DEPT OF COMPUTER SCIENCE

Researcher : Bai Z



List of Research Outputs

 

Bai Z. and Huo Q., A Study On the Use of 8-Directional Features For Online Handwritten Chinese Character Recognition, 8th International Conference on Document Analysis and Recognition (ICDAR-2005). Seoul, Korea, IEEE Computer Society, 2005, 1: 262-266.

 

Researcher : Bakiras S



List of Research Outputs

 

Kalnis P., Mamoulis N., Bakiras S. and Li X., Ad-hoc distributed spatial joins on mobile devices, Proceedings of the 20th IEEE International Parallel and Distributed Processing Symposium (IPDPS), Rhodes, Greece, April 2006. 2006.

 

Researcher : Cao HP



List of Research Outputs

 

Cao H.P., Mamoulis N. and Cheung D.W.L., Mining Frequent Spatio-temporal Sequential Patterns, Proceeding of the Fifth IEEE International Conference on Data Mining (ICDM 2005). New Orleans, Louisiana, 2005.

 

Cao H.P., Mamoulis N. and Cheung D.W.L., Mining Frequent Spatio-temporal Sequential Patterns, Proceedings of the 5th IEEE International Conference on Data Mining (ICDM). Houston, Texas, 2005.

 

Researcher : Chan BMY



List of Research Outputs

 

Chan B.M.Y., Chen D.Z., Chin F.Y.L. and Wang C.A., Construction of the Nearest Neighbor Embracing Graph of a Point Set, Journal of Combinatorial Optimization . Netherlands, Springer, 2006, 11(4): 435 - 443.

 

Researcher : Chan HL



List of Research Outputs

 

Chan H.L., Lam T.W. and Liu K.S., Extra unit-speed machines are almost as powerful as speedy machines for competitive flow time scheduling, The Sixteen Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). New York & Philadelphia, ACM and SIAM, 2006, 334-343.

 

Researcher : Chan HW



Project Title:

Anonymity in Web transactions

Investigator(s):

Chan HW

Department:

Computer Science

Source(s) of Funding:

Small Project Funding

Start Date:

01/2006

 

Abstract:

Privacy issue is always a concern for certain individuals with the proliferation of emails and transactions on the Web. In most of the current communication systems, information such as our identity (IP address) is exposed and kept by another party. Web server log files contain information about the users who visit them and the content they access. The server can record the user's IP address and often the user's Internet domain name, workplace, and/or approximate location, the type of computing platform used. The Web page that referred the user to this site and the server that is going to be visited next are all possibly contained within the request header. Even when the user's IP address changes between browsing sessions (e.g., the IP address is assigned dynamically using DHCP), a Web server can link multiple sessions by the same user by planting a unique cookie in the user' s browser during the first browsing session, and retrieving that cookie in subsequent sessions. Thus, various sites on the Internet collect a great amount of personal information about the individuals who visit them. This information can be used to generate consumer and communication profiles. The same monitoring capabilities are available to the user's ISP or local gateway administrator who can observe all communication in which the user participates. The user's profile made possible by such monitoring capabilities is viewed as a useful tool because a Web server can use such information to personalize its content for its users. However, user's privacy is compromised. In spite of a lack of privacy has always characterized Internet communication, a general acceptance that Internet communication has been logged universally and revealed so much about the personal tastes of its users is to be scrutinized. Web users should have the ability to limit what information is revealed about them and to whom it is revealed. While encrypting communication to and from web servers (e.g., using SSL) can hide the content of the transaction from an Internet service provider, or a local system administrator, they can still learn a lot about the client and server computers, the length of the data being exchanged, and the time and frequency of exchanges. Encryption indeed does little to protect the privacy of the client from the server. A web server can record the Internet addresses at which its clients reside, the servers that referred the clients to it, and the times and frequencies of accesses by its clients. Although some approaches enable users to negotiate the conditions under which they will share potentially private information with a Web server, these negotiations apply only to the server, only for certain kinds of information (for example, not the user's IP address), cannot be enforced, and are not presently widely practised. Other methods are definitely needed as well. Anonymity is a way not to release the identity and personal information of the individual. With the use of a proxy server, some degree of anonymity can be provided. However, it may still be possible to reveal our approximate location by examining the address of proxy server. Advertising company can use the information collected to decide which banner to show according to user location. With the use of cookies, the behavior of a visitor can be tracked when he/she visits another site embedded with web bugs. Therefore, individual privacy on the Internet is endangered and is of utmost concern for some. Since privacy cannot be protected solely by legislation, technologies that can be used to enforce privacy are needed. Anonymity for privacy protection is one possible solution, because if users are anonymous on a network, they need not worry about the loss of their privacy. The aim of the research is to design an efficient scheme for anonymous communication in web transactions. With such scheme, involved party should not be able to have an idea of whom and where the information requester is.

 

List of Research Outputs

 

Chow K.P., Chong C.F., Lai K.Y., Hui C.K., Pun K.H., Tsang W.W. and Chan H.W., Digital Evidence Search Kit, Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005). Los Alamitos, California, IEEE Computer Society Press, 2005, 187-194.

 

Ng C.K. and Chan H.W., Performance Modeling of Level Switching in Multitier Mobile Communication Systems, IEEE Transactions on Mobile Computing. IEEE, 2006, 5(4): 430-444.

 

Sui A., Chow S.M., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chong C.F., Pun K.H. and Chan H.W., Separable and Anonymous Identity-Based Key Issuing, Proceedings of the 11th International Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) . United States of America, IEEE Computer Society Conference Publishing Services, 2005, 2: 275-279.

 

Researcher : Chan KP



List of Research Outputs

 

Chan K.P., Chen T.Y. and Towey D.P., Adaptive Random Testing with Filtering: An Overhead Reduction Technique, 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'05). Taiwan, 2005.

 

Chan K.P., Chen T.Y. and Towey D.P., Restricted Random Testing: Adaptive Random Testing by Exclusion, International Journal of Software Engineering and Knowledge Engineering. 2005, 16(4): 553-584.

 

Researcher : Chan PY



List of Research Outputs

 

Chan P.Y., Lam T.W. and Yiu S.M., A More Accurate and Efficient Whole Genome Phylogeny, The 4th Asia-Pacific Bioinformatics Conference (APBC). London, Imperial College Press, 2006, 337-352.

 

Researcher : Chan WK



List of Research Outputs

 

Chan W.K., Chen T.Y., Lu H., Tse T.H. and Yau S.S., A metamorphic approach to integration testing of context-sensitive middleware-based applications, Proceedings of the 5th International Conference on Quality Software (QSIC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005, 241249.

 

Chan W.K., Cheng M.Y., Cheung S.C. and Tse T.H., Automatic goal-oriented classification of failure behaviors for testing XML-based multimedia software applications: an experimental case study, Journal of Systems and Software. Amsterdam, Elsevier, 2006, 79 (5): 602612.

 

Chan W.K., Cheung S.C. and Tse T.H., Fault-based testing of database application programs with conceptual data model, Proceedings of the 5th International Conference on Quality Software (QSIC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005, 187196.

 

Researcher : Chan WT



Project Title:

Algorithm issues on on-request data dissemination: scheduling algorithms and performance guarantee

Investigator(s):

Chan WT, Lam TW, Ting HF

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

12/2003

 

Abstract:

To solve the problem on deciding when to disseminate which page so as to optimize a pre-defined performance measure, such as the response time of a request, by giving online scheduling algorithms with performance guarantee; to introduce a formal performance comparison analysis between two (unicast or multicast) DDS with different resource settings; to study and solve the scheduling problems for some practical considerations.

 

List of Research Outputs

 

Chan W.T., Chin F.Y.L., Zhang Y., Zhu H., Shen H. and Wong P.W.H., A Dynamic Programming Approach Of Finding An Optimal Broadcast Schedule In Minimizing Total Flow Time, Journal of Combinatorial Optimization. Netherlands, Springer Netherlands, 2006, 11(2): 177-187.

 

Chan W.T., Zhang Y., Fung P.Y., Ye D. and Zhu H., Efficient Algorithms for Finding a Longest Common Increasing Subsequence, In: Xiaotie Deng, Dingzhu Du, The 16th Annual International Symposium on Algorithms and Computation (ISAAC). Springer, 2005, LNCS 3827: 665-674.

 

Chan W.T., Lam T.W., Liu K.S. and Wong P., New Resource Augmentation Analysis of the Total Stretch of SRPT and SJF in Multiprocessor Scheduling, The 30th International Symposium on Mathematical Foundations of Computer Science (MFCS). Springer, 2005, 3618 (LNCS): 236-247.

 

Chan W.T., Chin F.Y.L., Zhang Y., Zhu H., Shen H. and Wong P.W.H., Off-Line Algorithms for Minimizing Total Flow Time in Broadcast Scheduling, Proceedings of the Eleventh Annual International Computing and Combinatorics Conference (COCOON 2005). Kunming, Yunnan, China, Springer-Verlag Berlin Heidelberg, 2005, LNCS 3595: 318-328.

 

Chan W.T., Lam T.W., Ting H.F. and Wong W.H., On-line Stream Merging with Max Span and Min Coverage, Theory of Computing Systems . USA, Springer-Verlag New York, LLC, 2005, 38: 461-479.

 

Chan W.T., Chin F.Y.L., Ye D., Zhang G. and Zhang Y., Online Bin Packing of Fragile Objects with Application in Cellular Networks, In: Xiaotie Deng, Yinyu Ye, The 1st Workshop on Internet and Network Economics (WINE). Springer, 2005, LNCS 3828: 564-573.

 

Ye D., Chan W.T., Chin F.Y.L., Zhang G. and Zhang Y., On-line Scheduling of Parallel Jobs on Two Machines, In: Joe Ryan, Prabhu Manyem, Kiki Sugeng, Mirka Miller, Proceedings of the 16th Australasian Workshop on Combinatorial Algorithms (AWOCA 2005). Australia, 2005, 369-380.

 

Researcher : Chen L



List of Research Outputs

 

Chen L., Ma T.C., Wang C.L., Lau F.C.M. and Li S.P., G-JavaMPI: A Grid Middleware for Transparent MPI Task Migration, In: Beniamino Di Martino et al., Engineering the Grid: Status and Perspective. American Scientific Publishers, 2006.

 

Researcher : Chen TY



List of Research Outputs

 

Chan F.T., Tse T.H., Tang W.H. and Chen T.Y., Software testing education and training in Hong Kong, International Workshop on Education and Training for Quality Software Engineering, Proceedings of the 5th International Conference on Quality Software (QSIC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005, 313316.

 

Chan K.P., Chen T.Y. and Towey D.P., Restricted Random Testing: Adaptive Random Testing by Exclusion, International Journal of Software Engineering and Knowledge Engineering. 2005, 16(4): 553-584.

 

Chan W.K., Chen T.Y., Lu H., Tse T.H. and Yau S.S., A metamorphic approach to integration testing of context-sensitive middleware-based applications, Proceedings of the 5th International Conference on Quality Software (QSIC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005, 241249.

 

Chen T.Y., Poon P.L., Tang S.F., Tse T.H. and Yu Y.T., Applying testing to requirements inspection for software quality assurance, In: Information Systems Control Journal, Information Systems Control Journal. Rolling Meadows, Illinois, Information Systems Audit and Control Association, 2006, 6: 5056.

 

Chen T.Y., Poon P.L., Tang S.F. and Tse T.H., Identification of categories and choices in activity diagrams, Proceedings of the 5th International Conference on Quality Software (QSIC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005, 5563.

 

Tse T.H., Chen T.Y. and Glass R.L., An assessment of systems and software engineering scholars and institutions (2000-2004), Journal of Systems and Software. Amsterdam, Elsevier, 2006, 79 (6): 816819.

 

Researcher : Cheng KH



List of Research Outputs

 

Mamoulis N., Cheng K.H., Yiu M.L. and Cheung D.W.L., Efficient Aggregation of Ranked Inputs, Proceedings of the 22nd International Conference on Data Engineering (ICDE), Altanta, GA, April 2006. 2006.

 

Researcher : Cheng MY



List of Research Outputs

 

Chan W.K., Cheng M.Y., Cheung S.C. and Tse T.H., Automatic goal-oriented classification of failure behaviors for testing XML-based multimedia software applications: an experimental case study, Journal of Systems and Software. Amsterdam, Elsevier, 2006, 79 (5): 602612.

 

Researcher : Cheung DWL



Project Title:

Mining association rules on high performance parallel systems

Investigator(s):

Cheung DWL

Department:

Computer Science

Source(s) of Funding:

Outstanding RGC Projects

Start Date:

09/1998

 

Abstract:

To study and develop algorithms and techniques for mining association rules on high performance parallel systems including the following two system paradigms: share-nothing distributed memory parallel system and share-memory parallel system.

 

Project Title:

Applying clustering technique to partition large collection of XML documents for fast query processing

Investigator(s):

Cheung DWL, Huang JZ

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

08/2002

Completion Date:

08/2005

 

Abstract:

The project aims at studying the problem of partitioning large collection of XML documents by using the clustering technique. The goal of the partitioning (clustering) is to improve the storage efficiency and enhance the query performance on the documents.

 

Project Title:

Projected clustering for high dimensional data and application in gene expression data mining

Investigator(s):

Cheung DWL, Ng KP

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

08/2003

Completion Date:

07/2005

 

Abstract:

To develop dynamic algorithms for projected clustering; to apply algorithms on gene expression and other relevant data; to extend to dynamic approach to other data mining problems.

 

Project Title:

Projected clustering for high dimensional data and application in gene expression data mining

Investigator(s):

Cheung DWL, Ng KP

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

08/2003

 

Abstract:

N/A

 

Project Title:

A business process and information interoperability platform based on open standards

Investigator(s):

Cheung DWL, Kao CM, Lee TYT, Kwok WCH, Wong DCK, Chau PYK, Yee KC, Lau C.S.W., Tsang H.K., Ng V.T.Y.

Department:

Computer Science

Source(s) of Funding:

Innovation and Technology Support Programme

Start Date:

11/2003

Completion Date:

07/2006

 

Abstract:

To research and develop a business process and information interoperability platform based on international open standards and best practices available. This platform aims to support business process integration (BPI) within the enterprise and between business partners.

 

Project Title:

A business process and information interoperability platform based on open standards

Investigator(s):

Cheung DWL

Department:

Computer Science

Source(s) of Funding:

Innovation and Technology Fund Internship Programme

Start Date:

08/2004

Completion Date:

08/2005

 

Abstract:

To research and develop a business process and information interoperability platform based on international open standards and best practices available. This platform aims to support business process integration (BPI) within the enterprise and between business partners.

 

Project Title:

Semi-supervised Subspace Clustering for High-Dimensional Data

Investigator(s):

Cheung DWL

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

09/2005

 

Abstract:

N/A

 

Project Title:

Semi-supervised Subspace Clustering for High-Dimensional Data

Investigator(s):

Cheung DWL, Ng KP

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2005

 

Abstract:

The objectives of this project are: 1.Design and analysis of semi-supervised subspace clustering algorithms in different models. 2.Performance studies of the algorithms in both synthetic and real data. 3.Explore the applications of these algorithms in different environments.

 

Project Title:

Service oriented e-transaction platform

Investigator(s):

Cheung DWL

Department:

Computer Science

Source(s) of Funding:

Innovation and Technology Fund Internship Programme

Start Date:

06/2006

 

Abstract:

To extend SOA to support processing of electronic transactions between enterprises; to develop Web Service components to support reliable and secure B2B applications based on open standards; and to develop service modeling methodology and software to facilitate design of electronic transaction services.

