Search For:

Displaying 1-50 out of 96 total
A framework improving availability for consumer electronics
Found in: Computer Science and Information Technology, International Conference on
By Qingcheng Li,Xiaoli Gong,Jin Zhang,Yang Liu
Issue Date:August 2009
pp. 352-356
To face the challenges resulting from increasing complexity of portable consumer electronics, a dependability framework to improve the availability of application software in runtime is needed. In this paper, a system layer division based on the user event...
Multi-Agent Testing Architecture for Monitoring and Analyzing the Performance of Web Applications
Found in: Computer and Information Science, 5th IEEE/ACIS International Conference on
By Huiming Yu, Jin Zhang, Jinsheng Xu
Issue Date:July 2006
pp. 115-120
<p>This paper presents a Multi-Agent Testing Architecture (MATA) for monitoring and analyzing the performance of web applications in J2EE environments. This architecture includes agents and sub agents that collaborate and communicate with each other ...
TAMES: A Truthful Double Auction for Multi-Demand Heterogeneous Spectrums
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yanjiao Chen,Jin Zhang,Kaishun Wu,Qian Zhang
Issue Date:November 2014
pp. 3012-3024
To accommodate the soaring mobile broadband traffic, the Federal Communications Commission (FCC) in the U.S. sets out to retrieve under-utilized spectrum (e.g., TV Whitespace) and lay the groundwork for spectrum redistribution. Auction is an efficient way ...
RASS: A Portable Real-time Automatic Sleep Scoring System
Found in: 2012 IEEE 33rd Real-Time Systems Symposium (RTSS)
By Jin Zhang,Dawei Chen,Jianhui Zhao,Mincong He,Yuanpeng Wang,Qian Zhang
Issue Date:December 2012
pp. 105-114
It is a well known fact that the quality of sleep is an important factor in health-related quality of life (HRQoL), and people could prevent potential problems by tracking the quality of their sleep. Unfortunately sleep scoring, which is a systematic way t...
Side Channel: Bits over Interference
Found in: IEEE Transactions on Mobile Computing
By Kaishun Wu,Haoyu Tan,Yunhuai Liu,Jin Zhang,Qian Zhang,Lionel M. Ni
Issue Date:August 2012
pp. 1317-1330
Interference is a critical issue in wireless communications. In a typical multiple-user environment, different users may severely interfere with each other. Coordination among users therefore is an indispensable part for interference management in wireless...
REPICK: Random access MAC with reversed contention and Piggy-backed ACK
Found in: Network Protocols, IEEE International Conference on
By Xiaojun Feng,Jin Zhang,Qian Zhang,Bo Li
Issue Date:October 2011
pp. 119-120
The promise of high speed (over 1Gbps) wireless transmission rate at the physical layer can be significantly compromised with the current design in 802.11 DCF. There are three overheads in the 802.11 MAC that contribute to the performance degradation: DIFS...
RCSMA: Receiver-Based Carrier Sense Multiple Access in UHF RFID Systems
Found in: IEEE Transactions on Parallel and Distributed Systems
By Lei Kang,Jin Zhang,Kaishun Wu,Dian Zhang,Lionel M. Ni
Issue Date:April 2012
pp. 735-743
RFID tag identification is a crucial problem in UHF RFID systems. Traditional tag identification algorithms can be classified into two categories, ALOHA-based and tree-based. Both of them are inefficient due to the incidental high coordination cost. In thi...
The Prediction of Surface Layer Ozone Concentration Using an Improved AR Model
Found in: Information Technology, Computer Engineering and Management Sciences, International Conference of
By Wen-Yu Zhang,Ting-Ting Han,Zeng-Bao Zhao,Jin Zhang,Yan-Feng Wang
Issue Date:September 2011
pp. 72-75
In order to forecast the surface layer ozone concentration in the eastern coastal cities of China, an improved autoregressive method is used to dispose the ozone concentration data observed in November, 2008 in Tianjin, China in this paper. First the data ...
Web Page Layout Adaptation Based on WebKit for E-paper Device
Found in: Computational Science and Engineering, IEEE International Conference on
By Qing-Cheng Li,Zhan-Ying Zhang,Jie Ma,Jin Zhang
Issue Date:August 2011
pp. 495-502
E-paper screen mobile handheld devices primarily process multimedia data, such as image, audio and text, are expected to become important platforms for pervasive computing. Nowadays, mobile web browser is widely used in mobile handheld devices, such as cel...
