DEPT OF COMPUTER SCIENCE
Researcher
: Bai Z |
List of Research Outputs |
Bai Z.
and Huo Q., A Study On the Use of
8-Directional Features For Online Handwritten Chinese Character Recognition, 8th
International Conference on Document Analysis and Recognition (ICDAR-2005).
|
Researcher
: Bakiras S |
List of Research Outputs |
Kalnis P., Mamoulis N., Bakiras S. and Li X., Ad-hoc
distributed spatial joins on mobile devices, Proceedings of the 20th IEEE
International Parallel and Distributed Processing Symposium (IPDPS), |
Researcher
: Cao HP |
List of Research Outputs |
Cao
H.P., Mamoulis
N. and Cheung D.W.L., Mining
Frequent Spatio-temporal Sequential Patterns, Proceeding of the Fifth IEEE
International Conference on Data Mining (ICDM 2005). |
Cao
H.P., Mamoulis
N. and Cheung D.W.L., Mining
Frequent Spatio-temporal Sequential Patterns, Proceedings of the 5th IEEE
International Conference on Data Mining (ICDM). |
Researcher
: Chan BMY |
List of Research Outputs |
Chan
B.M.Y., Chen D.Z., Chin F.Y.L. and Wang C.A., Construction
of the Nearest Neighbor Embracing Graph of a Point Set, Journal of
Combinatorial Optimization . |
Researcher
: Chan HL |
List of Research Outputs |
Chan H.L., Lam T.W. and Liu K.S., Extra unit-speed machines
are almost as powerful as speedy machines for competitive flow time
scheduling, The Sixteen Annual ACM-SIAM Symposium on Discrete Algorithms
(SODA). |
Researcher
: Chan HW |
Project Title: |
Anonymity in Web transactions |
Investigator(s): |
Chan HW |
Department: |
Computer Science |
Source(s) of Funding: |
Small Project Funding |
Start Date: |
01/2006 |
Abstract: |
Privacy issue is always a concern for certain individuals with the proliferation of emails and transactions on the Web. In most of the current communication systems, information such as our identity (IP address) is exposed and kept by another party. Web server log files contain information about the users who visit them and the content they access. The server can record the user's IP address and often the user's Internet domain name, workplace, and/or approximate location, the type of computing platform used. The Web page that referred the user to this site and the server that is going to be visited next are all possibly contained within the request header. Even when the user's IP address changes between browsing sessions (e.g., the IP address is assigned dynamically using DHCP), a Web server can link multiple sessions by the same user by planting a unique cookie in the user' s browser during the first browsing session, and retrieving that cookie in subsequent sessions. Thus, various sites on the Internet collect a great amount of personal information about the individuals who visit them. This information can be used to generate consumer and communication profiles. The same monitoring capabilities are available to the user's ISP or local gateway administrator who can observe all communication in which the user participates. The user's profile made possible by such monitoring capabilities is viewed as a useful tool because a Web server can use such information to personalize its content for its users. However, user's privacy is compromised. In spite of a lack of privacy has always characterized Internet communication, a general acceptance that Internet communication has been logged universally and revealed so much about the personal tastes of its users is to be scrutinized. Web users should have the ability to limit what information is revealed about them and to whom it is revealed. While encrypting communication to and from web servers (e.g., using SSL) can hide the content of the transaction from an Internet service provider, or a local system administrator, they can still learn a lot about the client and server computers, the length of the data being exchanged, and the time and frequency of exchanges. Encryption indeed does little to protect the privacy of the client from the server. A web server can record the Internet addresses at which its clients reside, the servers that referred the clients to it, and the times and frequencies of accesses by its clients. Although some approaches enable users to negotiate the conditions under which they will share potentially private information with a Web server, these negotiations apply only to the server, only for certain kinds of information (for example, not the user's IP address), cannot be enforced, and are not presently widely practised. Other methods are definitely needed as well. Anonymity is a way not to release the identity and personal information of the individual. With the use of a proxy server, some degree of anonymity can be provided. However, it may still be possible to reveal our approximate location by examining the address of proxy server. Advertising company can use the information collected to decide which banner to show according to user location. With the use of cookies, the behavior of a visitor can be tracked when he/she visits another site embedded with web bugs. Therefore, individual privacy on the Internet is endangered and is of utmost concern for some. Since privacy cannot be protected solely by legislation, technologies that can be used to enforce privacy are needed. Anonymity for privacy protection is one possible solution, because if users are anonymous on a network, they need not worry about the loss of their privacy. The aim of the research is to design an efficient scheme for anonymous communication in web transactions. With such scheme, involved party should not be able to have an idea of whom and where the information requester is. |
List of Research Outputs |
Chow
K.P., Chong C.F., Lai K.Y., Hui C.K., Pun K.H., Tsang W.W. and Chan H.W., Digital Evidence Search
Kit, Proceedings of the First International Workshop on Systematic
Approaches to Digital Forensic Engineering (SADFE 2005). |
Ng
C.K. and Chan H.W., Performance
Modeling of Level Switching in Multitier |
Sui
A., Chow S.M., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chong C.F., Pun K.H. and Chan H.W., Separable and Anonymous
Identity-Based Key Issuing, Proceedings of the 11th International
Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) .
|
Researcher
: Chan KP |
List of Research Outputs |
Chan
K.P., Chen T.Y. and Towey D.P., Adaptive Random Testing
with Filtering: An Overhead Reduction Technique, 17th International
Conference on Software Engineering and Knowledge Engineering (SEKE'05). |
Chan K.P., Chen T.Y. and Towey D.P., Restricted Random Testing: Adaptive Random Testing by Exclusion, International Journal of Software Engineering and Knowledge Engineering. 2005, 16(4): 553-584. |
Researcher
: Chan PY |
List of Research Outputs |
Chan P.Y., Lam T.W. and Yiu S.M., A More Accurate and Efficient
Whole Genome Phylogeny, The 4th Asia-Pacific Bioinformatics Conference
(APBC). |
Researcher
: Chan WK |
List of Research Outputs |
Chan W.K., Chen T.Y., Lu H., Tse T.H. and Yau S.S., A metamorphic approach to integration testing of context-sensitive middleware-based applications, Proceedings of the 5th International Conference on Quality Software (QSIC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005, 241−249. |
Chan
W.K., Cheng
M.Y., Cheung S.C. and Tse T.H.,
Automatic goal-oriented classification of failure behaviors for testing
XML-based multimedia software applications: an experimental case study, Journal
of Systems and Software. |
Chan
W.K., Cheung S.C. and Tse T.H., Fault-based testing of database
application programs with conceptual data model, Proceedings of the 5th
International Conference on Quality Software (QSIC 2005), IEEE Computer
Society Press, |
Researcher
: Chan WT |
Project Title: |
Algorithm issues on on-request data dissemination: scheduling algorithms and performance guarantee |
Investigator(s): |
Chan WT, Lam TW, Ting HF |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
12/2003 |
Abstract: |
To solve the problem on deciding when to disseminate which page so as to optimize a pre-defined performance measure, such as the response time of a request, by giving online scheduling algorithms with performance guarantee; to introduce a formal performance comparison analysis between two (unicast or multicast) DDS with different resource settings; to study and solve the scheduling problems for some practical considerations. |
List of Research Outputs |
Chan
W.T., Chin
F.Y.L., Zhang Y., Zhu H., Shen H.
and Wong P.W.H., A Dynamic Programming Approach Of Finding An Optimal
Broadcast Schedule In Minimizing Total Flow Time, Journal of Combinatorial
Optimization. |
Chan W.T., Zhang Y., Fung P.Y., Ye D. and Zhu H., Efficient Algorithms for Finding a Longest Common Increasing Subsequence, In: Xiaotie Deng, Dingzhu Du, The 16th Annual International Symposium on Algorithms and Computation (ISAAC). Springer, 2005, LNCS 3827: 665-674. |
Chan W.T., Lam T.W., Liu K.S. and Wong P., New Resource Augmentation Analysis of the Total Stretch of SRPT and SJF in Multiprocessor Scheduling, The 30th International Symposium on Mathematical Foundations of Computer Science (MFCS). Springer, 2005, 3618 (LNCS): 236-247. |
Chan
W.T., Chin
F.Y.L., Zhang Y., Zhu H., Shen H.
and Wong P.W.H., Off-Line Algorithms for Minimizing Total Flow Time in
Broadcast Scheduling, Proceedings of the Eleventh Annual International
Computing and Combinatorics Conference (COCOON 2005). |
Chan
W.T., Lam
T.W., Ting H.F. and Wong W.H., On-line Stream Merging with
Max Span and Min Coverage, Theory of Computing Systems . |
Chan W.T., Chin F.Y.L., Ye D., Zhang G. and Zhang Y., Online Bin Packing of Fragile Objects with Application in Cellular Networks, In: Xiaotie Deng, Yinyu Ye, The 1st Workshop on Internet and Network Economics (WINE). Springer, 2005, LNCS 3828: 564-573. |
Ye D.,
Chan W.T., Chin F.Y.L., Zhang G. and Zhang Y., On-line Scheduling of Parallel
Jobs on Two Machines, In: Joe Ryan, Prabhu Manyem, Kiki Sugeng, Mirka Miller,
Proceedings of the 16th Australasian Workshop on Combinatorial Algorithms
(AWOCA 2005). |
Researcher
: Chen L |
List of Research Outputs |
Chen L., Ma T.C., Wang C.L., Lau F.C.M. and Li S.P., G-JavaMPI: A Grid Middleware for Transparent MPI Task Migration, In: Beniamino Di Martino et al., Engineering the Grid: Status and Perspective. American Scientific Publishers, 2006. |
Researcher
: Chen TY |
List of Research Outputs |
Chan F.T., Tse T.H., Tang W.H. and Chen T.Y., Software testing education and training in Hong Kong, International Workshop on Education and Training for Quality Software Engineering, Proceedings of the 5th International Conference on Quality Software (QSIC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005, 313−316. |
Chan K.P., Chen T.Y. and Towey D.P., Restricted Random Testing: Adaptive Random Testing by Exclusion, International Journal of Software Engineering and Knowledge Engineering. 2005, 16(4): 553-584. |
Chan W.K., Chen T.Y., Lu H., Tse T.H. and Yau S.S., A metamorphic approach to integration testing of context-sensitive middleware-based applications, Proceedings of the 5th International Conference on Quality Software (QSIC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005, 241−249. |
Chen
T.Y., Poon P.L., Tang S.F., Tse T.H. and Yu Y.T., Applying testing to
requirements inspection for software quality assurance, In: Information
Systems Control Journal, Information Systems Control Journal. |
Chen
T.Y., Poon P.L., Tang S.F. and Tse T.H., Identification of categories
and choices in activity diagrams, Proceedings of the 5th International Conference
on Quality Software (QSIC 2005), IEEE Computer Society Press, |
Tse
T.H., Chen T.Y. and Glass
R.L., An assessment of systems and software engineering scholars and
institutions (2000-2004), Journal of Systems and Software. |
Researcher
: Cheng KH |
List of Research Outputs |
Mamoulis
N., Cheng K.H., Yiu M.L. and Cheung D.W.L., Efficient Aggregation of
Ranked Inputs, Proceedings of the 22nd International Conference on Data
Engineering (ICDE), |
Researcher
: Cheng MY |
List of Research Outputs |
Chan
W.K., Cheng M.Y.,
Cheung S.C. and Tse T.H., Automatic
goal-oriented classification of failure behaviors for testing XML-based
multimedia software applications: an experimental case study, Journal of
Systems and Software. |
Researcher
: Cheung DWL |
Project Title: |
Mining association rules on high performance parallel systems |
Investigator(s): |
Cheung DWL |
Department: |
Computer Science |
Source(s) of Funding: |
Outstanding RGC Projects |
Start Date: |
09/1998 |
Abstract: |
To study and develop algorithms and techniques for mining association rules on high performance parallel systems including the following two system paradigms: share-nothing distributed memory parallel system and share-memory parallel system. |
Project Title: |
Applying clustering technique to partition large collection of XML documents for fast query processing |
Investigator(s): |
Cheung DWL, Huang JZ |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
08/2002 |
Completion Date: |
08/2005 |
Abstract: |
The project aims at studying the problem of partitioning large collection of XML documents by using the clustering technique. The goal of the partitioning (clustering) is to improve the storage efficiency and enhance the query performance on the documents. |
Project Title: |
Projected clustering for high dimensional data and application in gene expression data mining |
Investigator(s): |
Cheung DWL, Ng KP |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
08/2003 |
Completion Date: |
07/2005 |
Abstract: |
To develop dynamic algorithms for projected clustering; to apply algorithms on gene expression and other relevant data; to extend to dynamic approach to other data mining problems. |
Project Title: |
Projected clustering for high dimensional data and application in gene expression data mining |
Investigator(s): |
Cheung DWL, Ng KP |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
08/2003 |
Abstract: |
N/A |
Project Title: |
A business process and information interoperability platform based on open standards |
Investigator(s): |
Cheung DWL, Kao CM, Lee TYT, Kwok WCH, Wong DCK, Chau PYK, Yee KC, Lau C.S.W., Tsang H.K., Ng V.T.Y. |
Department: |
Computer Science |
Source(s) of Funding: |
Innovation and Technology Support Programme |
Start Date: |
11/2003 |
Completion Date: |
07/2006 |
Abstract: |
To research and develop a business process and information interoperability platform based on international open standards and best practices available. This platform aims to support business process integration (BPI) within the enterprise and between business partners. |