 

Project Title:

Service oriented e-transaction platform

Investigator(s):

Cheung DWL

Department:

Computer Science

Source(s) of Funding:

Innovation and Technology Fund Internship Programme

Start Date:

06/2006

 

Abstract:

To extend SOA to support processing of electronic transactions between enterprises; to develop Web Service components to support reliable and secure B2B applications based on open standards; and to develop service modeling methodology and software to facilitate design of electronic transaction services.

 

List of Research Outputs

 

Cao H.P., Mamoulis N. and Cheung D.W.L., Mining Frequent Spatio-temporal Sequential Patterns, Proceeding of the Fifth IEEE International Conference on Data Mining (ICDM 2005). New Orleans, Louisiana, 2005.

 

Cao H.P., Mamoulis N. and Cheung D.W.L., Mining Frequent Spatio-temporal Sequential Patterns, Proceedings of the 5th IEEE International Conference on Data Mining (ICDM). Houston, Texas, 2005.

 

Cheung D.W.L., Kwok W.C.H. and Yee K.C., Consultancy, Architectural Design for MTR Maintenance Management Information System, MTR Corporation Limited. 2005.

 

Cheung D.W.L. and Wong D.C.K., Consultancy, Internet Appliance to Serve G2B Integration with SCOPES, Office of the Government Chief Information Officer (OGCIO), HKSAR Government. 2005.

 

Cheung D.W.L. and Wong D.C.K., Consultancy, SUNDAY Enterprise Data Model Design, Mandarin Communications Limited, SUNDAY mobile phone carrier. 2005.

 

Cheung D.W.L. and Wong D.C.K., Consultancy, Trial Run on Capturing of Vehicle Insurance Data, Transport Department, HKSAR Government. 2005.

 

Cheung D.W.L., Lee T.Y.T., Kwok W.C.H., Yee K.C. and Wong D.C.K., Grand Award, Linux Business Award, Hong Kong Linux Business Award Organization Committee. 2005.

 

Cheung D.W.L., Second Generation E-Commerce Technology , Guangdong-Hong Kong Technology Collaboration Exchange Forum, China . 2005.

 

Ekambaram P., Ng T.S.T., Kumaraswamy M.M. and Cheung D.W.L., Enabling automation in tall building works with wireless technologies and tagging devices, In: Y K Cheung, K W Chau, Tall Buildings - From Engineering to Sustainability, Proceedings of the 6th International Conference on Tall Buildings (ICTB-VI). Hong Kong, World Scientific, 2005, 726 - 732.

 

Mamoulis N., Cheng K.H., Yiu M.L. and Cheung D.W.L., Efficient Aggregation of Ranked Inputs, Proceedings of the 22nd International Conference on Data Engineering (ICDE), Altanta, GA, April 2006. 2006.

 

Wang L., Mamoulis N., Cheung D.W.L. and Yiu S.M., Indexing Useful Structural Patterns for XML Query Processing, IEEE Transaction on Knowledge and Data Engineering. IEEE Computer Society, 2005, 17(7): 997-1009.

 

Researcher : Chin FYL



Project Title:

MultiVision Fund

Investigator(s):

Chin FYL

Department:

Computer Science

Source(s) of Funding:

MultiVision Intelligent Surveillance (Hong Kong) Ltd. - General Award

Start Date:

07/2003

 

Abstract:

MultiVision Fund.

 

Project Title:

On-line scheduling with partial job values

Investigator(s):

Chin FYL

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2003

Completion Date:

08/2005

 

Abstract:

To improve the lower bound and to design better algorithms for the on-line scheduling problems; to investigate other on-line problems related to scheduling with partial job values.

 

Project Title:

On-line scheduling with partial job values

Investigator(s):

Chin FYL

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

09/2003

 

Abstract:

N/A

 

Project Title:

DVR-2 Summer Project

Investigator(s):

Chin FYL

Department:

Computer Science

Source(s) of Funding:

MultiVision Systems and Networks Limited - General Award

Start Date:

06/2004

Completion Date:

01/2006

 

Abstract:

DVR-2 Summer Project.

 

Project Title:

Finding motifs for sequences with weak binding sites

Investigator(s):

Chin FYL

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2004

Completion Date:

08/2006

 

Abstract:

To find motifs by considering those sequences which do not contain any binding sites when there are insufficient no. of sequences with binding sites; to consider a more general and realistic model where each sequence contains more than one binding site; to test our proposed algorithms on both real and simulated data.

 

Project Title:

Robust object segmentation method for video surveillance system

Investigator(s):

Chin FYL, Chung HY, Mak L.F.S.

Department:

Computer Science

Source(s) of Funding:

Teaching Company Scheme

Start Date:

09/2004

Completion Date:

08/2006

 

Abstract:

To develop a new and robust object segmentation method specifically for video surveillance systems.

 

Project Title:

Finding motifs for sequences with weak binding sites

Investigator(s):

Chin FYL

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

01/2005

 

Abstract:

N/A

 

Project Title:

Computationally Haplotyping Pedigree Data

Investigator(s):

Chin FYL

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

01/2006

 

Abstract:

N/A

 

Project Title:

Computationally Haplotyping Pedigree Data

Investigator(s):

Chin FYL, Smith DK, Song Y

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

01/2006

 

Abstract:

Minimum Recombination Haplotyping Problem (MRHP): finding a haplotype solution for a given pedigree that is consistent with given genotype data and derived from fewest recombinations (minimizing SUM). (1) The k-MRHP is an MRHP with the additional constraint that the number of recombinations on each haplotype is at most k where k = 0, 1, 2 (minimizing SUM with MAX=k) (2) An efficient algorithm for the k-MRHP when k=0 (3) Software implementation of the efficient algorithm

 

List of Research Outputs

 

Chan B.M.Y., Chen D.Z., Chin F.Y.L. and Wang C.A., Construction of the Nearest Neighbor Embracing Graph of a Point Set, Journal of Combinatorial Optimization . Netherlands, Springer, 2006, 11(4): 435 - 443.

 

Chan W.T., Chin F.Y.L., Zhang Y., Zhu H., Shen H. and Wong P.W.H., A Dynamic Programming Approach Of Finding An Optimal Broadcast Schedule In Minimizing Total Flow Time, Journal of Combinatorial Optimization. Netherlands, Springer Netherlands, 2006, 11(2): 177-187.

 

Chan W.T., Chin F.Y.L., Zhang Y., Zhu H., Shen H. and Wong P.W.H., Off-Line Algorithms for Minimizing Total Flow Time in Broadcast Scheduling, Proceedings of the Eleventh Annual International Computing and Combinatorics Conference (COCOON 2005). Kunming, Yunnan, China, Springer-Verlag Berlin Heidelberg, 2005, LNCS 3595: 318-328.

 

Chan W.T., Chin F.Y.L., Ye D., Zhang G. and Zhang Y., Online Bin Packing of Fragile Objects with Application in Cellular Networks, In: Xiaotie Deng, Yinyu Ye, The 1st Workshop on Internet and Network Economics (WINE). Springer, 2005, LNCS 3828: 564-573.

 

Chin F.Y.L. and Leung C.M., An Efficient Algorithm for String Motif Discovery, The Fourth Asia-Pacific Bioinformatics Conference (APBC 2006). Taipei, Taiwan, 2006, 79-88.

 

Chin F.Y.L., Cooperative Determination on Cache Replacement Candidates for Transcoding Proxy Caching, The 3rd International Networking and Mobile Computing (ICCNMC 2005). 2005, LNCS 3619: 178-187.

 

Chin F.Y.L., Current Bioinformatics. 2006.

 

Chin F.Y.L., Ding Q.H. and Wang C.A., On Hamiltonian Tetrahedrlization of Convex Polyhedra, The 5th International Symposium on Operations Research and Its Applications (ISORA 2005). Tibet, China, 2005, 206-216.

 

Chin F.Y.L., Chrobak M., Fung P.Y., Jawor W., Sgall J. and Tichý T., Online Competitive Algorithms for Maximizing Weighted Throughput of Unit Jobs, Journal of Discrete Algorithms. Amsterdam, Netherlands, Elsevier B.V., 2006, 4(2): 255-276.

 

Fung P.Y., Chin F.Y.L. and Poon C.K., Approximating the minimum triangulation of convex 3-polytopes with bounded degrees, Computational Geometry: Theory and Applications. Elsevier B.V., 2005, 32(1): 1-12.

 

Fung P.Y., Chin F.Y.L. and Poon C.K., Laxity Helps in Broadcast Scheduling , The Ninth Italian Conference on Theoretical Computer Science (ICTCS 2005). Certosa di Pontignano (Siena), Italy, Springer Berlin / Heidelberg, 2005, 3701: 251-264.

 

Leung C.M. and Chin F.Y.L., Algorithms for Challenging Motif Problems, Journal of Bioinformatics and Computational Biology. Singapore, World Scientific Publishing Company, 2006, 4(1): 43-58.

 

Leung C.M. and Chin F.Y.L., An Efficient Algorithm for the Extended (l,d)-Motif Problem With Unknown Number of Binding Sites, The Fifth IEEE Symposium on Bioinformatics and Bioengineering (BIBE 05). Minneapolis, Minnesota, USA, IEEE Computer Society, 2005, 11-18.

 

Leung C.M. and Chin F.Y.L., Finding Exact Optimal Motif in Matrix Representation by Partitioning, Bioinformatics. Oxford University Press, 2005, 21(2): ii86-ii92.

 

Leung C.M., Chin F.Y.L., Yiu S.M., Rosenfeld R. and Tsang W.W., Finding Motifs with Insufficient Number of Strong Binding Sites, Journal of Computational Biology. Mary Ann Liebert, Inc, 2005, 12(6): 686-701.

 

Leung C.M. and Chin F.Y.L., Generalized Planted (l,d)-Motif Problem with Negative Set, The 5th Workshop on Algorithms in Bioinformatics (WABI 2005). Mallorca, Spain, Springer Berlin / Heidelberg, 2005, LNBI 3692: 264-275.

 

Li K.Q., Shen H. and Chin F.Y.L., Cooperative Determination on Cache Replacement Candidates for Transcoding Proxy Caching (Best Paper Award), The 3rd International Networking and Mobile Computing (ICCNMC 2005). Zhangjiajie, China, 2005, LNCS 3619: 178-187.

 

Li K.Q., Shen H., Chin F.Y.L. and Huang L.S., Multimedia Object Placement for Hybrid Transparent Data Replication, The IEEE Global Telecommunications Conference (GLOBECOM 2005) - Symposium on Wireless Communications. St. Louis, Missouri, USA, IEEE, 2005, 2: 631–635.

 

Li K.Q., Shen H., Chin F.Y.L. and Zheng S.Q., Optimal Methods for Coordinated Enroute Web Caching for Tree Networks, In: Won Kim, ACM Transactions on Internet Technology. Association for Computing Machinery, 2005, 5(3): 480-507.

 

So W.K., Wong K.K.Y., Chung H.Y. and Chin F.Y.L., Shadow Detection for Vehicles by Locating the Object-Shadow Boundary, 7th IASTED International Conference on Signal and Image Processing. Honolulu, Hawaii, USA, 2005, 315-319.

 

Ye D., Chan W.T., Chin F.Y.L., Zhang G. and Zhang Y., On-line Scheduling of Parallel Jobs on Two Machines, In: Joe Ryan, Prabhu Manyem, Kiki Sugeng, Mirka Miller, Proceedings of the 16th Australasian Workshop on Combinatorial Algorithms (AWOCA 2005). Australia, 2005, 369-380.

 

Yiu W.S., Wong K.K.Y., Chin F.Y.L. and Chung H.Y., Explicit Contour Model for Vehicle Tracking with Automatic Hypothesis Validation, International Conference on Image Processing. Genova, 2005, II: 582-585.

 

Zhang Q.F., Chin F.Y.L. and Shen H., Minimum Parent-Offspring Recombination Haplotype Inference in Pedigrees, In: Corrado Priami, Alexander Zelikovsky, Transactions on Computational Systems Biology II. Germany, Springer-Verlag Berlin Heidelberg, 2005, 3680: 100-112.

 

Zheng F.F., Chin F.Y.L., Fung P.Y., Poon C.K. and Xu Y.F., A Tight Lower Bound for Job Scheduling with Cancellation, Information Processing Letters. The Netherlands, Elsevier, 2006, 97(1): 1-3.

 

Researcher : Choi YK



List of Research Outputs

 

Albocher D., Sarel U., Choi Y.K., Elber G. and Wang W.P., Continuous collision detection for elliptic disks, IEEE Transactions on Robotics. Robotics and Automation Society, 2006, 22: 213-224.

 

Albocher D., Sarel U., Choi Y.K., Elber G. and Wang W.P., Efficient Continuous Collision Detection for Bounding Boxes under Rational Motion, The Proceedings of the 2006 IEEE International Conference on Robotics and Automation. IEEE, 2006, 3017-3022.

 

Wang X.T., Choi Y.K., Lu W.W. and Wang W.P., Rod-like trabeculae extraction from cancellous bone microstructure using topological analysis, Ninth International Conference on Computer Aided Design and Computer Graphics (CADCG 2005). IEEE Computer Society, 2005, 173-180.

 

Researcher : Chong CF



List of Research Outputs

 

Chow K.P., Chong C.F., Lai K.Y., Hui C.K., Pun K.H., Tsang W.W. and Chan H.W., Digital Evidence Search Kit, Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005). Los Alamitos, California, IEEE Computer Society Press, 2005, 187-194.

 

Lai K.Y., Yiu S.M., Chow K.P., Chong C.F. and Hui C.K., An Efficient Bloom Filter Based Solution for Multiparty Private Matching, SAM’06 The 2006 International Conference on Security & Management. Las Vegas, USA, CSREA Press 2006, 2006, 7pp.

 

Sui A., Chow S.M., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chong C.F., Pun K.H. and Chan H.W., Separable and Anonymous Identity-Based Key Issuing, Proceedings of the 11th International Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) . United States of America, IEEE Computer Society Conference Publishing Services, 2005, 2: 275-279.

 

Researcher : Chow KP



Project Title:

ID-Based Signcryption Schemes: Two Open Problems

Investigator(s):

Chow KP

Department:

Computer Science

Source(s) of Funding:

Incentive Award for RGC CERG Fundable But Not Funded Projects

Start Date:

07/2005

Completion Date:

06/2006

 

Abstract:

N/A

 

List of Research Outputs

 

Chow K.P., Chong C.F., Lai K.Y., Hui C.K., Pun K.H., Tsang W.W. and Chan H.W., Digital Evidence Search Kit, Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005). Los Alamitos, California, IEEE Computer Society Press, 2005, 187-194.

 

Chow S.M., Hui C.K., Yiu S.M. and Chow K.P., Forward-Secure Multisignature and Blind Signature Schemes, Applied Mathematics and Computation. Elsevier , 2005, 168/2: 895-908.

 

Chow S.M., Hui C.K., Yiu S.M. and Chow K.P., Two Improved Partially Blind Signature Schemes from Bilinear Pairings, Information Security and Privacy: 10th Australasian Conference (ACISP 2005). Springer, 2005, 3574 of Lecture Notes in Computer Science: 316-328.

 

Lai K.Y., Yiu S.M., Chow K.P., Chong C.F. and Hui C.K., An Efficient Bloom Filter Based Solution for Multiparty Private Matching, SAM’06 The 2006 International Conference on Security & Management. Las Vegas, USA, CSREA Press 2006, 2006, 7pp.

 

Sui A., Chow S.M., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chong C.F., Pun K.H. and Chan H.W., Separable and Anonymous Identity-Based Key Issuing, Proceedings of the 11th International Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) . United States of America, IEEE Computer Society Conference Publishing Services, 2005, 2: 275-279.