Optimization of a Subset of Apple Features Based on Modified Particle Swarm Algorithm
Found in: Intelligent Information Technology and Security Informatics, International Symposium on
By Weixing Zhu, Dajun Hou, Jin Zhang, Jian Zhang
Issue Date:April 2010
pp. 427-430
Reducing dimension processing is needed in feature samples because the repeated and secondary features would reduce the classification ability and increase computation complexity. In this paper, a feature selection method, named MPSO (Modified Particle Swa...
Quantitative Analysis of Contribution Rate of Institution to Growth of Economy
Found in: Future Information Technology and Management Engineering, International Seminar on
By Ruiqi Qin, Jin Zhang, Xuehua Zhang
Issue Date:December 2009
pp. 265-268
Traditional theory suggests that the economic growth depends on capital, labor and other factor inputs and the progress of technology, which overlooks the factor of institution. Actually, under the condition of absence of factors increased and no change of...
Image inpainting via sparse representation
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Bin Shen, Wei Hu, Yimin Zhang, Yu-Jin Zhang
Issue Date:April 2009
pp. 697-700
This paper proposes a novel patch-wise image inpainting algorithm using the image signal sparse representation over a redundant dictionary, which merits in both capabilities to deal with large holes and to preserve image details while taking less risk. Dif...
Mining Related Queries from Query Logs Based on Linear Regression
Found in: Future Information Technology and Management Engineering, International Seminar on
By Haijun Zhai, Jin Zhang, Xiaolei Wang, Gang Zhang
Issue Date:November 2008
pp. 665-670
In this paper a novel linear regression model is proposed to mine related queries from query logs. Three types of association relationships between queries are identified and leveraged in our model, which include query session co-occurence, URL-clicked sha...
Computer Simulation of Positional Beaming Effect of Molecular Flow in Straight Cylindrical Pipeline by Monte Carlo Method
Found in: Computer Science and Information Technology, International Conference on
By Zhang Shiwei,Han Jin,Zhang Zhijun
Issue Date:September 2008
pp. 486-491
The existence of positional beaming effect of gas molecular flow in straight cylindrical pipeline is proved by the Monte Carlo Simulation method in this paper. The positional beaming effect is defined as the passing density difference of the molecules in p...
A Novel License Distribution Mechanism in DRM System
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Qingcheng Li, Jin Zhang, Xiaoli Gong, Zhenhua Zhang
Issue Date:March 2008
pp. 1329-1334
Recently, distribution is required in many DRM systems. However current distribution mechanisms appear to use restriction for distribution. In this paper, we propose a distribution mechanism based on using different licenses for different distributions. Pa...
Genetic Simulated Annealing Algorithm for Optimal Deployment of Flow Monitors
Found in: International Conference on Natural Computation
By Jin Zhang, Xiaohui Zhang, Jiangxin Wu
Issue Date:August 2007
pp. 398-402
In order to monitor a large fraction of IP flows in an IP network concurrently, a set of flow monitors are needed to be deployed at multiple locations within the network. The problem of Optimal Deployment of Flow Monitors (ODFM) concerns that where to plac...
A New Training Principle for Stacked Denoising Autoencoders
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Qianhaozhe You,Yu-Jin Zhang
Issue Date:July 2013
pp. 384-389
In this work, a new training principle is introduced for unsupervised learning that makes the learned representations more efficient and useful. Using partially corrupted inputs instead, the denoising Auto encoder can obtain more robust and representative ...
Nonnegative Matrix Factorization: A Comprehensive Review
Found in: IEEE Transactions on Knowledge and Data Engineering
By Yu-Xiong Wang,Yu-Jin Zhang
Issue Date:June 2013
pp. 1336-1353
Nonnegative Matrix Factorization (NMF), a relatively novel paradigm for dimensionality reduction, has been in the ascendant since its inception. It incorporates the nonnegativity constraint and thus obtains the parts-based representation as well as enhanci...
Privacy Preservation in a Two-Tiered Sensor Network through Correlation Tracking
Found in: 2012 Third Global Congress on Intelligent Systems (GCIS)
By Songtao Ye,Junfei Liu,Jin Zhang
Issue Date:November 2012
pp. 294-297
The architecture of two tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing and processing data, has aroused researchers' attention because of the benefits of power and storage saving. In a senso...
Symbol-level detection: A new approach to silencing hidden terminals
Found in: 2012 20th IEEE International Conference on Network Protocols (ICNP)
By Tao Xiong,Jin Zhang,Junmei Yao,Wei Lou
Issue Date:October 2012
pp. 1-10
Hidden terminals are typical interference sources that can significantly reduce the throughput of a wireless network if it adopts the CSMA/CA MAC protocol. The RTS/CTS mechanism is a well-known solution to this hidden terminal problem. However, it only wor...
