Search For:

Displaying 1-26 out of 26 total
Cyber-Individual Meets Brain Informatics
Found in: IEEE Intelligent Systems
By Jianhua Ma,Jie Wen,Runhe Huang,Benxiong Huang
Issue Date:September 2011
pp. 30-37
To help people live better in today's digitally explosive environment, the authors envision a Cyber-Individual (Cyber-I) that is the counterpart of a real individual in the physical world.
 
SRPTES: A Secure Routing Protocol Based on Token Escrow Set for Ad Hoc Networks
Found in: Advanced Information Networking and Applications, International Conference on
By Chen Huang, Benxiong Huang, Yijun Mo, Jianhua Ma
Issue Date:March 2008
pp. 583-589
Ad hoc networks, which do not rely on fixed infrastructure such as base stations, can be deployed rapidly and inexpensively in situations with geographical or time constraints. However, the nature of Ad hoc networks makes them vulnerable to attacks, especi...
 
Region Partition Using User Mobility Patterns Based on Topic Model
Found in: 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)
By Feng Xiang,Lai Tu,Benxiong Huang,Xiaojun Yin
Issue Date:December 2013
pp. 484-489
Urban spatial structure has long been studied by geographers and economists to understand the development of cities using the activities extracted from surveys. With the popularity of mobile devices, massive urban sensing data has brought the opportunities...
 
What We Use to Predict a Mobile-Phone Users' Status in Campus?
Found in: 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)
By Fei Sun,Jun Zhang,Lai Tu,Benxiong Huang
Issue Date:December 2013
pp. 1238-1241
Mobile phones are quickly becoming the primary source for social and behavioral sensing and data collection. A great deal of research effort in academia and industry is put into mining this data for higher level sense-making, such as understanding user con...
 
Detecting Geographic Community in Mobile Social Network
Found in: 2012 IEEE International Conference on Green Computing and Communications (GreenCom)
By Duan Hu,Shu Chen,Lai Tu,Benxiong Huang
Issue Date:November 2012
pp. 343-347
We propose a new measurement called geographic community, which provides a bridge between spatial proximity and the social nature of individuals in mobile social network. A novel approach for detecting these geographic communities has been proposed. Throug...
 
Game System of Treadmill Based on Video Capture
Found in: IEEE-ACM International Conference on Green Computing and Communications and International Conference on Cyber, Physical and Social Computing
By Hai Hu, Yi Cui, Benxiong Huang
Issue Date:December 2010
pp. 836-839
Game system of treadmill based on video capture combines somatosensory technique which is hot now and professional exercise and body fitness together, providing a barrierless, ease experience of entertainment for people. This set of system captures running...
 
Activity Recognition from Call Detail Record: Relation Between Mobile Behavior Pattern and Social Attribute Using Hierarchical Conditional Random Fields
Found in: IEEE-ACM International Conference on Green Computing and Communications and International Conference on Cyber, Physical and Social Computing
By Chen Zhou, Zhengguang Xu, Benxiong Huang
Issue Date:December 2010
pp. 605-611
Mobile phone, as a kind of most commonly used vehicle of communication, keep records of every movements of each person. For each cell phone user, the different social attribute, leading to various mobility behaviors and social cliques, reflect on dissimila...
 
How About the Real Capacity of Cell-ID Based Algorithms for LBS
Found in: International Conference on E-Business and E-Government
By Tao Fu,Benxiong Huang
Issue Date:May 2010
pp. 1331-1337
We investigate the location algorithms of which parameters could be extracted from measurement reports. A field measurement was implemented for collecting data, and algorithms were programmed for examining their accuracies. The experiment results represent...
 
Message Receiver Determination in Multiple Simultaneous IM Conversations
Found in: IEEE Intelligent Systems
By Junze Wang, Furong Wang, Zheng Yan, Benxiong Huang
Issue Date:May 2011
pp. 24-31
<p>Automatically detecting instant message receivers by applying semantic relevance can help improve the usability of current IM systems and make multiple, simultaneous IM conversations more convenient.</p>
 
Password Recovery for RAR Files Using CUDA
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Guang Hu, Jianhua Ma, Benxiong Huang
Issue Date:December 2009
pp. 486-490
Driven by the insatiable demand of real-time graphics, especially from the market of computer games, Graphics Processing Unit (GPU) is becoming a major computing horsepower during recent years since the performance of GPU is surpassing that of the contempo...
 
Cyber-I: Vision of the Individual's Counterpart on Cyberspace
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Jie Wen, Kai Ming, Furong Wang, Benxiong Huang, Jianhua Ma
Issue Date:December 2009
pp. 295-302
Cyber-Individual, with a short term 'Cyber-I', is a real individual's counterpart in cyberspace. It is closely related to human-centric computing ideology which focuses on placing human in the center of computing. The study on Cyber-I tries to re-examine a...
 
Synchronized Multi-Channel Cognitive MAC Protocol with Efficient Solutions for Second Spectrum Access
Found in: Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on
By Sarah Eljack, Benxiong Huang, Lai Tu, Peng Zhang
Issue Date:July 2009
pp. 477-481
The MAC protocols for cognitive radio network should permit access to unused white spectrum without (or with minimal) interference to incumbent devices. With in mind the fact that channel availability can rapidly change over space and time, the coordinatio...
 
Internet Traffic Classification Using DBSCAN
Found in: Information Engineering, International Conference on
By Caihong Yang, Fei Wang, Benxiong Huang
Issue Date:July 2009
pp. 163-166
In recent years, a technique based on machinelearning for Internet traffic classification has attracted more and more attentions. It not only overcomes some shortcomingsof traditional classification technique based on port number,but also does not inspect ...
 