 

Researcher : Chow SM



List of Research Outputs

 

Chow S.M., Hui C.K., Yiu S.M. and Chow K.P., Forward-Secure Multisignature and Blind Signature Schemes, Applied Mathematics and Computation. Elsevier , 2005, 168/2: 895-908.

 

Chow S.M., Lui R.W.C., Hui C.K. and Yiu S.M., Identity Based Delegation Network, 1st International Conference on Cryptology in Malaysia (Mycrypt 2005). Springer, 2005, 3715 of Lecture Notes in Computer Science: 99-115.

 

Chow S.M., Hui C.K., Yiu S.M. and Chow K.P., Two Improved Partially Blind Signature Schemes from Bilinear Pairings, Information Security and Privacy: 10th Australasian Conference (ACISP 2005). Springer, 2005, 3574 of Lecture Notes in Computer Science: 316-328.

 

Lui R.W.C., Chow S.M., Hui C.K. and Yiu S.M., Role Activation Management in Role Based Access Control, Information Security and Privacy: 10th Australasian Conference (ACISP 2005). Springer, 2005, 3574 of Lecture Notes in Computer Science: 358-369.

 

Lui R.W.C., Chow S.M., Hui C.K. and Yiu S.M., Supporting Efficient Authorization in Delegation with Supervision , Proceedings of the 11th International Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) . United States of America, IEEE Computer Society Conference Publishing Services, 2005, 2: 240-244.

 

Sui A., Chow S.M., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chong C.F., Pun K.H. and Chan H.W., Separable and Anonymous Identity-Based Key Issuing, Proceedings of the 11th International Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) . United States of America, IEEE Computer Society Conference Publishing Services, 2005, 2: 275-279.

 

Researcher : Chow Y



List of Research Outputs

 

Wang C.L., Zhang X., Belaramani N., Siu P.L.P., Chow Y. and Lau F.C.M., Software Infrastructure for Context-aware Mobile Computing, In: Weidong Kou and Yelena Yesha, Enabling Technologies for Wireless E-Business. Springer, 2006.

 

Researcher : Chung HY



List of Research Outputs

 

Chung H.Y., Yung N.H.C. and Cheung P.Y.S., An Efficient Parameter-less Quadrilateral-Based Image Segmentation Method, IEEE Transactions on Pattern Analysis and Machine Intelligence. Piscataway, USA, IEEE, 2005, 27: 1446-1458.

 

So W.K., Wong K.K.Y., Chung H.Y. and Chin F.Y.L., Shadow Detection for Vehicles by Locating the Object-Shadow Boundary, 7th IASTED International Conference on Signal and Image Processing. Honolulu, Hawaii, USA, 2005, 315-319.

 

Yiu W.S., Wong K.K.Y., Chin F.Y.L. and Chung H.Y., Explicit Contour Model for Vehicle Tracking with Automatic Hypothesis Validation, International Conference on Image Processing. Genova, 2005, II: 582-585.

 

Researcher : Dai X



List of Research Outputs

 

Dai X., Yiu M.L., Mamoulis N., Tao Y. and Vaitis M., Probabilistic Spatial Queries on Existentially Uncertain Data, Proceedings of the 9th International Symposium on Spatial and Temporal Databases (SSTD). Angra dos Reis, Brazil, 2005, 400-417.

 

Researcher : Deng H



List of Research Outputs

 

Deng H. and Huo Q., Minutiae Matching Based Fingerprint Verification Using Delaunay Triangulation And Aligned-edge-guided Triangle Matching, In: T. Kanade, A. Jain, and N. K. Ratha , AVBPA 2005 (Audio- and Video-based Biometric Person Authentication 2005), LNCS 3546. Springer-Verlag, 2005, 270-278.

 

Researcher : Fang W



List of Research Outputs

 

Zhu W., Fang W., Wang C.L. and Lau F.C.M., High Performance Computing on Clusters: The Distributed JVM Approach, High Performance Computing: Paradigm and Infrastructure,. John Wiley and Sons, 2005.

 

Researcher : Fung PY



List of Research Outputs

 

Chan W.T., Zhang Y., Fung P.Y., Ye D. and Zhu H., Efficient Algorithms for Finding a Longest Common Increasing Subsequence, In: Xiaotie Deng, Dingzhu Du, The 16th Annual International Symposium on Algorithms and Computation (ISAAC). Springer, 2005, LNCS 3827: 665-674.

 

Chin F.Y.L., Chrobak M., Fung P.Y., Jawor W., Sgall J. and Tichý T., Online Competitive Algorithms for Maximizing Weighted Throughput of Unit Jobs, Journal of Discrete Algorithms. Amsterdam, Netherlands, Elsevier B.V., 2006, 4(2): 255-276.

 

Fung P.Y., Chin F.Y.L. and Poon C.K., Approximating the minimum triangulation of convex 3-polytopes with bounded degrees, Computational Geometry: Theory and Applications. Elsevier B.V., 2005, 32(1): 1-12.

 

Fung P.Y., Chin F.Y.L. and Poon C.K., Laxity Helps in Broadcast Scheduling , The Ninth Italian Conference on Theoretical Computer Science (ICTCS 2005). Certosa di Pontignano (Siena), Italy, Springer Berlin / Heidelberg, 2005, 3701: 251-264.

 

Zheng F.F., Chin F.Y.L., Fung P.Y., Poon C.K. and Xu Y.F., A Tight Lower Bound for Job Scheduling with Cancellation, Information Processing Letters. The Netherlands, Elsevier, 2006, 97(1): 1-3.

 

Researcher : Fung PY



List of Research Outputs

 

Chan W.T., Zhang Y., Fung P.Y., Ye D. and Zhu H., Efficient Algorithms for Finding a Longest Common Increasing Subsequence, In: Xiaotie Deng, Dingzhu Du, The 16th Annual International Symposium on Algorithms and Computation (ISAAC). Springer, 2005, LNCS 3827: 665-674.

 

Chin F.Y.L., Chrobak M., Fung P.Y., Jawor W., Sgall J. and Tichý T., Online Competitive Algorithms for Maximizing Weighted Throughput of Unit Jobs, Journal of Discrete Algorithms. Amsterdam, Netherlands, Elsevier B.V., 2006, 4(2): 255-276.

 

Fung P.Y., Chin F.Y.L. and Poon C.K., Approximating the minimum triangulation of convex 3-polytopes with bounded degrees, Computational Geometry: Theory and Applications. Elsevier B.V., 2005, 32(1): 1-12.

 

Fung P.Y., Chin F.Y.L. and Poon C.K., Laxity Helps in Broadcast Scheduling , The Ninth Italian Conference on Theoretical Computer Science (ICTCS 2005). Certosa di Pontignano (Siena), Italy, Springer Berlin / Heidelberg, 2005, 3701: 251-264.

 

Zheng F.F., Chin F.Y.L., Fung P.Y., Poon C.K. and Xu Y.F., A Tight Lower Bound for Job Scheduling with Cancellation, Information Processing Letters. The Netherlands, Elsevier, 2006, 97(1): 1-3.

 

Researcher : Ho SC



List of Research Outputs

 

Tsang K.C.K., Ho S.C., Tsang M.C.M., Wang C.L. and Lau F.C.M., An Adaptive Multipath Protocol for Efficient IP Handoff in Mobile Wireless Networks, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06). Vienna, Austria, IEEE Computer Society, 2006, 1: 503-510.

 

Researcher : Hon WK



List of Research Outputs

 

Huynh T.N.D., Hon W.K., Lam T.W. and Sung W.K., Approximate string matching using compressed suffix arrays, In: G. Ausiello, D. Sannella, Theoretical Computer Science. Elsevier, 2006, 352 (1-3): 240-249.

 

Researcher : Hui CK



Project Title:

Development of Digital Evidence Search Kit

Investigator(s):

Hui CK

Department:

Computer Science

Source(s) of Funding:

Technology Transfer Seed Fund of Versitech Ltd. - General Award

Start Date:

09/2003

Completion Date:

08/2005

 

Abstract:

To develop digital evidence search kit.

 

Project Title:

Study of multi-signer signature scheme and identity authentication

Investigator(s):

Hui CK, Chow KP, Tsang WW, Li Z.C.

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

12/2003

 

Abstract:

to investigate the security of multi-signer signature schemes, and to design some new schemes with secure and high efficient features.

 

Project Title:

Study of multi-signer signature scheme and identity authentication

Investigator(s):

Hui CK, Chow KP, Tsang WW, Li Z.C.

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

12/2003

 

Abstract:

N/A

 

Project Title:

Authentication for Surveillance System (ATS)

Investigator(s):

Hui CK, Tsang WW, Chin FYL, Lau FCM, Mak LFS, Chow KP, Chung RHY

Department:

Computer Science

Source(s) of Funding:

Matching Grant for Joint Research

Start Date:

12/2004

Completion Date:

02/2006

 

Abstract:

To provide strong evidence for the source of digital video data, includes the proof to the creation equipment and the proof about the creation time of the digital video data. To produce digital signature and place the digital signature into the video data using watermarking techniques. The existence technology of such by the PKI may not be efficient enough. So the implementation work will involve experiementation and tuning of the schemes.

 

Project Title:

Forward secure crytographic schemes for Ad Hoc Network

Investigator(s):

Hui CK

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

01/2005

 

Abstract:

N/A

 

Project Title:

Forward secure crytographic schemes for Ad Hoc Network

Investigator(s):

Hui CK, Chow KP, Yiu SM, Li VOK

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

01/2005

 

Abstract:

To carry out: (1) a forward secure signature scheme to be used in the clients of an ad hoc network. (2) a forward secure threshold signature scheme to be used in the CAs of an ad hoc network.

 

List of Research Outputs

 

Chow K.P., Chong C.F., Lai K.Y., Hui C.K., Pun K.H., Tsang W.W. and Chan H.W., Digital Evidence Search Kit, Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005). Los Alamitos, California, IEEE Computer Society Press, 2005, 187-194.

 

Chow S.M., Hui C.K., Yiu S.M. and Chow K.P., Forward-Secure Multisignature and Blind Signature Schemes, Applied Mathematics and Computation. Elsevier , 2005, 168/2: 895-908.

 

Chow S.M., Lui R.W.C., Hui C.K. and Yiu S.M., Identity Based Delegation Network, 1st International Conference on Cryptology in Malaysia (Mycrypt 2005). Springer, 2005, 3715 of Lecture Notes in Computer Science: 99-115.

 

Chow S.M., Hui C.K., Yiu S.M. and Chow K.P., Two Improved Partially Blind Signature Schemes from Bilinear Pairings, Information Security and Privacy: 10th Australasian Conference (ACISP 2005). Springer, 2005, 3574 of Lecture Notes in Computer Science: 316-328.

 

Lai K.Y., Yiu S.M., Chow K.P., Chong C.F. and Hui C.K., An Efficient Bloom Filter Based Solution for Multiparty Private Matching, SAM’06 The 2006 International Conference on Security & Management. Las Vegas, USA, CSREA Press 2006, 2006, 7pp.

 

Lui R.W.C., Chow S.M., Hui C.K. and Yiu S.M., Role Activation Management in Role Based Access Control, Information Security and Privacy: 10th Australasian Conference (ACISP 2005). Springer, 2005, 3574 of Lecture Notes in Computer Science: 358-369.

 

Lui R.W.C., Chow S.M., Hui C.K. and Yiu S.M., Supporting Efficient Authorization in Delegation with Supervision , Proceedings of the 11th International Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) . United States of America, IEEE Computer Society Conference Publishing Services, 2005, 2: 240-244.

 

Sui A., Chow S.M., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chong C.F., Pun K.H. and Chan H.W., Separable and Anonymous Identity-Based Key Issuing, Proceedings of the 11th International Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) . United States of America, IEEE Computer Society Conference Publishing Services, 2005, 2: 275-279.

 

Researcher : Hung RYS



List of Research Outputs

 

Hung R.Y.S. and Ting H.F., Design and Analysis of Online Batching Systems, In: M. Kiwi, Proceedings of the Seventh Latin American Theoretical Informatics Symposium. Valdvin, Chile, Springer, 2006, 605-616.

 

Researcher : Huo Q



Project Title:

Improving robust speech recognition techniques for talking to handheld devices

Investigator(s):

Huo Q

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2002

Completion Date:

08/2005

 

Abstract:

The project will first construct three speech corpora recorded by a handheld device, namely iPAQ pocket PC. New feature and model compensation technique will then be developed to cope with the robust automatic speech recognition (ASR) problem for talking to a handheld device.

 

Project Title:

Towards on-line recognition of continuous Chinese handwriting text on tablet PCs

Investigator(s):

Huo Q

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2003

 

Abstract:

To construct a large scale corpus of Chinese handwriting samples naturally written on Tablet PCs; to investigate new techniques for feature extraction, character modeling, contextual processing and integrated search to cope with the on-line recognition problem of continuously handwritten Chinese sentences; to implement a prototype system on the Tablet PC using the most promising solution identified by investigating the effectiveness of integrating the available techniques in different ways.

 

Project Title:

Towards on-line recognition of continuous Chinese handwriting text on tablet PCs

Investigator(s):

Huo Q

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

09/2003

 

Abstract:

N/A

 

Project Title:

Chinese spoken language processing

Investigator(s):

Huo Q

Department:

Computer Science

Source(s) of Funding:

Anhui USTC iFLYTEK Co. Ltd. - General Award

Start Date:

09/2005

 

Abstract:

To research and develop the state-of-the-art Chinese spoken language processing technology.

 

Project Title:

A Detection and Verification Based Approach for On-line Recognition of Handwritten Chinese Words

Investigator(s):

Huo Q

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

09/2005

 

Abstract:

N/A

 

Project Title:

A Detection and Verification Based Approach for On-line Recognition of Handwritten Chinese Words

Investigator(s):

Huo Q

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2005

 

Abstract:

The objectives of this project are: (1) to investigate a new "detection and verification based approach" for on-line recognition of handwritten Chinese words; (2) to investigate new techniques for feature extraction and character modeling to improve the character classification accuracy as well as the reliability of character verification; (3) to develop a prototype system on Tablet PC, as a test-bed of new ideas, by using the most promising solution identified through the study in this project. The character vocabulary of our recognizer will include 6763 simplified Chinese characters in GB2312-80 standard, 12 frequently used GBK Chinese characters, 62 alphanumeric characters, 140 punctuation marks and symbols. We are aiming at a writer-independent character recognition accuracy of above 90% for naturally written Chinese words derived from our handwriting corpus.

 

Project Title:

A Study of Similarity Measures For Hidden Markov Models and Their Applications in Speech Recognition

Investigator(s):

Huo Q

Department:

Computer Science

Source(s) of Funding:

Seed Funding Programme for Basic Research

Start Date:

03/2006

 

Abstract:

After many years research, Gaussian mixture continuous density hidden Markov model (CDHMM) remains predominant as a speech modeling technique in automatic speech recognition (ASR) area. How to measure the similarity of two given CDHMMs has been an important research topic for several decades. In a pioneering work, Juang and Rabiner proposed to use Kullback-Leibler (KL) divergence as a similarity measure of two HMMs with discrete observation distributions. In order to calculate the KL divergence, a Monte Carlo simulation procedure has to be used. It is not practical to use such a procedure in ASR applications that require a quick response. So, the main objectives of this project are as follows: - To develop efficient approximation methods for calculating the KL divergence of two given CDHMMs; - To study the possibility of using approximate KL divergence for the prediction of word confusabilities in a given vocabulary of an ASR system; - To develop effective and intelligent speaker adaptation strategies guided by an automatic analysis of vocabulary word confusability.

