152 Publications (Page 5 of 7)
2011
SkyEngine: Efficient skyline search engine for continuous skyline computationsHsueh, Y.-L.⋅Zimmermann, R.⋅Ku, W. S. and Jin, Y.(pp. 1316-1319)
The optimal k-covering tag deployment for RFID-based localizationKu, Wei Shinn⋅Sakai, Kazuya and Sun, Min-TeJournal of Network and Computer Applications, vol. 34, (no. 3), pp. 924, 2011.
| Journal Article
The partial sequenced route query with traveling rules in road networksChen, Haiquan⋅Chen, Haiquan⋅Ku, Wei-shinn⋅Ku, Wei Shinn⋅Sun, Min-Te⋅Sun, Min-te⋅Zimmermann, Roger and Zimmermann, RogerGeoInformatica, vol. 15, (no. 3), pp. 541-569, 2011.
| Journal Article
Timer-Based CDS Construction in Wireless Ad Hoc NetworksSakai, Kazuya⋅Huang, Scott C⋅Ku, Wei Shinn⋅Sun, Min-Te and Cheng, SusanIEEE Transactions on Mobile Computing, vol. 10, (no. 10), pp. 1388-1402, 2011.
| Journal Article
2010
Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platformsFeng, J.⋅Chen, Y.⋅Ku, W. S. and Liu, P.(pp. 251-258)
A novel DDoS attack defending framework with minimized bilateral damagesChen, Y.⋅Ku, W. S.⋅Sakai, K. and DeCruze, C.
Cleansing uncertain databases leveraging aggregate constraintsChen, H.⋅Ku, W. S. and Wang, H.(pp. 128-135)
D-DOG: Securing sensitive data in distributed storage space by data division and out-of-order keystream generationFeng, J.⋅Chen, Y.⋅Ku, W. S. and Su, Z.
Efficient evaluation of ?-Range Nearest Neighbor queries in road networksBao, J.⋅Chow, C.-Y.⋅Mokbel, M.F. and Ku, W. S.(pp. 115-124)
Efficient Location Updates for Continuous Queries over Moving ObjectsHsueh, Yu-Ling⋅Zimmermann, Roger and Ku, Wei ShinnJournal of Computer Science and Technology, vol. 25, (no. 3), pp. 415-430, 2010.
| Journal Article
INTACT: A spatial query integrity assurance framework for location-based servicesWang, C.-J.⋅Ku, W. S.⋅Hu, L. and Shahabi, C.(pp. 536-537)
Leveraging spatio-temporal redundancy for RFID data cleansingChen, H.⋅Ku, W. S.⋅Wang, H. and Sun, M.-T.(pp. 51-62)
Message-Efficient CDS construction in MANETsSakai, K.⋅Sun, M.-T. and Ku, W. S.(pp. 186-191)
Verifying spatial queries using voronoi neighborsHu, L.⋅Ku, W. S.⋅Bakiras, S. and Shahabi, C.(pp. 350-359)
2009
Adaptive safe regions for continuous spatial queries over moving objectsHsueh, Y.-L.⋅Zimmermann, R. and Ku, W. S.(pp. 71-76)
Fast connected dominating set construction in mobile ad hoc networksSakai, K.⋅Sun, M.-T. and Ku, W. S.
Group-server scheduling for continuous multimedia streaming in MANETsSakai, K.⋅Ku, W. S. and Zimmermann, R.(pp. 400-405)
Modern navigation systems and related spatial queryKu, W. S.⋅Wang, H. and Zimmermann, R.(pp. 285-292)
PLUS: A message-efficient prototype for location-based applicationsHsueh, Y.-L.⋅Zimmermann, R.⋅Ku, W. S.⋅Wang, H. and Wang, C.-D.(pp. 1515-1518)
Privacy Protected Spatial Query Processing for Advanced Location Based ServicesKu, Wei Shinn⋅Chen, Yu and Zimmermann, RogerWireless Personal Communications, vol. 51, (no. 1), pp. 65, 2009-10-00.
| Journal Article
PROS: A peer-to-peer system for location privacy protection on road networks (demo paper)Bao, J.⋅Chen, H. and Ku, W. S.(pp. 552-553)
Query integrity assurance of location-based services accessing outsourced spatial databasesKu, W. S.⋅Hu, L.⋅Shahabi, C. and Wang, H.(pp. 80-97)
Self-encryption scheme for data security in mobile devicesChen, Y. and Ku, W. S.
Weighted trust evaluation-based malicious node detection for wireless sensor networksHu, Hongbing⋅Chen, Yu⋅Ku, Wei Shinn⋅Su, Zhou and Chen, Chung-Han JInternational Journal of Information and Computer Security, vol. 3, (no. 2), pp. 132-149, 2009.
| Journal Article
2008
A cloaking algorithm based on spatial networks for location privacyLi, P.-Y.⋅Peng, W.-C.⋅Wang, T.-W.⋅Ku, W. S.⋅Xu, J. and Hamilton Jr., J.A.(pp. 90-97)