A Duty Cycle Adaptive Algorithm Based on Throughput
Found in: Information Technology and Computer Science, International Conference on
By Youling Zhou, Wenjin Liu, Benxiong Huang, Angli Liu
Issue Date:July 2009
pp. 39-42
For Wireless Sensor Networks, the duty cycle is an important factor to energy benefit, by analyzing how the listening/sleep periods of S-MAC, T-MAC protocol work on energy consumption, we have defined two parameters, Thfl and Q, Thfl standing for average w...
 
Latency Estimation for Time-Sensitive Applications under Wireless Network Coding Scheme
Found in: Communications and Mobile Computing, International Conference on
By Kui Xu, Bin Dai, Fan Zhang, Benxiong Huang, Bo Zhang
Issue Date:January 2009
pp. 263-266
Network coding has been designed for wireless networks to improve the capabilities of throughput, reliability, and routing by mixing information from different flows and conveying more information in each transmission. If packets are coded by blocks with l...
 
Block Size Estimation for Time-Sensitive Applications under Wireless Network Coding
Found in: Future Generation Communication and Networking
By Kui Xu, Fan Zhang, Chunming Rong, Bin Dai, Benxiong Huang
Issue Date:December 2008
pp. 321-324
Network coding has been designed for wireless networks to improve the capabilities of throughput, reliability, and routing by mixing information from different flows and conveying more information in each transmission. If packets are coded by blocks with l...
 
Wavelet Domain Image Restoration and Parameters Estimation based on Variational Bayesian Method and Student-t Priors
Found in: Computational Intelligence and Design, International Symposium on
By Xiaole Lu, Furong Wang, Hai Hu, Benxiong Huang
Issue Date:October 2008
pp. 405-409
In this paper we proposed a novel algorithm for image restoration and parameters estimation with a wavelet domain Student-t priors using variational Bayesian method. Because the conventional spatial domain hierarchical prior models have the shortcoming tha...
 
Reduce Time Synchronization Cost for High Latency and Resource-Constrained Sensor Networks
Found in: International Conference on Networking
By Yi Wang, Benxiong Huang, Furong Wang, Fan Zhang
Issue Date:April 2008
pp. 111-116
For emerging resource-constrained sensor networks, energy efficiency and computation simplicity could be as important as precision. Existing terrestrial synchronization protocols have already achieved high precision in radio networks, but none of them perf...
 
Delta Compression for Information Push Services
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Junze Wang, Yi Guo, Benxiong Huang, Jianhua Ma, Yijun Mo
Issue Date:March 2008
pp. 247-252
With remarkable advances in mobile calculation and wireless communications, users expect to access the Internet anytime, anywhere. However, in environments with limited network bandwidth, the traditional pull based approach for information diffusion can no...
 
Mitigating Harm of Liar-Farm in Reputation Model of VoIP Spam Filtering System
Found in: International Conference on Internet Computing in Science and Engineering
By Fei Wang, Yijun Mo, Caihong Yang, Benxiong Huang
Issue Date:January 2008
pp. 429-435
Reputation can help VoIP system detect spammers and filter spam calls, however, existing of liar farm would destroy the infrastructure of reputation system. As the spammers are more and more trickish, they would certainly construct liar farms and ask liars...
 
Delay Analysis of Single-hop Communication in Wireless SensorNetworks with Mobile Sink
Found in: Computer and Computational Sciences, International Multi-Symposiums on
By Fan Zhang, Benxiong Huang, Zhengguang Xu, Lai Tu
Issue Date:August 2007
pp. 504-507
In wireless sensor networks where the sink is mobile, a node can conveniently hold an information packet until the sink comes closer. This allows to both decrease the number of wireless hops required to deliver the information to the sink and reduce energy...
 
Password-Based Access Control Scheme with Remote User Authentication Using Smart Cards
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Chen Yang, Wenping Ma, Benxiong Huang, Xinmei Wang
Issue Date:May 2007
pp. 448-452
In this paper, a bilinear mapping based password-based access control scheme with remote user authentication scheme using smart cards is presented. The proposed scheme enables one user to choose his password freely in the registration phase and easily chan...
 
HLA-Based Network Simulation for Interactive Communication System
Found in: Asia International Conference on Modelling & Simulation
By Fan Zhang, Benxiong Huang
Issue Date:March 2007
pp. 177-180
This paper presents the idea of modeling transparent network simulations to realize the communication system by using interactive network simulation technology. An interactive network simulation can be built based on High Level Architecture (HLA). With the
 
Adaptive MAC Scheme Ready for Delay Assurances in Wireless Networks
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Fan Zhang, Benxiong Huang, Lai Tu, Jian Zhang
Issue Date:December 2006
pp. 234-239
Providing multiple classes of delay assurances to end-to-end applications is one of the key challenges in multihop WLAN's. In this paper, we propose a new scheme called Delay Feedback Adaptive Control (DFAC), which is a preparation to implement end-toend d...
 
Simulation and Evaluation of an HF Email Network
Found in: MILCOM
By Fan Zhang, Benxiong Huang, Lai Tu, Jian Zhang
Issue Date:October 2006
pp. 1-5
HF radio is becoming an increasingly important element in multimedia networks that incorporate landline, VHF, and UHF. MIL-STD-188-141B defines a third generation HF system with the aim of providing faster link establishment and higher message throughputs ...
 
A Cluster-Based Energy-Efficient Scheme for Sensor Networks
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Jian Zhang, Benxiong Huang, Lai Tu, Fan Zhang
Issue Date:December 2005
pp. 191-195
We propose a novel, cluster-based, energy-efficient scheme in this paper. A modified LEACH algorithm is used to dynamically cluster the networks. It balances the energy consumption to all the nodes in each cluster. To prolong the lifetime of the networks m...
 
 1