Cellular SDS Algorithm for the Rectilinear Steiner Minimum Tree
Found in: 2012 Third International Conference on Digital Manufacturing and Automation (ICDMA)
By Sheng-Wei Li,Jin Zhang
Issue Date:July 2012
pp. 272-276
The rectilinear Steiner minimum tree problem asks for a shortest tree connecting given points in the plane with rectilinear distance which has extensive applications in real world and is known to be NP-complete. Because of the intrinsic characteristic of t...
DDC: A Novel Scheme to Directly Decode the Collisions in UHF RFID Systems
Found in: IEEE Transactions on Parallel and Distributed Systems
By Lei Kang, Kaishun Wu, Jin Zhang, Haoyu Tan,Lionel M. Ni
Issue Date:February 2012
pp. 263-270
RFID has been gaining popularity due to its variety of applications, such as inventory control and localization. One important issue in RFID system is tag identification. In RFID systems, the tag randomly selects a slot to send a Random Number (RN) packet ...
Workshop: Calling Structural Variation with low-coverage sequencing data by mapping to focal region
Found in: Computational Advances in Bio and Medical Sciences, IEEE International Conference on
By Jin Zhang,Yufeng Wu
Issue Date:February 2012
pp. 1
In the problem of Structural Variations (SV) finding, split-read mapping methods which search gaps upto a pre-defined maximum deletion size can be time consuming and less accurate. In this paper, we present a split read mapping method that calls SVs with l...
Automatic Model Building and Verification of Embedded Software with UPPAAL
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Xiaoli Gong,Jie Ma,Qingcheng Li,Jin Zhang
Issue Date:November 2011
pp. 1118-1124
Embedded systems are becoming ubiquitous and taking more and more important part in our daily life. Increasingly complex functionality leads to higher develop cost and lower software quality. Model checking has the potential of alleviating these problems. ...
QoS-aware, Optimal and Automated Service Composition with Users' Constraints
Found in: E-Business Engineering, IEEE International Conference on
By Chaocan Xiang,Wendong Zhao,Chang Tian,Jingnan Nie,Jin Zhang
Issue Date:October 2011
pp. 223-228
In order to address a fundamental issue of automated service composition, this paper presents a novel approach for QoS-aware, optimal and automated service composition with users' constraints. Firstly, we construct the workflow of service composition autom...
A Large-Scale Network Worm Emulation Experimental Environment
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Kuang Xiaohui,Xu Fei,Li Jin,Zhang Jianbo
Issue Date:October 2011
pp. 837-842
The worm experimental environment is the pivotal foundation for the worm research. Existing methods to build the environment, such as mathematical modeling, simulation and emulation, almost all of the existing methods inherently face a rigid fidelity-scala...
Grid Technology and e-government
Found in: Internet Computing and Information Services, International Conference on
By Jin Zhang
Issue Date:September 2011
pp. 58-60
Grid is the main technology in the e-government systems, based on characters of grid technology, we put forward to setup the e-government systems with different levels, this technology would be widely used in the future.
Robust Moving Cast Shadows Detection and Removal with Reliability Checking of the Color Property
Found in: Image and Graphics, International Conference on
By Xue Li,Yu-Jin Zhang,Bao-Di Liu
Issue Date:August 2011
pp. 440-445
In this paper, we propose a novel method that is capable of detecting and removing moving cast shadows robustly. Four properties of the moving cast shadows are observed. To make full use of the four properties, pixel level processing is adopted to extract ...
Image Class Segmentation via Conditional Random Field over Weighted Histogram Classifier
Found in: Image and Graphics, International Conference on
By Fei Xue,Yu-Jin Zhang
Issue Date:August 2011
pp. 477-481
Image class segmentation is a problem that combines image segmentation and image classification. Conditional random field can be used in image class segmentation to achieve state-of-the-art result, adding high-level information in the course of using low-l...
Combining Mean-Shift and Particle Filter for Object Tracking
Found in: Image and Graphics, International Conference on
By Da Tang,Yu-Jin Zhang
Issue Date:August 2011
pp. 771-776
Mean-shift is an effective algorithm for object tracking. However, it has a poor performance when the illumination condition changes fast or the tracking target being shadowed. By contract, particle filter based object tracking has a better tracking perfor...
