Search For:

Displaying 1-29 out of 29 total
An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques
Found in: IEEE Transactions on Parallel and Distributed Systems
By Weijia Jia, Wei Zhao, Dong Xuan, Gaochao Xu
Issue Date:October 1999
pp. 984-1000
<p><b>Abstract</b>—In this paper, we design and analyze an efficient fault-tolerant multicast routing protocol. Reliable multicast communication is critical for the success of many Internet applications. Multicast routing protocols with c...
 
An Improved Scheduling Algorithm for Multimedia Support in Web Cluster Servers
Found in: Multimedia and Signal Processing, International Conference on
By Bao Li-yong, Zhao Dong-feng, Zhao Yi-fan
Issue Date:May 2011
pp. 115-119
A solution is urgently expected to meet the higher-quality web service requirements of multimedia applications on the limited bandwidth of internet. Based on the ideas of priority-based service and dynamic load adaptation, this paper presents a new schedul...
 
Recognition of Wood-Floor Damages Based on Wavelet Transform and Neural Network Ensemble
Found in: Intelligent Computation Technology and Automation, International Conference on
By Zhao Jian, Zhao Dong
Issue Date:May 2010
pp. 988-991
Analyzed the forced vibration dynamic characteristics of three different damage-types wood-floors, according to the characteristics of forced vibration signals, wavelet packet decompose was proposed to extract the information related to the condition of th...
 
The Analysis of the MAC Protocol of Two-Class Priority Station Polling System under Mixed Services Policy of Exhaustive and Two-Times Gated Services
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Bao Li-yong, Zhao Dong-feng, Ding Hong-wei
Issue Date:April 2010
pp. 344-347
Based on the ideas of priority service, self-adaptation to loading, and conflict-free transmission with high-efficiency, this article proposes a new analysis model of MAC protocol of wireless communication network, which has made possible the polling servi...
 
Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks
Found in: Parallel Processing, International Conference on
By Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao, Dong Xuan
Issue Date:October 2003
pp. 483
This paper studies countermeasures to traffic analysis attacks. A common strategy for such countermeasures is link padding. We consider systems where payload traffic is padded so that packets have either constant inter-arrival times or variable inter-arriv...
 
Anisotropic spherical Gaussians
Found in: ACM Transactions on Graphics (TOG)
By Dan-Yong Zhao, Kun Xu, Zhao Dong, Run-Dong Wu, Shi-Min Hu, Wei-Lun Sun
Issue Date:November 2013
pp. 1-11
We present a novel anisotropic Spherical Gaussian (ASG) function, built upon the Bingham distribution [Bingham 1974], which is much more effective and efficient in representing anisotropic spherical functions than Spherical Gaussians (SGs). In addition to ...
     
Real-Time Volume Rendering in Dynamic Lighting Environments Using Precomputed Photon Mapping
Found in: IEEE Transactions on Visualization and Computer Graphics
By Yubo Zhang, Zhao Dong, Kwan-Liu Ma
Issue Date:August 2013
pp. 1317-1330
We present a framework for precomputed volume radiance transfer that achieves real-time rendering of global illumination effects for volume data sets such as multiple scattering, volumetric shadows, and so on. Our approach incorporates the volumetric photo...
 
A Method of Combining HSSE-tree and Binary Label to Compute All Minimal Hitting Sets
Found in: Computational Intelligence and Design, International Symposium on
By Wenquan Feng,Min Du,Qi Zhao,Dong Wang
Issue Date:October 2011
pp. 23-26
Computing all minimal hitting sets (MHSs) is a key step of model-based diagnosis. A novel method to compute all MHSs called Binary-label HSSE is put forward, which combines HSSE-tree and binary label. In the method, binary digits is used to mark the real e...
 