 

List of Research Outputs

 

Bai Z. and Huo Q., A Study On the Use of 8-Directional Features For Online Handwritten Chinese Character Recognition, 8th International Conference on Document Analysis and Recognition (ICDAR-2005). Seoul, Korea, IEEE Computer Society, 2005, 1: 262-266.

 

Deng H. and Huo Q., Minutiae Matching Based Fingerprint Verification Using Delaunay Triangulation And Aligned-edge-guided Triangle Matching, In: T. Kanade, A. Jain, and N. K. Ratha , AVBPA 2005 (Audio- and Video-based Biometric Person Authentication 2005), LNCS 3546. Springer-Verlag, 2005, 270-278.

 

Huo Q., Member, International Editorial Board, Journal of Chinese Language and Computing. 2005.

 

Huo Q., Member, International Editorial Board, Journal of Chinese Language and Computing. 2006.

 

Huo Q., Towards Intelligent Multi-Modal Human-Machine Communication on Handheld Devices, Motorola China Research Center (MCRC), Shanghai, China. 2005.

 

Huo Q., Zhu D. and Wu J., Unsupervised Online Adaptation of Segmental Switching Linear Gaussian Hidden Markov Models for Robust Speech Recognition, 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing. Toulouse, France, IEEE Signal Processing Society, 2006, 1: 1125-1128.

 

Lam Y.K. and Huo Q., A Data Structure Using Hashing and Tries For Efficient Chinese Lexical Access, 8th International Conference on Document Analysis and Recognition (ICDAR-2005). Seoul, Korea, IEEE Computer Society, 2005, 1: 506-510.

 

Researcher : Kao CM



Project Title:

Association rule mining on continuous stream data

Investigator(s):

Kao CM, Cheung DWL

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2004

 

Abstract:

To derive efficient online time-based sampling algorithms; to derive efficient approximation algorithms for mining association rules from a single data stream; to derive efficiency algorithms for mining inter-stream associations; to perform time-delayed association analysis.

 

Project Title:

Association rule mining on continuous stream data

Investigator(s):

Kao CM

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

01/2005

 

Abstract:

N/A

 

List of Research Outputs

 

Chau M.C.L., Cheng R. and Kao C.M., "Uncertain Data Mining: A New Research Direction", Workshop on the Sciences of the Artificial (WSA 2005). Hualien, Taiwan, 2005.

 

Chau M.C.L., Cheng R., Kao C.M. and Ng J.Y.L., "Uncertain Data Mining: An Example in Clustering Location Data", Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006). Singapore, 2006.

 

Cheng R., Kao C.M., Prabhakar S., Kwan K.L. and Tu Y., Adaptive Stream Filters for Entity-based Queries with Non-value Tolerance, The 31st International Conference on Very Large Data Bases . 2005.

 

Tao Y., Cheng R., Xiao X., Ngai W.K., Kao C.M. and Prabhakar S., Indexing Multi-Dimensional Uncertain Data with Arbitrary Probability Density Functions, The 31st International Conference on Very Large Data Bases . 2005.

 

Researcher : Karras P



List of Research Outputs

 

Karras P. and Mamoulis N., Detecting the Direction of Motion in a Binary Sensor Network, Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), Taichung, Taiwan, June 2006. 2006.

 

Karras P. and Mamoulis N., One-Pass Wavelet Synopses for Maximum-Error Metrics, Proceedings of the 31st Very Large Data Bases Conference (VLDB). Trondheim, Norway, 2005.

 

Researcher : Karras P



List of Research Outputs

 

Karras P. and Mamoulis N., Detecting the Direction of Motion in a Binary Sensor Network, Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), Taichung, Taiwan, June 2006.. 2006.

 

Karras P. and Mamoulis N., One-Pass Wavelet Synopses for Maximum-Error Metrics, Proceedings of the 31st Very Large Data Bases Conference (VLDB). Trondheim, Norway, 2005.

 

Researcher : Kwan KL



List of Research Outputs

 

Cheng R., Kao C.M., Prabhakar S., Kwan K.L. and Tu Y., Adaptive Stream Filters for Entity-based Queries with Non-value Tolerance, The 31st International Conference on Very Large Data Bases . 2005.

 

Researcher : Kwok WCH



List of Research Outputs

 

Cheung D.W.L., Kwok W.C.H. and Yee K.C., Consultancy, Architectural Design for MTR Maintenance Management Information System, MTR Corporation Limited. 2005.

 

Cheung D.W.L., Lee T.Y.T., Kwok W.C.H., Yee K.C. and Wong D.C.K., Grand Award, Linux Business Award, Hong Kong Linux Business Award Organization Committee. 2005.

 

Researcher : Lai KY



List of Research Outputs

 

Chow K.P., Chong C.F., Lai K.Y., Hui C.K., Pun K.H., Tsang W.W. and Chan H.W., Digital Evidence Search Kit, Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005). Los Alamitos, California, IEEE Computer Society Press, 2005, 187-194.

 

Lai K.Y., Yiu S.M., Chow K.P., Chong C.F. and Hui C.K., An Efficient Bloom Filter Based Solution for Multiparty Private Matching, SAM’06 The 2006 International Conference on Security & Management. Las Vegas, USA, CSREA Press 2006, 2006, 7pp.

 

Researcher : Lai KY



List of Research Outputs

 

Chow K.P., Chong C.F., Lai K.Y., Hui C.K., Pun K.H., Tsang W.W. and Chan H.W., Digital Evidence Search Kit, Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005). Los Alamitos, California, IEEE Computer Society Press, 2005, 187-194.

 

Lai K.Y., Yiu S.M., Chow K.P., Chong C.F. and Hui C.K., An Efficient Bloom Filter Based Solution for Multiparty Private Matching, SAM’06 The 2006 International Conference on Security & Management. Las Vegas, USA, CSREA Press 2006, 2006, 7pp.

 

Researcher : Lam TW



Project Title:

Algorithms for uncovering conserved genes on whole genomes

Investigator(s):

Lam TW, Sung W.K.

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2004

 

Abstract:

To investigate the complexity of a maximum common subsequence problem that models mutations between genomes; to design and implement better algorithms and software for uncovering conserved genes.

 

Project Title:

Algorithms for uncovering conserved genes on whole genomes

Investigator(s):

Lam TW

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

01/2005

 

Abstract:

N/A

 

List of Research Outputs

 

Chan H.L., Lam T.W. and Liu K.S., Extra unit-speed machines are almost as powerful as speedy machines for competitive flow time scheduling, The Sixteen Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). New York & Philadelphia, ACM and SIAM, 2006, 334-343.

 

Chan P.Y., Lam T.W. and Yiu S.M., A More Accurate and Efficient Whole Genome Phylogeny, The 4th Asia-Pacific Bioinformatics Conference (APBC). London, Imperial College Press, 2006, 337-352.

 

Chan W.T., Lam T.W., Liu K.S. and Wong P., New Resource Augmentation Analysis of the Total Stretch of SRPT and SJF in Multiprocessor Scheduling, The 30th International Symposium on Mathematical Foundations of Computer Science (MFCS). Springer, 2005, 3618 (LNCS): 236-247.

 

Chan W.T., Lam T.W., Ting H.F. and Wong W.H., On-line Stream Merging with Max Span and Min Coverage, Theory of Computing Systems . USA, Springer-Verlag New York, LLC, 2005, 38: 461-479.

 

Huynh T.N.D., Hon W.K., Lam T.W. and Sung W.K., Approximate string matching using compressed suffix arrays, In: G. Ausiello, D. Sannella, Theoretical Computer Science. Elsevier, 2006, 352 (1-3): 240-249.

 

Lam T.W., Sung W.K. and Wong S.S., Improved Approximate String Matching Using Compressed Suffix Data Structures, The 16th Annual International Symposium on Algorithms and Computation. Germany, Springer, 2005, LNCS 3827: 339-348.

 

Researcher : Lam YK



List of Research Outputs

 

Lam Y.K. and Huo Q., A Data Structure Using Hashing and Tries For Efficient Chinese Lexical Access, 8th International Conference on Document Analysis and Recognition (ICDAR-2005). Seoul, Korea, IEEE Computer Society, 2005, 1: 506-510.

 

Researcher : Lau FCM



Project Title:

The Hong Kong University grid point

Investigator(s):

Lau FCM, Feng S.Z.

Department:

Computer Science

Source(s) of Funding:

Matching Fund for Hi-Tech Research and Development Program of China (863 Projects)

Start Date:

12/2002

 

Abstract:

To study grid point of The University of Hong Kong.

 

Project Title:

Content adaptation for mobile computing

Investigator(s):

Lau FCM

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2003

 

Abstract:

To design and implement a content adaptation system with context-awareness and which is sensitive to user's preferences; to design and implement an automatic content augmentation tool for content creation.

 

Project Title:

Content adaptation for mobile computing

Investigator(s):

Lau FCM

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

09/2003

 

Abstract:

N/A

 

Project Title:

A holistic approach to structured web document viewing in small devices

Investigator(s):

Lau FCM

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2004

 

Abstract:

To produce a system design covering the content creation, content adaptation, and content rendering aspects of Web content viewing on a mobile handheld device, whereby any viewing activity will be seen as complete, fast, and easy.

 

Project Title:

HP mobile technology for teaching initiative

Investigator(s):

Lau FCM

Department:

Computer Science

Source(s) of Funding:

Hewlett-Packard HK SAR Ltd.

Start Date:

10/2004

 

Abstract:

To develop HP mobile technology for teaching initiative.

 

Project Title:

A holistic approach to structured web document viewing in small devices

Investigator(s):

Lau FCM

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

01/2005

 

Abstract:

N/A

 

Project Title:

Intelligent Systems for Painting and Calligraphy

Investigator(s):

Lau FCM

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

09/2005

 

Abstract:

N/A

 

Project Title:

Intelligent Systems for Painting and Calligraphy

Investigator(s):

Lau FCM

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2005

 

Abstract:

The objectives of this proposed project are: (1)To apply point-based techniques to achieve fast rendering of the brush geometry, and to consider image-based rendering algorithms for high quality rendering of the animated brush. (2) To incorporate the smooth particles hydrodynamics method borrowed from astrophysics in the dynamics simulation of the brush. (3) To apply particle diffusion (from chemistry/physics) to simulate the complex pigment behavior. (4) To devise an intelligent system component for training the brush to adapt to “personal habitual bias” of the user. (5) To extend the present calligraphy generation system with a feedback reinforcement learning component to strengthen the constraint satisfaction process. (6) To explore possible new recognition algorithms for calligraphic writings of which the characters are severely distorted.

 

Project Title:

UGC-Matching Grant Scheme (2nd Phase)-Process Migration and Runtime Scheduling for Parallel Tasks in Computational Grids

Investigator(s):

Lau FCM

Department:

Computer Science

Source(s) of Funding:

Other Funding Scheme

Start Date:

05/2006

 

Abstract:

To study process migration and runtime scheduling for parallel tasks in computational grids.

 

List of Research Outputs

 

Chen L., Ma T.C., Wang C.L., Lau F.C.M. and Li S.P., G-JavaMPI: A Grid Middleware for Transparent MPI Task Migration, In: Beniamino Di Martino et al., Engineering the Grid: Status and Perspective. American Scientific Publishers, 2006.

 

Liu P., LI S., Lau F.C.M., Shi Y. and Huang F., RAID-M: a High Performance RAID Matrix Mass Storage, Science in China, Series F: Information Sciences. Springer, 2005, 48(4): 409-420.

 

Lum W.Y. and Lau F.C.M., Relationship-aware Content Adaptation of Structured Web Documents for Mobile Computing, 11th International Conference on Parallel and Distributed Systems (ICPADS 2005). Fukuoka, Japan, 2005.

 

Sit Y.F., Lau F.C.M. and Wang C.L., On The Cooperation of Web Clients and Proxy Caches, 11th International Conference on Parallel and Distributed Systems (ICPADS 2005). Fukuoka, Japan, 2005.

 

Tsang K.C.K., Ho S.C., Tsang M.C.M., Wang C.L. and Lau F.C.M., An Adaptive Multipath Protocol for Efficient IP Handoff in Mobile Wireless Networks, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06). Vienna, Austria, IEEE Computer Society, 2006, 1: 503-510.

 

Wang C.L., Zhang X., Belaramani N., Siu P.L.P., Chow Y. and Lau F.C.M., Software Infrastructure for Context-aware Mobile Computing, In: Weidong Kou and Yelena Yesha, Enabling Technologies for Wireless E-Business. Springer, 2006.

 

Xu S.H., Pan Y.H., Zhuang Y.T. and Lau F.C.M., Synthesis Reasoning and Its Application in Calligraphy Generation, Acta Automatica Sinica. 2005, 31(4): 495-509.

 

Zhu D., Lau F.C.M., Wang C.L., Lam W.K., He C., Wang X., Chen Y. and Li S., Design of an OGSA Based MetaService Architecture, The International Workshop on Grid and Cooperative Computing (GCC 2004). Wuhan, China, 2005.

 

Zhu W., Fang W., Wang C.L. and Lau F.C.M., High Performance Computing on Clusters: The Distributed JVM Approach, High Performance Computing: Paradigm and Infrastructure,. John Wiley and Sons, 2005.

 

Researcher : Lee LK



List of Research Outputs

 

Lee L.K. and Ting H.F., A Simpler and More Efficient Deterministic Scheme for Finding Frequent Items Over Sliding Windows, In: J. Van den Bussche, Proceedings of the Twenty-fifth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. Chicago, USA, Springer, 2006, 290-297.

 

Lee L.K. and Ting H.F., Proceedings of the 17th ACM-SIAM Symposium on Discrete Algorithms, Maintain significant statistics over sliding window. 2006.

 

Researcher : Lee TYT



List of Research Outputs

 

Cheung D.W.L., Lee T.Y.T., Kwok W.C.H., Yee K.C. and Wong D.C.K., Grand Award, Linux Business Award, Hong Kong Linux Business Award Organization Committee. 2005.

 

Researcher : Leung CM



List of Research Outputs

 

Chin F.Y.L. and Leung C.M., An Efficient Algorithm for String Motif Discovery, The Fourth Asia-Pacific Bioinformatics Conference (APBC 2006). Taipei, Taiwan, 2006, 79-88.

 

Leung C.M. and Chin F.Y.L., Algorithms for Challenging Motif Problems, Journal of Bioinformatics and Computational Biology. Singapore, World Scientific Publishing Company, 2006, 4(1): 43-58.

 

Leung C.M. and Chin F.Y.L., An Efficient Algorithm for the Extended (l,d)-Motif Problem With Unknown Number of Binding Sites, The Fifth IEEE Symposium on Bioinformatics and Bioengineering (BIBE 05). Minneapolis, Minnesota, USA, IEEE Computer Society, 2005, 11-18.

 

Leung C.M. and Chin F.Y.L., Finding Exact Optimal Motif in Matrix Representation by Partitioning, Bioinformatics. Oxford University Press, 2005, 21(2): ii86-ii92.

 

Leung C.M., Chin F.Y.L., Yiu S.M., Rosenfeld R. and Tsang W.W., Finding Motifs with Insufficient Number of Strong Binding Sites, Journal of Computational Biology. Mary Ann Liebert, Inc, 2005, 12(6): 686-701.

 

Leung C.M. and Chin F.Y.L., Generalized Planted (l,d)-Motif Problem with Negative Set, The 5th Workshop on Algorithms in Bioinformatics (WABI 2005). Mallorca, Spain, Springer Berlin / Heidelberg, 2005, LNBI 3692: 264-275.