Project Title: |
A business process and information interoperability platform based on open standards |
Investigator(s): |
Cheung DWL |
Department: |
Computer Science |
Source(s) of Funding: |
Innovation and Technology Fund Internship Programme |
Start Date: |
08/2004 |
Completion Date: |
08/2005 |
Abstract: |
To research and develop a business process and information interoperability platform based on international open standards and best practices available. This platform aims to support business process integration (BPI) within the enterprise and between business partners. |
Project Title: |
Semi-supervised Subspace Clustering for High-Dimensional Data |
Investigator(s): |
Cheung DWL |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
09/2005 |
Abstract: |
N/A |
Project Title: |
Semi-supervised Subspace Clustering for High-Dimensional Data |
Investigator(s): |
Cheung DWL, Ng KP |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2005 |
Abstract: |
The objectives of this project are: 1.Design and analysis of semi-supervised subspace clustering algorithms in different models. 2.Performance studies of the algorithms in both synthetic and real data. 3.Explore the applications of these algorithms in different environments. |
Project Title: |
Service oriented e-transaction platform |
Investigator(s): |
Cheung DWL |
Department: |
Computer Science |
Source(s) of Funding: |
Innovation and Technology Fund Internship Programme |
Start Date: |
06/2006 |
Abstract: |
To extend SOA to support processing of electronic transactions between enterprises; to develop Web Service components to support reliable and secure B2B applications based on open standards; and to develop service modeling methodology and software to facilitate design of electronic transaction services. |
Project Title: |
Service oriented e-transaction platform |
Investigator(s): |
Cheung DWL |
Department: |
Computer Science |
Source(s) of Funding: |
Innovation and Technology Fund Internship Programme |
Start Date: |
06/2006 |
Abstract: |
To extend SOA to support processing of electronic transactions between enterprises; to develop Web Service components to support reliable and secure B2B applications based on open standards; and to develop service modeling methodology and software to facilitate design of electronic transaction services. |
List of Research Outputs |
Cao
H.P., Mamoulis N. and Cheung D.W.L., Mining Frequent
Spatio-temporal Sequential Patterns, Proceeding of the Fifth IEEE
International Conference on Data Mining (ICDM 2005). |
Cao
H.P., Mamoulis N. and Cheung D.W.L., Mining Frequent
Spatio-temporal Sequential Patterns, Proceedings of the 5th IEEE
International Conference on Data Mining (ICDM). |
Cheung D.W.L., Kwok W.C.H. and Yee K.C., Consultancy, Architectural Design for MTR Maintenance Management Information System, MTR Corporation Limited. 2005. |
Cheung D.W.L. and Wong D.C.K., Consultancy, Internet Appliance to Serve G2B Integration with SCOPES, Office of the Government Chief Information Officer (OGCIO), HKSAR Government. 2005. |
Cheung D.W.L. and Wong D.C.K., Consultancy, SUNDAY Enterprise Data Model Design, Mandarin Communications Limited, SUNDAY mobile phone carrier. 2005. |
Cheung D.W.L. and Wong D.C.K., Consultancy, Trial Run on Capturing of Vehicle Insurance Data, Transport Department, HKSAR Government. 2005. |
Cheung D.W.L., Lee T.Y.T., Kwok W.C.H., Yee K.C. and Wong D.C.K., Grand Award, Linux Business Award, Hong Kong Linux Business Award Organization Committee. 2005. |
Cheung
D.W.L., Second Generation E-Commerce Technology
, |
Ekambaram
P., Ng T.S.T., Kumaraswamy M.M. and Cheung D.W.L., Enabling automation
in tall building works with wireless technologies and tagging devices, In: Y
K Cheung, K W Chau, |
Mamoulis
N., Cheng K.H., Yiu M.L. and Cheung D.W.L., Efficient Aggregation
of Ranked Inputs, Proceedings of the 22nd International Conference on Data
Engineering (ICDE), |
Wang L., Mamoulis N., Cheung D.W.L. and Yiu S.M., Indexing Useful Structural Patterns for XML Query Processing, IEEE Transaction on Knowledge and Data Engineering. IEEE Computer Society, 2005, 17(7): 997-1009. |
Researcher
: Chin FYL |
Project Title: |
MultiVision Fund |
Investigator(s): |
Chin FYL |
Department: |
Computer Science |
Source(s) of Funding: |
MultiVision Intelligent Surveillance ( |
Start Date: |
07/2003 |
Abstract: |
MultiVision Fund. |
Project Title: |
On-line scheduling with partial job values |
Investigator(s): |
Chin FYL |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2003 |
Completion Date: |
08/2005 |
Abstract: |
To improve the lower bound and to design better algorithms for the on-line scheduling problems; to investigate other on-line problems related to scheduling with partial job values. |
Project Title: |
On-line scheduling with partial job values |
Investigator(s): |
Chin FYL |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
09/2003 |
Abstract: |
N/A |
Project Title: |
DVR-2 Summer Project |
Investigator(s): |
Chin FYL |
Department: |
Computer Science |
Source(s) of Funding: |
MultiVision Systems and Networks Limited - General Award |
Start Date: |
06/2004 |
Completion Date: |
01/2006 |
Abstract: |
DVR-2 Summer Project. |
Project Title: |
Finding motifs for sequences with weak binding sites |
Investigator(s): |
Chin FYL |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2004 |
Completion Date: |
08/2006 |
Abstract: |
To find motifs by considering those sequences which do not contain any binding sites when there are insufficient no. of sequences with binding sites; to consider a more general and realistic model where each sequence contains more than one binding site; to test our proposed algorithms on both real and simulated data. |
Project Title: |
Robust object segmentation method for video surveillance system |
Investigator(s): |
Chin FYL, Chung HY, Mak L.F.S. |
Department: |
Computer Science |
Source(s) of Funding: |
Teaching Company Scheme |
Start Date: |
09/2004 |
Completion Date: |
08/2006 |
Abstract: |
To develop a new and robust object segmentation method specifically for video surveillance systems. |
Project Title: |
Finding motifs for sequences with weak binding sites |
Investigator(s): |
Chin FYL |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
01/2005 |
Abstract: |
N/A |
Project Title: |
Computationally Haplotyping Pedigree Data |
Investigator(s): |
Chin FYL |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
01/2006 |
Abstract: |
N/A |
Project Title: |
Computationally Haplotyping Pedigree Data |
Investigator(s): |
Chin FYL, Smith DK, Song Y |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
01/2006 |
Abstract: |
Minimum Recombination Haplotyping Problem (MRHP): finding a haplotype solution for a given pedigree that is consistent with given genotype data and derived from fewest recombinations (minimizing SUM). (1) The k-MRHP is an MRHP with the additional constraint that the number of recombinations on each haplotype is at most k where k = 0, 1, 2 (minimizing SUM with MAX=k) (2) An efficient algorithm for the k-MRHP when k=0 (3) Software implementation of the efficient algorithm |
List of Research Outputs |
Chan
B.M.Y., Chen D.Z., Chin F.Y.L.
and Wang C.A., Construction of the Nearest Neighbor Embracing Graph of a
Point Set, Journal of Combinatorial Optimization . |
Chan
W.T., Chin F.Y.L., Zhang Y., Zhu H., Shen H. and Wong
P.W.H., A Dynamic Programming Approach Of Finding An Optimal Broadcast
Schedule In Minimizing Total Flow Time, Journal of Combinatorial
Optimization. |
Chan
W.T., Chin F.Y.L., Zhang Y., Zhu H., Shen H. and Wong
P.W.H., Off-Line Algorithms for Minimizing Total Flow Time in Broadcast Scheduling,
Proceedings of the Eleventh Annual International Computing and
Combinatorics Conference (COCOON 2005). |
Chan W.T., Chin F.Y.L., Ye D., Zhang G. and Zhang Y., Online Bin Packing of Fragile Objects with Application in Cellular Networks, In: Xiaotie Deng, Yinyu Ye, The 1st Workshop on Internet and Network Economics (WINE). Springer, 2005, LNCS 3828: 564-573. |
Chin
F.Y.L. and Leung C.M., An Efficient Algorithm
for String Motif Discovery, The Fourth Asia-Pacific Bioinformatics
Conference (APBC 2006). |
Chin
F.Y.L., Cooperative Determination on Cache
Replacement Candidates for Transcoding Proxy Caching, The 3rd
International Networking and |
Chin F.Y.L., Current Bioinformatics. 2006. |
Chin
F.Y.L., Ding Q.H. and Wang |
Chin
F.Y.L., Chrobak M., Fung P.Y., Jawor W., Sgall J. and
Tichý T., Online Competitive Algorithms for Maximizing Weighted Throughput of
Unit Jobs, Journal of Discrete Algorithms. |
Fung P.Y., Chin F.Y.L. and Poon C.K., Approximating the minimum triangulation of convex 3-polytopes with bounded degrees, Computational Geometry: Theory and Applications. Elsevier B.V., 2005, 32(1): 1-12. |
Fung
P.Y., Chin F.Y.L. and Poon
C.K., Laxity Helps in Broadcast Scheduling , The Ninth Italian Conference
on Theoretical Computer Science (ICTCS 2005). Certosa di Pontignano ( |
Leung
C.M. and Chin F.Y.L.,
Algorithms for Challenging Motif Problems, Journal of Bioinformatics and
Computational Biology. |
Leung
C.M. and Chin F.Y.L., An
Efficient Algorithm for the Extended (l,d)-Motif Problem With Unknown Number
of Binding Sites, The Fifth IEEE Symposium on Bioinformatics and
Bioengineering (BIBE 05). |
Leung C.M. and Chin F.Y.L., Finding Exact Optimal Motif in Matrix Representation by Partitioning, Bioinformatics. Oxford University Press, 2005, 21(2): ii86-ii92. |
Leung C.M., Chin F.Y.L., Yiu S.M., Rosenfeld R. and Tsang W.W., Finding Motifs with Insufficient Number of Strong Binding Sites, Journal of Computational Biology. Mary Ann Liebert, Inc, 2005, 12(6): 686-701. |
Leung
C.M. and Chin F.Y.L.,
Generalized Planted (l,d)-Motif Problem with Negative Set, The 5th
Workshop on Algorithms in Bioinformatics (WABI 2005). |
Li K.Q., Shen H. and Chin F.Y.L., Cooperative
Determination on Cache Replacement Candidates for Transcoding Proxy Caching
(Best Paper Award), The 3rd International Networking and Mobile Computing
(ICCNMC 2005). |
Li K.Q., Shen H., Chin F.Y.L. and Huang L.S.,
Multimedia Object Placement for Hybrid Transparent Data Replication, The
IEEE Global Telecommunications Conference (GLOBECOM 2005) - Symposium on
Wireless Communications. |
Li K.Q., Shen H., Chin F.Y.L. and Zheng S.Q., Optimal Methods for Coordinated Enroute Web Caching for Tree Networks, In: Won Kim, ACM Transactions on Internet Technology. Association for Computing Machinery, 2005, 5(3): 480-507. |
So
W.K., Wong K.K.Y., Chung H.Y. and Chin F.Y.L., Shadow Detection for
Vehicles by Locating the Object-Shadow Boundary, 7th IASTED International
Conference on Signal and Image Processing. |
Ye D.,
Chan W.T., Chin F.Y.L., Zhang G. and Zhang Y., On-line Scheduling of Parallel
Jobs on Two Machines, In: Joe Ryan, Prabhu Manyem, Kiki Sugeng, Mirka Miller,
Proceedings of the 16th Australasian Workshop on Combinatorial Algorithms
(AWOCA 2005). |
Yiu W.S., Wong K.K.Y., Chin F.Y.L. and Chung H.Y., Explicit Contour Model for Vehicle Tracking with Automatic Hypothesis Validation, International Conference on Image Processing. Genova, 2005, II: 582-585. |
Zhang Q.F., Chin F.Y.L. and Shen H., Minimum
Parent-Offspring Recombination Haplotype Inference in Pedigrees, In: Corrado
Priami, Alexander Zelikovsky, Transactions on Computational Systems
Biology II. |
Zheng F.F., Chin F.Y.L., Fung P.Y., Poon C.K. and Xu Y.F., A
Tight Lower Bound for Job Scheduling with Cancellation, Information Processing
Letters. The |
List of Research Outputs |
Albocher D., Sarel U., Choi Y.K., Elber G. and Wang W.P., Continuous collision detection for elliptic disks, IEEE Transactions on Robotics. Robotics and Automation Society, 2006, 22: 213-224. |
Albocher D., Sarel U., Choi Y.K., Elber G. and Wang W.P., Efficient Continuous Collision Detection for Bounding Boxes under Rational Motion, The Proceedings of the 2006 IEEE International Conference on Robotics and Automation. IEEE, 2006, 3017-3022. |
Wang X.T., Choi Y.K., Lu W.W. and Wang W.P., Rod-like trabeculae extraction from cancellous bone microstructure using topological analysis, Ninth International Conference on Computer Aided Design and Computer Graphics (CADCG 2005). IEEE Computer Society, 2005, 173-180. |
Researcher
: Chong CF |
List of Research Outputs |
Chow
K.P., Chong C.F., Lai K.Y., Hui C.K., Pun K.H., Tsang W.W. and Chan H.W., Digital Evidence Search Kit, Proceedings
of the First International Workshop on Systematic Approaches to Digital
Forensic Engineering (SADFE 2005). |
Lai
K.Y., Yiu S.M., Chow K.P., Chong C.F. and Hui C.K., An Efficient Bloom Filter
Based Solution for Multiparty Private Matching, SAM’06 The 2006
International Conference on Security & Management. |
Sui
A., Chow S.M., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chong C.F., Pun K.H. and Chan H.W., Separable and Anonymous
Identity-Based Key Issuing, Proceedings of the 11th International
Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) .
|
Researcher
: Chow KP |
Project Title: |
ID-Based Signcryption Schemes: Two Open Problems |
Investigator(s): |
Chow KP |
Department: |
Computer Science |
Source(s) of Funding: |
Incentive Award for RGC CERG Fundable But Not Funded Projects |
Start Date: |
07/2005 |
Completion Date: |
06/2006 |
Abstract: |
N/A |
List of Research Outputs |
Chow
K.P., Chong
C.F., Lai K.Y., Hui C.K., Pun K.H., Tsang W.W. and Chan H.W., Digital Evidence Search Kit, Proceedings
of the First International Workshop on Systematic Approaches to Digital
Forensic Engineering (SADFE 2005). |
Chow S.M., Hui C.K., Yiu S.M. and Chow K.P., Forward-Secure Multisignature and Blind Signature Schemes, Applied Mathematics and Computation. Elsevier , 2005, 168/2: 895-908. |
Chow S.M., Hui C.K., Yiu S.M. and Chow K.P., Two Improved Partially Blind Signature Schemes from Bilinear Pairings, Information Security and Privacy: 10th Australasian Conference (ACISP 2005). Springer, 2005, 3574 of Lecture Notes in Computer Science: 316-328. |
Lai
K.Y., Yiu S.M., Chow K.P., Chong C.F. and Hui C.K., An Efficient Bloom Filter
Based Solution for Multiparty Private Matching, SAM’06 The 2006
International Conference on Security & Management. |
Sui
A., Chow S.M., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chong C.F., Pun K.H. and Chan H.W., Separable and Anonymous
Identity-Based Key Issuing, Proceedings of the 11th International
Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) .
