152 Publications (Page 5 of 7)
2011
SkyEngine: Efficient skyline search engine for continuous skyline computations
Hsueh, Y.-L.Zimmermann, R.Ku, W.-S. and Jin, Y.
(pp. 1316-1319)
 
The optimal k-covering tag deployment for RFID-based localization
Ku, Wei-ShinnSakai, Kazuya and Sun, Min-Te
Journal of Network and Computer Applications, vol. 34, (no. 3), pp. 924, 2011. | Journal Article
 
The partial sequenced route query with traveling rules in road networks
Chen, HaiquanChen, HaiquanKu, Wei-shinnKu, Wei-ShinnSun, Min-TeSun, Min-teZimmermann, Roger and Zimmermann, Roger
GeoInformatica, vol. 15, (no. 3), pp. 541-569, 2011. | Journal Article
 
Timer-Based CDS Construction in Wireless Ad Hoc Networks
Sakai, KazuyaHuang, Scott CKu, Wei-ShinnSun, Min-Te and Cheng, Susan
IEEE Transactions on Mobile Computing, vol. 10, (no. 10), pp. 1388-1402, 2011. | Journal Article
2010
Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms
Feng, J.Chen, Y.Ku, W.-S. and Liu, P.
(pp. 251-258)
 
A novel DDoS attack defending framework with minimized bilateral damages
Chen, Y.Ku, W.-S.Sakai, K. and DeCruze, C.
 
Cleansing uncertain databases leveraging aggregate constraints
Chen, H.Ku, W.-S. and Wang, H.
(pp. 128-135)
 
D-DOG: Securing sensitive data in distributed storage space by data division and out-of-order keystream generation
Feng, J.Chen, Y.Ku, W.-S. and Su, Z.
 
Efficient evaluation of ?-Range Nearest Neighbor queries in road networks
Bao, J.Chow, C.-Y.Mokbel, M.F. and Ku, W.-S.
(pp. 115-124)
 
Efficient Location Updates for Continuous Queries over Moving Objects
Hsueh, Yu-LingZimmermann, Roger and Ku, Wei-Shinn
Journal of Computer Science and Technology, vol. 25, (no. 3), pp. 415-430, 2010. | Journal Article
 
INTACT: A spatial query integrity assurance framework for location-based services
Wang, C.-J.Ku, W.-S.Hu, L. and Shahabi, C.
(pp. 536-537)
 
Leveraging spatio-temporal redundancy for RFID data cleansing
Chen, H.Ku, W.-S.Wang, H. and Sun, M.-T.
(pp. 51-62)
 
Message-Efficient CDS construction in MANETs
Sakai, K.Sun, M.-T. and Ku, W.-S.
(pp. 186-191)
 
Verifying spatial queries using voronoi neighbors
Hu, L.Ku, W.-S.Bakiras, S. and Shahabi, C.
(pp. 350-359)
2009
Adaptive safe regions for continuous spatial queries over moving objects
Hsueh, Y.-L.Zimmermann, R. and Ku, W.-S.
(pp. 71-76)
 
Fast connected dominating set construction in mobile ad hoc networks
Sakai, K.Sun, M.-T. and Ku, W.-S.
 
Group-server scheduling for continuous multimedia streaming in MANETs
Sakai, K.Ku, W.-S. and Zimmermann, R.
(pp. 400-405)
 
Modern navigation systems and related spatial query
Ku, W.-S.Wang, H. and Zimmermann, R.
(pp. 285-292)
 
PLUS: A message-efficient prototype for location-based applications
Hsueh, Y.-L.Zimmermann, R.Ku, W.-S.Wang, H. and Wang, C.-D.
(pp. 1515-1518)
 
Privacy Protected Spatial Query Processing for Advanced Location Based Services
Ku, Wei-ShinnChen, Yu and Zimmermann, Roger
Wireless Personal Communications, vol. 51, (no. 1), pp. 65, 2009-10-00. | Journal Article
 
PROS: A peer-to-peer system for location privacy protection on road networks (demo paper)
Bao, J.Chen, H. and Ku, W.-S.
(pp. 552-553)
 
Query integrity assurance of location-based services accessing outsourced spatial databases
Ku, W.-S.Hu, L.Shahabi, C. and Wang, H.
(pp. 80-97)
 
Self-encryption scheme for data security in mobile devices
Chen, Y. and Ku, W.-S.
 
Weighted trust evaluation-based malicious node detection for wireless sensor networks
Hu, HongbingChen, YuKu, Wei-ShinnSu, Zhou and Chen, Chung-Han J
International Journal of Information and Computer Security, vol. 3, (no. 2), pp. 132-149, 2009. | Journal Article
2008
A cloaking algorithm based on spatial networks for location privacy
Li, P.-Y.Peng, W.-C.Wang, T.-W.Ku, W.-S.Xu, J. and Hamilton Jr., J.A.
(pp. 90-97)