Search For:

Displaying 1-46 out of 46 total
A Hybrid Particle Swarm Optimization Improved by Mutative Scale Chaos Algorithm
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Ming Chen,Tao Wang,Jian Feng,Yong-Yong Tang,Li-Xin Zhao
Issue Date:August 2012
pp. 321-324
When using the standard particle swarm optimization to optimize the complex problems with high dimension, low convergence efficiency and falling into local optimization usually occur because of its inherent disadvantages. To avoid these disadvantages, a no...
 
Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing
Found in: Cloud Computing Technology and Science, IEEE International Conference on
By Jin Li, Gansen Zhao, Xiaofeng Chen, Dongqing Xie, Chunming Rong, Wenjun Li, Lianzhang Tang, Yong Tang
Issue Date:December 2010
pp. 89-96
Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. Promising as it is, this paradigm also brings forth new challenges for data security and access control when users outsource ...
 
Trusted Data Sharing over Untrusted Cloud Storage Providers
Found in: Cloud Computing Technology and Science, IEEE International Conference on
By Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, Yong Tang
Issue Date:December 2010
pp. 97-103
Cloud computing has been acknowledged as one of the prevaling models for providing IT capacities. The off-premises computing paradigm that comes with cloud computing has incurred great concerns on the security of data, especially the integrity and confiden...
 
Enhanced Boiling Microstructures Applied to Microelectronics Cooling
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Dashi Su, Yong Tang, Biao Tang
Issue Date:April 2009
pp. 380-383
A kind of Two-phase Closed Loop Thermosyphon (TCLT) which dissipate heat of electronic device was fabricated. The TCLT was composed of an evaporator, a condenser, a subcooler and connecting tubes. The most important part, the Enhanced Boiling Microstructur...
 
A workflow model based on fuzzy-timing Petri nets
Found in: International Conference on Computer Supported Cooperative Work in Design
By Yan Pan, Yong Tang, Na Tang, Yang Yu, Wei Dao
Issue Date:May 2005
pp. 541-546 Vol. 1
Time information management in workflow has been recognized as one of the most significant tasks in workflow management. The uncertainties in time and time-related constraints in workflow models should be taken into consideration. Based on introducing time...
 
Research of temporal workflow process and resource modeling
Found in: International Conference on Computer Supported Cooperative Work in Design
By Jianqin Xie, Yong Tang, Qing He, Na Tang
Issue Date:May 2005
pp. 530-534 Vol. 1
In recent years, numerous Petri net based workflow models have been proposed. In the aspect of temporal modeling information, however, there remain some problems in these workflow models. In this paper, a new Petri Net modeling method is put forward, which...
 
Resource Pool Oriented Trust Management for Cloud Infrastructure
Found in: 2013 Eighth International Conference on Availability, Reliability and Security (ARES)
By Gansen Zhao,Haiyu Wang,Chunming Rong,Yong Tang
Issue Date:September 2013
pp. 268-273
IaaS encourages pooled resource management model, which provides transparency on the management and provision of IT resources. The transparency, hiding physical details of the underlying resources, makes it difficult for cloud users/services to identify tr...
 
Modeling MongoDB with Relational Model
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Gansen Zhao,Weichai Huang,Shunlin Liang,Yong Tang
Issue Date:September 2013
pp. 115-121
Relational databases have been prevailing for the last two decades, with features of clear semantics and ease of use with SQL supported by the underlying theory, relational algebra. Relational databases provide good support for structural data management. ...
 
A Concept Drifting Based Clustering Framework for Data Streams
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Gansen Zhao,Ziliu Li,Fujiao Liu,Yong Tang
Issue Date:September 2013
pp. 122-129
It has attracted extensive interests to discover knowledge from data streams generated in real-time. At present, there are some data streams mining frameworks, providing mining solutions for data streams. This paper proposes an on-demand framework (SRAStre...
 