|
Researcher
: Chow SM |
List of Research Outputs |
Chow S.M., Hui C.K., Yiu S.M. and Chow K.P., Forward-Secure Multisignature and Blind Signature Schemes, Applied Mathematics and Computation. Elsevier , 2005, 168/2: 895-908. |
Chow S.M., Lui R.W.C., Hui C.K. and Yiu S.M., Identity Based Delegation Network, 1st International Conference on Cryptology in Malaysia (Mycrypt 2005). Springer, 2005, 3715 of Lecture Notes in Computer Science: 99-115. |
Chow S.M., Hui C.K., Yiu S.M. and Chow K.P., Two Improved Partially Blind Signature Schemes from Bilinear Pairings, Information Security and Privacy: 10th Australasian Conference (ACISP 2005). Springer, 2005, 3574 of Lecture Notes in Computer Science: 316-328. |
Lui R.W.C., Chow S.M., Hui C.K. and Yiu S.M., Role Activation Management in Role Based Access Control, Information Security and Privacy: 10th Australasian Conference (ACISP 2005). Springer, 2005, 3574 of Lecture Notes in Computer Science: 358-369. |
Lui
R.W.C., Chow S.M., Hui C.K. and Yiu S.M., Supporting Efficient
Authorization in Delegation with Supervision , Proceedings of the 11th
International Conference on Parallel and Distribute Systems, Volume II
Workshops (SNDS05) . |
Sui
A., Chow S.M., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chong C.F., Pun K.H. and Chan H.W., Separable and Anonymous
Identity-Based Key Issuing, Proceedings of the 11th International
Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) .
|
Researcher
: Chow Y |
List of Research Outputs |
Wang C.L., Zhang X., Belaramani N., Siu P.L.P., Chow Y. and Lau F.C.M., Software Infrastructure for Context-aware Mobile Computing, In: Weidong Kou and Yelena Yesha, Enabling Technologies for Wireless E-Business. Springer, 2006. |
Researcher
: Chung HY |
List of Research Outputs |
Chung
H.Y., Yung
N.H.C. and Cheung P.Y.S., An
Efficient Parameter-less Quadrilateral-Based Image Segmentation Method, IEEE
Transactions on Pattern Analysis and Machine Intelligence. |
So
W.K., Wong K.K.Y., Chung H.Y. and Chin F.Y.L., Shadow Detection for
Vehicles by Locating the Object-Shadow Boundary, 7th IASTED International
Conference on Signal and Image Processing. |
Yiu W.S., Wong K.K.Y., Chin F.Y.L. and Chung H.Y., Explicit Contour Model for Vehicle Tracking with Automatic Hypothesis Validation, International Conference on Image Processing. Genova, 2005, II: 582-585. |
Researcher
: Dai X |
List of Research Outputs |
Dai
X., Yiu
M.L., Mamoulis N., Tao Y. and
Vaitis M., Probabilistic Spatial Queries on Existentially Uncertain Data, Proceedings
of the 9th International Symposium on Spatial and Temporal Databases (SSTD).
Angra dos Reis, |
Researcher
: Deng H |
List of Research Outputs |
Deng H. and Huo Q., Minutiae Matching Based Fingerprint Verification Using Delaunay Triangulation And Aligned-edge-guided Triangle Matching, In: T. Kanade, A. Jain, and N. K. Ratha , AVBPA 2005 (Audio- and Video-based Biometric Person Authentication 2005), LNCS 3546. Springer-Verlag, 2005, 270-278. |
Researcher
: Fang W |
List of Research Outputs |
Zhu W., Fang W., Wang C.L. and Lau F.C.M., High Performance Computing on Clusters: The Distributed JVM Approach, High Performance Computing: Paradigm and Infrastructure,. John Wiley and Sons, 2005. |
Researcher
: Fung PY |
List of Research Outputs |
Chan W.T., Zhang Y., Fung P.Y., Ye D. and Zhu H., Efficient Algorithms for Finding a Longest Common Increasing Subsequence, In: Xiaotie Deng, Dingzhu Du, The 16th Annual International Symposium on Algorithms and Computation (ISAAC). Springer, 2005, LNCS 3827: 665-674. |
Chin
F.Y.L., Chrobak M., Fung P.Y.,
Jawor W., Sgall J. and Tichý T., Online Competitive Algorithms for Maximizing
Weighted Throughput of Unit Jobs, Journal of Discrete Algorithms. |
Fung P.Y., Chin F.Y.L. and Poon C.K., Approximating the minimum triangulation of convex 3-polytopes with bounded degrees, Computational Geometry: Theory and Applications. Elsevier B.V., 2005, 32(1): 1-12. |
Fung P.Y., Chin F.Y.L. and Poon
C.K., Laxity Helps in Broadcast Scheduling , The Ninth Italian Conference
on Theoretical Computer Science (ICTCS 2005). Certosa di Pontignano ( |
Zheng F.F., Chin F.Y.L., Fung P.Y., Poon C.K. and Xu
Y.F., A Tight Lower Bound for Job Scheduling with Cancellation, Information
Processing Letters. The |
Researcher
: Fung PY |
List of Research Outputs |
Chan W.T., Zhang Y., Fung P.Y., Ye D. and Zhu H., Efficient Algorithms for Finding a Longest Common Increasing Subsequence, In: Xiaotie Deng, Dingzhu Du, The 16th Annual International Symposium on Algorithms and Computation (ISAAC). Springer, 2005, LNCS 3827: 665-674. |
Chin
F.Y.L., Chrobak M., Fung P.Y.,
Jawor W., Sgall J. and Tichý T., Online Competitive Algorithms for Maximizing
Weighted Throughput of Unit Jobs, Journal of Discrete Algorithms. |
Fung P.Y., Chin F.Y.L. and Poon C.K., Approximating the minimum triangulation of convex 3-polytopes with bounded degrees, Computational Geometry: Theory and Applications. Elsevier B.V., 2005, 32(1): 1-12. |
Fung P.Y., Chin F.Y.L. and Poon
C.K., Laxity Helps in Broadcast Scheduling , The Ninth Italian Conference
on Theoretical Computer Science (ICTCS 2005). Certosa di Pontignano ( |
Zheng F.F., Chin F.Y.L., Fung P.Y., Poon C.K. and Xu
Y.F., A Tight Lower Bound for Job Scheduling with Cancellation, Information
Processing Letters. The |
List of Research Outputs |
Tsang
K.C.K., Ho S.C., Tsang M.C.M., Wang C.L. and Lau F.C.M., An Adaptive Multipath
Protocol for Efficient IP Handoff in Mobile Wireless Networks, 20th
International Conference on Advanced Information Networking and Applications
- Volume 1 (AINA'06). |
Researcher
: Hon WK |
List of Research Outputs |
Huynh T.N.D., Hon W.K., Lam T.W. and Sung W.K., Approximate string matching using compressed suffix arrays, In: G. Ausiello, D. Sannella, Theoretical Computer Science. Elsevier, 2006, 352 (1-3): 240-249. |
Researcher
: Hui CK |
Project Title: |
Development of Digital Evidence Search Kit |
Investigator(s): |
Hui CK |
Department: |
Computer Science |
Source(s) of Funding: |
Technology Transfer Seed Fund of Versitech Ltd. - General Award |
Start Date: |
09/2003 |
Completion Date: |
08/2005 |
Abstract: |
To develop digital evidence search kit. |
Project Title: |
Study of multi-signer signature scheme and identity authentication |
Investigator(s): |
Hui CK, Chow KP, Tsang WW, Li Z.C. |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
12/2003 |
Abstract: |
to investigate the security of multi-signer signature schemes, and to design some new schemes with secure and high efficient features. |
Project Title: |
Study of multi-signer signature scheme and identity authentication |
Investigator(s): |
Hui CK, Chow KP, Tsang WW, Li Z.C. |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
12/2003 |
Abstract: |
N/A |
Project Title: |
Authentication for Surveillance System (ATS) |
Investigator(s): |
Hui CK, Tsang WW, Chin FYL, Lau FCM, Mak LFS, Chow KP, Chung RHY |
Department: |
Computer Science |
Source(s) of Funding: |
Matching Grant for Joint Research |
Start Date: |
12/2004 |
Completion Date: |
02/2006 |
Abstract: |
To provide strong evidence for the source of digital video data, includes the proof to the creation equipment and the proof about the creation time of the digital video data. To produce digital signature and place the digital signature into the video data using watermarking techniques. The existence technology of such by the PKI may not be efficient enough. So the implementation work will involve experiementation and tuning of the schemes. |
Project Title: |
Forward secure crytographic schemes for Ad Hoc Network |
Investigator(s): |
Hui CK |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
01/2005 |
Abstract: |
N/A |
Project Title: |
Forward secure crytographic schemes for Ad Hoc Network |
Investigator(s): |
Hui CK, Chow KP, Yiu SM, Li VOK |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
01/2005 |
Abstract: |
To carry out: (1) a forward secure signature scheme to be used in the clients of an ad hoc network. (2) a forward secure threshold signature scheme to be used in the CAs of an ad hoc network. |
List of Research Outputs |
Chow
K.P., Chong C.F., Lai K.Y., Hui C.K., Pun K.H., Tsang W.W. and Chan H.W., Digital Evidence Search Kit, Proceedings
of the First International Workshop on Systematic Approaches to Digital
Forensic Engineering (SADFE 2005). |
Chow S.M., Hui C.K., Yiu S.M. and Chow K.P., Forward-Secure Multisignature and Blind Signature Schemes, Applied Mathematics and Computation. Elsevier , 2005, 168/2: 895-908. |
Chow
S.M., Lui R.W.C., Hui C.K. and Yiu S.M., Identity Based Delegation
Network, 1st International Conference on Cryptology in |
Chow S.M., Hui C.K., Yiu S.M. and Chow K.P., Two Improved Partially Blind Signature Schemes from Bilinear Pairings, Information Security and Privacy: 10th Australasian Conference (ACISP 2005). Springer, 2005, 3574 of Lecture Notes in Computer Science: 316-328. |
Lai
K.Y., Yiu S.M., Chow K.P., Chong C.F. and Hui C.K., An Efficient Bloom Filter
Based Solution for Multiparty Private Matching, SAM’06 The 2006
International Conference on Security & Management. |
Lui R.W.C., Chow S.M., Hui C.K. and Yiu S.M., Role Activation Management in Role Based Access Control, Information Security and Privacy: 10th Australasian Conference (ACISP 2005). Springer, 2005, 3574 of Lecture Notes in Computer Science: 358-369. |
Lui
R.W.C., Chow S.M., Hui C.K. and Yiu S.M., Supporting Efficient
Authorization in Delegation with Supervision , Proceedings of the 11th
International Conference on Parallel and Distribute Systems, Volume II
Workshops (SNDS05) . |
Sui
A., Chow S.M., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chong C.F., Pun K.H. and Chan H.W., Separable and Anonymous
Identity-Based Key Issuing, Proceedings of the 11th International
Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) .
|
Researcher
: Hung RYS |
List of Research Outputs |
Hung
R.Y.S. and Ting
H.F., Design and Analysis of Online Batching Systems, In: M. Kiwi, Proceedings
of the Seventh Latin American Theoretical Informatics Symposium. |
Researcher
: Huo Q |
Project Title: |
Improving robust speech recognition techniques for talking to handheld devices |
Investigator(s): |
Huo Q |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2002 |
Completion Date: |
08/2005 |
Abstract: |
The project will first construct three speech corpora recorded by a handheld device, namely iPAQ pocket PC. New feature and model compensation technique will then be developed to cope with the robust automatic speech recognition (ASR) problem for talking to a handheld device. |
Project Title: |
Towards on-line recognition of continuous Chinese handwriting text on tablet PCs |
Investigator(s): |
Huo Q |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2003 |
Abstract: |
To construct a large scale corpus of Chinese handwriting samples naturally written on Tablet PCs; to investigate new techniques for feature extraction, character modeling, contextual processing and integrated search to cope with the on-line recognition problem of continuously handwritten Chinese sentences; to implement a prototype system on the Tablet PC using the most promising solution identified by investigating the effectiveness of integrating the available techniques in different ways. |
Project Title: |
Towards on-line recognition of continuous Chinese handwriting text on tablet PCs |
Investigator(s): |
Huo Q |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
09/2003 |
Abstract: |
N/A |
Project Title: |
Chinese spoken language processing |
Investigator(s): |
Huo Q |
Department: |
Computer Science |
Source(s) of Funding: |
Anhui USTC iFLYTEK Co. Ltd. - General Award |
Start Date: |
09/2005 |
Abstract: |
To research and develop the state-of-the-art Chinese spoken language processing technology. |
Project Title: |
A Detection and Verification Based Approach for On-line Recognition of Handwritten Chinese Words |
Investigator(s): |
Huo Q |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
09/2005 |
Abstract: |
N/A |
Project Title: |
A Detection and Verification Based Approach for On-line Recognition of Handwritten Chinese Words |
Investigator(s): |
Huo Q |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2005 |
Abstract: |
The objectives of this project are: (1) to investigate a new "detection and verification based approach" for on-line recognition of handwritten Chinese words; (2) to investigate new techniques for feature extraction and character modeling to improve the character classification accuracy as well as the reliability of character verification; (3) to develop a prototype system on Tablet PC, as a test-bed of new ideas, by using the most promising solution identified through the study in this project. The character vocabulary of our recognizer will include 6763 simplified Chinese characters in GB2312-80 standard, 12 frequently used GBK Chinese characters, 62 alphanumeric characters, 140 punctuation marks and symbols. We are aiming at a writer-independent character recognition accuracy of above 90% for naturally written Chinese words derived from our handwriting corpus. |
Project Title: |
A Study of Similarity Measures For Hidden Markov Models and Their Applications in Speech Recognition |
Investigator(s): |
Huo Q |
Department: |
Computer Science |
Source(s) of Funding: |
Seed Funding Programme for Basic Research |
Start Date: |
03/2006 |
Abstract: |
After many years research, Gaussian
mixture continuous density hidden Markov model (CDHMM) remains predominant as
a speech modeling technique in automatic speech recognition (ASR) area. How
to measure the similarity of two given CDHMMs has been an important research
topic for several decades. In a pioneering work, Juang and Rabiner proposed
to use Kullback-Leibler (KL) divergence as a similarity measure of two HMMs
with discrete observation distributions. In order to calculate the KL
divergence, a |
List of Research Outputs |
Bai Z. and Huo Q., A Study On the Use of 8-Directional Features For Online Handwritten Chinese Character Recognition, 8th International Conference on Document Analysis and Recognition (ICDAR-2005). Seoul, Korea, IEEE Computer Society, 2005, 1: 262-266. |
Deng H. and Huo Q., Minutiae Matching Based Fingerprint Verification Using Delaunay Triangulation And Aligned-edge-guided Triangle Matching, In: T. Kanade, A. Jain, and N. K. Ratha , AVBPA 2005 (Audio- and Video-based Biometric Person Authentication 2005), LNCS 3546. Springer-Verlag, 2005, 270-278. |
Huo Q., Member, International Editorial Board, Journal of Chinese Language and Computing. 2005. |
Huo Q., Member, International Editorial Board, Journal of Chinese Language and Computing. 2006. |
Huo Q., Towards Intelligent Multi-Modal Human-Machine Communication on Handheld Devices, Motorola China Research Center (MCRC), Shanghai, China. 2005. |
Huo Q., Zhu D. and Wu J., Unsupervised Online Adaptation of Segmental Switching Linear Gaussian Hidden Markov Models for Robust Speech Recognition, 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing. Toulouse, France, IEEE Signal Processing Society, 2006, 1: 1125-1128. |
Lam Y.K. and Huo Q., A Data Structure Using Hashing and Tries For Efficient Chinese Lexical Access, 8th International Conference on Document Analysis and Recognition (ICDAR-2005). Seoul, Korea, IEEE Computer Society, 2005, 1: 506-510. |
Researcher
: Kao CM |
Project Title: |
Association rule mining on continuous stream data |
Investigator(s): |
Kao CM, Cheung DWL |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2004 |
Abstract: |
To derive efficient online time-based sampling algorithms; to derive efficient approximation algorithms for mining association rules from a single data stream; to derive efficiency algorithms for mining inter-stream associations; to perform time-delayed association analysis. |
Project Title: |
Association rule mining on continuous stream data |
Investigator(s): |
Kao CM |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
01/2005 |
Abstract: |
N/A |
List of Research Outputs |
Chau
M.C.L., Cheng R. and Kao C.M.,
"Uncertain Data Mining: A New Research Direction", Workshop on
the Sciences of the Artificial (WSA 2005). |
Chau
M.C.L., Cheng R., Kao C.M.