 

Researcher : Leung CM



List of Research Outputs

 

Chin F.Y.L. and Leung C.M., An Efficient Algorithm for String Motif Discovery, The Fourth Asia-Pacific Bioinformatics Conference (APBC 2006). Taipei, Taiwan, 2006, 79-88.

 

Leung C.M. and Chin F.Y.L., Algorithms for Challenging Motif Problems, Journal of Bioinformatics and Computational Biology. Singapore, World Scientific Publishing Company, 2006, 4(1): 43-58.

 

Leung C.M. and Chin F.Y.L., An Efficient Algorithm for the Extended (l,d)-Motif Problem With Unknown Number of Binding Sites, The Fifth IEEE Symposium on Bioinformatics and Bioengineering (BIBE 05). Minneapolis, Minnesota, USA, IEEE Computer Society, 2005, 11-18.

 

Leung C.M. and Chin F.Y.L., Finding Exact Optimal Motif in Matrix Representation by Partitioning, Bioinformatics. Oxford University Press, 2005, 21(2): ii86-ii92.

 

Leung C.M., Chin F.Y.L., Yiu S.M., Rosenfeld R. and Tsang W.W., Finding Motifs with Insufficient Number of Strong Binding Sites, Journal of Computational Biology. Mary Ann Liebert, Inc, 2005, 12(6): 686-701.

 

Leung C.M. and Chin F.Y.L., Generalized Planted (l,d)-Motif Problem with Negative Set, The 5th Workshop on Algorithms in Bioinformatics (WABI 2005). Mallorca, Spain, Springer Berlin / Heidelberg, 2005, LNBI 3692: 264-275.

 

Researcher : Liang C



List of Research Outputs

 

Chen H., Wong K.K.Y., Liang C. and Chen Y., Extracting Surface Representations from Rim Curves, Asian Conference on Computer Vision . Hyderabad, India, 2006, II: 732-741.

 

Researcher : Liu KS



List of Research Outputs

 

Chan H.L., Lam T.W. and Liu K.S., Extra unit-speed machines are almost as powerful as speedy machines for competitive flow time scheduling, The Sixteen Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). New York & Philadelphia, ACM and SIAM, 2006, 334-343.

 

Chan W.T., Lam T.W., Liu K.S. and Wong P., New Resource Augmentation Analysis of the Total Stretch of SRPT and SJF in Multiprocessor Scheduling, The 30th International Symposium on Mathematical Foundations of Computer Science (MFCS). Springer, 2005, 3618 (LNCS): 236-247.

 

Researcher : Lu H



List of Research Outputs

 

Chan W.K., Chen T.Y., Lu H., Tse T.H. and Yau S.S., A metamorphic approach to integration testing of context-sensitive middleware-based applications, Proceedings of the 5th International Conference on Quality Software (QSIC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005, 241249.

 

Researcher : Lui RWC



List of Research Outputs

 

Chow S.M., Lui R.W.C., Hui C.K. and Yiu S.M., Identity Based Delegation Network, 1st International Conference on Cryptology in Malaysia (Mycrypt 2005). Springer, 2005, 3715 of Lecture Notes in Computer Science: 99-115.

 

Lui R.W.C., Chow S.M., Hui C.K. and Yiu S.M., Role Activation Management in Role Based Access Control, Information Security and Privacy: 10th Australasian Conference (ACISP 2005). Springer, 2005, 3574 of Lecture Notes in Computer Science: 358-369.

 

Lui R.W.C., Chow S.M., Hui C.K. and Yiu S.M., Supporting Efficient Authorization in Delegation with Supervision , Proceedings of the 11th International Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) . United States of America, IEEE Computer Society Conference Publishing Services, 2005, 2: 240-244.

 

Researcher : Lum WY



List of Research Outputs

 

Lum W.Y. and Lau F.C.M., Relationship-aware Content Adaptation of Structured Web Documents for Mobile Computing, 11th International Conference on Parallel and Distributed Systems (ICPADS 2005). Fukuoka, Japan, 2005.

 

Researcher : Mamoulis N



Project Title:

Storage schemes and search algorithms for high dimensional data

Investigator(s):

Mamoulis N

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2002

Completion Date:

02/2006

 

Abstract:

New applications, like muti-media/time-series databases, OLAP, and data mining, require efficient management of high dimensional data. The project will deal with the development of novel technquies of storing and searching high dimensional data. The research will focus on the decomposed storage model that fragments the data dimension-wise, as opposed to the conventional record-wise approach.

 

Project Title:

Evaluation of proximity queries over spatial road networks

Investigator(s):

Mamoulis N, Papadias D.

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2003

Completion Date:

02/2006

 

Abstract:

To device access methods for spatial road networks; to combine network indexes with spatial indexes in order to process fast spatial queries with network proximity components; to make these methods applicable for large problems; to provide solutions for dynamic-location data.

 

Project Title:

Evaluation of proximity queries over spatial road networks

Investigator(s):

Mamoulis N, Papadias D.

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

09/2003

 

Abstract:

N/A

 

Project Title:

Periodicity of movement in spatiotemporal databases

Investigator(s):

Mamoulis N

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

01/2005

 

Abstract:

N/A

 

Project Title:

Periodicity of movement in spatiotemporal databases

Investigator(s):

Mamoulis N

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

01/2005

Completion Date:

12/2006

 

Abstract:

To develop the effective data mining algorithms that can discover periodic object movement patterns; to develop the indexes that cluster object movements based on the discovered periodic patterns; to study the discovery of patterns which are weighted according to how recently their instances appear.

 

Project Title:

Continuous Constraint Query Evaluation for Spatio-temporal Data Sequences

Investigator(s):

Mamoulis N

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

09/2005

 

Abstract:

N/A

 

Project Title:

Continuous Constraint Query Evaluation for Spatio-temporal Data Sequences

Investigator(s):

Mamoulis N, Cheung DWL

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2005

 

Abstract:

The main objectives of this project are: (1) The development of effective techniques that manage and index incoming events in memory. These techniques will take adantage of the special nature of the queries to minimize the required memory. (2) The development of appropriate algorithms for evaluation of CCQ. The algorithms should consider the online, dynamic nature of the queries. Each time a new event arrives, we need to validate whether it forms a query result with past events. (3) The development of approximate management and query evaluation solutions for problem settings, when the required memory is smaller than the available. For such cases, we should consider data structures like spatiotemporal histograms, which could allow query evaluation with some uncertainty. (4) The integration of the developed system with a spatiotemporal pattern mining module that will automatically define the CCQs.

 

List of Research Outputs

 

Cao H.P., Mamoulis N. and Cheung D.W.L., Mining Frequent Spatio-temporal Sequential Patterns, Proceeding of the Fifth IEEE International Conference on Data Mining (ICDM 2005). New Orleans, Louisiana, 2005.

 

Cao H.P., Mamoulis N. and Cheung D.W.L., Mining Frequent Spatio-temporal Sequential Patterns, Proceedings of the 5th IEEE International Conference on Data Mining (ICDM). Houston, Texas, 2005.

 

Dai X., Yiu M.L., Mamoulis N., Tao Y. and Vaitis M., Probabilistic Spatial Queries on Existentially Uncertain Data, Proceedings of the 9th International Symposium on Spatial and Temporal Databases (SSTD). Angra dos Reis, Brazil, 2005, 400-417.

 

Kalnis P., Mamoulis N., Bakiras S. and Li X., Ad-hoc distributed spatial joins on mobile devices, Proceedings of the 20th IEEE International Parallel and Distributed Processing Symposium (IPDPS), Rhodes, Greece, April 2006.. 2006.

 

Kalnis P., Mamoulis N. and Bakiras S., On Discovering Moving Clusters in Spatio-temporal Data, Proceedings of the 9th International Symposium on Spatial and Temporal Databases (SSTD). Angra dos Reis, Brazil, 2005, 364-381.

 

Karras P. and Mamoulis N., Detecting the Direction of Motion in a Binary Sensor Network, Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), Taichung, Taiwan, June 2006.. 2006.

 

Karras P. and Mamoulis N., One-Pass Wavelet Synopses for Maximum-Error Metrics, Proceedings of the 31st Very Large Data Bases Conference (VLDB). Trondheim, Norway, 2005.

 

Mamoulis N., Cheng K.H., Yiu M.L. and Cheung D.W.L., Efficient Aggregation of Ranked Inputs, Proceedings of the 22nd International Conference on Data Engineering (ICDE), Altanta, GA, April 2006.. 2006.

 

Mamoulis N., Bakiras S. and Kalnis P., Evaluation of Top-k OLAP Queries Using Aggregate R--trees, Proceedings of the 9th International Symposium on Spatial and Temporal Databases (SSTD). Angra dos Reis, Brazil, 2005, 336-353.

 

Mamoulis N., Papadias D. and Theodoridis Y., Spatial Joins: Algorithms, Cost Models and Optimization Techniques, In: Manolopoulos, Papadopoulos, Vassilakopoulos, Spatial Databases: Technologies, Techniques and Trends. Hershey PA, USA, IDEA Group Publishing, 2005, 155-184.

 

Wang L., Mamoulis N., Cheung D.W.L. and Yiu S.M., Indexing Useful Structural Patterns for XML Query Processing, IEEE Transaction on Knowledge and Data Engineering. IEEE Computer Society, 2005, 17(7): 997-1009.

 

Wong K.K. and Mamoulis N., First Look at Average-Case Complexity for Planar Maximum-Likelihood Detection, Proceedings of the 5th IEEE International Conference on Information, Communications and Signal Processing (ICICS), Bangkok, Thailand, December 2005.. 2005.

 

Yiu M.L., Mamoulis N. and Tao Y., Efficient Quantile Retrieval on Multi-dimensional Data, Proceedings of the 10th International Conference on Extending Database Technology (EDBT), Munich, Germany, March 2006.. 2006.

 

Yiu M.L. and Mamoulis N., Reverse Nearest Neighbors Search in Ad-hoc Subspaces, Proceedings of the 22nd International Conference on Data Engineering (ICDE), Altanta, GA, April 2006.. 2006.

 

Yiu M.L., Papadias D., Mamoulis N. and Tao Y., Reverse Nearest Neighbors in Large Graphs, IEEE Transactions on Knowledge and Data Engineering (TKDE). IEEE, 2006, 18(4): 540-553.

 

Researcher : Mitcheson GR



List of Research Outputs

 

Researcher : Ng CK



List of Research Outputs

 

Ng C.K. and Chan H.W., Performance Modeling of Level Switching in Multitier Mobile Communication Systems, IEEE Transactions on Mobile Computing. IEEE, 2006, 5(4): 430-444.

 

Researcher : Ngai WK



List of Research Outputs

 

Tao Y., Cheng R., Xiao X., Ngai W.K., Kao C.M. and Prabhakar S., Indexing Multi-Dimensional Uncertain Data with Arbitrary Probability Density Functions, The 31st International Conference on Very Large Data Bases . 2005.

 

Researcher : Peng Z



List of Research Outputs

 

Peng Z. and Ting H.F., An efficient reduction from constrained to unconstrained agreement subtrees, In: Rita Casadio, Gene Myers, Proceeding of the 5th international workshop on algorithms in bioinformatics. New York, Springer-Verlag, 2005, 104--115.

 

Researcher : Pun KH



Project Title:

Community Legal Information Project

Investigator(s):

Pun KH

Department:

Computer Science

Source(s) of Funding:

Department of Justice, HKSAR Government - General Award

Start Date:

04/2004

 

Abstract:

To study community legal information.

 

List of Research Outputs

 

Chow K.P., Chong C.F., Lai K.Y., Hui C.K., Pun K.H., Tsang W.W. and Chan H.W., Digital Evidence Search Kit, Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005). Los Alamitos, California, IEEE Computer Society Press, 2005, 187-194.

 

Pun K.H., Scholarly book, The Annotated Ordinances of Hong Kong: Patents Ordinance (Cap 514). Hong Kong, Butterworths, 2005, 464pp.

 

Sui A., Chow S.M., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chong C.F., Pun K.H. and Chan H.W., Separable and Anonymous Identity-Based Key Issuing, Proceedings of the 11th International Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) . United States of America, IEEE Computer Society Conference Publishing Services, 2005, 2: 275-279.

 

Researcher : Shi Y



List of Research Outputs

 

Liu P., LI S., Lau F.C.M., Shi Y. and Huang F., RAID-M: a High Performance RAID Matrix Mass Storage, Science in China, Series F: Information Sciences. Springer, 2005, 48(4): 409-420.

 

Researcher : Sit YF



List of Research Outputs

 

Sit Y.F., Lau F.C.M. and Wang C.L., On The Cooperation of Web Clients and Proxy Caches, 11th International Conference on Parallel and Distributed Systems (ICPADS 2005). Fukuoka, Japan, 2005.

 

Researcher : Siu PLP



List of Research Outputs

 

Wang C.L., Zhang X., Belaramani N., Siu P.L.P., Chow Y. and Lau F.C.M., Software Infrastructure for Context-aware Mobile Computing, In: Weidong Kou and Yelena Yesha, Enabling Technologies for Wireless E-Business. Springer, 2006.

 

Researcher : So WK



List of Research Outputs

 

So W.K., Wong K.K.Y., Chung H.Y. and Chin F.Y.L., Shadow Detection for Vehicles by Locating the Object-Shadow Boundary, 7th IASTED International Conference on Signal and Image Processing. Honolulu, Hawaii, USA, 2005, 315-319.

 

Researcher : Sui A



List of Research Outputs

 

Sui A., Chow S.M., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chong C.F., Pun K.H. and Chan H.W., Separable and Anonymous Identity-Based Key Issuing, Proceedings of the 11th International Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) . United States of America, IEEE Computer Society Conference Publishing Services, 2005, 2: 275-279.

 

Researcher : Ting HF



Project Title:

Algorithmic issues on designing media-on-demand systems

Investigator(s):

Ting HF, Lam TW

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

08/2002

 

Abstract:

With the use of relative-competitive analysis for online systems, the project attempts to provide a theoretical foundation for comparing different media-on-demand (MOD) systems and thus helps to decide scientifically the right configurations. It is anticipated that results of the analysis can be used to design schedulers with performance guarantee and implement computational tools for building cost-effective MOD systems.

 

Project Title:

Design and analysis of online batching systems-- An algorithmic study on the virtues of paitence and sharing

Investigator(s):

Ting HF

Department:

Computer Science

Source(s) of Funding:

Incentive Award for RGC CERG Fundable But Not Funded Projects

Start Date:

07/2005

Completion Date:

06/2006

 

Abstract:

N/A

 

List of Research Outputs

 

Chan W.T., Lam T.W., Ting H.F. and Wong W.H., On-line Stream Merging with Max Span and Min Coverage, Theory of Computing Systems . USA, Springer-Verlag New York, LLC, 2005, 38: 461-479.

 

Hung R.Y.S. and Ting H.F., Design and Analysis of Online Batching Systems, In: M. Kiwi, Proceedings of the Seventh Latin American Theoretical Informatics Symposium. Valdvin, Chile, Springer, 2006, 605-616.

 

Lee L.K. and Ting H.F., A Simpler and More Efficient Deterministic Scheme for Finding Frequent Items Over Sliding Windows, In: J. Van den Bussche, Proceedings of the Twenty-fifth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. Chicago, USA, Springer, 2006, 290-297.

 

Lee L.K. and Ting H.F., Proceedings of the 17th ACM-SIAM Symposium on Discrete Algorithms, Maintain significant statistics over sliding window. 2006.