A Concept Drifting Based Clustering Framework for Data Streams
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Gansen Zhao,Ziliu Li,Fujiao Liu,Yong Tang
Issue Date:September 2013
pp. 122-129
It has attracted extensive interests to discover knowledge from data streams generated in real-time. At present, there are some data streams mining frameworks, providing mining solutions for data streams. This paper proposes an on-demand framework (SRAStre...
 
Modeling MongoDB with Relational Model
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Gansen Zhao,Weichai Huang,Shunlin Liang,Yong Tang
Issue Date:September 2013
pp. 115-121
Relational databases have been prevailing for the last two decades, with features of clear semantics and ease of use with SQL supported by the underlying theory, relational algebra. Relational databases provide good support for structural data management. ...
 
Privacy Enhancing Framework on PaaS
Found in: 2012 International Conference on Cloud and Service Computing (CSC)
By Gansen Zhao,Ziliu Li,Wenjun Li,Hao Zhang,Yong Tang
Issue Date:November 2012
pp. 131-137
Platform as a service (PaaS) is a cloud computing service model that provides a computing platform and a solution stack as an on-demand service, allowing users to create, deploy and control their own cloud services without building and managing their own c...
 
A Stream Reassembly Mechanism Based on DPI
Found in: 2012 26th IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)
By Shuhui Chen,Yong Tang
Issue Date:May 2012
pp. 1204-1209
Stream Reassembly is an indispensable function of Deep Packet Inspection, which is an critical element of Network Intrusion System. However, since it need to heavily move packet payload from one block of memory to another block of memory, Stream Reassembly...
 
A Pay-as-You-Go Framework for Data Management
Found in: Computational and Information Sciences, International Conference on
By Ying Pan,Yong Tang
Issue Date:October 2011
pp. 373-376
Extensive effort has been brought forth to assist in data management. In particular, classic information integration systems and database systems techniques are exploited to manage evolving data. However, these works require hard up-front investment before...
 
Gregex: GPU Based High Speed Regular Expression Matching Engine
Found in: Innovative Mobile and Internet Services in Ubiquitous Computing, International Conference on
By Lei Wang, Shuhui Chen, Yong Tang, Jinshu Su
Issue Date:July 2011
pp. 366-370
Regular expression matching engine is a crucial infrastructure which is widely used in network security systems, like IDS. We propose Gregex, a Graphics Processing Unit (GPU) based regular expression matching engine for deep packet inspection (DPI). Gregex...
 
Experimental Study on Voltage Breakdown Characteristic of IGBT
Found in: Asia-Pacific Power and Energy Engineering Conference
By Bo Wang, Yong Tang, Ming Chen
Issue Date:March 2011
pp. 1-4
NA
 
Study on Electric Characteristic of IGBT at Different Junction Temperature
Found in: Asia-Pacific Power and Energy Engineering Conference
By Bo Wang, Yong Tang, Ming Chen
Issue Date:March 2011
pp. 1-4
NA
 
One-Hop Neighbor Transmission Coverage Information Based Distributed Algorithm for Connected Dominating Set
Found in: Parallel Architectures, Algorithms and Programming, International Symposium on
By Wenyong Wang,Jun Zhang,Yong Tang,Yu Xiang,Ting Yang
Issue Date:December 2010
pp. 15-21
Broadcast is very important for delivering messages in wireless sensor networks. In order to improve the efficiency of broadcast and re¬duce energy consumption, it is necessary to con¬struct a virtual backbone within the entire net¬work. Constructing a vir...
 
Test of IGBT Junction-Case Steady State Thermal Resistance and Experimental Analysis
Found in: 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010)
By Ming Chen, An Hu, Bo Wang, Yong Tang
Issue Date:October 2010
pp. 557-560
A common theoretically erroneous is to assume that the power electronic devices junction-case steady state thermal resistance is a constant. Based on theoretical qualitative analysis and experimental research, the junction-case steady state thermal resista...
 