and Ng J.Y.L., "Uncertain Data
Mining: An Example in Clustering Location Data", Pacific-Asia
Conference on Knowledge Discovery and Data Mining (PAKDD 2006). |
Cheng R., Kao C.M., Prabhakar S., Kwan K.L. and Tu Y., Adaptive Stream Filters for Entity-based Queries with Non-value Tolerance, The 31st International Conference on Very Large Data Bases . 2005. |
Tao Y., Cheng R., Xiao X., Ngai W.K., Kao C.M. and Prabhakar S., Indexing Multi-Dimensional Uncertain Data with Arbitrary Probability Density Functions, The 31st International Conference on Very Large Data Bases . 2005. |
Researcher
: Karras P |
List of Research Outputs |
Karras P. and Mamoulis N., Detecting the Direction of Motion in a Binary Sensor Network, Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), Taichung, Taiwan, June 2006. 2006. |
Karras
P. and Mamoulis
N., One-Pass Wavelet Synopses for Maximum-Error Metrics, Proceedings
of the 31st Very Large Data Bases Conference (VLDB). |
Researcher
: Karras P |
List of Research Outputs |
Karras P. and Mamoulis N., Detecting the Direction of Motion in a Binary Sensor Network, Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), Taichung, Taiwan, June 2006.. 2006. |
Karras
P. and Mamoulis
N., One-Pass Wavelet Synopses for Maximum-Error Metrics, Proceedings
of the 31st Very Large Data Bases Conference (VLDB). |
Researcher
: Kwan KL |
List of Research Outputs |
Cheng R., Kao C.M., Prabhakar S., Kwan K.L. and Tu Y., Adaptive Stream Filters for Entity-based Queries with Non-value Tolerance, The 31st International Conference on Very Large Data Bases . 2005. |
Researcher
: Kwok WCH |
List of Research Outputs |
Cheung D.W.L., Kwok W.C.H. and Yee K.C., Consultancy, Architectural Design for MTR Maintenance Management Information System, MTR Corporation Limited. 2005. |
Cheung D.W.L., Lee T.Y.T., Kwok W.C.H., Yee K.C. and Wong D.C.K., Grand Award, Linux Business Award, Hong Kong Linux Business Award Organization Committee. 2005. |
List of Research Outputs |
Chow
K.P., Chong C.F., Lai K.Y., Hui C.K., Pun K.H., Tsang W.W. and Chan H.W., Digital Evidence Search Kit, Proceedings
of the First International Workshop on Systematic Approaches to Digital
Forensic Engineering (SADFE 2005). |
Lai K.Y., Yiu S.M., Chow K.P., Chong C.F. and Hui C.K., An Efficient Bloom Filter
Based Solution for Multiparty Private Matching, SAM’06 The 2006
International Conference on Security & Management. |
List of Research Outputs |
Chow
K.P., Chong C.F., Lai K.Y., Hui C.K., Pun K.H., Tsang W.W. and Chan H.W., Digital Evidence Search Kit, Proceedings
of the First International Workshop on Systematic Approaches to Digital
Forensic Engineering (SADFE 2005). |
Lai K.Y., Yiu S.M., Chow K.P., Chong C.F. and Hui C.K., An Efficient Bloom Filter
Based Solution for Multiparty Private Matching, SAM’06 The 2006
International Conference on Security & Management. |
Researcher
: Lam TW |
Project Title: |
Algorithms for uncovering conserved genes on whole genomes |
Investigator(s): |
Lam TW, Sung W.K. |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2004 |
Abstract: |
To investigate the complexity of a maximum common subsequence problem that models mutations between genomes; to design and implement better algorithms and software for uncovering conserved genes. |
Project Title: |
Algorithms for uncovering conserved genes on whole genomes |
Investigator(s): |
Lam TW |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
01/2005 |
Abstract: |
N/A |
List of Research Outputs |
Chan
H.L., Lam T.W. and Liu K.S., Extra unit-speed machines
are almost as powerful as speedy machines for competitive flow time
scheduling, The Sixteen Annual ACM-SIAM Symposium on Discrete Algorithms
(SODA). |
Chan
P.Y., Lam T.W. and Yiu S.M., A More Accurate and Efficient
Whole Genome Phylogeny, The 4th Asia-Pacific Bioinformatics Conference
(APBC). |
Chan W.T., Lam T.W., Liu K.S. and Wong P., New Resource Augmentation Analysis of the Total Stretch of SRPT and SJF in Multiprocessor Scheduling, The 30th International Symposium on Mathematical Foundations of Computer Science (MFCS). Springer, 2005, 3618 (LNCS): 236-247. |
Chan
W.T., Lam T.W., Ting H.F. and Wong W.H., On-line Stream Merging with
Max Span and Min Coverage, Theory of Computing Systems . |
Huynh T.N.D., Hon W.K., Lam T.W. and Sung W.K., Approximate string matching using compressed suffix arrays, In: G. Ausiello, D. Sannella, Theoretical Computer Science. Elsevier, 2006, 352 (1-3): 240-249. |
Lam
T.W., Sung W.K. and Wong S.S., Improved
Approximate String Matching Using Compressed Suffix Data Structures, The
16th Annual International Symposium on Algorithms and Computation. |
List of Research Outputs |
Lam Y.K. and Huo Q., A Data
Structure Using Hashing and Tries For Efficient Chinese Lexical Access, 8th
International Conference on Document Analysis and Recognition (ICDAR-2005).
|
Researcher
: Lau FCM |
Project Title: |
The |
Investigator(s): |
Lau FCM, Feng S.Z. |
Department: |
Computer Science |
Source(s) of Funding: |
Matching Fund for Hi-Tech Research and
Development Program of |
Start Date: |
12/2002 |
Abstract: |
To study grid point of The University of |
Project Title: |
Content adaptation for mobile computing |
Investigator(s): |
Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2003 |
Abstract: |
To design and implement a content adaptation system with context-awareness and which is sensitive to user's preferences; to design and implement an automatic content augmentation tool for content creation. |
Project Title: |
Content adaptation for mobile computing |
Investigator(s): |
Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
09/2003 |
Abstract: |
N/A |
Project Title: |
A holistic approach to structured web document viewing in small devices |
Investigator(s): |
Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2004 |
Abstract: |
To produce a system design covering the content creation, content adaptation, and content rendering aspects of Web content viewing on a mobile handheld device, whereby any viewing activity will be seen as complete, fast, and easy. |
Project Title: |
HP mobile technology for teaching initiative |
Investigator(s): |
Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
Hewlett-Packard HK SAR Ltd. |
Start Date: |
10/2004 |
Abstract: |
To develop HP mobile technology for teaching initiative. |
Project Title: |
A holistic approach to structured web document viewing in small devices |
Investigator(s): |
Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
01/2005 |
Abstract: |
N/A |
Project Title: |
Intelligent Systems for Painting and Calligraphy |
Investigator(s): |
Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
09/2005 |
Abstract: |
N/A |
Project Title: |
Intelligent Systems for Painting and Calligraphy |
Investigator(s): |
Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2005 |
Abstract: |
The objectives of this proposed project are: (1)To apply point-based techniques to achieve fast rendering of the brush geometry, and to consider image-based rendering algorithms for high quality rendering of the animated brush. (2) To incorporate the smooth particles hydrodynamics method borrowed from astrophysics in the dynamics simulation of the brush. (3) To apply particle diffusion (from chemistry/physics) to simulate the complex pigment behavior. (4) To devise an intelligent system component for training the brush to adapt to “personal habitual bias” of the user. (5) To extend the present calligraphy generation system with a feedback reinforcement learning component to strengthen the constraint satisfaction process. (6) To explore possible new recognition algorithms for calligraphic writings of which the characters are severely distorted. |
Project Title: |
UGC-Matching Grant Scheme (2nd Phase)-Process Migration and Runtime Scheduling for Parallel Tasks in Computational Grids |
Investigator(s): |
Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
Other Funding Scheme |
Start Date: |
05/2006 |
Abstract: |
To study process migration and runtime scheduling for parallel tasks in computational grids. |
List of Research Outputs |
Chen L., Ma T.C., Wang C.L., Lau F.C.M. and Li S.P., G-JavaMPI: A Grid Middleware for Transparent MPI Task Migration, In: Beniamino Di Martino et al., Engineering the Grid: Status and Perspective. American Scientific Publishers, 2006. |
Liu P., LI S., Lau F.C.M., Shi Y. and Huang F., RAID-M: a High
Performance RAID Matrix Mass Storage, Science in |
Lum
W.Y. and Lau F.C.M.,
Relationship-aware Content Adaptation of Structured Web Documents for Mobile
Computing, 11th International Conference on Parallel and Distributed
Systems (ICPADS 2005). |
Sit
Y.F., Lau F.C.M. and Wang C.L., On The Cooperation of Web
Clients and Proxy Caches, 11th International Conference on Parallel and
Distributed Systems (ICPADS 2005). |
Tsang
K.C.K., Ho S.C., Tsang M.C.M., Wang C.L. and Lau F.C.M., An Adaptive Multipath
Protocol for Efficient IP Handoff in Mobile Wireless Networks, 20th
International Conference on Advanced Information Networking and Applications
- Volume 1 (AINA'06). |
Wang C.L., Zhang X., Belaramani N., Siu P.L.P., Chow Y. and Lau F.C.M., Software Infrastructure for Context-aware Mobile Computing, In: Weidong Kou and Yelena Yesha, Enabling Technologies for Wireless E-Business. Springer, 2006. |
Xu S.H., Pan Y.H., Zhuang Y.T. and Lau F.C.M., Synthesis Reasoning and Its Application in Calligraphy Generation, Acta Automatica Sinica. 2005, 31(4): 495-509. |
Zhu
D., Lau F.C.M., Wang C.L., Lam W.K., He C., Wang X.,
Chen Y. and Li S., Design of an OGSA Based MetaService Architecture, The
International Workshop on Grid and Cooperative Computing (GCC 2004). |
Zhu W., Fang W., Wang C.L. and Lau F.C.M., High Performance Computing on Clusters: The Distributed JVM Approach, High Performance Computing: Paradigm and Infrastructure,. John Wiley and Sons, 2005. |
Researcher
: Lee LK |
List of Research Outputs |
Lee
L.K. and Ting
H.F., A Simpler and More Efficient Deterministic Scheme for Finding
Frequent Items Over Sliding Windows, In: J. Van den Bussche, Proceedings
of the Twenty-fifth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of
Database Systems. |
Lee L.K. and Ting H.F., Proceedings of the 17th ACM-SIAM Symposium on Discrete Algorithms, Maintain significant statistics over sliding window. 2006. |
Researcher
: Lee TYT |
List of Research Outputs |
Cheung D.W.L., Lee T.Y.T., Kwok W.C.H., Yee K.C. and Wong D.C.K., Grand Award, Linux Business Award, Hong Kong Linux Business Award Organization Committee. 2005. |
Researcher
: Leung CM |
List of Research Outputs |
Chin
F.Y.L. and Leung C.M.,
An Efficient Algorithm for String Motif Discovery, The Fourth Asia-Pacific
Bioinformatics Conference (APBC 2006). |
Leung C.M. and Chin F.Y.L.,
Algorithms for Challenging Motif Problems, Journal of Bioinformatics and
Computational Biology. |
Leung C.M. and Chin F.Y.L., An
Efficient Algorithm for the Extended (l,d)-Motif Problem With Unknown Number
of Binding Sites, The Fifth IEEE Symposium on Bioinformatics and
Bioengineering (BIBE 05). |
Leung C.M. and Chin F.Y.L., Finding Exact Optimal Motif in Matrix Representation by Partitioning, Bioinformatics. Oxford University Press, 2005, 21(2): ii86-ii92. |
Leung C.M., Chin F.Y.L., Yiu S.M., Rosenfeld R. and Tsang W.W., Finding Motifs with Insufficient Number of Strong Binding Sites, Journal of Computational Biology. Mary Ann Liebert, Inc, 2005, 12(6): 686-701. |
Leung C.M. and Chin F.Y.L., Generalized Planted (l,d)-Motif Problem with Negative Set, The 5th Workshop on Algorithms in Bioinformatics (WABI 2005). Mallorca, Spain, Springer Berlin / Heidelberg, 2005, LNBI 3692: 264-275. |
Researcher
: Leung CM |
List of Research Outputs |
Chin F.Y.L. and Leung C.M., An Efficient Algorithm for String Motif Discovery, The Fourth Asia-Pacific Bioinformatics Conference (APBC 2006). Taipei, Taiwan, 2006, 79-88. |
Leung C.M. and Chin F.Y.L., Algorithms for Challenging Motif Problems, Journal of Bioinformatics and Computational Biology. Singapore, World Scientific Publishing Company, 2006, 4(1): 43-58. |