 

Peng Z. and Ting H.F., An efficient reduction from constrained to unconstrained agreement subtrees, In: Rita Casadio, Gene Myers, Proceeding of the 5th international workshop on algorithms in bioinformatics. New York, Springer-Verlag, 2005, 104--115.

 

Ting H.F., A Near Optimal Scheduler for Scheduling Data Broadcasts, In: M Calamoneri, Proceedings of the Sixth International Conference on Algorithms and Complexity. Rome, Italy, Springer, 2006, 163-174.

 

Researcher : Towey DP



List of Research Outputs

 

Chan K.P., Chen T.Y. and Towey D.P., Adaptive Random Testing with Filtering: An Overhead Reduction Technique, 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'05). Taiwan, 2005.

 

Chan K.P., Chen T.Y. and Towey D.P., Restricted Random Testing: Adaptive Random Testing by Exclusion, International Journal of Software Engineering and Knowledge Engineering. 2005, 16(4): 553-584.

 

Researcher : Towey DP



List of Research Outputs

 

Chan K.P., Chen T.Y. and Towey D.P., Adaptive Random Testing with Filtering: An Overhead Reduction Technique, 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'05). Taiwan, 2005.

 

Chan K.P., Chen T.Y. and Towey D.P., Restricted Random Testing: Adaptive Random Testing by Exclusion, International Journal of Software Engineering and Knowledge Engineering. 2005, 16(4): 553-584.

 

Researcher : Tsang KCK



List of Research Outputs

 

Tsang K.C.K., Ho S.C., Tsang M.C.M., Wang C.L. and Lau F.C.M., An Adaptive Multipath Protocol for Efficient IP Handoff in Mobile Wireless Networks, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06). Vienna, Austria, IEEE Computer Society, 2006, 1: 503-510.

 

Researcher : Tsang MCM



List of Research Outputs

 

Tsang K.C.K., Ho S.C., Tsang M.C.M., Wang C.L. and Lau F.C.M., An Adaptive Multipath Protocol for Efficient IP Handoff in Mobile Wireless Networks, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06). Vienna, Austria, IEEE Computer Society, 2006, 1: 503-510.

 

Researcher : Tsang WW



Project Title:

Tests for uniformity

Investigator(s):

Tsang WW

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

01/2005

 

Abstract:

N/A

 

Project Title:

Tests for uniformity

Investigator(s):

Tsang WW, Chow KP, Hui CK, Chan HW, Chong CF, Pun KH, Marsaglia G.

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

01/2005

 

Abstract:

To develop accurate and easy-to-compute C programs for the cumulative distribution functions of the KS statistic and the Anderson-Darling statistic; to conduct a fair and thorough comparison on the power of various tests for uniformity; to develop new tests for uniformity.

 

Project Title:

Evaluating the CDF of the Kolmogorov Statistic for unknown parameter case

Investigator(s):

Tsang WW, Chong CF

Department:

Computer Science

Source(s) of Funding:

Small Project Funding

Start Date:

09/2005

 

Abstract:

A goodness-of-fit test checks whether a set of samples follows a hypothetical distribution. The most common test for checking discrete samples is the chi-square test. The counterpart for real samples is the Kolmogorov-Smirnov (KS) test [3,5]. Consider an ordered set of samples, x1x2xn, and the hypothetical distribution, F(x), where all parameters of F(x) are known. The empirical distribution function (EDF) is defined as / | 0, x < x1, Fn(x) = < k/n , xk x < xk+1, k = 1,2,…,n-1, | 1, xn x. \The Kolmogorov statistic, Dn, measures the maximum absolute distance between F(x) and Fn(x). The test result is conventionally determined by looking up tables of the critical values of Dn obtained from simulation [6]. In 2003, we developed a program that evaluates the cumulative distribution function (CDF) of Dn with 13-digit accuracy for 2 n 16000 [4]. The test result can thus be determined from the CDF of Dn. However, the KS test is still not quit readily applicable because the parameters of F(x) are often unspecified in real world applications. For example, in the testing of exponentiality, usually we have no idea on the mean of the exponential distribution. Therefore, we need to first estimate the mean from the samples. Then we check whether the samples follow the exponential distribution of this mean. The Dn so computed is noticeably smaller than that of the case where the mean is known beforehand. Durbin is the first scholar who advocates the study of the difference between the two cases [1,2]. Stephens has worked out a couple approximation formulas for the CDFs of two unknown parameter cases [7]. However, these formulas deviate from the true values by as much as 2%. Such extent of errors is not cmmensurate with the modern computing capability. The objective of this project is to develop accurate computer programs that evaluate the CDFs of Dn for the tests of normality and exponentiality, the two most common goodness-of-fit tests in unknown parameter case.Reference[1] J. Durbin, Distribution theory for tests based on the sample distribution function, Regional Conference Series in Applied Mathematics (9), SIAM, Philadelphia, 1973.[2] J. Durbin, Kolmogorov-smirnov tests when parameters are estimated, with applications to tests of exponentiality and tests on spacings, Biometrika, 62(1): 5-22, 1975.[3] A. Kolmogorov, Sulla determinazione empirical ei una legge di distributione, Giornale Dell' Istituto Italiano Degli Attuari, 4:83-91, 1933.[4] G. Marsaglia, W. W. Tsang and J. Wang, Evaluating Kolmogorov's distribution, Journal of Statistical Software, 8(18): 1-4, 2003.[5] N. V. Smirnov, On the deviation of the empirical distribution function, Recreational Mathematics (Mat. Sbornik), 6:3-26, 1939.[6] M. A. Stephens, EDF statistics for goodness of fit and some comparisons, Journal of the American Statistical Association, 69 (347): 730-737, 1974.[7] M. A. Stephens, Asymptotic results for goodness-of-fit statistics with unknown parameters, Annuals of Statistics, 4:357-369, 1976.

 

List of Research Outputs

 

Chow K.P., Chong C.F., Lai K.Y., Hui C.K., Pun K.H., Tsang W.W. and Chan H.W., Digital Evidence Search Kit, Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005). Los Alamitos, California, IEEE Computer Society Press, 2005, 187-194.

 

Ding Q., Qian J., Tsang W.W. and Wang C., Randomly Generating Triangulations of a Simple Polygon, Lecture Notes in Computer Science (LNCS), Computing and Combinatorics, L. Wang (Ed.), Proceedings of the 11th Annual International Computing and Combinatorics Conference (COCOON). Kunming, China, Springer-Verlag, 2005, 3595: 471-480.

 

Ding Q., Qian J., Tsang W.W. and Wang C., Randomly Generating Triangulations of a Simple Polygon, Proceedings of the 11th Annual International Computing and Combinatorics Conference (COCOON). Kunming, China, 2005, 471-480.

 

Leung C.M., Chin F.Y.L., Yiu S.M., Rosenfeld R. and Tsang W.W., Finding Motifs with Insufficient Number of Strong Binding Sites, Journal of Computational Biology. Mary Ann Liebert, Inc, 2005, 12(6): 686-701.

 

Sui A., Chow S.M., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chong C.F., Pun K.H. and Chan H.W., Separable and Anonymous Identity-Based Key Issuing, Proceedings of the 11th International Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) . United States of America, IEEE Computer Society Conference Publishing Services, 2005, 2: 275-279.

 

Researcher : Tse TH



Project Title:

Towards an integrated method for program verification, testing and debugging

Investigator(s):

Tse TH, Chen T.Y.

Department:

Computer Science

Source(s) of Funding:

Incentive Award for RGC CERG Fundable But Not Funded Projects

Start Date:

07/2003

 

Abstract:

N/A

 

Project Title:

Towards an integrated method for program testing, proving debugging

Investigator(s):

Tse TH, Chen T.Y.

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2004

 

Abstract:

To provide an integrated method for testing, proving and debugging; to reduce the cost of software quality assurance by improving on individual techniques for testing, proving and debugging; to improve on the quality and relaibility of the software thus produced; to provide software engineers with effective testing, proving and debugging tools.

 

Project Title:

27th Annual international computer software and applications conference

Investigator(s):

Tse TH

Department:

Computer Science

Source(s) of Funding:

Croucher Foundation - Conference / Seminars

Start Date:

09/2004

 

Abstract:

27th Annual international computer software and applications conference

 

Project Title:

Towards an integrated method for program testing, proving and debugging

Investigator(s):

Tse TH

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

01/2005

 

Abstract:

N/A

 

Project Title:

TIRAMISU: testing conText-sensItive, concurRent And MIddleware-baSed Ubiquitous software

Investigator(s):

Tse TH

Department:

Computer Science

Source(s) of Funding:

Incentive Award for RGC CERG Fundable But Not Funded Projects

Start Date:

07/2005

Completion Date:

06/2006

 

Abstract:

N/A

 

Project Title:

TIRAMISU: testing conText-sensItive, concurRent And MIddleware-baSed Ubiquitous software

Investigator(s):

Tse TH, Chen T.Y.

Department:

Computer Science

Source(s) of Funding:

Seed Funding Programme for Basic Research

Start Date:

02/2006

 

Abstract:

Ubiquitous computing means computing anywhere and at any time. Context-sensitive ubiquitous software dynamically adapts its operations according to the changing environment. One of the strategic directions of Hong Kong is to become a world-class base for supply chain management. Ubiquitous middleware-based sensor network systems are envisaged to be an essential enabling technology. Nevertheless, many researchers have emphasized the difficulties in assuring the quality of such software, because context-sensitive applications operate in a highly volatile and unpredictable environment. We were the first research group to embark on their testing techniques. We propose a major project to comprehensively address both the integration and unit testing of these systems. Context detections and function activations are the duties of the middleware. In unit testing, test oracles may not be immediately available for a component under test. We propose the application of metamorphic testing to solve the problem, focusing on isotropic context properties. They can reveal failures not identifiable by conventional testing methods. In integration testing, we propose a model in Communicating Sequential Processes to generate test cases that conform to the components in a ubiquitous environment. We make use of a notion of anti-extension, which can help to alleviate the state-explosion problem in test case generation. This project has important theoretical and practical implications. It will solve the major difficulties in testing complex context-sensitive middleware-based ubiquitous software. It will also illustrate the usefulness of formal approaches to software testing in practical situations.

 

List of Research Outputs

 

Chan F.T., Tse T.H., Tang W.H. and Chen T.Y., Software testing education and training in Hong Kong, International Workshop on Education and Training for Quality Software Engineering, Proceedings of the 5th International Conference on Quality Software (QSIC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005, 313316.

 

Chan W.K., Chen T.Y., Lu H., Tse T.H. and Yau S.S., A metamorphic approach to integration testing of context-sensitive middleware-based applications, Proceedings of the 5th International Conference on Quality Software (QSIC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005, 241249.

 

Chan W.K., Cheng M.Y., Cheung S.C. and Tse T.H., Automatic goal-oriented classification of failure behaviors for testing XML-based multimedia software applications: an experimental case study, Journal of Systems and Software. Amsterdam, Elsevier, 2006, 79 (5): 602612.

 

Chan W.K., Cheung S.C. and Tse T.H., Fault-based testing of database application programs with conceptual data model, Proceedings of the 5th International Conference on Quality Software (QSIC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005, 187196.

 

Chen T.Y., Poon P.L., Tang S.F., Tse T.H. and Yu Y.T., Applying testing to requirements inspection for software quality assurance, In: Information Systems Control Journal, Information Systems Control Journal. Rolling Meadows, Illinois, Information Systems Audit and Control Association, 2006, 6: 5056.

 

Chen T.Y., Poon P.L., Tang S.F. and Tse T.H., Identification of categories and choices in activity diagrams, Proceedings of the 5th International Conference on Quality Software (QSIC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005, 5563.

 

Ehrich H.D., Schewe K.D. and Tse T.H., Editorial, Special Issue for the 4th International Conference on Quality Software, Journal of Systems and Software. Amsterdam, Elsevier, 2006, 79 (5): 575576.

 

Ehrich H.D., Schewe K.D. and Tse T.H., Guest Editor, Special Issue for the 4th International Conference on Quality Software, Journal of Systems and Software. Amsterdam, Elsevier, 2006, 79 (5): 575576.

 

Tse T.H., Chen T.Y. and Glass R.L., An assessment of systems and software engineering scholars and institutions (2000-2004), Journal of Systems and Software. Amsterdam, Elsevier, 2006, 79 (6): 816819.

 

Tse T.H., Cover Design, Proceedings of the 5th International Conference on Quality Software (QSIC 2005). IEEE Computer Society Press, Los Alamitos, California, 2005.

 

Tse T.H., Editor, Journal of Systems and Software. Elsevier, Amsterdam, 2005.

 

Tse T.H., Foundation Editor, Journal for Universal Computer Science. Springer, Berlin, 2005.

 

Tse T.H., Message from the steering committee chair, Proceedings of the 5th International Conference on Quality Software (QSIC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005.

 

Tse T.H., Research directions in model-based metamorphic testing and verification, Proceedings of the 29th Annual International Computer Software and Applications Conference (COMPSAC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005.

 

Researcher : Wang CL



Project Title:

The HKU Grid Computing Research Center

Investigator(s):

Wang CL, Lau FCM

Department:

Computer Science

Source(s) of Funding:

The University of Hong Kong Foundation Seed Grant

Start Date:

07/2003

 

Abstract:

To share resources and knowledge under the theme of grid computing; to collaborate on a joint effort to develop the Hong Kong grid which will then contribute to the China National Grid and the Asia-Pacific Grid.

 

Project Title:

A component-based software architecture for context-aware pervasive computing

Investigator(s):

Wang CL, Lau FCM

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2004

 

Abstract:

To carry out: (1) proactive and context-aware adaptation: to realize the functionality adaptation. The proposed adaptation mechanism should be able to proactively discover contextual information and make applications constantly adapt to the changing environment. (2) mobility Support: to explore the possibilities of using the facet model to achieve better mobility in the pervasive world. In particular, the proposed system will support user mobility, which allows nomadic users to continue their job while switching from device to device. (3) software Extensibility: to build a real-life pervasive application using facets, to demonstrate that the functionalities and the scale of the application could be very extensibe and no longer be restricted by the resource-constrained devices.

 

Project Title:

Session continuity for mobile computing

Investigator(s):

Wang CL

Department:

Computer Science

Source(s) of Funding:

Small Project Funding

Start Date:

11/2004

 

Abstract:

To construct the missing session layer support on top of the TCP, which masks network changes caused by terminal mobility from the applications, thereby maintaining virtually uninterrupted dialogs between endpoints; to design a name service which supports flexible mappings between logical entities and their network addresses, and to tackle the inherent performance issues.

