh, Y.-L.⋅Zimmermann, R.⋅Ku, W. S. and Jin, Y.(pp. 1316-1319)
The optimal k-covering tag deployment for RFID-based localizationKu, Wei Shinn⋅Sakai, Kazuya and Sun, Min-TeJournal of Network and Computer Applications, vol. 34, (no. 3), pp. 924, 2011.
| Journal Article
The partial sequenced route query with traveling rules in road networksChen, Haiquan⋅Chen, Haiquan⋅Ku, Wei-shinn⋅Ku, Wei Shinn⋅Sun, Min-Te⋅Sun, Min-te⋅Zimmermann, Roger and Zimmermann, RogerGeoInformatica, vol. 15, (no. 3), pp. 541-569, 2011.
| Journal Article
Timer-Based CDS Construction in Wireless Ad Hoc NetworksSakai, Kazuya⋅Huang, Scott C⋅Ku, Wei Shinn⋅Sun, Min-Te and Cheng, SusanIEEE Transactions on Mobile Computing, vol. 10, (no. 10), pp. 1388-1402, 2011.
| Journal Article
2010
Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platformsFeng, J.⋅Chen, Y.⋅Ku, W. S. and Liu, P.(pp. 251-258)
A novel DDoS attack defending framework with minimized bilateral damagesChen, Y.⋅Ku, W. S.⋅Sakai, K. and DeCruze, C.
Cleansing uncertain databases leveraging aggregate constraintsChen, H.⋅Ku, W. S. and Wang, H.(pp. 128-135)
D-DOG: Securing sensitive data in distributed storage space by data division and out-of-order keystream generationFeng, J.⋅Chen, Y.⋅Ku, W. S. and Su, Z.