Optimal Management of MicroGrid Based on a Modified Particle Swarm Optimization Algorithm
Found in: Asia-Pacific Power and Energy Engineering Conference
By Chun-xia Dou, Xing-bei Jia, Zhi-qian Bo, Fang Zhao, Dong-le Liu
Issue Date:March 2011
pp. 1-8
NA
 
Research Progress and Development Trend of Smart Transmission Line Technologies
Found in: Asia-Pacific Power and Energy Engineering Conference
By Mengyao Yang, Wei Wang, Dianquan Zhao, Dong Han
Issue Date:March 2011
pp. 1-5
NA
 
Fast Exact Nearest Patch Matching for Patch-Based Image Editing and Processing
Found in: IEEE Transactions on Visualization and Computer Graphics
By Chunxia Xiao, Meng Liu, Yongwei Nie, Zhao Dong
Issue Date:August 2011
pp. 1122-1134
This paper presents an efficient exact nearest patch matching algorithm which can accurately find the most similar patch-pairs between source and target image. Traditional match matching algorithms treat each pixel/patch as an independent sample and build ...
 
Chinese News Event 5W1H Elements Extraction Using Semantic Role Labeling
Found in: International Symposiums on Information Processing
By Wei Wang, Dongyan Zhao, Dong Wang
Issue Date:October 2010
pp. 484-489
To relieve
 
Design and Implementation of DSP-based License Plate Detection System
Found in: Frontier of Computer Science and Technology, Japan-China Joint Workshop on
By Ying-Juan Sun, Yong-Peng Xiao, Da-Wei Zhao, Dong-Bing Pu
Issue Date:August 2010
pp. 494-498
This paper focuses on the design of hardware framework about DSP-based embedded License Plate Detection system including the detailed technology of circuit design among image sensor, DSP, Flash, SDRAM, timer and resetting. The program on license plate dete...
 
Joint Source Number Detection and DOA Track Using Particle Filter
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By De-xiu Hu, Yong-jun Zhao, Dong-hai Li
Issue Date:March 2010
pp. 541-544
Current particle filter assumes that the dimension of state is known and constant and it fails when this suppose does not holds. This paper improves on the particle filter using RJMCMC. The improved particle filter can not only preserve the performance on ...
 
The Application of UML in Zigbee Networks
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Jianyu Zhao, Dong Yang, Diankui Tang, Xinli Fang
Issue Date:March 2010
pp. 794-798
For the issues of a long development cycle, poor portability and high-risk in the development process of Zigbee wireless network, this paper introduces the Unified Modeling Language (UML) to standardize the development process, improving development effici...
 
A New Semi-fragile Watermarking for Audio Authentication
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Hong Zhao, Dong-sheng Shen
Issue Date:November 2009
pp. 299-302
This paper presents a new semi-fragile watermarking algorithm for audio authentication, which takes full advantage of scrambing algorithm. Watermark scrambling algorithm can dispel the pixel space relationship of the binary watermark image. After scrambing...
 
Interactive Global Illumination Using Implicit Visibility
Found in: Computer Graphics and Applications, Pacific Conference on
By Zhao Dong, Jan Kautz, Christian Theobalt, Hans-Peter Seidel
Issue Date:November 2007
pp. 77-86
Rendering global illumination effects for dynamic scenes at interactive frame rates is a computationally challenging task. Much of the computation time needed is spent during visibility queries between individual scene elements, and it is almost illusive t...
 
Collision Avoidance Multiple Access inWireless Sensor Networks
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Jianwei Wang, Yuping Zhao, Dong Wang, Timo Korhonen
Issue Date:September 2007
pp. 529-534
Collision avoidance multiple access plays an important role in wireless sensor networks, especially for those composed of nodes having a simple access protocol functionality. Numerous protocols have been proposed for wireless sensor networks during the pas...
 
Mining Evolutionary Event Patterns of Web Texts for Text Resource Aggregation
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Cheng-li Zhao, Dong-yun Yi
Issue Date:August 2007
pp. 50-55
As an outcome of the overwhelming volume of internet resources, it is necessary to research methods integrating distributed autonomous resources connected to the internet to make them more effective and efficient. With the understanding of characteristics ...
 
Real-time Voxelization for Complex Polygonal Models
Found in: Computer Graphics and Applications, Pacific Conference on
By Zhao Dong, Wei Chen, Hujun Bao, Hongxin Zhang, Qunsheng Peng
Issue Date:October 2004
pp. 43-50
In this paper we present an efficient voxelization algorithm for complex polygonal models by exploiting newest programmable graphics hardware. We first convert the model into three discrete voxel spaces according to its surface orientation. The resultant v...
 
