Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hong Va Leong is active.

Publication


Featured researches published by Hong Va Leong.


IEEE Transactions on Knowledge and Data Engineering | 2010

Nearest Surrounder Queries

Ken C. K. Lee; Wang-Chien Lee; Hong Va Leong

In this paper, we present a new type of spatial queries called Nearest Surrounder (NS) queries. An NS query determines the nearest polygon-shaped spatial objects (referred to as nearest surrounder objects) and their orientations with respect to a query point from an object set. Besides, we derive two NS query variants, namely, multitier NS (m-NS) queries and angle-constrained NS (ANS) queries. An m-NS query searches multiple layers of NS objects for the same range of angles from a query point. An ANS query searches for NS objects within a specified range of angles. To evaluate NS queries and their variants, we explore angle-based and distance-based bound properties of polygons, and devise two efficient algorithms, namely, Sweep and Ripple, based on R-tree. The algorithms access objects in an order according to their orientations and distances with respect to a given query point, respectively. They are efficient as they can finish a search with one index lookup. Besides, they can progressively deliver a query result. Through empirical studies, we evaluate the proposed algorithms and report their performance for both synthetic and real object sets.


international conference on pervasive services | 2006

Tracking Nearest Surrounders in Moving Object Environments

Lee; Schiffman; Baihua Zheng; Wang-Chien Lee; Hong Va Leong

This paper presents a system framework to support continuous nearest surrounder (NS) queries in moving object environments. NS query finds the nearest objects at individual distinct angles from a query point. This query distinguishes itself from other conventional spatial queries such as range queries and nearest neighbor queries by considering both distance and angular aspects of objects with respect to a query point. One of NS query applications is to monitor the nearest objects around an observation point. In our framework, a centralized server is dedicated to collect object location updates, to determine affected NS queries of each object location update, to compute the incremental result change of affected queries and to deliver result updates to corresponding interested users/applications that initiate the queries. In particular, we propose algorithms namely, safe region formation and partial query evaluation, that can significantly improve the system performance. Through simulations, we validate our proposed algorithms over a wide range of settings


international conference on ubiquitous information management and communication | 2009

Efficient valid scope computation for location-dependent spatial queries in mobile and wireless environments

Ken C. K. Lee; Wang-Chien Lee; Hong Va Leong; Brandon Unger; Baihua Zheng

In mobile and wireless environments, mobile clients can access information with respect to their locations by submitting Location-Dependent Spatial Queries (LDSQs) to Location-Based Service (LBS) servers. Owing to scarce wireless channel bandwidth and limited client battery life, frequent LDSQ submission from clients must be avoided. Observing that LDSQs issued from similar client positions would normally return the same results, we explore the idea of valid scope, that represents a spatial area in which a set of LDSQs will retrieve exactly the same query results. With a valid scope derived and an LDSQ result cached at the client side, a client can assert whether the new LDSQs can be answered with the maintained LDSQ result, thus eliminating the LDSQs sent to the server. As such, contention on wireless channel and client energy consumed for data transmission can be considerably reduced. In this paper, we design efficient algorithms to compute the valid scope for common types of LDSQs, including nearest neighbor queries and range queries. Through an extensive set of experiments, our proposed valid scope computation algorithms are shown to significantly outperform existing approaches.


international conference on ubiquitous information management and communication | 2010

Privacy enhancement in mobile data broadcasting environments

Hong Va Leong

In mobile and wireless environments, clients will request for information by submitting queries to the server, which delivers the required data via point-to-point connection or broadcast channels. The broadcast paradigm possesses the advantage of scalability. However, the broadcast data is vulnerable to eavesdropping and the adversary may be able to associate the requested data items and hence the original query with a specific client, a form of privacy threat that we would like to protect against. In this paper, we propose to protect the privacy of queries generated by individual clients by allowing them to hide themselves behind other clients. We assume a possibly untrustworthy server and make use of a trustworthy anonymizer for the queries. At the query anonymizer, user queries are clustered and consolidated into subsuming queries, to obfuscate the queries from being recovered. The consolidated queries are then expanded to improve the obfuscation effect, making it harder for the adversary to deduce the original queries. We define various performance metrics on the query privacy, by studying the ability that the adversary could crack the client queries, and propose algorithms to obfuscate a collection of user queries.


Archive | 1999

Mobile Data Access

Hong Va Leong; Wang-Chien Lee; Bo Li; Li Yin

Next generation wireless networks are going to use IP capable mobile terminals and support both voice/multimedia and data services. VoIP is a promising technology allowing a converged core network for all services, and provides a service platform for easier and quicker service creation. Application of VoIP in wireless networks, however, is not so straightforward as people may expect. Among other issues, mobility support is perhaps the most challenging one. The different levels of mobility support (terminal, personal and service mobility) highlight the gap between the existing VoIP framework, which is so far focusing on fixed networks, and the requirements in a wireless environment. After analyzing the existing solutions/proposals for this problem, a framework is proposed in which the mobility-related services are decomposed into several levels so that mobility support is made available to many applications. This layered approach would help to lead to a mobility enabled wireless IP infrastructure in which voice service is just an application.


conference on information and knowledge management | 2009

Navigational path privacy protection: navigational path privacy protection

Ken C. K. Lee; Wang-Chien Lee; Hong Va Leong; Baihua Zheng


Journal of Software | 2010

Efficient valid scope for location-dependent spatial queries in mobile environments

Ken C. K. Lee; Wang-Chien Lee; Hong Va Leong; Brandon Unger; Baihua Zheng


international conference on data engineering | 2009

OPAQUE: Protecting Path Privacy in Directions Search

Ken C. K. Lee; Wang-Chien Lee; Hong Va Leong; Baihua Zheng


Journal of Systems and Software | 2007

Round-Eye: A system for tracking nearest surrounders in moving object environments

Ken C. K. Lee; Josh Schiffman; Baihua Zheng; Wang-Chien Lee; Hong Va Leong


Proceedings of the First International Conference on Mobile Data Access | 1999

Proceedings of the First International Conference on Mobile Data Access

Hong Va Leong; Wang-Chien Lee; Bo Li; Li Yin

Collaboration


Dive into the Hong Va Leong's collaboration.

Top Co-Authors

Avatar

Wang-Chien Lee

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Ken C. K. Lee

University of Massachusetts Dartmouth

View shared research outputs
Top Co-Authors

Avatar

Baihua Zheng

Singapore Management University

View shared research outputs
Top Co-Authors

Avatar

Brandon Unger

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Josh Schiffman

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Lee

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Schiffman

Pennsylvania State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge