144 Publications (Page 5 of 6)
2010
Efficient evaluation of ?-Range Nearest Neighbor queries in road networks
Bao, J.Chow, C.-Y.Mokbel, M.F. and Ku, W. S.
(pp. 115-124)
 
Efficient Location Updates for Continuous Queries over Moving Objects
Hsueh, Yu-LingZimmermann, Roger and Ku, Wei Shinn
Journal of Computer Science and Technology, vol. 25, (no. 3), pp. 415-430, 2010. | Journal Article
 
INTACT: A spatial query integrity assurance framework for location-based services
Wang, C.-J.Ku, W. S.Hu, L. and Shahabi, C.
(pp. 536-537)
 
Leveraging spatio-temporal redundancy for RFID data cleansing
Chen, H.Ku, W. S.Wang, H. and Sun, M.-T.
(pp. 51-62)
 
Message-Efficient CDS construction in MANETs
Sakai, K.Sun, M.-T. and Ku, W. S.
(pp. 186-191)
 
Verifying spatial queries using voronoi neighbors
Hu, L.Ku, W. S.Bakiras, S. and Shahabi, C.
(pp. 350-359)
2009
Adaptive safe regions for continuous spatial queries over moving objects
Hsueh, Y.-L.Zimmermann, R. and Ku, W. S.
(pp. 71-76)
 
Fast connected dominating set construction in mobile ad hoc networks
Sakai, K.Sun, M.-T. and Ku, W. S.
 
Group-server scheduling for continuous multimedia streaming in MANETs
Sakai, K.Ku, W. S. and Zimmermann, R.
(pp. 400-405)
 
Modern navigation systems and related spatial query
Ku, W. S.Wang, H. and Zimmermann, R.
(pp. 285-292)
 
PLUS: A message-efficient prototype for location-based applications
Hsueh, Y.-L.Zimmermann, R.Ku, W. S.Wang, H. and Wang, C.-D.
(pp. 1515-1518)
 
Privacy Protected Spatial Query Processing for Advanced Location Based Services
Ku, Wei ShinnChen, Yu and Zimmermann, Roger
Wireless Personal Communications, vol. 51, (no. 1), pp. 65, 2009-10-00. | Journal Article
 
PROS: A peer-to-peer system for location privacy protection on road networks (demo paper)
Bao, J.Chen, H. and Ku, W. S.
(pp. 552-553)
 
Query integrity assurance of location-based services accessing outsourced spatial databases
Ku, W. S.Hu, L.Shahabi, C. and Wang, H.
(pp. 80-97)
 
Self-encryption scheme for data security in mobile devices
Chen, Y. and Ku, W. S.
 
Weighted trust evaluation-based malicious node detection for wireless sensor networks
Hu, HongbingChen, YuKu, Wei ShinnSu, Zhou and Chen, Chung-Han J
International Journal of Information and Computer Security, vol. 3, (no. 2), pp. 132-149, 2009. | Journal Article
2008
A cloaking algorithm based on spatial networks for location privacy
Li, P.-Y.Peng, W.-C.Wang, T.-W.Ku, W. S.Xu, J. and Hamilton Jr., J.A.
(pp. 90-97)
 
Cache management techniques for privacy preserving location-based services
Chen, Y.Bao, J.Ku, W. S. and Huang, J.-L.
(pp. 88-93)
 
Efficient updates for continuous skyline computations
Hsueh, Y.-L.Zimmermann, R. and Ku, W. S.
(pp. 419-433)
 
Maintaining CDS in mobile ad hoc networks
Sakai, K.Sun, M.-T.Ku, W. S. and Okada, H.
(pp. 141-153)
 
Malicious node detection in wireless sensor networks using weighted trust evaluation
Atakli, I.M.Hu, H.Chen, Y.Ku, W. S. and Su, Z.
(pp. 836-843)
 
Nearest neighbor queries with peer-to-peer data sharing in mobile environments
Ku, Wei Shinn and Zimmermann, Roger
Pervasive and Mobile Computing, vol. 4, (no. 5), pp. 788, 2008. | Journal Article
 
The multi-rule partial sequenced route query
Chen, H.Ku, W. S.Sun, M.-T. and Zimmermann, R.
(pp. 65-74)
2007
Collaborative Detection of DDoS Attacks over Multiple Network Domains
Chen, YuChen, YuHwang, KaiHwang, KaiKu, Wei Shinn and Ku, Wei-Shinn
IEEE Transactions on Parallel and Distributed Systems, vol. 18, (no. 12), pp. 1649-1662, 2007. | Journal Article
 
Distributed change-point detection of ddos attacks: Experimental results on DETER testbed
Chen, Y.Hwang, K. and Ku, W. S.