 

Project Title:

A component-based software architecture for context-aware pervasive computing

Investigator(s):

Wang CL

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

01/2005

 

Abstract:

N/A

 

Project Title:

Enhanced Distributed JVM for Large-scale Scientific Applications

Investigator(s):

Wang CL

Department:

Computer Science

Source(s) of Funding:

Small Project Funding

Start Date:

04/2006

 

Abstract:

Many large-scale scientific and commercial data-mining applications are written in Java. These applications are in great need of a huge virtual memory to keep the created Java objects in memory for computation. In this research, we will introduce a cluster middleware, a Distributed JVM (DJVM) that can group the memory in all computing nodes (PCs or servers) to support parallel execution of large-scale memory-demanding Java applications. The DJVM will be built at the virtual machine level and it can make a cluster appear as a single, multi-processor machine to Java applications. Existing JVM or DJVM prototypes don't provide solutions for the problem of supporting huge virtula memory. A sinlge machine JVM can support up to 2GB memory space, which is insufficient for running an application with large data set. Previous approaches in DJVM have limitation in the JVM heap management in supporting an address space larger than 2GB in a 32-bit platform. The difficulties come from two aspects. (1) The JVM specification defines the size of the object refence as a word in a physical machine. On 32-bit machines, it is therefore 32-bit. Extending the address space will need to revise the JVM specification substantially. (2) All previous DJVMs are based on some open-source JVM implementations, which tends to follow the orginal specification. For new implementation, new and careful design in JVM heap and JIT compilers is needed in the DJVM kernel for manipulating of Java references, which is a non-trivious task. It needs to involve complex transformations of new reference type on the 32-bit platforms.To make the existing applications able to be transparently migrated to the new platform, we also need to make sure the Java libraries and latest APIs used by the Java applications can be executed on DJVM. To incorporate different Java libraries in a DJVM is a challenge because a JVM is often shipped with its own class libraries. Simply setting class search path or copying class libraries in the DJVM directories will not work. There are many compatibility problems to solve for a JVM to use another JVM's libraries. A DJVM needs to find a portable and flexible method to solve the transplant of Java libraries for the applications to use.

 

List of Research Outputs

 

Chen L., Ma T.C., Wang C.L., Lau F.C.M. and Li S.P., G-JavaMPI: A Grid Middleware for Transparent MPI Task Migration, In: Beniamino Di Martino et al., Engineering the Grid: Status and Perspective. American Scientific Publishers, 2006.

 

Sit Y.F., Lau F.C.M. and Wang C.L., On The Cooperation of Web Clients and Proxy Caches, 11th International Conference on Parallel and Distributed Systems (ICPADS 2005). Fukuoka, Japan, 2005.

 

Tsang K.C.K., Ho S.C., Tsang M.C.M., Wang C.L. and Lau F.C.M., An Adaptive Multipath Protocol for Efficient IP Handoff in Mobile Wireless Networks, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06). Vienna, Austria, IEEE Computer Society, 2006, 1: 503-510.

 

Wang C.L., Zhang X., Belaramani N., Siu P.L.P., Chow Y. and Lau F.C.M., Software Infrastructure for Context-aware Mobile Computing, In: Weidong Kou and Yelena Yesha, Enabling Technologies for Wireless E-Business. Springer, 2006.

 

Zhu D., Lau F.C.M., Wang C.L., Lam W.K., He C., Wang X., Chen Y. and Li S., Design of an OGSA Based MetaService Architecture, The International Workshop on Grid and Cooperative Computing (GCC 2004). Wuhan, China, 2005.

 

Zhu W., Fang W., Wang C.L. and Lau F.C.M., High Performance Computing on Clusters: The Distributed JVM Approach, High Performance Computing: Paradigm and Infrastructure,. John Wiley and Sons, 2005.

 

Researcher : Wang L



List of Research Outputs

 

Wang L., Mamoulis N., Cheung D.W.L. and Yiu S.M., Indexing Useful Structural Patterns for XML Query Processing, IEEE Transaction on Knowledge and Data Engineering. IEEE Computer Society, 2005, 17(7): 997-1009.

 

Researcher : Wang WP



Project Title:

Collision detection of moving ellipses and ellipsoids

Investigator(s):

Wang WP

Department:

Computer Science

Source(s) of Funding:

Seed Funding Programme for Basic Research

Start Date:

10/2002

 

Abstract:

To study the collision detection problem between moving ellipses in 2D plane and ellipsoids in 3D space. Specially, based on the PI's recent study on the algebraic properties of the arrangement of two ellipsoids.

 

Project Title:

New methods for collision detection of ellipsoids

Investigator(s):

Wang WP

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

09/2003

 

Abstract:

To develop methods of collision detection of moving ellipsoids in the following three different cases: i) motions expressible as rational functions of time; ii) motions expressible by analytical functions of time; continuous motions, which include the important class of continuous but "non-smooth' motions due to interactive user control or constant interaction with surrounding objects in a VR or computer game application.

 

Project Title:

New methods for collision detection of ellipsoids

Investigator(s):

Wang WP

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

09/2003

 

Abstract:

N/A

 

Project Title:

A novel method for curve and surface approximation

Investigator(s):

Wang WP

Department:

Computer Science

Source(s) of Funding:

Seed Funding Programme for Basic Research

Start Date:

02/2004

Completion Date:

01/2006

 

Abstract:

To propose a new method, based on active spline curves and surfaces, for shape approximation.

 

Project Title:

A new collision detection scheme fo human character animation

Investigator(s):

Wang WP

Department:

Computer Science

Source(s) of Funding:

Small Project Funding

Start Date:

11/2004

Completion Date:

10/2006

 

Abstract:

Based on our previous results, to consider other quadric surfaces both in the static case as well as in continuous motion.

 

Project Title:

SDM - a new optimization method for shape modelling

Investigator(s):

Wang WP

Department:

Computer Science

Source(s) of Funding:

Incentive Award for RGC CERG Fundable But Not Funded Projects

Start Date:

07/2005

Completion Date:

06/2006

 

Abstract:

N/A

 

Project Title:

Efficient Collision Detection for Composite Quadric Models

Investigator(s):

Wang WP

Department:

Computer Science

Source(s) of Funding:

Seed Funding Programme for Basic Research

Start Date:

04/2006

Completion Date:

12/2006

 

Abstract:

[Purpose] We shall investigate the collision detection problem for composite quadric models (CQMS), which are 3D objects bounded by planar and quadric surfaces. CQMs include objects as simple as ellipsoids and those more complex ones defined as the CSG (Constructive Solid Geometry) objects with quadric primitives. Figure 1 shows objects of this type in a context of collision detection for robot operation. Collision detection is of paramount importance to many fields involving object interaction and simulation, e.g., computer animation, computational physics, virtual reality, robotics and CAD/CAM. The efficiency and accuracy of the collision detection methods are critical to most applications. Quadric surfaces are widely used in practice. Ellipsoids and truncated/capped cylinders or cones are often used as bounding volumes of complex geometry in graphics and robotics. The rising interests in modeling human characters in computer game/animation and organic forms in bio-science make ellipsoids a serious contender for shape representation. Furthermore, most mechanical parts can accurately be modeled with simple quadrics, such as spheres, cones, and cylinders. Through composite representation or CSG composition, an even wider class of complex objects is modeled by quadric surfaces. [Key Issues] Most research in the literature has so far mainly concentrated on collision detection of piecewise linear objects (e.g., polyhedrons). These methods usually sample the motion time interval and then perform interference test for static objects along the motion path at sampled instants. When applied to collision detection of moving quadric surfaces, there are problems with these methods: 1) piecewise linear approximation introduces geometric error and entails large storage space; 2) discrete time sampling may miss collision between time samples for small or fast moving objects due to inadequate sampling, or results in inefficiency when overly dense sampling is used. [Previous work 1] Collision detection of quadric surfaces: Quadric surfaces, or quadrics, are the simplest curved surfaces of degree two. A straightforward way to detect whether or not two quadrics collide is to determine their intersection: two quadrics are separate if and only if their intersection is empty in real space. Intersection of quadric surfaces has been extensively studied [4, 5, 10, 9]. Related to collision detection of quadrics, distance computation for quadric surfaces is studied in [3]. However, the collision detection problem of quadrics by itself does not necessitate the computation of intersection or distance of two quadrics. Therefore, the procedures in the above work are usually too involved for time critical collision detection. Moreover, it is difficult to extend these methods to continuous collision detection (CCD) of quadrics. [Previous work 2] Continuous collision detection of moving objects: The common feature of continuous collision detection (CCD) methods is that no discrete time sampling is needed, thus inaccuracy due to missing collision between time samples is avoided. Recently, Redon et al. propose CCD methods of Oriented Bounding Boxes (OBB) [6], and Line Swept Sphere (LSS) primitives [7]. However, so far there has been no effective solution in the literature to CCD of quadric surfaces or the like, except for the recent work by the PI and his collaborators dealing with the CCD of moving elliptic disks in 2D plane and the CCD of moving ellipsoids in 3D space, which are a special case of general quadrics. [Related work by PI] The PI and his collaborators pioneered the algebraic approach to collision detection of conics and quadric surfaces, starting from their 2001 paper [11] on an algebraic condition on the separation of two ellipsoids. Our results have led to an algebraic method for exact collision detection of two ellipsoids based on time sampling [8] and another algorithm for continuous collision detection (CCD) of moving ellipsoids based on the analysis of a bivariate function [1]. We have also conducted further study on algebraic methods for fast and exact CCD of moving elliptic disks in 2D plane by processing a univariate function [2]. Basically, using our algebraic approach, we can handle the input ellipsoids or ellipses directly without geometric approximation, and we can set up and solve collision detection equations exactly without the need to sample the motion time. Compared with the conventional methods, the benefit of this algebraic approach is the significant improvement in spatial and temporal accuracy in collision detection. In this project we expect to extend this approach to deal with general quadrics and, more importantly, composite objects bounded by piecewise quadric or planar surface patches. Clearly, CCD for composite quadric models is a much more challenging problem than that for ellipsoids. We will have to consider collision between different types of boundary elements, such a boundary curve versus a boundary curve. The difficulty and intricacy of this problem will fully be discussed in the next part on Research Methodology. [Objectives] We shall study an algebraic framework for continuous collision detection (CCD) of composite quadric models (CQM) which are objects bounded by quadric or planar surface patches. We will use algebraic conditions to characterize and compute the times of collision and contact points in an accurate and efficient manner. Our framework is a significant extension to the previous work pioneered by the PI on an algebraic approach to the exact collision detection for ellipses and ellipsoids. The main challenges in this extension are: 1) A much larger number of quadric surfaces and more complex contact configurations of them need to be studied; 2) Unlike ellipsoids which are defined by a single equation, CQMs are defined by multiple quadratic inequalities, i.e., they are real semi-algebraic varieties. Hence, the existing algebraic approach to CCD of ellipsoids cannot be applied straightforwardly to CCD of CQMs. We will devise a systematic framework for continuous collision detection of CQMs. Specifically, our objectives are: ** establish algebraic conditions to characterize contact configurations of quadric surfaces in 3D; ** based on these algebraic conditions, devise efficient algorithms for CCD of composite quadric models.

 

List of Research Outputs

 

Albocher D., Sarel U., Choi Y.K., Elber G. and Wang W.P., Continuous collision detection for elliptic disks, IEEE Transactions on Robotics. Robotics and Automation Society, 2006, 22: 213-224.

 

Albocher D., Sarel U., Choi Y.K., Elber G. and Wang W.P., Efficient Continuous Collision Detection for Bounding Boxes under Rational Motion, The Proceedings of the 2006 IEEE International Conference on Robotics and Automation. IEEE, 2006, 3017-3022.

 

Wang X.T., Choi Y.K., Lu W.W. and Wang W.P., Rod-like trabeculae extraction from cancellous bone microstructure using topological analysis, Ninth International Conference on Computer Aided Design and Computer Graphics (CADCG 2005). IEEE Computer Society, 2005, 173-180.

 

Researcher : Wong DCK



List of Research Outputs

 

Cheung D.W.L. and Wong D.C.K., Consultancy, Internet Appliance to Serve G2B Integration with SCOPES, Office of the Government Chief Information Officer (OGCIO), HKSAR Government. 2005.

 

Cheung D.W.L. and Wong D.C.K., Consultancy, SUNDAY Enterprise Data Model Design, Mandarin Communications Limited, SUNDAY mobile phone carrier. 2005.

 

Cheung D.W.L. and Wong D.C.K., Consultancy, Trial Run on Capturing of Vehicle Insurance Data, Transport Department, HKSAR Government. 2005.

 

Cheung D.W.L., Lee T.Y.T., Kwok W.C.H., Yee K.C. and Wong D.C.K., Grand Award, Linux Business Award, Hong Kong Linux Business Award Organization Committee. 2005.

 

Researcher : Wong KKY



Project Title:

Outdoor 3D scanner using off-the-shelf digital camera

Investigator(s):

Wong KKY

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

10/2003

Completion Date:

03/2006

 

Abstract:

To provide a cost-efficient solution to the generation of realistic 3D models by developing algorithms for motion estimation and model reconstruction from image sequences.

 

Project Title:

Outdoor 3D scanner using off-the-shelf digital camera

Investigator(s):

Wong KKY

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

10/2003

 

Abstract:

N/A

 

Project Title:

Tracking of lumbar spinal motion in videofluoroscopy

Investigator(s):

Wong KKY, Leong JCY, Luk KDK

Department:

Computer Science

Source(s) of Funding:

Small Project Funding

Start Date:

11/2003

Completion Date:

10/2005

 

Abstract:

To exploit computer vision and image processing techniques for enhancing the image quality of the videofluoroscopic sequence and to extract useful information of spinal motion from the sequence automatically.

 

Project Title:

3D shape recovery of complex objects using a dual-space approach

Investigator(s):

Wong KKY

Department:

Computer Science

Source(s) of Funding:

Merit Award for RGC CERG Funded Projects

Start Date:

01/2006

 

Abstract:

N/A

 

Project Title:

3D shape recovery of complex objects using a dual-space approach

Investigator(s):

Wong KKY

Department:

Computer Science

Source(s) of Funding:

Competitive Earmarked Research Grants (CERG)

Start Date:

01/2006

 

Abstract:

The main objective of this project is to develop a novel method for reconstructing complex 3D objects with unknown topology using their silhouettes extracted from the image sequences. The proposed method exploits the duality principle governing surface points and their corresponding tangent planes, and enables direct estimation of points on the contour generators.

 

List of Research Outputs

 

Chen H., Wong K.K.Y., Liang C. and Chen Y., Extracting Surface Representations from Rim Curves, Asian Conference on Computer Vision . Hyderabad, India, 2006, II: 732-741.

 

So W.K., Wong K.K.Y., Chung H.Y. and Chin F.Y.L., Shadow Detection for Vehicles by Locating the Object-Shadow Boundary, 7th IASTED International Conference on Signal and Image Processing. Honolulu, Hawaii, USA, 2005, 315-319.

 

Wong W.N., Luk K.D.K., Leong J.C.Y., Wong S.F. and Wong K.K.Y., Continuous Dynamic Spinal Motion Analysis, Spine. 2006, 31(4): 414-419.

 

Yiu W.S., Wong K.K.Y., Chin F.Y.L. and Chung H.Y., Explicit Contour Model for Vehicle Tracking with Automatic Hypothesis Validation, International Conference on Image Processing. Genova, 2005, II: 582-585.

 

Zhang G. and Wong K.K.Y., Motion Estimation from Spheres, IEEE International Conference on Computer Vision and Pattern Recognition. New York, USA, 2006, 1: 1238-1243.

 

Zhang H., Zhang G. and Wong K.K.Y., Auto-Calibration and Motion Recovery from Silhouettes for Turntable Sequences, British Machine Vision Conference. Oxford, UK, 2005, I: 79-88.

 

Zhang H., Zhang G. and Wong K.K.Y., Camera Calibration with Spheres: Linear Approaches, International Conference on Image Processing. Genova, 2005, II: 1150-1153.

 

Researcher : Wong KY



List of Research Outputs

 

Wong K.Y. and Yip C.L., An Intelligent Tropical Cyclone Eye Fix System using Motion Field Analysis, Proceedings of the 17th International Conference on Tools with Artificial Intelligence (ICTAI-2005). 2005.

 

Wong K.Y. and Yip C.L., An Intelligent Tropical Cyclone Eye Fix System using Motion Field Analysis, The 17th IEEE International Conference on Tools with Artificial Intelligence. Hong Kong, IEEE Computer Society, 2005, 1: 652-656.