Applying Q-Learning Algorithm to Study Line-Grasping Control Policy for Transmission Line Deicing Robot
Found in: 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010)
By Shuning Wei, Yaonan Wang, Yiming Yang, Feng Yin, Wenming Cao, Yong Tang
Issue Date:October 2010
pp. 382-387
Ice coating in power networks could result in power-tower collapse and power interruption. This paper introduces a preliminary design of deicing robot, which travels on transmission lines and automatically remove ices. Inevitably, the deicing robot will en...
 
Signature Tree Generation for Polymorphic Worms
Found in: IEEE Transactions on Computers
By Yong Tang, Bin Xiao, Xicheng Lu
Issue Date:April 2011
pp. 565-579
Network-based signature generation (NSG) has been proposed as a way to automatically and quickly generate accurate signatures for worms, especially polymorphic worms. In this paper, we propose a new NSG system—PolyTree, to defend against polymorphic worms....
 
CAD Model's Simplification and Conversion for Virtual Reality
Found in: Information and Computing Science, International Conference on
By Yong Tang, Hongbin Gu
Issue Date:June 2010
pp. 265-268
Due to huge number of triangles are produced when CAD model converts to graphics model that making use of the current data interface, it can't meet the requirement of real time rendering in virtual reality system. In this paper, a novel approach about CAD ...
 
Research on Diversity Measure in Particle Filter
Found in: Intelligent Computation Technology and Automation, International Conference on
By Jinxia Yu, Yongli Tang, Wenjing Liu
Issue Date:May 2010
pp. 1146-1149
It is very important to find diversity measure when to perform a resampling step in particle filter. By analyzing the inherent deficiency in resampling algorithm of particle filter, some diversity measures including effective sample size, population divers...
 
Interactive Pervasive Wireless Services over GPRS and Bluetooth
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Yong Tang
Issue Date:December 2009
pp. 796-801
The large scale adoption of mobile phones brings a merging mobile commerce market. Most wireless applications are based on GPRS to provide services in wide areas, while some location based services are based on Bluetooth to enable mobile users to enjoy pro...
 
Study of AD HOC Network Access Single-Channel MAC Protocol and Hidden/Exposed Terminal
Found in: Genetic and Evolutionary Computing, International Conference on
By Yong Tang, Man-yuan Zhou
Issue Date:October 2009
pp. 689-692
The mobile AD HOC networks have the characteristics hidden / exposed terminals and single channel. This paper not only analysis the cause of hidden / exposed terminals and the single-channel, but also described mac layer main access protocol in the current...
 
Research in Enterprise Applications of Dynamic Web Service Composition Methods and Models
Found in: Electronic Commerce and Security, International Symposium
By Qing-Ming Wang, Yong Tang, Zan-Bo Zhang
Issue Date:May 2009
pp. 146-150
The paper summarizes current technologies of dynamic web service composition. Then, based on the existing technologies, we raise a new solution for dynamic web service composition. We make use of the knowledge of domain ontology. On the one hand, the user’...
 
A role hierarchical group awareness model and its time possibility analysis based fuzzy time
Found in: International Conference on Computer Supported Cooperative Work in Design
By Jun Zhu, Yong Tang, Jianguo Li, Hai Liu
Issue Date:April 2009
pp. 38-43
A role based hierarchical group awareness model (RHGAM) on the basis of the previous research was presented in this paper. Regarding role as the basis of the group cooperation, firstly RHGAM constructed a group cooperation environment (GCE), and then GCE w...
 
The role research in group awareness model
Found in: International Conference on Computer Supported Cooperative Work in Design
By Jianguo Li, Yong Tang, Gaofeng Ji, Jun Zhu
Issue Date:April 2009
pp. 26-31
Role is an important concept in collaboration systems and CSCW systems especially in the aspect of group awareness. This paper proposes a new group awareness model based on role by the research of role in collaboration systems and the analysis of existing ...
 