Leung C.M. and Chin F.Y.L., An Efficient Algorithm for the Extended (l,d)-Motif Problem With Unknown Number of Binding Sites, The Fifth IEEE Symposium on Bioinformatics and Bioengineering (BIBE 05). Minneapolis, Minnesota, USA, IEEE Computer Society, 2005, 11-18. |
Leung C.M. and Chin F.Y.L., Finding Exact Optimal Motif in Matrix Representation by Partitioning, Bioinformatics. Oxford University Press, 2005, 21(2): ii86-ii92. |
Leung C.M., Chin F.Y.L., Yiu S.M., Rosenfeld R. and Tsang W.W., Finding Motifs with Insufficient Number of Strong Binding Sites, Journal of Computational Biology. Mary Ann Liebert, Inc, 2005, 12(6): 686-701. |
Leung C.M. and Chin F.Y.L., Generalized Planted (l,d)-Motif Problem with Negative Set, The 5th Workshop on Algorithms in Bioinformatics (WABI 2005). Mallorca, Spain, Springer Berlin / Heidelberg, 2005, LNBI 3692: 264-275. |
Researcher
: Liang C |
List of Research Outputs |
Chen H., Wong K.K.Y., Liang C. and Chen Y., Extracting Surface Representations from Rim Curves, Asian Conference on Computer Vision . Hyderabad, India, 2006, II: 732-741. |
Researcher
: Liu KS |
List of Research Outputs |
Chan H.L., Lam T.W. and Liu K.S., Extra unit-speed machines are almost as powerful as speedy machines for competitive flow time scheduling, The Sixteen Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). New York & Philadelphia, ACM and SIAM, 2006, 334-343. |
Chan W.T., Lam T.W., Liu K.S. and Wong P., New Resource Augmentation Analysis of the Total Stretch of SRPT and SJF in Multiprocessor Scheduling, The 30th International Symposium on Mathematical Foundations of Computer Science (MFCS). Springer, 2005, 3618 (LNCS): 236-247. |
Researcher
: Lu H |
List of Research Outputs |
Chan W.K., Chen T.Y., Lu H., Tse T.H. and Yau S.S., A metamorphic approach to integration testing of context-sensitive middleware-based applications, Proceedings of the 5th International Conference on Quality Software (QSIC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005, 241−249. |
Researcher
: Lui RWC |
List of Research Outputs |
Chow S.M., Lui R.W.C., Hui C.K. and Yiu S.M., Identity Based Delegation Network, 1st International Conference on Cryptology in Malaysia (Mycrypt 2005). Springer, 2005, 3715 of Lecture Notes in Computer Science: 99-115. |
Lui R.W.C., Chow S.M., Hui C.K. and Yiu S.M., Role Activation Management in Role Based Access Control, Information Security and Privacy: 10th Australasian Conference (ACISP 2005). Springer, 2005, 3574 of Lecture Notes in Computer Science: 358-369. |
Lui R.W.C., Chow S.M., Hui C.K. and Yiu S.M., Supporting Efficient Authorization in Delegation with Supervision , Proceedings of the 11th International Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) . United States of America, IEEE Computer Society Conference Publishing Services, 2005, 2: 240-244. |
Researcher
: Lum WY |
List of Research Outputs |
Lum W.Y. and Lau F.C.M., Relationship-aware Content Adaptation of Structured Web Documents for Mobile Computing, 11th International Conference on Parallel and Distributed Systems (ICPADS 2005). Fukuoka, Japan, 2005. |
Researcher
: Mamoulis N |
Project Title: |
Storage schemes and search algorithms for high dimensional data |
Investigator(s): |
Mamoulis N |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2002 |
Completion Date: |
02/2006 |
Abstract: |
New applications, like muti-media/time-series databases, OLAP, and data mining, require efficient management of high dimensional data. The project will deal with the development of novel technquies of storing and searching high dimensional data. The research will focus on the decomposed storage model that fragments the data dimension-wise, as opposed to the conventional record-wise approach. |
Project Title: |
Evaluation of proximity queries over spatial road networks |
Investigator(s): |
Mamoulis N, Papadias D. |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2003 |
Completion Date: |
02/2006 |
Abstract: |
To device access methods for spatial road networks; to combine network indexes with spatial indexes in order to process fast spatial queries with network proximity components; to make these methods applicable for large problems; to provide solutions for dynamic-location data. |
Project Title: |
Evaluation of proximity queries over spatial road networks |
Investigator(s): |
Mamoulis N, Papadias D. |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
09/2003 |
Abstract: |
N/A |
Project Title: |
Periodicity of movement in spatiotemporal databases |
Investigator(s): |
Mamoulis N |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
01/2005 |
Abstract: |
N/A |
Project Title: |
Periodicity of movement in spatiotemporal databases |
Investigator(s): |
Mamoulis N |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
01/2005 |
Completion Date: |
12/2006 |
Abstract: |
To develop the effective data mining algorithms that can discover periodic object movement patterns; to develop the indexes that cluster object movements based on the discovered periodic patterns; to study the discovery of patterns which are weighted according to how recently their instances appear. |
Project Title: |
Continuous Constraint Query Evaluation for Spatio-temporal Data Sequences |
Investigator(s): |
Mamoulis N |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
09/2005 |
Abstract: |
N/A |
Project Title: |
Continuous Constraint Query Evaluation for Spatio-temporal Data Sequences |
Investigator(s): |
Mamoulis N, Cheung DWL |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2005 |
Abstract: |
The main objectives of this project are: (1) The development of effective techniques that manage and index incoming events in memory. These techniques will take adantage of the special nature of the queries to minimize the required memory. (2) The development of appropriate algorithms for evaluation of CCQ. The algorithms should consider the online, dynamic nature of the queries. Each time a new event arrives, we need to validate whether it forms a query result with past events. (3) The development of approximate management and query evaluation solutions for problem settings, when the required memory is smaller than the available. For such cases, we should consider data structures like spatiotemporal histograms, which could allow query evaluation with some uncertainty. (4) The integration of the developed system with a spatiotemporal pattern mining module that will automatically define the CCQs. |
List of Research Outputs |
Cao
H.P., Mamoulis N. and Cheung D.W.L., Mining Frequent
Spatio-temporal Sequential Patterns, Proceeding of the Fifth IEEE
International Conference on Data Mining (ICDM 2005). |
Cao
H.P., Mamoulis N. and Cheung D.W.L., Mining Frequent
Spatio-temporal Sequential Patterns, Proceedings of the 5th IEEE
International Conference on Data Mining (ICDM). |
Dai
X., Yiu M.L., Mamoulis N., Tao Y. and Vaitis M.,
Probabilistic Spatial Queries on Existentially Uncertain Data, Proceedings
of the 9th International Symposium on Spatial and Temporal Databases (SSTD).
Angra dos Reis, |
Kalnis P., Mamoulis N., Bakiras S. and Li X., Ad-hoc distributed
spatial joins on mobile devices, Proceedings of the 20th IEEE International
Parallel and Distributed Processing Symposium (IPDPS), |
Kalnis P., Mamoulis N. and Bakiras S., On
Discovering Moving Clusters in Spatio-temporal Data, Proceedings of the
9th International Symposium on Spatial and Temporal Databases (SSTD).
Angra dos Reis, |
Karras P. and Mamoulis N., Detecting the Direction of Motion in a Binary Sensor Network, Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), Taichung, Taiwan, June 2006.. 2006. |
Karras
P. and Mamoulis N.,
One-Pass Wavelet Synopses for Maximum-Error Metrics, Proceedings of the
31st Very Large Data Bases Conference (VLDB). |
Mamoulis
N., Cheng
K.H., Yiu M.L. and Cheung D.W.L., Efficient Aggregation of
Ranked Inputs, Proceedings of the 22nd International Conference on Data
Engineering (ICDE), |
Mamoulis
N., Bakiras S. and Kalnis P., Evaluation of
Top-k OLAP Queries Using Aggregate R--trees, Proceedings of the 9th
International Symposium on Spatial and Temporal Databases (SSTD). Angra
dos Reis, |
Mamoulis N., Papadias D. and Theodoridis Y., Spatial Joins: Algorithms, Cost Models and Optimization Techniques, In: Manolopoulos, Papadopoulos, Vassilakopoulos, Spatial Databases: Technologies, Techniques and Trends. Hershey PA, USA, IDEA Group Publishing, 2005, 155-184. |
Wang L., Mamoulis N., Cheung D.W.L. and Yiu S.M., Indexing Useful Structural Patterns for XML Query Processing, IEEE Transaction on Knowledge and Data Engineering. IEEE Computer Society, 2005, 17(7): 997-1009. |
Wong K.K. and Mamoulis N., First Look at Average-Case Complexity for Planar Maximum-Likelihood Detection, Proceedings of the 5th IEEE International Conference on Information, Communications and Signal Processing (ICICS), Bangkok, Thailand, December 2005.. 2005. |
Yiu M.L., Mamoulis N. and Tao Y., Efficient Quantile Retrieval on Multi-dimensional Data, Proceedings of the 10th International Conference on Extending Database Technology (EDBT), Munich, Germany, March 2006.. 2006. |
Yiu M.L. and Mamoulis N., Reverse Nearest Neighbors Search in Ad-hoc Subspaces, Proceedings of the 22nd International Conference on Data Engineering (ICDE), Altanta, GA, April 2006.. 2006. |
Yiu M.L., Papadias D., Mamoulis N. and Tao Y., Reverse Nearest Neighbors in Large Graphs, IEEE Transactions on Knowledge and Data Engineering (TKDE). IEEE, 2006, 18(4): 540-553. |
Researcher
: Mitcheson GR |
List of Research Outputs |
Researcher
: Ng CK |
List of Research Outputs |
Ng C.K.
and Chan H.W., Performance Modeling
of Level Switching in Multitier |
Researcher
: Ngai WK |
List of Research Outputs |
Tao Y., Cheng R., Xiao X., Ngai W.K., Kao C.M. and Prabhakar S., Indexing Multi-Dimensional Uncertain Data with Arbitrary Probability Density Functions, The 31st International Conference on Very Large Data Bases . 2005. |
Researcher
: Peng Z |
List of Research Outputs |
Peng Z.
and Ting H.F., An efficient reduction
from constrained to unconstrained agreement subtrees, In: Rita Casadio, Gene
Myers, Proceeding of the 5th international workshop on algorithms in
bioinformatics. |
Researcher
: Pun KH |
Project Title: |
Community Legal Information Project |
Investigator(s): |
Pun KH |
Department: |
Computer Science |
Source(s) of Funding: |
Department of Justice, HKSAR Government - General Award |
Start Date: |
04/2004 |
Abstract: |
To study community legal information. |
List of Research Outputs |
Chow
K.P., Chong C.F., Lai K.Y., Hui C.K., Pun K.H., Tsang W.W. and Chan H.W., Digital Evidence Search Kit, Proceedings
of the First International Workshop on Systematic Approaches to Digital
Forensic Engineering (SADFE 2005). |
Pun
K.H., Scholarly book, The Annotated
Ordinances of |
Sui
A., Chow S.M., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chong C.F., Pun K.H. and Chan H.W., Separable and Anonymous
Identity-Based Key Issuing, Proceedings of the 11th International
Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) .
|
Researcher
: Shi Y |
List of Research Outputs |
Liu P., LI S., Lau F.C.M., Shi Y. and Huang F., RAID-M: a High
Performance RAID Matrix Mass Storage, Science in |
Researcher
: Sit YF |
List of Research Outputs |
Sit
Y.F., Lau
F.C.M. and Wang C.L., On The
Cooperation of Web Clients and Proxy Caches, 11th International Conference
on Parallel and Distributed Systems (ICPADS 2005). |
Researcher
: Siu PLP |
List of Research Outputs |
Wang C.L., Zhang X., Belaramani N., Siu P.L.P., Chow Y. and Lau F.C.M., Software Infrastructure for Context-aware Mobile Computing, In: Weidong Kou and Yelena Yesha, Enabling Technologies for Wireless E-Business. Springer, 2006. |
Researcher
: So WK |
List of Research Outputs |
So
W.K., Wong
K.K.Y., Chung H.Y. and Chin F.Y.L., Shadow Detection for
Vehicles by Locating the Object-Shadow Boundary, 7th IASTED International
Conference on Signal and Image Processing. |
Researcher
: Sui A |
List of Research Outputs |
Sui
A., Chow
S.M., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chong C.F., Pun K.H. and Chan H.W., Separable and Anonymous
Identity-Based Key Issuing, Proceedings of the 11th International
Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) .
