144 Publications (Page 5 of 6)
2010
Efficient evaluation of ?-Range Nearest Neighbor queries in road networksBao, J.⋅Chow, C.-Y.⋅Mokbel, M.F. and Ku, W. S.(pp. 115-124)
Efficient Location Updates for Continuous Queries over Moving ObjectsHsueh, Yu-Ling⋅Zimmermann, Roger and Ku, Wei ShinnJournal of Computer Science and Technology, vol. 25, (no. 3), pp. 415-430, 2010.
| Journal Article
INTACT: A spatial query integrity assurance framework for location-based servicesWang, C.-J.⋅Ku, W. S.⋅Hu, L. and Shahabi, C.(pp. 536-537)
Leveraging spatio-temporal redundancy for RFID data cleansingChen, H.⋅Ku, W. S.⋅Wang, H. and Sun, M.-T.(pp. 51-62)
Message-Efficient CDS construction in MANETsSakai, K.⋅Sun, M.-T. and Ku, W. S.(pp. 186-191)
Verifying spatial queries using voronoi neighborsHu, L.⋅Ku, W. S.⋅Bakiras, S. and Shahabi, C.(pp. 350-359)
2009
Adaptive safe regions for continuous spatial queries over moving objectsHsueh, Y.-L.⋅Zimmermann, R. and Ku, W. S.(pp. 71-76)
Fast connected dominating set construction in mobile ad hoc networksSakai, K.⋅Sun, M.-T. and Ku, W. S.
Group-server scheduling for continuous multimedia streaming in MANETsSakai, K.⋅Ku, W. S. and Zimmermann, R.(pp. 400-405)
Modern navigation systems and related spatial queryKu, W. S.⋅Wang, H. and Zimmermann, R.(pp. 285-292)
PLUS: A message-efficient prototype for location-based applicationsHsueh, Y.-L.⋅Zimmermann, R.⋅Ku, W. S.⋅Wang, H. and Wang, C.-D.(pp. 1515-1518)
Privacy Protected Spatial Query Processing for Advanced Location Based ServicesKu, Wei Shinn⋅Chen, Yu and Zimmermann, RogerWireless Personal Communications, vol. 51, (no. 1), pp. 65, 2009-10-00.
| Journal Article
PROS: A peer-to-peer system for location privacy protection on road networks (demo paper)Bao, J.⋅Chen, H. and Ku, W. S.(pp. 552-553)
Query integrity assurance of location-based services accessing outsourced spatial databasesKu, W. S.⋅Hu, L.⋅Shahabi, C. and Wang, H.(pp. 80-97)
Self-encryption scheme for data security in mobile devicesChen, Y. and Ku, W. S.
Weighted trust evaluation-based malicious node detection for wireless sensor networksHu, Hongbing⋅Chen, Yu⋅Ku, Wei Shinn⋅Su, Zhou and Chen, Chung-Han JInternational Journal of Information and Computer Security, vol. 3, (no. 2), pp. 132-149, 2009.
| Journal Article
2008
A cloaking algorithm based on spatial networks for location privacyLi, P.-Y.⋅Peng, W.-C.⋅Wang, T.-W.⋅Ku, W. S.⋅Xu, J. and Hamilton Jr., J.A.(pp. 90-97)
Cache management techniques for privacy preserving location-based servicesChen, Y.⋅Bao, J.⋅Ku, W. S. and Huang, J.-L.(pp. 88-93)
Efficient updates for continuous skyline computationsHsueh, Y.-L.⋅Zimmermann, R. and Ku, W. S.(pp. 419-433)
Maintaining CDS in mobile ad hoc networksSakai, K.⋅Sun, M.-T.⋅Ku, W. S. and Okada, H.(pp. 141-153)
Malicious node detection in wireless sensor networks using weighted trust evaluationAtakli, I.M.⋅Hu, H.⋅Chen, Y.⋅Ku, W. S. and Su, Z.(pp. 836-843)
Nearest neighbor queries with peer-to-peer data sharing in mobile environmentsKu, Wei Shinn and Zimmermann, RogerPervasive and Mobile Computing, vol. 4, (no. 5), pp. 788, 2008.
| Journal Article
The multi-rule partial sequenced route queryChen, H.⋅Ku, W. S.⋅Sun, M.-T. and Zimmermann, R.(pp. 65-74)
2007
Collaborative Detection of DDoS Attacks over Multiple Network DomainsChen, Yu⋅Chen, Yu⋅Hwang, Kai⋅Hwang, Kai⋅Ku, Wei Shinn and Ku, Wei-ShinnIEEE Transactions on Parallel and Distributed Systems, vol. 18, (no. 12), pp. 1649-1662, 2007.
| Journal Article
Distributed change-point detection of ddos attacks: Experimental results on DETER testbedChen, Y.⋅Hwang, K. and Ku, W. S.