144 Publications (Page 4 of 6)
2013
Geo-Store: A Framework for Supporting Semantics-Enabled Location-Based Services
Ku, Wei-ShinnChen, HaiquanWang, Chih-Jye and Liu, Chuan-Ming
IEEE Internet Computing, vol. 17, (no. 2), pp. 35-43, 2013. | Journal Article
 
LAVI: A location aware virtual infrastructure for VANETs
Golatkar, R.B.Chen, Y. and Ku, W.-S.
(pp. 1-6)
 
LinkProbe: Probabilistic inference on large-scale social networks
Chen, H.Ku, W.-S.Wang, H.Tang, L. and Sun, M.-T.
(pp. 290-301)
 
Privacy preserving continuous multimedia streaming in MANETs
Sakai, KazuyaKu, Wei-ShinnSun, Min-Te and Zimmermann, Roger
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), vol. 9, (no. 4), pp. 22, 08-01-2013. | Journal Article
 
Randomized Skip Lists-based private authentication for large-scale RFID systems
Sakai, K.Sun, M.-T.Ku, W.-S. and Lai, T.H.
(pp. 277-280)
 
Spatial Query Integrity with Voronoi Neighbors
Hu, LingKu, Wei-ShinnBakiras, S and Shahabi, C
IEEE Transactions on Knowledge and Data Engineering, vol. 25, (no. 4), pp. 876, 2013-April. | Journal Article
2012
Anonymous sensory data collection approach for mobile participatory sensing
Wang, C.-J. and Ku, W.-S.
(pp. 220-227)
 
Caching support for skyline query processing with partially-ordered domains
Hsueh, Y.-L.Zimmermann, R. and Ku, W.-S.
(pp. 386-389)
 
Efficient evaluation of skyline queries in wireless data broadcast environments
Wang, C.-J. and Ku, W.-S.
(pp. 442-445)
 
Enforcing k nearest neighbor query integrity on road networks
Hu, L.Jing, Y.Ku, W.-S. and Shahabi, C.
(pp. 422-425)
 
Geo-Store: A spatially-augmented SPARQL query evaluation system
Wang, C.-J.Ku, W.-S. and Chen, H.
(pp. 562-565)
2011
A location aware virtual infrastructure for VANETs
Chen, Y.Wang, C.-J.Ku, W.-S. and Su, Z.
(pp. 820-821)
 
BMF: Bitmapped Mass Fingerprinting for fast protein identification
Yu, WeikuanYu, W.Yu, W.Wu, K.J.Wu, K.J.Wu, K. JohnKu, W.-S.Ku, W.-S.Ku, Wei-ShinnXu, C.Xu, C.Xu, CongGao, JuanGao, J. and Gao, J.
(pp. 17-25)
 
Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol
Feng, J.Chen, Y.Summerville, D.Ku, W.-S. and Su, Z.
(pp. 521-522)
 
Mitigating DDoS attacks using protection nodes in mobile ad hoc networks
Xiang, M.Chen, Y.Ku, W.-S. and Su, Z.
 
Querying uncertain data with aggregate constraints
Yang, M.Wang, H.Chen, H. and Ku, W.-S.
(pp. 817-828)
 
Secure Distributed Data Storage in Cloud Computing
Chen, Y.Ku, W.-S.Feng, J.Liu, P. and Su, Z.
(pp. 221-248)
 
SkyEngine: Efficient skyline search engine for continuous skyline computations
Hsueh, Y.-L.Zimmermann, R.Ku, W.-S. and Jin, Y.
(pp. 1316-1319)
 
The optimal k-covering tag deployment for RFID-based localization
Ku, Wei-ShinnSakai, Kazuya and Sun, Min-Te
Journal of Network and Computer Applications, vol. 34, (no. 3), pp. 924, 2011. | Journal Article
 
The partial sequenced route query with traveling rules in road networks
Chen, HaiquanChen, HaiquanKu, Wei-shinnKu, Wei-ShinnSun, Min-TeSun, Min-teZimmermann, Roger and Zimmermann, Roger
GeoInformatica, vol. 15, (no. 3), pp. 541-569, 2011. | Journal Article
 
Timer-Based CDS Construction in Wireless Ad Hoc Networks
Sakai, KazuyaHuang, Scott CKu, Wei-ShinnSun, Min-Te and Cheng, Susan
IEEE Transactions on Mobile Computing, vol. 10, (no. 10), pp. 1388-1402, 2011. | Journal Article
2010
Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms
Feng, J.Chen, Y.Ku, W.-S. and Liu, P.
(pp. 251-258)
 
A novel DDoS attack defending framework with minimized bilateral damages
Chen, Y.Ku, W.-S.Sakai, K. and DeCruze, C.
 
Cleansing uncertain databases leveraging aggregate constraints
Chen, H.Ku, W.-S. and Wang, H.
(pp. 128-135)
 
D-DOG: Securing sensitive data in distributed storage space by data division and out-of-order keystream generation
Feng, J.Chen, Y.Ku, W.-S. and Su, Z.