An Efficient Certificateless Signature from Pairings
Found in: Data, Privacy, and E-Commerce, International Symposium on
By Changji Wang, Hui Huang, Yong Tang
Issue Date:November 2007
pp. 236-238
In this paper, we proposed a new certificateless signature based on bilinear pairings. The proposed scheme is more efficient than those of previous schemes by pre-computing the pairing e(P, P ) = g and publishing as the system pa- rameters, it needs not to...
 
Improved Lempel-Ziv Algorithm Based on Complexity Measurement of Short Time Series
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Feng-tao Liu, Yong Tang
Issue Date:August 2007
pp. 771-776
The Lempel-Ziv algorithm is not fully suitable for measuring the complexity of short series. When the Lempel-Ziv algorithm is applied, the assumption that the sequence must be long enough is always ignored: the series length is usually too large, and the e...
 
DAW: A Distributed Antiworm System
Found in: IEEE Transactions on Parallel and Distributed Systems
By Shigang Chen, Yong Tang
Issue Date:July 2007
pp. 893-906
<p><b>Abstract</b>—A worm automatically replicates itself across networks and may infect millions of servers in a short period of time. It is conceivable that the cyberterrorists may use a widespread worm to cause major disruption to the ...
 
An Automated Signature-Based Approach against Polymorphic Internet Worms
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yong Tang, Shigang Chen
Issue Date:July 2007
pp. 879-892
<p><b>Abstract</b>—Capable of infecting hundreds of thousands of hosts, worms represent a major threat to the Internet. However, the defense against them is still an open problem. This paper attempts to answer an important question: How c...
 
Efficient Wireless Multicast Protocol with Orthogonal CTS Modulation Supporting Video Conferencing
Found in: Multimedia and Expo, IEEE International Conference on
By Ju Wang, Hongsik Choi, Esther Hughes, Yong Tang
Issue Date:July 2006
pp. 1217-1220
Multicast based video conferencing in wireless networks is recently receiving more and more attention. In this paper, we propose a novel linker-level protocol, Multicast with Orthorgonal CTS (MOCTS) protocol, to provide efficient wireless multicast. Our ap...
 
HonIDS: Enhancing Honeypot System with Intrusion Detection Models
Found in: Innovative Architecture for Future Generation High-Performance Processors and Systems, International Workshop on
By Yong Tang, HuaPing Hu, XiCheng Lu, Jie Wang
Issue Date:April 2006
pp. 135-143
Honeypots are highly valued for their detective function. However, suitable detection models using in honeypot system have not been fully explored. We present HonIDS, a honeypot system for detecting malicious hosts and intruders in local network. HonIDS is...
 
Correction strategy for view maintenance anomaly after schema and data updating concurrently
Found in: International Conference on Computer Supported Cooperative Work in Design
By Zhongmei Shu, Shixian Li, Yayao Zuo, Xiaocong Zhou, Yong Tang
Issue Date:May 2005
pp. 1046-1051 Vol. 2
During maintaining the materialized view in the data warehouse, how to efficiently handle the concurrent updates is an important and intractable problem. The paper discusses typical situations that schema changes mix with data updates concurrently. And the...
 
A parallel multiple dimensional view re-evaluation strategy
Found in: International Conference on Computer Supported Cooperative Work in Design
By Yayao Zuo, Yong Tang, Zhongmei Shu
Issue Date:May 2005
pp. 188-193 Vol. 1
A parallel strategy for multiple dimensional view re-evaluation (PMDVRES) proposed in this paper integrates incremental view maintenance with view self-maintenance algorithm. Meanwhile, this approach takes advantage of the relevant algorithm to filter out ...
 
Slowing Down Internet Worms
Found in: Distributed Computing Systems, International Conference on
By Shigang Chen, Yong Tang
Issue Date:March 2004
pp. 312-319
An Internet worm automatically replicates itself to vulnerable systems and may infect hundreds of thousands of servers across the Internet. It is conceivable that the cyber-terrorists may use a wide-spread worm to cause major disruption to our Internet eco...
 
