Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dan Hong is active.

Publication


Featured researches published by Dan Hong.


networked digital technologies | 2009

User identification across multiple social networks

Jan Vosecky; Dan Hong; Vincent Y. Shen

Today, more and more people have their virtual identities on the web. It is common that people are users of more than one social network and also their friends may be registered on multiple websites. A facility to aggregate our online friends into a single integrated environment would enable the user to keep up-to-date with their virtual contacts more easily, as well as to provide improved facility to search for people across different websites. In this paper, we propose a method to identify users based on profile matching. We use data from two popular social networks to study the similarity of profile definition. We evaluate the importance of fields in the web profile and develop a profile comparison tool. We demonstrate the effectiveness and efficiency of our tool in identifying and consolidating duplicated users on different websites.


Information Systems Frontiers | 2007

Ubiquitous enterprise service adaptations based on contextual user behavior

Dan Hong; Dickson K. W. Chiu; Vincent Y. Shen; Shing Chi Cheung; Eleanna Kafeza

Recent advances in mobile technologies and infrastructures have created the demand for ubiquitous access to enterprise services from mobile handheld devices. Further, with the invention of new interaction devices, the context in which the services are being used becomes an integral part of the activity carried out with the system. Traditional human–computer interface (HCI) theories are now inadequate for developing these context-aware applications, as we believe that the notion of context should be extended to different categories: computing contexts, user contexts, and physical contexts for ubiquitous computing. This demands a new paradigm for system requirements elicitation and design in order to make good use of such extended context information captured from mobile user behavior. Instead of redesigning or adapting existing enterprise services in an ad hoc manner, we introduce a methodology for the elicitation of context-aware adaptation requirements and the matching of context-awareness features to the target context by capability matching. For the implementation of such adaptations, we propose the use of three tiers of views: user interface views, data views, and process views. This approach centers on a novel notion of process views to ubiquitous service adaptation, where mobile users may execute a more concise version or modified procedure of the original process according to their behavior under different contexts. The process view also serves as the key mechanism for integrating user interface views and data views. Based on this model, we analyze the design and implementation issues of some common ubiquitous access situations and show how to adapt them systematically into a context-aware application by considering the requirements of a ubiquitous enterprise information system.


international world wide web conferences | 2009

Setting Access Permission through Transitive Relationship in Web-based Social Networks

Dan Hong; Vincent Y. Shen

The rising popularity of various social networking websites has created a huge problem on Internet privacy. Although it is easy to post photos, comments, opinions on some events, etc. on the Web, some of these data (such as a person’s location at a particular time, criticisms of a politician, etc.) are private and should not be accessed by unauthorized users. Although social networks facilitate sharing, the fear of sending sensitive data to a third party without knowledge or permission of the data owners discourages people from taking full advantage of some social networking applications. We exploit the existing relationships on social networks and build a ‘‘trust network’’ with transitive relationship to allow controlled data sharing so that the privacy and preferences of data owners are respected. The trust network linking private data owners, private data requesters, and intermediary users is a directed weighted graph. The permission value for each private data requester can be automatically assigned in this network based on the transitive relationship. Experiments were conducted to confirm the feasibility of constructing the trust network from existing social networks, and to assess the validity of permission value assignments in the query process. Since the data owners only need to define the access rights of their closest contacts once, this privacy scheme can make private data sharing easily manageable by social network participants.


hawaii international conference on system sciences | 2007

Towards Ubiquitous Government Services through Adaptations with Context and Views in a Three-Tier Architecture

Dickson K. W. Chiu; Dan Hong; Shing Chi Cheung; Eleanna Kafeza

With the recent advances in mobile technologies and infrastructures, citizens start to demand for not just mobile but also ubiquitous access to e-government services. Further with the invention of new interaction devices, the context in which the service is being used becomes an integral part of the activity carried out with the system. This demands a new paradigm for system requirements elicitation and design in order to make good use of such extended context information. Instead of redesigning or adapting existing e-government services in an ad-hoc manner, we introduce a methodology for the elicitation of context-aware adaptation requirements and the matching of context-awareness features to the target context by capability matching. For the implementation of these adaptations, we propose the use of three tiers of views: user interface views, data views, and process views. This approach centers on a novel notion of process views to ubiquitous government (u-government) service adaptation, where mobile users may execute a more concise version or modified procedures of the original process according to their context. The process view also serves as the key mechanism for integrating user interface views and data views. We demonstrate our methodology by extending an e-government appointment service into a mobile one with context support


enterprise distributed object computing | 2006

Adapting Ubiquitous Enterprise Services with Context and Views

Dickson K. W. Chiu; Dan Hong; Shing Chi Cheung; Eleanna Kafeza

Recent advances in mobile technologies and infrastructures have led to increasing demands for ubiquitous access to enterprise services from mobile handheld devices, such as mobile phones and PDAs. The context in which such a service is used becomes an integral part of the associated enterprise application. This demands a new paradigm for system requirements elicitation and design in order to make good use of such extended context information. Instead of redesigning or adapting existing enterprise services in an ad-hoc manner, we introduce a methodology for the elicitation of context-aware adaptation requirements and the matching of context-awareness features to the target context by capability matching. For the implementation of these adaptations, we propose the use of three tiers of views: user interface views, data views, and process views. This approach centers on a novel notion of process views to service adaptation according to their context. We demonstrate our methodology by extending an enterprise appointment service into a ubiquitous one with context support


US Patent | 2008

Custom rendering of webpages on mobile devices

Vincent Y. Shen; Benfeng Chen; Dan Hong; Kwok Chu Lo; Yongzhen Zhuang


human computer interaction with mobile devices and services | 2005

Dynamic privacy management: a plug-in service for the middleware in pervasive computing

Dan Hong; Mingxuan Yuan; Vincent Y. Shen


IJWA | 2010

User Identification across Social Networks using the Web Profile and Friend Network

Jan Vosecky; Dan Hong; Vincent Y. Shen


computational science and engineering | 2009

Online User Activities Discovery Based on Time Dependent Data

Dan Hong; Vincent Y. Shen


networked digital technologies | 2009

User Profile Comparison Across Domain

Jan Vosecky; Dan Hong; Vincent Y. Shen

Collaboration


Dive into the Dan Hong's collaboration.

Top Co-Authors

Avatar

Vincent Y. Shen

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shing Chi Cheung

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Jan Vosecky

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Eleanna Kafeza

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Benfeng Chen

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Eleanna Kafeza

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Kwok Chu Lo

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Yongzhen Zhuang

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Mingxuan Yuan

Xi'an Jiaotong University

View shared research outputs
Researchain Logo
Decentralizing Knowledge