Competitive and Fair Medium Access Despite Reactive Jamming
Found in: Distributed Computing Systems, International Conference on
By Andrea Richa, Christian Scheideler, Stefan Schmid, Jin Zhang
Issue Date:June 2011
pp. 507-516
Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often simple and cheap to implement. Today's jammers can perform physical carrier sensing in...
Dynamic Cascades with Bidirectional Bootstrapping for Action Unit Detection in Spontaneous Facial Behavior
Found in: IEEE Transactions on Affective Computing
By Yunfeng Zhu,F. De la Torre,J. F. Cohn, Yu-Jin Zhang
Issue Date:April 2011
pp. 79-91
Automatic facial action unit detection from video is a long-standing problem in facial expression analysis. Research has focused on registration, choice of features, and classifiers. A relatively neglected problem is the choice of training images. Nearly a...
Identifying interacting SNPs with parallel fish-agent based logic regression
Found in: 2011 IEEE 1st International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)
By Jiayin Wang, Jin Zhang, Yufeng Wu
Issue Date:February 2011
pp. 171-177
Understanding the genotype-phenotype association is a fundamental problem in genetics. A major open problem in mapping complex traits is identifying a set of interacting genetic variants (such as single nucleotide polymorphisms or SNPs) that influence dise...
Dynamic Modeling and Simulation Analysis of the Cushioning System of the Impact Roller Based on ADAMS
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Zhi Jinning, Zhang Hong, Li Jie
Issue Date:January 2011
pp. 1125-1128
The mathematical model of cushioning system is established on the basis of analyzing the structure and work characteristics of the impact roller. The assembly model of the whole machine was developed in UG software utilizing the multi-body dynamics theory ...
Coverage Algorithm Based on Sensor Residual Energy for Sensor Network
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Weifeng Yang, Xiao Liu, Jin Zhang
Issue Date:December 2010
pp. 523-525
Aiming at the coverage problem, a new coverage algorithm is proposed based on residual energy of sensors in this paper. In the algorithm, it is unnecessary for sensors to know its geographic information. By exchanging some related information with its neig...
Using Packet Size Distribution to Identify P2P-TV Traffic
Found in: Cyber-Enabled Distributed Computing and Knowledge Discovery, International Conference on
By Li Jin, Zhang Xin, Zuo Xiao-Liang, Wang Hui
Issue Date:October 2010
pp. 150-155
We propose an approach to accurately identify the traffic generaed by P2P-TV applications. This approach only relies on accounting packet size distribution (PSD) of the P2P-TV application during small time-windows. The rationale is that the packet size dis...
Routing in max-min fair networks: A game theoretic approach
Found in: Network Protocols, IEEE International Conference on
By Dejun Yang, Guoliang Xue, Xi Fang, Satyajayant Misra, Jin Zhang
Issue Date:October 2010
pp. 1-10
In this paper, we study the problem of routing in networks with max-min fair congestion control at the link level. The goal of each user is to maximize its own bandwidth by selecting its path. The problem is formulated as a non-cooperative game. We first p...
Robust Human Tracking Algorithm Applied for Occlusion Handling
Found in: Frontier of Computer Science and Technology, Japan-China Joint Workshop on
By Jin Zhang, Hongguang Sun, Weizhou Guan, Jialiang Wang, Yannan Xie, Bingnan Shang
Issue Date:August 2010
pp. 546-551
The robust tracking algorithm is presented that can automatically track the human including partial or total occlusion in the paper. Firstly, as a result of the use of Camshift, the effectiveness of particle is improved, and the tracking window can change ...
A CT Centered on Rogowski Coil Applied for Low-Frequency Heavy Current Measurement
Found in: Electrical and Control Engineering, International Conference on
By Li Weibo, He Hong, Rao Jin, Zhang Mingyuan, Ma Minzhong
Issue Date:June 2010
pp. 27-30
A current transformer (CT) system centered on Rogowski coil is introduced to measure the low frequency heavy current of the linear induction motor (LIM) powered by the H-bridge sine pulse width modulation (SPWM) inverter. The frequency of the output curren...
An Incremental Approach to Efficiently Retrieving Representative Information for Mobile Search on Web
Found in: Mobile Business / Global Mobility Roundtable, International Conference on
By Jin Zhang, Qiang Wei, Guoqing Chen
Issue Date:June 2010
pp. 402-409
Mobile search is one of the emerging and promising fields for researchers and practitioners. Nowadays, in consideration of screen size and navigability, current PC web search engines and information retrieval approaches may hardly be transplanted onto mobi...