Event Driving Based Alarm Correlation Approach by Using Petri Net
Found in: Information Science and Engineering, International Conference on
By Yong Tang, Xin Zhang
Issue Date:December 2009
pp. 4865-4868
According to practical requirement, this paper puts forward an alarm event correlation approach basing on event driving, which considers the temporal relationship between events, and establishes several Petri net models. The experiment results show that, t...
 
Contructing Authentication Web in Cloud Computing
Found in: 2013 International Conference on Cloud and Service Computing (CSC)
By Gansen Zhao,Zhongjie Ba,Feng Zhang,Qi Chen,Jianguo Li,Yong Tang
Issue Date:November 2013
pp. 106-111
Cloud computing enables rapid deployment of services on an on-demand basis in large scale. Public clouds are open to all users with identities from various domains, requiring the support of multiple identity providers and hybrid authentication protocols. T...
 
Trust Management for IaaS with Group Signature
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Haiyu Wang,Gansen Zhao,Qi Chen,Yong Tang
Issue Date:September 2013
pp. 422-430
IaaS encourages pooled resource management model, which provides transparency on the management and provision of IT resources. The transparency, hiding physical details of the underlying resources, makes it difficult for cloud users/services to identify tr...
 
Trust Management for IaaS with Group Signature
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Haiyu Wang,Gansen Zhao,Qi Chen,Yong Tang
Issue Date:September 2013
pp. 422-430
IaaS encourages pooled resource management model, which provides transparency on the management and provision of IT resources. The transparency, hiding physical details of the underlying resources, makes it difficult for cloud users/services to identify tr...
 
Optimization of Configuration for Retro-reflective Sheeting in Guide Signs Based on Dynamic Intervention Technology
Found in: Optoelectronics and Image Processing, International Conference on
By Huang Kai, He Yong, Tang Jianjuan, Hou Dezao
Issue Date:November 2010
pp. 83-85
Based on psychological theories, the paper analyzed the relationship between the acuity and the brightness ratio of the letter and background in guide signs. Because the luminance values for the five grades of the retro-reflective sheeting were constant an...
 
Research on Speed Limit of Work Zones in the Freeway
Found in: Optoelectronics and Image Processing, International Conference on
By Huang Kai, He Yong, Tang Jianjuan, Hou Dezao
Issue Date:November 2010
pp. 277-280
The aim of the study was to develop a procedure for determining freeway work zone speed limits usable during the construction phase of a roadway maintenance project. The most desirable work zone speed limit should minimize the accident rate as well as ensu...
 
Research on Effectiveness of Freeway Work Zone Speed Reduction Strategies
Found in: Optoelectronics and Image Processing, International Conference on
By Huang Kai, He Yong, Tang Jianjuan, Hou Dezao
Issue Date:November 2010
pp. 218-220
Two-lane, one-way freeways compose a large percent of the freeway system nationwide. Preserving, expending, and enhancing these freeways result in many work zones which have caused a safety concern for the traveling public. Aimed at reducing crashes attrib...
 
Question classification with semantic tree kernel
Found in: Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval (SIGIR '08)
By Luxin Lin, Yan Pan, Yemin Luo, Yong Tang
Issue Date:July 2008
pp. 2-2
Question Classification plays an important role in most Question Answering systems. In this paper, we exploit semantic features in Support Vector Machines (SVMs) for Question Classification. We propose a semantic tree kernel to incorporate semantic similar...
     
Visual Modeling and Simulation for Laser Action Area in Rapid Prototyping
Found in: Computer Science and Information Engineering, World Congress on
By Wu Gui yong, Tang Guang xing, Zhang Hong liang, Yao Shan
Issue Date:April 2009
pp. 435-439
To select optimal processing parameters for Rapid Prototyping (RP) and improve the product efficiency, a visual modeling and simulating method for laser action area in RP was proposed. The SolidWorks' API (Application Programming Interface) functions were ...
 
 1