144 Publications (Page 4 of 6)
2013
Geo-Store: A Framework for Supporting Semantics-Enabled Location-Based Services
Ku, Wei ShinnChen, HaiquanWang, Chih-Jye and Liu, Chuan-Ming
IEEE Internet Computing, vol. 17, (no. 2), pp. 35-43, 2013. | Journal Article
 
LAVI: A location aware virtual infrastructure for VANETs
Golatkar, R.B.Chen, Y. and Ku, W. S.
(pp. 1-6)
 
LinkProbe: Probabilistic inference on large-scale social networks
Chen, H.Ku, W. S.Wang, H.Tang, L. and Sun, M.-T.
(pp. 290-301)
 
Privacy preserving continuous multimedia streaming in MANETs
Sakai, KazuyaKu, Wei ShinnSun, Min-Te and Zimmermann, Roger
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), vol. 9, (no. 4), pp. 22, 08-01-2013. | Journal Article
 
Randomized Skip Lists-based private authentication for large-scale RFID systems
Sakai, K.Sun, M.-T.Ku, W. S. and Lai, T.H.
(pp. 277-280)
 
Spatial Query Integrity with Voronoi Neighbors
Hu, LingKu, Wei ShinnBakiras, S and Shahabi, C
IEEE Transactions on Knowledge and Data Engineering, vol. 25, (no. 4), pp. 876, 2013-April. | Journal Article
2012
Anonymous sensory data collection approach for mobile participatory sensing
Wang, C.-J. and Ku, W. S.
(pp. 220-227)
 
Caching support for skyline query processing with partially-ordered domains
Hsueh, Y.-L.Zimmermann, R. and Ku, W. S.
(pp. 386-389)
 
Efficient evaluation of skyline queries in wireless data broadcast environments
Wang, C.-J. and Ku, W. S.
(pp. 442-445)
 
Enforcing k nearest neighbor query integrity on road networks
Hu, L.Jing, Y.Ku, W. S. and Shahabi, C.
(pp. 422-425)
 
Geo-Store: A spatially-augmented SPARQL query evaluation system
Wang, C.-J.Ku, W. S. and Chen, H.
(pp. 562-565)
2011
A location aware virtual infrastructure for VANETs
Chen, Y.Wang, C.-J.Ku, W. S. and Su, Z.
(pp. 820-821)
 
BMF: Bitmapped Mass Fingerprinting for fast protein identification
Yu, WeikuanYu, W.Yu, W.Wu, K.J.Wu, K.J.Wu, K. JohnKu, W.-S.Ku, W. S.Ku, Wei-ShinnXu, C.Xu, C.Xu, CongGao, JuanGao, J. and Gao, J.
(pp. 17-25)
 
Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol
Feng, J.Chen, Y.Summerville, D.Ku, W. S. and Su, Z.
(pp. 521-522)
 
Mitigating DDoS attacks using protection nodes in mobile ad hoc networks
Xiang, M.Chen, Y.Ku, W. S. and Su, Z.
 
Querying uncertain data with aggregate constraints
Yang, M.Wang, H.Chen, H. and Ku, W. S.
(pp. 817-828)
 
Secure Distributed Data Storage in Cloud Computing
Chen, Y.Ku, W. S.Feng, J.Liu, P. and Su, Z.
(pp. 221-248)
 
SkyEngine: Efficient skyline search engine for continuous skyline computations
Hsueh, Y.-L.Zimmermann, R.Ku, W. S. and Jin, Y.
(pp. 1316-1319)
 
The optimal k-covering tag deployment for RFID-based localization
Ku, Wei ShinnSakai, Kazuya and Sun, Min-Te
Journal of Network and Computer Applications, vol. 34, (no. 3), pp. 924, 2011. | Journal Article
 
The partial sequenced route query with traveling rules in road networks
Chen, HaiquanChen, HaiquanKu, Wei-shinnKu, Wei ShinnSun, Min-TeSun, Min-teZimmermann, Roger and Zimmermann, Roger
GeoInformatica, vol. 15, (no. 3), pp. 541-569, 2011. | Journal Article
 
Timer-Based CDS Construction in Wireless Ad Hoc Networks
Sakai, KazuyaHuang, Scott CKu, Wei ShinnSun, Min-Te and Cheng, Susan
IEEE Transactions on Mobile Computing, vol. 10, (no. 10), pp. 1388-1402, 2011. | Journal Article
2010
Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms
Feng, J.Chen, Y.Ku, W. S. and Liu, P.
(pp. 251-258)
 
A novel DDoS attack defending framework with minimized bilateral damages
Chen, Y.Ku, W. S.Sakai, K. and DeCruze, C.
 
Cleansing uncertain databases leveraging aggregate constraints
Chen, H.Ku, W. S. and Wang, H.
(pp. 128-135)
 
D-DOG: Securing sensitive data in distributed storage space by data division and out-of-order keystream generation
Feng, J.Chen, Y.Ku, W. S. and Su, Z.