|
Researcher
: Ting HF |
Project Title: |
Algorithmic issues on designing media-on-demand systems |
Investigator(s): |
Ting HF, Lam TW |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
08/2002 |
Abstract: |
With the use of relative-competitive analysis for online systems, the project attempts to provide a theoretical foundation for comparing different media-on-demand (MOD) systems and thus helps to decide scientifically the right configurations. It is anticipated that results of the analysis can be used to design schedulers with performance guarantee and implement computational tools for building cost-effective MOD systems. |
Project Title: |
Design and analysis of online batching systems-- An algorithmic study on the virtues of paitence and sharing |
Investigator(s): |
Ting HF |
Department: |
Computer Science |
Source(s) of Funding: |
Incentive Award for RGC CERG Fundable But Not Funded Projects |
Start Date: |
07/2005 |
Completion Date: |
06/2006 |
Abstract: |
N/A |
List of Research Outputs |
Chan
W.T., Lam T.W., Ting H.F. and Wong W.H., On-line Stream Merging with
Max Span and Min Coverage, Theory of Computing Systems . |
Hung
R.Y.S. and Ting H.F.,
Design and Analysis of Online Batching Systems, In: M. Kiwi, Proceedings
of the Seventh Latin American Theoretical Informatics Symposium. |
Lee
L.K. and Ting H.F., A
Simpler and More Efficient Deterministic Scheme for Finding Frequent Items
Over Sliding Windows, In: J. Van den Bussche, Proceedings of the
Twenty-fifth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database
Systems. |
Lee L.K. and Ting H.F., Proceedings of the 17th ACM-SIAM Symposium on Discrete Algorithms, Maintain significant statistics over sliding window. 2006. |
Peng
Z. and Ting H.F., An
efficient reduction from constrained to unconstrained agreement subtrees, In:
Rita Casadio, Gene Myers, Proceeding of the 5th international workshop on
algorithms in bioinformatics. |
Ting
H.F., A Near Optimal Scheduler for Scheduling
Data Broadcasts, In: M Calamoneri, Proceedings of the Sixth International
Conference on Algorithms and Complexity. |
Researcher
: Towey DP |
List of Research Outputs |
Chan
K.P., Chen T.Y. and Towey
D.P., Adaptive Random Testing with Filtering: An Overhead Reduction
Technique, 17th International Conference on Software Engineering and
Knowledge Engineering (SEKE'05). |
Chan K.P., Chen T.Y. and Towey D.P., Restricted Random Testing: Adaptive Random Testing by Exclusion, International Journal of Software Engineering and Knowledge Engineering. 2005, 16(4): 553-584. |
Researcher
: Towey DP |
List of Research Outputs |
Chan
K.P., Chen T.Y. and Towey
D.P., Adaptive Random Testing with Filtering: An Overhead Reduction
Technique, 17th International Conference on Software Engineering and
Knowledge Engineering (SEKE'05). |
Chan K.P., Chen T.Y. and Towey D.P., Restricted Random Testing: Adaptive Random Testing by Exclusion, International Journal of Software Engineering and Knowledge Engineering. 2005, 16(4): 553-584. |
Researcher
: Tsang KCK |
List of Research Outputs |
Tsang K.C.K., Ho S.C., Tsang M.C.M., Wang C.L. and Lau F.C.M., An Adaptive Multipath Protocol for Efficient IP Handoff in Mobile Wireless Networks, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06). Vienna, Austria, IEEE Computer Society, 2006, 1: 503-510. |
Researcher
: Tsang MCM |
List of Research Outputs |
Tsang K.C.K., Ho S.C., Tsang M.C.M., Wang C.L. and Lau F.C.M., An Adaptive Multipath Protocol for Efficient IP Handoff in Mobile Wireless Networks, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06). Vienna, Austria, IEEE Computer Society, 2006, 1: 503-510. |
Researcher
: Tsang WW |
Project Title: |
Tests for uniformity |
Investigator(s): |
Tsang WW |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
01/2005 |
Abstract: |
N/A |
Project Title: |
Tests for uniformity |
Investigator(s): |
Tsang WW, Chow KP, Hui CK, Chan HW, Chong CF, Pun KH, Marsaglia G. |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
01/2005 |
Abstract: |
To develop accurate and easy-to-compute C programs for the cumulative distribution functions of the KS statistic and the Anderson-Darling statistic; to conduct a fair and thorough comparison on the power of various tests for uniformity; to develop new tests for uniformity. |
Project Title: |
Evaluating the CDF of the Kolmogorov Statistic for unknown parameter case |
Investigator(s): |
Tsang WW, Chong CF |
Department: |
Computer Science |
Source(s) of Funding: |
Small Project Funding |
Start Date: |
09/2005 |
Abstract: |
A goodness-of-fit test checks whether a set of samples follows a hypothetical distribution. The most common test for checking discrete samples is the chi-square test. The counterpart for real samples is the Kolmogorov-Smirnov (KS) test [3,5]. Consider an ordered set of samples, x1≤x2≤…≤xn, and the hypothetical distribution, F(x), where all parameters of F(x) are known. The empirical distribution function (EDF) is defined as / | 0, x < x1, Fn(x) = < k/n , xk ≤ x < xk+1, k = 1,2,…,n-1, | 1, xn ≤ x. \The Kolmogorov statistic, Dn, measures the maximum absolute distance between F(x) and Fn(x). The test result is conventionally determined by looking up tables of the critical values of Dn obtained from simulation [6]. In 2003, we developed a program that evaluates the cumulative distribution function (CDF) of Dn with 13-digit accuracy for 2 ≤ n ≤ 16000 [4]. The test result can thus be determined from the CDF of Dn. However, the KS test is still not quit readily applicable because the parameters of F(x) are often unspecified in real world applications. For example, in the testing of exponentiality, usually we have no idea on the mean of the exponential distribution. Therefore, we need to first estimate the mean from the samples. Then we check whether the samples follow the exponential distribution of this mean. The Dn so computed is noticeably smaller than that of the case where the mean is known beforehand. Durbin is the first scholar who advocates the study of the difference between the two cases [1,2]. Stephens has worked out a couple approximation formulas for the CDFs of two unknown parameter cases [7]. However, these formulas deviate from the true values by as much as 2%. Such extent of errors is not cmmensurate with the modern computing capability. The objective of this project is to develop accurate computer programs that evaluate the CDFs of Dn for the tests of normality and exponentiality, the two most common goodness-of-fit tests in unknown parameter case.Reference[1] J. Durbin, Distribution theory for tests based on the sample distribution function, Regional Conference Series in Applied Mathematics (9), SIAM, Philadelphia, 1973.[2] J. Durbin, Kolmogorov-smirnov tests when parameters are estimated, with applications to tests of exponentiality and tests on spacings, Biometrika, 62(1): 5-22, 1975.[3] A. Kolmogorov, Sulla determinazione empirical ei una legge di distributione, Giornale Dell' Istituto Italiano Degli Attuari, 4:83-91, 1933.[4] G. Marsaglia, W. W. Tsang and J. Wang, Evaluating Kolmogorov's distribution, Journal of Statistical Software, 8(18): 1-4, 2003.[5] N. V. Smirnov, On the deviation of the empirical distribution function, Recreational Mathematics (Mat. Sbornik), 6:3-26, 1939.[6] M. A. Stephens, EDF statistics for goodness of fit and some comparisons, Journal of the American Statistical Association, 69 (347): 730-737, 1974.[7] M. A. Stephens, Asymptotic results for goodness-of-fit statistics with unknown parameters, Annuals of Statistics, 4:357-369, 1976. |
List of Research Outputs |
Chow K.P., Chong C.F., Lai K.Y., Hui C.K., Pun K.H., Tsang W.W. and Chan H.W., Digital Evidence Search Kit, Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005). Los Alamitos, California, IEEE Computer Society Press, 2005, 187-194. |
Ding Q., Qian J., Tsang W.W. and Wang C., Randomly Generating Triangulations of a Simple Polygon, Lecture Notes in Computer Science (LNCS), Computing and Combinatorics, L. Wang (Ed.), Proceedings of the 11th Annual International Computing and Combinatorics Conference (COCOON). Kunming, China, Springer-Verlag, 2005, 3595: 471-480. |
Ding Q., Qian J., Tsang W.W. and Wang C., Randomly Generating Triangulations of a Simple Polygon, Proceedings of the 11th Annual International Computing and Combinatorics Conference (COCOON). Kunming, China, 2005, 471-480. |
Leung C.M., Chin F.Y.L., Yiu S.M., Rosenfeld R. and Tsang W.W., Finding Motifs with Insufficient Number of Strong Binding Sites, Journal of Computational Biology. Mary Ann Liebert, Inc, 2005, 12(6): 686-701. |
Sui A., Chow S.M., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chong C.F., Pun K.H. and Chan H.W., Separable and Anonymous Identity-Based Key Issuing, Proceedings of the 11th International Conference on Parallel and Distribute Systems, Volume II Workshops (SNDS05) . United States of America, IEEE Computer Society Conference Publishing Services, 2005, 2: 275-279. |
Researcher
: Tse TH |
Project Title: |
Towards an integrated method for program verification, testing and debugging |
Investigator(s): |
Tse TH, Chen T.Y. |
Department: |
Computer Science |
Source(s) of Funding: |
Incentive Award for RGC CERG Fundable But Not Funded Projects |
Start Date: |
07/2003 |
Abstract: |
N/A |
Project Title: |
Towards an integrated method for program testing, proving debugging |
Investigator(s): |
Tse TH, Chen T.Y. |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2004 |
Abstract: |
To provide an integrated method for testing, proving and debugging; to reduce the cost of software quality assurance by improving on individual techniques for testing, proving and debugging; to improve on the quality and relaibility of the software thus produced; to provide software engineers with effective testing, proving and debugging tools. |
Project Title: |
27th Annual international computer software and applications conference |
Investigator(s): |
Tse TH |
Department: |
Computer Science |
Source(s) of Funding: |
Croucher Foundation - Conference / Seminars |
Start Date: |
09/2004 |
Abstract: |
27th Annual international computer software and applications conference |
Project Title: |
Towards an integrated method for program testing, proving and debugging |
Investigator(s): |
Tse TH |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
01/2005 |
Abstract: |
N/A |
Project Title: |
TIRAMISU: testing conText-sensItive, concurRent And MIddleware-baSed Ubiquitous software |
Investigator(s): |
Tse TH |
Department: |
Computer Science |
Source(s) of Funding: |
Incentive Award for RGC CERG Fundable But Not Funded Projects |
Start Date: |
07/2005 |
Completion Date: |
06/2006 |
Abstract: |
N/A |
Project Title: |
TIRAMISU: testing conText-sensItive, concurRent And MIddleware-baSed Ubiquitous software |
Investigator(s): |
Tse TH, Chen T.Y. |
Department: |
Computer Science |
Source(s) of Funding: |
Seed Funding Programme for Basic Research |
Start Date: |
02/2006 |
Abstract: |
Ubiquitous computing means computing
anywhere and at any time. Context-sensitive ubiquitous software dynamically
adapts its operations according to the changing environment. One of the
strategic directions of |
List of Research Outputs |
Chan F.T., Tse T.H., Tang W.H. and Chen T.Y., Software testing education and training in Hong Kong, International Workshop on Education and Training for Quality Software Engineering, Proceedings of the 5th International Conference on Quality Software (QSIC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005, 313−316. |
Chan W.K., Chen T.Y., Lu H., Tse T.H. and Yau S.S., A metamorphic approach to integration testing of context-sensitive middleware-based applications, Proceedings of the 5th International Conference on Quality Software (QSIC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005, 241−249. |
Chan
W.K., Cheng M.Y., Cheung
S.C. and Tse T.H., Automatic
goal-oriented classification of failure behaviors for testing XML-based
multimedia software applications: an experimental case study, Journal of
Systems and Software. |
Chan
W.K., Cheung S.C. and Tse T.H.,
Fault-based testing of database application programs with conceptual data
model, Proceedings of the 5th International Conference on Quality Software
(QSIC 2005), IEEE Computer Society Press, |
Chen
T.Y., Poon P.L., Tang S.F., Tse
T.H. and Yu Y.T., Applying testing to requirements inspection for
software quality assurance, In: Information Systems Control Journal, Information
Systems Control Journal. |
Chen
T.Y., Poon P.L., Tang S.F. and Tse
T.H., Identification of categories and choices in activity diagrams, Proceedings
of the 5th International Conference on Quality Software (QSIC 2005), IEEE
Computer Society Press, |
Ehrich H.D., Schewe K.D. and Tse T.H., Editorial, Special Issue
for the 4th International Conference on Quality Software, Journal of
Systems and Software. |
Ehrich H.D., Schewe K.D. and Tse T.H., Guest Editor, Special Issue
for the 4th International Conference on Quality Software, Journal of
Systems and Software. |
Tse
T.H., Chen
T.Y. and Glass R.L., An assessment of systems and software engineering
scholars and institutions (2000-2004), Journal of Systems and Software.