Service-oriented Workflow Metamodel and System
Found in: International Conference on E-Business and E-Government
By Guangzhi Dong,Junfei Liu,Jin Zhang,Mingzhong Xiao
Issue Date:May 2010
pp. 203-206
For solving the problems appearing in the application of SOA to various types WFMS, such as WFMS which includes many human activities, a metamodel of Service-oriented workflow process, SOWF-MM, is proposed. In SOWF-MM, services are regarded as resource, a ...
Detect Events on Noisy Textual Datasets
Found in: Conference, International Asia-Pacific Web
By Sen Yang, Xueqi Cheng, You Chen, Gaolin Fang, Jin Zhang, Hongbo Xu
Issue Date:April 2010
pp. 372-374
Social media, e.g. Weblog and Internet forum, generate rich historical textual datasets which record lots of valuable events. Automatic event detection tries to discover important and interesting events and their related documents. Existing solutions to ev...
A demonstration of the MaxStream federated stream processing system
Found in: Data Engineering, International Conference on
By Irina Botan, Younggoo Cho, Roozbeh Derakhshan, Nihal Dindar, Ankush Gupta, Laura Haas, Kihong Kim, Chulwon Lee, Girish Mundada, Ming-Chien Shan, Nesime Tatbul, Ying Yan, Beomjin Yun, Jin Zhang
Issue Date:March 2010
pp. 1093-1096
MaxStream is a federated stream processing system that seamlessly integrates multiple autonomous and heterogeneous Stream Processing Engines (SPEs) and databases. In this paper, we propose to demonstrate the key features of MaxStream using two application ...
Scheduling for fast response multi-pattern matching over streaming events
Found in: Data Engineering, International Conference on
By Ying Yan, Jin Zhang, Ming-Chien Shan
Issue Date:March 2010
pp. 89-100
Real-time pattern matching over event streams has gained much more attention recently due to the analytical capability demanded in many operation-critical applications such as credit card fraud detection, algorithmic stock trading and RFID tracking. One of...
Design and Implementation of Chinese Ancient Poetry Learning System Based on Domain Ontology
Found in: e-Education, e-Business, e-Management and e-Learning, International Conference on
By Rui Yao, Jin Zhang
Issue Date:January 2010
pp. 460-463
Based on technology of domain ontology, Chinese ancient poetry learning system provides the high knowledge relevance among poems, poet, allusion, genre etc., and presents knowledge according to the user's preference and educational level. It explores appro...
Notice of Retraction Data Management Mode Research Based on Learners' Learning Information -- An Example of Network Courses
Found in: 2009 International Conference on Education Technology and Training (ETT 2009)
By Jin Zhang, Hong Shen
Issue Date:December 2009
pp. 74-78
Notice of Retraction After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles. We hereby retract the content of this paper. Reas...
Research on Training Methods of Operation Ability for the Students Major in Automatization
Found in: Computer Science-Technology and Applications, International Forum on
By Du Bo, Wang Jin, Zhang Xin
Issue Date:December 2009
pp. 401-404
The poor operation ability is one of the main reasons for the difficult employment of college graduates. In order to solve this problem, considering professional characteristics of automatization, research and improve four training methods of Single Chip M...
Query Classification Based on Regularized Correlated Topic Model
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Haijun Zhai, Jiafeng Guo, Qiong Wu, Xueqi Cheng, Huawei Sheng, Jin Zhang
Issue Date:September 2009
pp. 552-555
This paper addresses the problem of query classification (QC), which aims to classify Web search queries into one or more predefined categories. The state-of-the-art solution for QC is to employ a bridging classifier via an intermediate taxonomy. In this p...
A Frequency Sensitivity-Based Quality Prediction Model for JPEG Images
Found in: Image and Graphics, International Conference on
By David W. Tsai, Yu-Jin Zhang
Issue Date:September 2009
pp. 28-32
A quality prediction model for images coded with JPEG is proposed in this paper. This model estimates the quality of an image at a given compressed ratio based on the structural similarity theory, without actual coding of the image. As different frequencie...
Evaluation of SENSC Algorithm for Image Clustering
Found in: Image and Graphics, International Conference on
By Yinfeng Qin, Le Li, Yu-Jin Zhang
Issue Date:September 2009
pp. 266-271
SENSC algorithm is a newly proposed stable and efficient NSC algorithm. In this paper the SENSC algorithm is evaluated for the task of image clustering. A series of experiments are conducted on two different kinds of image datasets, including face images a...
 1  2 Next >>