Jeng-Ping Lin

Learn More
Going along with the rapid development of web technologies , in some applications on demands, partners or staffs may make a great quantity of web transactions or personal communications anytime and anywhere. However, the partners could be distributed over different network domains. They require a communal trusted third party to help them establish a shared(More)
The goal of a denial-of-service (DoS) attack is to deplete the resource of a targeted server in order that its intended clients cannot obtain the services. Recently, Hwang et al. proposed an ID-based password authentication scheme using smart cards against the DoS attack. In their scheme, the major merits include: (1) mutual authentication; (2) the password(More)
This paper proposes a content-based image retrieval (CBIR) method based on color histograms and the discrete cosine transform (DCT). Color histogram characterizes an image by its color distribution, but the drawback of a global histogram representation is that spatial information (such as object location, shape, and texture) is discarded. In our approach,(More)
SUMMARY In this paper, we propose a novel fault-tolerant multicast algorithm for n-dimensional wormhole routed hyper-cubes. The multicast algorithm will remain functional if the number of faulty nodes in an n-dimensional hypercube is less than n. Multicast is the delivery of the same message from one source node to an arbitrary number of destination nodes.(More)
  • 1