|
Tse
T.H., Cover Design, Proceedings of the 5th
International Conference on Quality Software (QSIC 2005). IEEE Computer
Society Press, |
Tse
T.H., Editor, Journal of Systems and
Software. Elsevier, |
Tse
T.H., Foundation Editor, Journal for
Universal Computer Science. Springer, |
Tse
T.H., Message from the steering committee
chair, Proceedings of the 5th International Conference on Quality Software
(QSIC 2005), IEEE Computer Society Press, |
Tse T.H., Research directions in model-based metamorphic testing and verification, Proceedings of the 29th Annual International Computer Software and Applications Conference (COMPSAC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005. |
Researcher
: Wang CL |
Project Title: |
The HKU Grid Computing Research Center |
Investigator(s): |
Wang CL, Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
The University of Hong Kong Foundation Seed Grant |
Start Date: |
07/2003 |
Abstract: |
To share resources and knowledge under
the theme of grid computing; to collaborate on a joint effort to develop the |
Project Title: |
A component-based software architecture for context-aware pervasive computing |
Investigator(s): |
Wang CL, Lau FCM |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2004 |
Abstract: |
To carry out: (1) proactive and context-aware adaptation: to realize the functionality adaptation. The proposed adaptation mechanism should be able to proactively discover contextual information and make applications constantly adapt to the changing environment. (2) mobility Support: to explore the possibilities of using the facet model to achieve better mobility in the pervasive world. In particular, the proposed system will support user mobility, which allows nomadic users to continue their job while switching from device to device. (3) software Extensibility: to build a real-life pervasive application using facets, to demonstrate that the functionalities and the scale of the application could be very extensibe and no longer be restricted by the resource-constrained devices. |
Project Title: |
Session continuity for mobile computing |
Investigator(s): |
Wang CL |
Department: |
Computer Science |
Source(s) of Funding: |
Small Project Funding |
Start Date: |
11/2004 |
Abstract: |
To construct the missing session layer support on top of the TCP, which masks network changes caused by terminal mobility from the applications, thereby maintaining virtually uninterrupted dialogs between endpoints; to design a name service which supports flexible mappings between logical entities and their network addresses, and to tackle the inherent performance issues. |
Project Title: |
A component-based software architecture for context-aware pervasive computing |
Investigator(s): |
Wang CL |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
01/2005 |
Abstract: |
N/A |
Project Title: |
Enhanced Distributed JVM for Large-scale Scientific Applications |
Investigator(s): |
Wang CL |
Department: |
Computer Science |
Source(s) of Funding: |
Small Project Funding |
Start Date: |
04/2006 |
Abstract: |
Many large-scale scientific and commercial data-mining applications are written in Java. These applications are in great need of a huge virtual memory to keep the created Java objects in memory for computation. In this research, we will introduce a cluster middleware, a Distributed JVM (DJVM) that can group the memory in all computing nodes (PCs or servers) to support parallel execution of large-scale memory-demanding Java applications. The DJVM will be built at the virtual machine level and it can make a cluster appear as a single, multi-processor machine to Java applications. Existing JVM or DJVM prototypes don't provide solutions for the problem of supporting huge virtula memory. A sinlge machine JVM can support up to 2GB memory space, which is insufficient for running an application with large data set. Previous approaches in DJVM have limitation in the JVM heap management in supporting an address space larger than 2GB in a 32-bit platform. The difficulties come from two aspects. (1) The JVM specification defines the size of the object refence as a word in a physical machine. On 32-bit machines, it is therefore 32-bit. Extending the address space will need to revise the JVM specification substantially. (2) All previous DJVMs are based on some open-source JVM implementations, which tends to follow the orginal specification. For new implementation, new and careful design in JVM heap and JIT compilers is needed in the DJVM kernel for manipulating of Java references, which is a non-trivious task. It needs to involve complex transformations of new reference type on the 32-bit platforms.To make the existing applications able to be transparently migrated to the new platform, we also need to make sure the Java libraries and latest APIs used by the Java applications can be executed on DJVM. To incorporate different Java libraries in a DJVM is a challenge because a JVM is often shipped with its own class libraries. Simply setting class search path or copying class libraries in the DJVM directories will not work. There are many compatibility problems to solve for a JVM to use another JVM's libraries. A DJVM needs to find a portable and flexible method to solve the transplant of Java libraries for the applications to use. |
List of Research Outputs |
Chen L., Ma T.C., Wang C.L., Lau F.C.M. and Li S.P., G-JavaMPI: A Grid Middleware for Transparent MPI Task Migration, In: Beniamino Di Martino et al., Engineering the Grid: Status and Perspective. American Scientific Publishers, 2006. |
Sit
Y.F., Lau F.C.M. and Wang C.L., On The Cooperation of Web
Clients and Proxy Caches, 11th International Conference on Parallel and
Distributed Systems (ICPADS 2005). |
Tsang
K.C.K., Ho S.C., Tsang M.C.M., Wang C.L. and Lau F.C.M., An Adaptive Multipath
Protocol for Efficient IP Handoff in Mobile Wireless Networks, 20th
International Conference on Advanced Information Networking and Applications
- Volume 1 (AINA'06). |
Wang C.L., Zhang X., Belaramani N., Siu P.L.P., Chow Y. and Lau F.C.M., Software Infrastructure for Context-aware Mobile Computing, In: Weidong Kou and Yelena Yesha, Enabling Technologies for Wireless E-Business. Springer, 2006. |
Zhu
D., Lau F.C.M., Wang C.L., Lam W.K., He C., Wang X.,
Chen Y. and Li S., Design of an OGSA Based MetaService Architecture, The
International Workshop on Grid and Cooperative Computing (GCC 2004). |
Zhu W., Fang W., Wang C.L. and Lau F.C.M., High Performance Computing on Clusters: The Distributed JVM Approach, High Performance Computing: Paradigm and Infrastructure,. John Wiley and Sons, 2005. |
Researcher
: Wang L |
List of Research Outputs |
Wang L., Mamoulis N., Cheung D.W.L. and Yiu S.M., Indexing Useful Structural Patterns for XML Query Processing, IEEE Transaction on Knowledge and Data Engineering. IEEE Computer Society, 2005, 17(7): 997-1009. |
Researcher
: Wang WP |
Project Title: |
Collision detection of moving ellipses and ellipsoids |
Investigator(s): |
Wang WP |
Department: |
Computer Science |
Source(s) of Funding: |
Seed Funding Programme for Basic Research |
Start Date: |
10/2002 |
Abstract: |
To study the collision detection problem between moving ellipses in 2D plane and ellipsoids in 3D space. Specially, based on the PI's recent study on the algebraic properties of the arrangement of two ellipsoids. |
Project Title: |
New methods for collision detection of ellipsoids |
Investigator(s): |
Wang WP |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
09/2003 |
Abstract: |
To develop methods of collision detection of moving ellipsoids in the following three different cases: i) motions expressible as rational functions of time; ii) motions expressible by analytical functions of time; continuous motions, which include the important class of continuous but "non-smooth' motions due to interactive user control or constant interaction with surrounding objects in a VR or computer game application. |
Project Title: |
New methods for collision detection of ellipsoids |
Investigator(s): |
Wang WP |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
09/2003 |
Abstract: |
N/A |
Project Title: |
A novel method for curve and surface approximation |
Investigator(s): |
Wang WP |
Department: |
Computer Science |
Source(s) of Funding: |
Seed Funding Programme for Basic Research |
Start Date: |
02/2004 |
Completion Date: |
01/2006 |
Abstract: |
To propose a new method, based on active spline curves and surfaces, for shape approximation. |
Project Title: |
A new collision detection scheme fo human character animation |
Investigator(s): |
Wang WP |
Department: |
Computer Science |
Source(s) of Funding: |
Small Project Funding |
Start Date: |
11/2004 |
Completion Date: |
10/2006 |
Abstract: |
Based on our previous results, to consider other quadric surfaces both in the static case as well as in continuous motion. |
Project Title: |
SDM - a new optimization method for shape modelling |
Investigator(s): |
Wang WP |
Department: |
Computer Science |
Source(s) of Funding: |
Incentive Award for RGC CERG Fundable But Not Funded Projects |
Start Date: |
07/2005 |
Completion Date: |
06/2006 |
Abstract: |
N/A |
Project Title: |
Efficient Collision Detection for Composite Quadric Models |
Investigator(s): |
Wang WP |
Department: |
Computer Science |
Source(s) of Funding: |
Seed Funding Programme for Basic Research |
Start Date: |
04/2006 |
Completion Date: |
12/2006 |
Abstract: |
[Purpose] We shall investigate the collision detection problem for composite quadric models (CQMS), which are 3D objects bounded by planar and quadric surfaces. CQMs include objects as simple as ellipsoids and those more complex ones defined as the CSG (Constructive Solid Geometry) objects with quadric primitives. Figure 1 shows objects of this type in a context of collision detection for robot operation. Collision detection is of paramount importance to many fields involving object interaction and simulation, e.g., computer animation, computational physics, virtual reality, robotics and CAD/CAM. The efficiency and accuracy of the collision detection methods are critical to most applications. Quadric surfaces are widely used in practice. Ellipsoids and truncated/capped cylinders or cones are often used as bounding volumes of complex geometry in graphics and robotics. The rising interests in modeling human characters in computer game/animation and organic forms in bio-science make ellipsoids a serious contender for shape representation. Furthermore, most mechanical parts can accurately be modeled with simple quadrics, such as spheres, cones, and cylinders. Through composite representation or CSG composition, an even wider class of complex objects is modeled by quadric surfaces. [Key Issues] Most research in the literature has so far mainly concentrated on collision detection of piecewise linear objects (e.g., polyhedrons). These methods usually sample the motion time interval and then perform interference test for static objects along the motion path at sampled instants. When applied to collision detection of moving quadric surfaces, there are problems with these methods: 1) piecewise linear approximation introduces geometric error and entails large storage space; 2) discrete time sampling may miss collision between time samples for small or fast moving objects due to inadequate sampling, or results in inefficiency when overly dense sampling is used. [Previous work 1] Collision detection of quadric surfaces: Quadric surfaces, or quadrics, are the simplest curved surfaces of degree two. A straightforward way to detect whether or not two quadrics collide is to determine their intersection: two quadrics are separate if and only if their intersection is empty in real space. Intersection of quadric surfaces has been extensively studied [4, 5, 10, 9]. Related to collision detection of quadrics, distance computation for quadric surfaces is studied in [3]. However, the collision detection problem of quadrics by itself does not necessitate the computation of intersection or distance of two quadrics. Therefore, the procedures in the above work are usually too involved for time critical collision detection. Moreover, it is difficult to extend these methods to continuous collision detection (CCD) of quadrics. [Previous work 2] Continuous collision detection of moving objects: The common feature of continuous collision detection (CCD) methods is that no discrete time sampling is needed, thus inaccuracy due to missing collision between time samples is avoided. Recently, Redon et al. propose CCD methods of Oriented Bounding Boxes (OBB) [6], and Line Swept Sphere (LSS) primitives [7]. However, so far there has been no effective solution in the literature to CCD of quadric surfaces or the like, except for the recent work by the PI and his collaborators dealing with the CCD of moving elliptic disks in 2D plane and the CCD of moving ellipsoids in 3D space, which are a special case of general quadrics. [Related work by PI] The PI and his collaborators pioneered the algebraic approach to collision detection of conics and quadric surfaces, starting from their 2001 paper [11] on an algebraic condition on the separation of two ellipsoids. Our results have led to an algebraic method for exact collision detection of two ellipsoids based on time sampling [8] and another algorithm for continuous collision detection (CCD) of moving ellipsoids based on the analysis of a bivariate function [1]. We have also conducted further study on algebraic methods for fast and exact CCD of moving elliptic disks in 2D plane by processing a univariate function [2]. Basically, using our algebraic approach, we can handle the input ellipsoids or ellipses directly without geometric approximation, and we can set up and solve collision detection equations exactly without the need to sample the motion time. Compared with the conventional methods, the benefit of this algebraic approach is the significant improvement in spatial and temporal accuracy in collision detection. In this project we expect to extend this approach to deal with general quadrics and, more importantly, composite objects bounded by piecewise quadric or planar surface patches. Clearly, CCD for composite quadric models is a much more challenging problem than that for ellipsoids. We will have to consider collision between different types of boundary elements, such a boundary curve versus a boundary curve. The difficulty and intricacy of this problem will fully be discussed in the next part on Research Methodology. [Objectives] We shall study an algebraic framework for continuous collision detection (CCD) of composite quadric models (CQM) which are objects bounded by quadric or planar surface patches. We will use algebraic conditions to characterize and compute the times of collision and contact points in an accurate and efficient manner. Our framework is a significant extension to the previous work pioneered by the PI on an algebraic approach to the exact collision detection for ellipses and ellipsoids. The main challenges in this extension are: 1) A much larger number of quadric surfaces and more complex contact configurations of them need to be studied; 2) Unlike ellipsoids which are defined by a single equation, CQMs are defined by multiple quadratic inequalities, i.e., they are real semi-algebraic varieties. Hence, the existing algebraic approach to CCD of ellipsoids cannot be applied straightforwardly to CCD of CQMs. We will devise a systematic framework for continuous collision detection of CQMs. Specifically, our objectives are: ** establish algebraic conditions to characterize contact configurations of quadric surfaces in 3D; ** based on these algebraic conditions, devise efficient algorithms for CCD of composite quadric models. |
List of Research Outputs |
Albocher D., Sarel U., Choi Y.K., Elber G. and Wang W.P., Continuous collision detection for elliptic disks, IEEE Transactions on Robotics. Robotics and Automation Society, 2006, 22: 213-224. |
Albocher D., Sarel U., Choi Y.K., Elber G. and Wang W.P., Efficient Continuous Collision Detection for Bounding Boxes under Rational Motion, The Proceedings of the 2006 IEEE International Conference on Robotics and Automation. IEEE, 2006, 3017-3022. |
Wang X.T., Choi Y.K., Lu W.W. and Wang W.P., Rod-like trabeculae extraction from cancellous bone microstructure using topological analysis, Ninth International Conference on Computer Aided Design and Computer Graphics (CADCG 2005). IEEE Computer Society, 2005, 173-180. |