 

Wong K.Y. and Yip C.L., Fast Rotation Center Identification Methods for Video Sequences, Proceedigns of IEEE International Conference on Multimedia & Expo (ICME-2005). 2005.

 

Wong K.Y., Hung Hing Ying Scholarships, 2006.

 

Wong K.Y. and Yip C.L., Tropical Cyclone Eye Fix using Genetic Algorithm with Temporal Information, Proceedings of the 9th International Conference on Knowledge-based Intelligent Information and Engineering Systems (KES-2005). 2005.

 

Researcher : Wong KY



List of Research Outputs

 

Wong K.Y. and Yip C.L., An Intelligent Tropical Cyclone Eye Fix System using Motion Field Analysis, Proceedings of the 17th International Conference on Tools with Artificial Intelligence (ICTAI-2005). 2005.

 

Wong K.Y. and Yip C.L., An Intelligent Tropical Cyclone Eye Fix System using Motion Field Analysis, The 17th IEEE International Conference on Tools with Artificial Intelligence. Hong Kong, IEEE Computer Society, 2005, 1: 652-656.

 

Wong K.Y. and Yip C.L., Fast Rotation Center Identification Methods for Video Sequences, Proceedigns of IEEE International Conference on Multimedia & Expo (ICME-2005). 2005.

 

Wong K.Y., Hung Hing Ying Scholarships, 2006.

 

Wong K.Y. and Yip C.L., Tropical Cyclone Eye Fix using Genetic Algorithm with Temporal Information, Proceedings of the 9th International Conference on Knowledge-based Intelligent Information and Engineering Systems (KES-2005). 2005.

 

Researcher : Wong SF



List of Research Outputs

 

Wong W.N., Luk K.D.K., Leong J.C.Y., Wong S.F. and Wong K.K.Y., Continuous Dynamic Spinal Motion Analysis, Spine. 2006, 31(4): 414-419.

 

Researcher : Wong WH



List of Research Outputs

 

Chan W.T., Lam T.W., Ting H.F. and Wong W.H., On-line Stream Merging with Max Span and Min Coverage, Theory of Computing Systems . USA, Springer-Verlag New York, LLC, 2005, 38: 461-479.

 

Researcher : Wu J



List of Research Outputs

 

Huo Q., Zhu D. and Wu J., Unsupervised Online Adaptation of Segmental Switching Linear Gaussian Hidden Markov Models for Robust Speech Recognition, 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing. Toulouse, France, IEEE Signal Processing Society, 2006, 1: 1125-1128.

 

Researcher : Yan D



List of Research Outputs

 

Liu Y.S., Yong J.H., Zhang H., Yan D. and Sun J.G., A quasi-Monte Carlo method for computing areas of point-sampled surfaces, Computer-Aided Design. 2006, 38(1): 55-68.

 

Researcher : Yau SS



List of Research Outputs

 

Chan W.K., Chen T.Y., Lu H., Tse T.H. and Yau S.S., A metamorphic approach to integration testing of context-sensitive middleware-based applications, Proceedings of the 5th International Conference on Quality Software (QSIC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005, 241249.

 

Researcher : Ye D



List of Research Outputs

 

Chan W.T., Zhang Y., Fung P.Y., Ye D. and Zhu H., Efficient Algorithms for Finding a Longest Common Increasing Subsequence, In: Xiaotie Deng, Dingzhu Du, The 16th Annual International Symposium on Algorithms and Computation (ISAAC). Springer, 2005, LNCS 3827: 665-674.

 

Chan W.T., Chin F.Y.L., Ye D., Zhang G. and Zhang Y., Online Bin Packing of Fragile Objects with Application in Cellular Networks, In: Xiaotie Deng, Yinyu Ye, The 1st Workshop on Internet and Network Economics (WINE). Springer, 2005, LNCS 3828: 564-573.

 

Ye D., Chan W.T., Chin F.Y.L., Zhang G. and Zhang Y., On-line Scheduling of Parallel Jobs on Two Machines, In: Joe Ryan, Prabhu Manyem, Kiki Sugeng, Mirka Miller, Proceedings of the 16th Australasian Workshop on Combinatorial Algorithms (AWOCA 2005). Australia, 2005, 369-380.

 

Researcher : Yee KC



List of Research Outputs

 

Cheung D.W.L., Kwok W.C.H. and Yee K.C., Consultancy, Architectural Design for MTR Maintenance Management Information System, MTR Corporation Limited. 2005.

 

Cheung D.W.L., Lee T.Y.T., Kwok W.C.H., Yee K.C. and Wong D.C.K., Grand Award, Linux Business Award, Hong Kong Linux Business Award Organization Committee. 2005.

 

Researcher : Yip CL



List of Research Outputs

 

Wong K.Y. and Yip C.L., An Intelligent Tropical Cyclone Eye Fix System using Motion Field Analysis, Proceedings of the 17th International Conference on Tools with Artificial Intelligence (ICTAI-2005). 2005.

 

Wong K.Y. and Yip C.L., An Intelligent Tropical Cyclone Eye Fix System using Motion Field Analysis, The 17th IEEE International Conference on Tools with Artificial Intelligence. Hong Kong, IEEE Computer Society, 2005, 1: 652-656.

 

Wong K.Y. and Yip C.L., Fast Rotation Center Identification Methods for Video Sequences, Proceedigns of IEEE International Conference on Multimedia & Expo (ICME-2005). 2005.

 

Wong K.Y. and Yip C.L., Tropical Cyclone Eye Fix using Genetic Algorithm with Temporal Information, Proceedings of the 9th International Conference on Knowledge-based Intelligent Information and Engineering Systems (KES-2005). 2005.

 

Researcher : Yiu ML



List of Research Outputs

 

Dai X., Yiu M.L., Mamoulis N., Tao Y. and Vaitis M., Probabilistic Spatial Queries on Existentially Uncertain Data, Proceedings of the 9th International Symposium on Spatial and Temporal Databases (SSTD). Angra dos Reis, Brazil, 2005, 400-417.

 

Mamoulis N., Cheng K.H., Yiu M.L. and Cheung D.W.L., Efficient Aggregation of Ranked Inputs, Proceedings of the 22nd International Conference on Data Engineering (ICDE), Altanta, GA, April 2006.. 2006.

 

Yiu M.L., Mamoulis N. and Tao Y., Efficient Quantile Retrieval on Multi-dimensional Data, Proceedings of the 10th International Conference on Extending Database Technology (EDBT), Munich, Germany, March 2006.. 2006.

 

Yiu M.L. and Mamoulis N., Reverse Nearest Neighbors Search in Ad-hoc Subspaces, Proceedings of the 22nd International Conference on Data Engineering (ICDE), Altanta, GA, April 2006.. 2006.

 

Yiu M.L., Papadias D., Mamoulis N. and Tao Y., Reverse Nearest Neighbors in Large Graphs, IEEE Transactions on Knowledge and Data Engineering (TKDE). IEEE, 2006, 18(4): 540-553.

 

Researcher : Yiu SM



List of Research Outputs

 

Chan P.Y., Lam T.W. and Yiu S.M., A More Accurate and Efficient Whole Genome Phylogeny, The 4th Asia-Pacific Bioinformatics Conference (APBC). London, Imperial College Press, 2006, 337-352.

 

Chow S.M., Hui C.K., Yiu S.M. and Chow K.P., Forward-Secure Multisignature and Blind Signature Schemes, Applied Mathematics and Computation. Elsevier , 2005, 168/2: 895-908.

 

Chow S.M., Lui R.W.C., Hui C.K. and Yiu S.M., Identity Based Delegation Network, 1st International Conference on Cryptology in Malaysia (Mycrypt 2005). Springer, 2005, 3715 of Lecture Notes in Computer Science: 99-115.

 

Chow S.M., Hui C.K., Yiu S.M. and Chow K.P., Two Improved Partially Blind Signature Schemes from Bilinear Pairings, Information Security and Privacy: 10th Australasian Conference (ACISP 2005). Springer, 2005, 3574 of Lecture Notes in Computer Science: 316-328.

 

Lai K.Y., Yiu S.M., Chow K.P., Chong C.F. and Hui C.K., An Efficient Bloom Filter Based Solution for Multiparty Private Matching, SAM’06 The 2006 International Conference on Security & Management. Las Vegas, USA, CSREA Press 2006, 2006, 7pp.

 

Leung C.M., Chin F.Y.L., Yiu S.M., Rosenfeld R. and Tsang W.W., Finding Motifs with Insufficient Number of Strong Binding Sites, Journal of Computational Biology. Mary Ann Liebert, Inc, 2005, 12(6): 686-701.

 

Lui R.W.C., Chow S.M., Hui C.K. and Yiu S.M., Role Activation Management in Role Based Access Control, Information Security and Privacy: 10th Australasian Conference (ACISP 2005). Springer, 2005, 3574 of Lecture Notes in Computer Science: 358-369.

 

Lui R.W.C., Chow S.M., Hui C.K. and Yiu S.M., Supporting Efficient Authorization in Delegation with Supervision , Proceedings of the 11th International Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) . United States of America, IEEE Computer Society Conference Publishing Services, 2005, 2: 240-244.

 

Sui A., Chow S.M., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chong C.F., Pun K.H. and Chan H.W., Separable and Anonymous Identity-Based Key Issuing, Proceedings of the 11th International Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) . United States of America, IEEE Computer Society Conference Publishing Services, 2005, 2: 275-279.

 

Wang L., Mamoulis N., Cheung D.W.L. and Yiu S.M., Indexing Useful Structural Patterns for XML Query Processing, IEEE Transaction on Knowledge and Data Engineering. IEEE Computer Society, 2005, 17(7): 997-1009.

 

Researcher : Yiu WS



List of Research Outputs

 

Yiu W.S., Wong K.K.Y., Chin F.Y.L. and Chung H.Y., Explicit Contour Model for Vehicle Tracking with Automatic Hypothesis Validation, International Conference on Image Processing. Genova, 2005, II: 582-585.

 

Researcher : Zhang G



List of Research Outputs

 

Zhang G. and Wong K.K.Y., Motion Estimation from Spheres, IEEE International Conference on Computer Vision and Pattern Recognition. New York, USA, 2006, 1: 1238-1243.

 

Zhang H., Zhang G. and Wong K.K.Y., Auto-Calibration and Motion Recovery from Silhouettes for Turntable Sequences, British Machine Vision Conference. Oxford, UK, 2005, I: 79-88.

 

Zhang H., Zhang G. and Wong K.K.Y., Camera Calibration with Spheres: Linear Approaches, International Conference on Image Processing. Genova, 2005, II: 1150-1153.

 

Researcher : Zhang G



List of Research Outputs

 

Zhang G. and Wong K.K.Y., Motion Estimation from Spheres, IEEE International Conference on Computer Vision and Pattern Recognition. New York, USA, 2006, 1: 1238-1243.

 

Zhang H., Zhang G. and Wong K.K.Y., Auto-Calibration and Motion Recovery from Silhouettes for Turntable Sequences, British Machine Vision Conference. Oxford, UK, 2005, I: 79-88.

 

Zhang H., Zhang G. and Wong K.K.Y., Camera Calibration with Spheres: Linear Approaches, International Conference on Image Processing. Genova, 2005, II: 1150-1153.

 

Researcher : Zhang H



List of Research Outputs

 

Liu Y.S., Yong J.H., Zhang H., Yan D. and Sun J.G., A quasi-Monte Carlo method for computing areas of point-sampled surfaces, Computer-Aided Design. 2006, 38(1): 55-68.

 

Zhang H., Zhang G. and Wong K.K.Y., Auto-Calibration and Motion Recovery from Silhouettes for Turntable Sequences, British Machine Vision Conference. Oxford, UK, 2005, I: 79-88.

 

Zhang H., Zhang G. and Wong K.K.Y., Camera Calibration with Spheres: Linear Approaches, International Conference on Image Processing. Genova, 2005, II: 1150-1153.

 

Researcher : Zhang H



List of Research Outputs

 

Liu Y.S., Yong J.H., Zhang H., Yan D. and Sun J.G., A quasi-Monte Carlo method for computing areas of point-sampled surfaces, Computer-Aided Design. 2006, 38(1): 55-68.

 

Zhang H., Zhang G. and Wong K.K.Y., Auto-Calibration and Motion Recovery from Silhouettes for Turntable Sequences, British Machine Vision Conference. Oxford, UK, 2005, I: 79-88.

 

Zhang H., Zhang G. and Wong K.K.Y., Camera Calibration with Spheres: Linear Approaches, International Conference on Image Processing. Genova, 2005, II: 1150-1153.

 

Researcher : Zhang X



List of Research Outputs

 

Wang C.L., Zhang X., Belaramani N., Siu P.L.P., Chow Y. and Lau F.C.M., Software Infrastructure for Context-aware Mobile Computing, In: Weidong Kou and Yelena Yesha, Enabling Technologies for Wireless E-Business. Springer, 2006.

 

Researcher : Zhang Y



List of Research Outputs

 

Chan W.T., Chin F.Y.L., Zhang Y., Zhu H., Shen H. and Wong P.W.H., A Dynamic Programming Approach Of Finding An Optimal Broadcast Schedule In Minimizing Total Flow Time, Journal of Combinatorial Optimization. Netherlands, Springer Netherlands, 2006, 11(2): 177-187.

 

Chan W.T., Zhang Y., Fung P.Y., Ye D. and Zhu H., Efficient Algorithms for Finding a Longest Common Increasing Subsequence, In: Xiaotie Deng, Dingzhu Du, The 16th Annual International Symposium on Algorithms and Computation (ISAAC). Springer, 2005, LNCS 3827: 665-674.

 

Chan W.T., Chin F.Y.L., Zhang Y., Zhu H., Shen H. and Wong P.W.H., Off-Line Algorithms for Minimizing Total Flow Time in Broadcast Scheduling, Proceedings of the Eleventh Annual International Computing and Combinatorics Conference (COCOON 2005). Kunming, Yunnan, China, Springer-Verlag Berlin Heidelberg, 2005, LNCS 3595: 318-328.

 

Chan W.T., Chin F.Y.L., Ye D., Zhang G. and Zhang Y., Online Bin Packing of Fragile Objects with Application in Cellular Networks, In: Xiaotie Deng, Yinyu Ye, The 1st Workshop on Internet and Network Economics (WINE). Springer, 2005, LNCS 3828: 564-573.

 

Ye D., Chan W.T., Chin F.Y.L., Zhang G. and Zhang Y., On-line Scheduling of Parallel Jobs on Two Machines, In: Joe Ryan, Prabhu Manyem, Kiki Sugeng, Mirka Miller, Proceedings of the 16th Australasian Workshop on Combinatorial Algorithms (AWOCA 2005). Australia, 2005, 369-380.

 

Researcher : Zhu D



List of Research Outputs

 

Huo Q., Zhu D. and Wu J., Unsupervised Online Adaptation of Segmental Switching Linear Gaussian Hidden Markov Models for Robust Speech Recognition, 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing. Toulouse, France, IEEE Signal Processing Society, 2006, 1: 1125-1128.

 

Zhu D., Lau F.C.M., Wang C.L., Lam W.K., He C., Wang X., Chen Y. and Li S., Design of an OGSA Based MetaService Architecture, The International Workshop on Grid and Cooperative Computing (GCC 2004). Wuhan, China, 2005.

 

Researcher : Zhu W



List of Research Outputs

 

Zhu W., Fang W., Wang C.L. and Lau F.C.M., High Performance Computing on Clusters: The Distributed JVM Approach, High Performance Computing: Paradigm and Infrastructure,. John Wiley and Sons, 2005.



-- End of Listing --