Yung-Chuan Lee

Learn More
The purpose of this paper is to introduce an innovative framework for implementation of ambient intelligence (AmI) environments. Compared to the existing state-of-the-art approaches, this framework creates a more decentralized and distributed AmI environment. In addition, the proposed approach is not limited to one specific domain, unlike many others. The(More)
In this paper, we propose a new failure-recovery model for workflow management systems (WfMSs). This model is supported with a new language, called the workflow failure-handling (WfFH) language, which allows the workflow designer to write programs so that s/he can use data-flow analysis technology to guide the failure recovery in workflow execution. With(More)
Pi-Calculus is a formal method for describing and analyzing the behavior of large distributed and concurrent systems. Pi-calculus offers a conceptual framework for describing and analyzing the concurrent systems whose configuration may change during the computation. With all the advantages that pi-calculus offers, it does not provide any methods for(More)
—Without the security assurance from the underlining operating system, software agents and agencies are constantly under security threats through the operating system. Although the security issues between software agents and agencies have been studied intensively, any formulated counter-measurement of these issues are subject to attacks that are able to(More)
We propose a new approach towards Particle Swarm Optimization named Agent-based PSO. The swarm is elevated to the status of a multi-agent system by giving the particles more autonomy, an asynchronous execution, and superior learning capabilities. The problem space is modeled as an environment which forms clusters ofpoints that are known to be non-optimal(More)
Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. This material is presented to(More)
Covert channel attacks utilise shared resources to indirectly transmit sensitive information to unauthorised parties. Current operating systems (e.g. SELinux) rely on tagging the filesystem with security labels and enforcing security policies at the time of access to a file or resource. However, such mechanisms do not provide strong protection against(More)