Researcher
: Wong DCK |
List of Research Outputs |
Cheung D.W.L. and Wong D.C.K., Consultancy, Internet Appliance to Serve G2B Integration with SCOPES, Office of the Government Chief Information Officer (OGCIO), HKSAR Government. 2005. |
Cheung D.W.L. and Wong D.C.K., Consultancy, SUNDAY Enterprise Data Model Design, Mandarin Communications Limited, SUNDAY mobile phone carrier. 2005. |
Cheung D.W.L. and Wong D.C.K., Consultancy, Trial Run on Capturing of Vehicle Insurance Data, Transport Department, HKSAR Government. 2005. |
Cheung D.W.L., Lee T.Y.T., Kwok W.C.H., Yee K.C. and Wong D.C.K., Grand Award, Linux Business Award, Hong Kong Linux Business Award Organization Committee. 2005. |
Researcher
: Wong KKY |
Project Title: |
Outdoor 3D scanner using off-the-shelf digital camera |
Investigator(s): |
Wong KKY |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
10/2003 |
Completion Date: |
03/2006 |
Abstract: |
To provide a cost-efficient solution to the generation of realistic 3D models by developing algorithms for motion estimation and model reconstruction from image sequences. |
Project Title: |
Outdoor 3D scanner using off-the-shelf digital camera |
Investigator(s): |
Wong KKY |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
10/2003 |
Abstract: |
N/A |
Project Title: |
Tracking of lumbar spinal motion in videofluoroscopy |
Investigator(s): |
Wong KKY, Leong JCY, Luk KDK |
Department: |
Computer Science |
Source(s) of Funding: |
Small Project Funding |
Start Date: |
11/2003 |
Completion Date: |
10/2005 |
Abstract: |
To exploit computer vision and image processing techniques for enhancing the image quality of the videofluoroscopic sequence and to extract useful information of spinal motion from the sequence automatically. |
Project Title: |
3D shape recovery of complex objects using a dual-space approach |
Investigator(s): |
Wong KKY |
Department: |
Computer Science |
Source(s) of Funding: |
Merit Award for RGC CERG Funded Projects |
Start Date: |
01/2006 |
Abstract: |
N/A |
Project Title: |
3D shape recovery of complex objects using a dual-space approach |
Investigator(s): |
Wong KKY |
Department: |
Computer Science |
Source(s) of Funding: |
Competitive Earmarked Research Grants (CERG) |
Start Date: |
01/2006 |
Abstract: |
The main objective of this project is to develop a novel method for reconstructing complex 3D objects with unknown topology using their silhouettes extracted from the image sequences. The proposed method exploits the duality principle governing surface points and their corresponding tangent planes, and enables direct estimation of points on the contour generators. |
List of Research Outputs |
Chen H., Wong K.K.Y., Liang C. and Chen Y., Extracting
Surface Representations from Rim Curves, Asian Conference on Computer
Vision . |
So
W.K., Wong K.K.Y., Chung H.Y. and Chin F.Y.L., Shadow Detection for
Vehicles by Locating the Object-Shadow Boundary, 7th IASTED International
Conference on Signal and Image Processing. |
Wong W.N., Luk K.D.K., Leong J.C.Y., Wong S.F. and Wong K.K.Y., Continuous Dynamic Spinal Motion Analysis, Spine. 2006, 31(4): 414-419. |
Yiu W.S., Wong K.K.Y., Chin F.Y.L. and Chung H.Y., Explicit Contour Model for Vehicle Tracking with Automatic Hypothesis Validation, International Conference on Image Processing. Genova, 2005, II: 582-585. |
Zhang
G. and Wong K.K.Y., Motion
Estimation from Spheres, IEEE International Conference on Computer Vision
and Pattern Recognition. |
Zhang
H., Zhang G. and Wong K.K.Y., Auto-Calibration and
Motion Recovery from Silhouettes for Turntable Sequences, British Machine
Vision Conference. |
Zhang H., Zhang G. and Wong K.K.Y., Camera Calibration with Spheres: Linear Approaches, International Conference on Image Processing. Genova, 2005, II: 1150-1153. |
List of Research Outputs |
Wong K.Y. and Yip C.L., An Intelligent Tropical Cyclone Eye Fix System using Motion Field Analysis, Proceedings of the 17th International Conference on Tools with Artificial Intelligence (ICTAI-2005). 2005. |
Wong
K.Y. and Yip
C.L., An Intelligent Tropical Cyclone Eye Fix System using Motion Field
Analysis, The 17th IEEE International Conference on Tools with Artificial
Intelligence. |
Wong K.Y. and Yip C.L., |
Wong K.Y., Hung Hing Ying Scholarships, 2006. |
Wong K.Y. and Yip C.L., Tropical Cyclone Eye Fix using Genetic Algorithm with Temporal Information, Proceedings of the 9th International Conference on Knowledge-based Intelligent Information and Engineering Systems (KES-2005). 2005. |
List of Research Outputs |
Wong K.Y. and Yip C.L., An Intelligent Tropical Cyclone Eye Fix System using Motion Field Analysis, Proceedings of the 17th International Conference on Tools with Artificial Intelligence (ICTAI-2005). 2005. |
Wong
K.Y. and Yip
C.L., An Intelligent Tropical Cyclone Eye Fix System using Motion Field
Analysis, The 17th IEEE International Conference on Tools with Artificial
Intelligence. |
Wong K.Y. and Yip C.L., |
Wong K.Y., Hung Hing Ying Scholarships, 2006. |
Wong K.Y. and Yip C.L., Tropical Cyclone Eye Fix using Genetic Algorithm with Temporal Information, Proceedings of the 9th International Conference on Knowledge-based Intelligent Information and Engineering Systems (KES-2005). 2005. |
Researcher
: Wong SF |
List of Research Outputs |
Wong W.N., Luk K.D.K., Leong J.C.Y., Wong S.F. and Wong K.K.Y., Continuous Dynamic Spinal Motion Analysis, Spine. 2006, 31(4): 414-419. |
Researcher
: Wong WH |
List of Research Outputs |
Chan W.T., Lam T.W., Ting H.F. and Wong W.H., On-line Stream Merging with Max Span and Min Coverage, Theory of Computing Systems . USA, Springer-Verlag New York, LLC, 2005, 38: 461-479. |
Researcher
: Wu J |
List of Research Outputs |
Huo Q., Zhu D. and Wu J., Unsupervised Online Adaptation of Segmental Switching Linear Gaussian Hidden Markov Models for Robust Speech Recognition, 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing. Toulouse, France, IEEE Signal Processing Society, 2006, 1: 1125-1128. |
Researcher
: Yan D |
List of Research Outputs |
Liu Y.S., Yong J.H., Zhang H., Yan D. and Sun J.G., A quasi-Monte Carlo method for computing areas of point-sampled surfaces, Computer-Aided Design. 2006, 38(1): 55-68. |
Researcher
: Yau SS |
List of Research Outputs |
Chan W.K., Chen T.Y., Lu H., Tse T.H. and Yau S.S., A metamorphic approach to integration testing of context-sensitive middleware-based applications, Proceedings of the 5th International Conference on Quality Software (QSIC 2005), IEEE Computer Society Press, Los Alamitos, California. 2005, 241−249. |
Researcher
: Ye D |
List of Research Outputs |
Chan W.T., Zhang Y., Fung P.Y., Ye D. and Zhu H., Efficient Algorithms for Finding a Longest Common Increasing Subsequence, In: Xiaotie Deng, Dingzhu Du, The 16th Annual International Symposium on Algorithms and Computation (ISAAC). Springer, 2005, LNCS 3827: 665-674. |
Chan W.T., Chin F.Y.L., Ye D., Zhang G. and Zhang Y., Online Bin Packing of Fragile Objects with Application in Cellular Networks, In: Xiaotie Deng, Yinyu Ye, The 1st Workshop on Internet and Network Economics (WINE). Springer, 2005, LNCS 3828: 564-573. |
Ye
D., Chan
W.T., Chin F.Y.L., Zhang G. and Zhang Y., On-line Scheduling of Parallel
Jobs on Two Machines, In: Joe Ryan, Prabhu Manyem, Kiki Sugeng, Mirka Miller,
Proceedings of the 16th Australasian Workshop on Combinatorial Algorithms
(AWOCA 2005). |
Researcher
: Yee KC |
List of Research Outputs |
Cheung D.W.L., Kwok W.C.H. and Yee K.C., Consultancy, Architectural Design for MTR Maintenance Management Information System, MTR Corporation Limited. 2005. |
Cheung D.W.L., Lee T.Y.T., Kwok W.C.H., Yee K.C. and Wong D.C.K., Grand Award, Linux Business Award, Hong Kong Linux Business Award Organization Committee. 2005. |
Researcher
: Yip CL |
List of Research Outputs |
Wong K.Y. and Yip C.L., An Intelligent Tropical Cyclone Eye Fix System using Motion Field Analysis, Proceedings of the 17th International Conference on Tools with Artificial Intelligence (ICTAI-2005). 2005. |
Wong
K.Y. and Yip C.L., An
Intelligent Tropical Cyclone Eye Fix System using Motion Field Analysis, The
17th IEEE International Conference on Tools with Artificial Intelligence.
|
Wong
K.Y. and Yip C.L., |
Wong K.Y. and Yip C.L., Tropical Cyclone Eye Fix using Genetic Algorithm with Temporal Information, Proceedings of the 9th International Conference on Knowledge-based Intelligent Information and Engineering Systems (KES-2005). 2005. |
Researcher
: Yiu ML |
List of Research Outputs |
Dai
X., Yiu M.L., Mamoulis N., Tao Y. and Vaitis M.,
Probabilistic Spatial Queries on Existentially Uncertain Data, Proceedings
of the 9th International Symposium on Spatial and Temporal Databases (SSTD).
Angra dos Reis, |
Mamoulis
N., Cheng K.H., Yiu M.L. and Cheung D.W.L., Efficient Aggregation of
Ranked Inputs, Proceedings of the 22nd International Conference on Data
Engineering (ICDE), |
Yiu M.L., Mamoulis N. and Tao Y., Efficient Quantile Retrieval on Multi-dimensional Data, Proceedings of the 10th International Conference on Extending Database Technology (EDBT), Munich, Germany, March 2006.. 2006. |
Yiu
M.L. and Mamoulis
N., Reverse Nearest Neighbors Search in Ad-hoc Subspaces, Proceedings
of the 22nd International Conference on Data Engineering (ICDE), |
Yiu M.L., Papadias D., Mamoulis N. and Tao Y., Reverse Nearest Neighbors in Large Graphs, IEEE Transactions on Knowledge and Data Engineering (TKDE). IEEE, 2006, 18(4): 540-553. |
Researcher
: Yiu SM |
List of Research Outputs |
Chan
P.Y., Lam T.W. and Yiu S.M., A More Accurate and
Efficient Whole Genome Phylogeny, The 4th Asia-Pacific Bioinformatics
Conference (APBC). |
Chow S.M., Hui C.K., Yiu S.M. and Chow K.P., Forward-Secure Multisignature and Blind Signature Schemes, Applied Mathematics and Computation. Elsevier , 2005, 168/2: 895-908. |
Chow
S.M., Lui R.W.C., Hui C.K. and Yiu S.M., Identity Based Delegation
Network, 1st International Conference on Cryptology in |
Chow S.M., Hui C.K., Yiu S.M. and Chow K.P., Two Improved Partially Blind Signature Schemes from Bilinear Pairings, Information Security and Privacy: 10th Australasian Conference (ACISP 2005). Springer, 2005, 3574 of Lecture Notes in Computer Science: 316-328. |
Lai
K.Y., Yiu S.M., Chow K.P., Chong C.F. and Hui C.K., An Efficient Bloom Filter
Based Solution for Multiparty Private Matching, SAM’06 The 2006
International Conference on Security & Management. |
Leung C.M., Chin F.Y.L., Yiu S.M., Rosenfeld R. and Tsang W.W., Finding Motifs with Insufficient Number of Strong Binding Sites, Journal of Computational Biology. Mary Ann Liebert, Inc, 2005, 12(6): 686-701. |
Lui R.W.C., Chow S.M., Hui C.K. and Yiu S.M., Role Activation Management in Role Based Access Control, Information Security and Privacy: 10th Australasian Conference (ACISP 2005). Springer, 2005, 3574 of Lecture Notes in Computer Science: 358-369. |
Lui
R.W.C., Chow S.M., Hui C.K. and Yiu S.M., Supporting Efficient
Authorization in Delegation with Supervision , Proceedings of the 11th
International Conference on Parallel and Distribute Systems, Volume II
Workshops (SNDS05) . |
Sui
A., Chow S.M., Hui C.K., Yiu S.M., Chow K.P., Tsang W.W., Chong C.F., Pun K.H. and Chan H.W., Separable and Anonymous
Identity-Based Key Issuing, Proceedings of the 11th International Conference
on Parallel and Distribute Systems, Volume II Workshops (SNDS05) . |
Wang L., Mamoulis N., Cheung D.W.L. and Yiu S.M., Indexing Useful Structural Patterns for XML Query Processing, IEEE Transaction on Knowledge and Data Engineering. IEEE Computer Society, 2005, 17(7): 997-1009. |
Researcher
: Yiu WS |
List of Research Outputs |
Yiu W.S., Wong K.K.Y., Chin F.Y.L. and Chung H.Y., Explicit Contour Model for Vehicle Tracking with Automatic Hypothesis Validation, International Conference on Image Processing. Genova, 2005, II: 582-585. |
Researcher
: Zhang G |
List of Research Outputs |
Zhang G. and Wong K.K.Y., Motion
Estimation from Spheres, IEEE International Conference on Computer Vision
and Pattern Recognition. |
Zhang
H., Zhang G. and Wong K.K.Y., Auto-Calibration and Motion
Recovery from Silhouettes for Turntable Sequences, British Machine Vision
Conference. |
Zhang H., Zhang G. and Wong K.K.Y., Camera Calibration with Spheres: Linear Approaches, International Conference on Image Processing. Genova, 2005, II: 1150-1153. |
Researcher
: Zhang G |
List of Research Outputs |
Zhang G. and Wong K.K.Y., Motion
Estimation from Spheres, IEEE International Conference on Computer Vision
and Pattern Recognition. |
Zhang
H., Zhang G. and Wong K.K.Y., Auto-Calibration and Motion
Recovery from Silhouettes for Turntable Sequences, British Machine Vision
Conference. |
Zhang H., Zhang G. and Wong K.K.Y., Camera Calibration with Spheres: Linear Approaches, International Conference on Image Processing. Genova, 2005, II: 1150-1153. |
Researcher
: Zhang H |
List of Research Outputs |
Liu Y.S., Yong J.H., Zhang H., Yan D. and Sun J.G., A quasi-Monte Carlo method for computing areas of point-sampled surfaces, Computer-Aided Design. 2006, 38(1): 55-68. |
Zhang
H., Zhang
G. and Wong K.K.Y.,
Auto-Calibration and Motion Recovery from Silhouettes for Turntable
Sequences, British Machine Vision Conference. |
Zhang H., Zhang G. and Wong K.K.Y., Camera Calibration with Spheres: Linear Approaches, International Conference on Image Processing. Genova, 2005, II: 1150-1153. |
Researcher
: Zhang H |
List of Research Outputs |
Liu Y.S., Yong J.H., Zhang H., Yan D. and Sun J.G., A quasi-Monte Carlo method for computing areas of point-sampled surfaces, Computer-Aided Design. 2006, 38(1): 55-68. |
Zhang
H., Zhang
G. and Wong K.K.Y.,
Auto-Calibration and Motion Recovery from Silhouettes for Turntable
Sequences, British Machine Vision Conference. |
Zhang H., Zhang G. and Wong K.K.Y., Camera Calibration with Spheres: Linear Approaches, International Conference on Image Processing. Genova, 2005, II: 1150-1153. |
Researcher
: Zhang X |
List of Research Outputs |
Wang C.L., Zhang X., Belaramani N., Siu P.L.P., Chow Y. and Lau F.C.M., Software Infrastructure for Context-aware Mobile Computing, In: Weidong Kou and Yelena Yesha, Enabling Technologies for Wireless E-Business. Springer, 2006. |
Researcher
: Zhang Y |
List of Research Outputs |
Chan W.T., Chin F.Y.L., Zhang Y., Zhu H., Shen H. and Wong P.W.H., A Dynamic Programming Approach Of Finding An Optimal Broadcast Schedule In Minimizing Total Flow Time, Journal of Combinatorial Optimization. Netherlands, Springer Netherlands, 2006, 11(2): 177-187. |
Chan W.T., Zhang Y., Fung P.Y., Ye D. and Zhu H., Efficient Algorithms for Finding a Longest Common Increasing Subsequence, In: Xiaotie Deng, Dingzhu Du, The 16th Annual International Symposium on Algorithms and Computation (ISAAC). Springer, 2005, LNCS 3827: 665-674. |
Chan W.T., Chin F.Y.L., Zhang Y., Zhu H., Shen H. and Wong P.W.H., Off-Line Algorithms for Minimizing Total Flow Time in Broadcast Scheduling, Proceedings of the Eleventh Annual International Computing and Combinatorics Conference (COCOON 2005). Kunming, Yunnan, China, Springer-Verlag Berlin Heidelberg, 2005, LNCS 3595: 318-328. |
Chan W.T., Chin F.Y.L., Ye D., Zhang G. and Zhang Y., Online Bin Packing of Fragile Objects with Application in Cellular Networks, In: Xiaotie Deng, Yinyu Ye, The 1st Workshop on Internet and Network Economics (WINE). Springer, 2005, LNCS 3828: 564-573. |
Ye D., Chan W.T., Chin F.Y.L., Zhang G. and Zhang Y., On-line Scheduling of Parallel Jobs on Two Machines, In: Joe Ryan, Prabhu Manyem, Kiki Sugeng, Mirka Miller, Proceedings of the 16th Australasian Workshop on Combinatorial Algorithms (AWOCA 2005). Australia, 2005, 369-380. |
Researcher
: Zhu D |
List of Research Outputs |
Huo
Q., Zhu D. and Wu J., Unsupervised Online Adaptation of
Segmental Switching Linear Gaussian Hidden Markov Models for Robust Speech
Recognition, 2006 IEEE International Conference on Acoustics, Speech, and
Signal Processing. |
Zhu
D., Lau
F.C.M., Wang C.L., Lam W.K., He
C., Wang X., Chen Y. and Li S., Design of an OGSA Based MetaService
Architecture, The International Workshop on Grid and Cooperative Computing
(GCC 2004). |
Researcher
: Zhu W |
List of Research Outputs |
Zhu W., Fang W., Wang C.L. and Lau F.C.M., High Performance Computing on Clusters: The Distributed JVM Approach, High Performance Computing: Paradigm and Infrastructure,. John Wiley and Sons, 2005. |
-- End of Listing --