Design of Single Sign-On
Found in: E-Commerce Technology for Dynamic E-Business, IEEE International Conference on
By Gang Zhao, Dong Zheng, Kefei Chen
Issue Date:September 2004
pp. 253-256
As IT systems proliferate to support business processes, users typically have to sign-on to multiple systems, necessitating an equivalent number of sign-on dialogues. Single sign-on can resolve the problem well. We first introduce the situation which makes...
 
Refining a Randomized Post-optimization Method for Covering Arrays
Found in: 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
By Xiaohua Li,Zhao Dong,Huayao Wu,Changhai Nie,Kai-Yuan Cai
Issue Date:March 2014
pp. 143-152
Combinatorial testing is an efficient technique that reveals the faults caused by parameters interaction in software systems. It uses covering arrays as test suites to avoid the combinatorial explosion of parameter values. However, the construction of cove...
 
Experimental Research of Grape Drying Using Solar Dryer with Latent Heat Storage System
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Mu Song, Yi Songlin, Zhang Biguang, Zhao Dong
Issue Date:February 2011
pp. 740-742
Solar dryer with latent heat storage system was designed in order to solve the problems of continuity of solar drying. The system was used to dry grape. The results of experiment show that the dryer met the requirement of continuous drying. At solar radiat...
 
A practical algorithm for rendering interreflections with all-frequency BRDFs
Found in: ACM Transactions on Graphics (TOG)
By Kun Xu, Li-Qian Ma, Rui Wang, Shi-Min Hu, Yan-Pei Cao, Zhao Dong
Issue Date:January 2014
pp. 1-16
Algorithms for rendering interreflection (or indirect illumination) effects often make assumptions about the frequency range of the materials' reflectance properties. For example, methods based on Virtual Point Lights (VPLs) perform well for diffuse and se...
     
Realtime volume rendering using precomputed photon mapping
Found in: Proceedings of the ACM SIGGRAPH Symposium on Interactive 3D Graphics and Games (I3D '12)
By Kwan-Liu Ma, Yubo Zhang, Zhao Dong
Issue Date:March 2012
pp. 217-217
In this poster, we present a volume rendering framework that achieves realtime rendering of global illumination effects for volume datasets, such as multiple scattering and volume shadow. This approach incorporates the volumetric photon mapping technique [...
     
Variance soft shadow mapping
Found in: Proceedings of the 2010 ACM SIGGRAPH symposium on Interactive 3D Graphics and Games (I3D '10)
By Baoguang Yang, Zhao Dong
Issue Date:February 2010
pp. 1-1
Camera control is essential in both virtual and real-world environments. The quality of the camera's placement and motion may spell the difference between usability and confusion. Our work focuses on an instance of camera control called target following, a...
     
Interactive volume caustics in single-scattering media
Found in: Proceedings of the 2010 ACM SIGGRAPH symposium on Interactive 3D Graphics and Games (I3D '10)
By Guodong Yuan, Hans-Peter Seidel, Ivo Ihrke, Thorsten Grosch, Wei Hu, Zhao Dong
Issue Date:February 2010
pp. 109-117
Volume caustics are intricate illumination patterns formed by light first interacting with a specular surface and subsequently being scattered inside a participating medium. Although this phenomenon can be simulated by existing techniques, image synthesis ...
     
Real-time, all-frequency shadows in dynamic scenes
Found in: ACM Transactions on Graphics (TOG)
By Hans-Peter Seidel, Jan Kautz, Philippe Bekaert, Thomas Annen, Tom Mertens, Zhao Dong
Issue Date:August 2008
pp. 1-49
Shadow computation in dynamic scenes under complex illumination is a challenging problem. Methods based on precomputation provide accurate, real-time solutions, but are hard to extend to dynamic scenes. Specialized approaches for soft shadows can deal with...
     
An Adaptive Method of IFS Image Compression Based on Creditability
Found in: Computers and Communications, IEEE Symposium on
By Yun-zhao Dong, He-xin Chen
Issue Date:July 2000
pp. 744
In this paper, we present a new scheme to compress still grayscale images based on iterated function system (IFS) employing a quadtree partitioning structure with adaptive threshold. In the conventional fractal image compression based on quadtree partition...
 
 1