Search For:

Displaying 1-50 out of 220 total
A Software Birthmark Based on Dynamic Opcode n-gram
Found in: International Conference on Semantic Computing
By Bin Lu, Fenlin Liu, Xin Ge, Bin Liu, Xiangyang Luo
Issue Date:September 2007
pp. 37-44
A kind of dynamic opcode n-gram software birthmark is proposed in this paper based on Myles? software birthmark (in which static opcode n-gram set is regarded as the software birthmark). The dynamic opcode n-gram set is regarded as the software birthmark w...
Application of Fuzzy Comprehensive Evaluation Method for Bid Evaluation of Power Equipment Based on Weight of Entropy
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Jie Yao, Li-chun Wang, Bin-Bin Liu
Issue Date:December 2009
pp. 456-458
According to the uncertainty of indexes in the bid evaluation of power equipment, the entropy value theory is applied to combine the traditional fuzzy comprehensive evaluation method for bid evaluation of power equipment. The coefficients of weight for eva...
The Research on Consolidated Financial Evaluation about Corporate Social Responsibility Based on Fuzzy-AHP
Found in: Hybrid Intelligent Systems, International Conference on
By Ze-Hong Li, Bin-Bin Liu, Li-Chun Wang
Issue Date:August 2009
pp. 447-450
In the system of highly globalized world economy, corporate social responsibility has become main trends and methods, which made the corporate sustainable operation. Modern financial analysis, however, always based on the analysis of economic responsibilit...
Analytical PI Design by Using Closed-Loop Stability Constraints and H8 Theory for Relativity Rotary Machine
Found in: Communication Software and Networks, International Conference on
By Shuang Liu, Bin Liu
Issue Date:February 2009
pp. 562-566
In order to suppress the torsional vibration of rotary machine, a PI controller was analytically derived based on stability of the closed-loop system and H∞ mixed sensitivity function. This novel design procedure is adapted to some unstable and critically ...
A New March Test for Process-Variation Induced Delay Faults in SRAMs
Found in: 2013 22nd Asian Test Symposium (ATS)
By Da Cheng,Hsunwei Hsiung,Bin Liu,Jianing Chen,Jia Zeng,Ramesh Govindan,Sandeep K. Gupta
Issue Date:November 2013
pp. 115-122
Process variations are growing with technology scaling towards nano-scale. This brings new challenges to the design of memory modules, which are often the first circuits to be fabricated using a new technology and usually designed with critical timing. We ...
CLUE: Achieving Fast Update over Compressed Table for Parallel Lookup with Reduced Dynamic Redundancy
Found in: 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS)
By Tong Yang,Ruian Duan,Jianyuan Lu,Shenjiang Zhang,Huichen Dai,Bin Liu
Issue Date:June 2012
pp. 678-687
The sizes of routing table in backbone routers continue to keep a rapid growth and some of them currently increase up to 400K entries [1]. An effective solution to deflate the large table is the routing table compression. Meanwhile, there is an increasingl...
Optimization Way of Engineering Equipment Maintenance Based on Process Algebra
Found in: Services Science, Management and Engineering, IITA International Conference on
By Xiaonan Zhang, Anxin Liu, Jun Yan, Bin Liu, Hongliang Liu, Qingzheng Gao
Issue Date:July 2009
pp. 96-99
This paper presents a method of engineering equipment process optimization based on process algebra from the from the decision analysis perspective. In the new method, maintenance process described process algebra formula is presented and analyzed; then, t...
The Fuzzy Synthesize Assess in Reliability and Maintainability of Military Engineer Machinery
Found in: Services Science, Management and Engineering, IITA International Conference on
By Xiaonan Zhang, Anxin Liu, Bin Liu, Jun Yan, Yaoming Gao, Hongliang Liu
Issue Date:July 2009
pp. 92-95
This article systematically analyzes the index in the reliability and maintainability of military engineer machinery and synthetically assesses the composed elements by the Fuzzy. Furthermore, the article combining the experts’ markings with AHP theory dis...
Some Improvements on the Rules for Exchanging Between Error Model Annex and AADL to Fault Tree
Found in: 2013 International Conference on Information Technology and Applications (ITA)
By Quan Zhang,Shihai Wang,Bin Liu
Issue Date:November 2013
pp. 338-342
AADL (The architecture analysis and design language) can be used to describe the reliability of the safety critical system. In this paper, we, firstly, make an introduction on the AADL dependability model and summary the basic rules for translating from Er...
A novel hierarchical bandwidth allocation approach in heterogeneous wireless networks
Found in: 2013 8th International Conference on Communications and Networking in China (CHINACOM)
By Bin Wang, Hui Tian, Bin Liu, Shaoshuai Fan, Kai Sun
Issue Date:August 2013
pp. 206-211
In order to provide high quality of wireless connectivity and seamless service to mobile terminals (MTs), the next generation networks will be an integration of multiple wireless access networks. This will give rise to a heterogeneous wireless access syste...
An ultra-fast universal incremental update algorithm for trie-based routing lookup
Found in: 2012 20th IEEE International Conference on Network Protocols (ICNP)
By Tong Yang, Zhian Mi, Ruian Duan, Xiaoyu Guo, Jianyuan Lu, Shenjiang Zhang, Xianda Sun,Bin Liu
Issue Date:October 2012
pp. 1-10
With the rapid growth of the Internet, the update messages in backbone routers become more and more frequent due to the ever-increasing dynamic changes on network topologies and new emerging functionalities of the Internet. In addition, update messages oft...
A Cooperative and Adaptive E-MTM Framework Based on Body Classification
Found in: Intelligent Human-Machine Systems and Cybernetics, International Conference on
By Guan-Bin Liu, Wen-Bin Zhang
Issue Date:August 2010
pp. 319-322
The tradition Made-To-Measure (MTM) emphasizes the integration of and devices and CAD tools and tries to provide a coordinative environment for fashion designers and technicians. Although the body information is collected by sophisticated devices and tools...
Design and Implementation of Wireless Computational Grid based on JavaSpace
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Wen Bin, Liu Chang-qing
Issue Date:August 2007
pp. 259-261
Notice of Violation of IEEE Publication Principles<br/><br/>After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publicati...
Route Table Partitioning and Load Balancing for Parallel Searching with TCAMs
Found in: Parallel and Distributed Processing Symposium, International
By Dong Lin, Yue Zhang, Chengchen Hu, Bin Liu, Xin Zhang, Derek Pao
Issue Date:March 2007
pp. 121
With the continuous advances in optical communications technology, the link transmission speed of Internet backbone has been increasing rapidly. This in turn demands more powerful IP address lookup engine. In this paper, we propose a power-efficient parall...
The Model and Simulation of Utilization Optimization of Railway Passenger Waiting Compartment Based on Arena
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Bilong Wu,Zuoyi Liu,Bin Liu
Issue Date:June 2013
pp. 1216-1219
The reasonable use of railway waiting compartment is very important for improving the efficiency of passengers transport organization. In this paper, a multi-objective optimization model for utilization of railway waiting compartment was established. The o...
Study on the Properties of the Antibacterial Alginate Impression Material
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Wenjuan Liu,Bin Liu,Yuanyuan Qi,Yi Wang
Issue Date:May 2012
pp. 1753-1755
Different proportions of LZB-GC nano-silver antibacterial agent was added into the alginate impression materials. The antibacterial ratios of antibacterial alginate impression material on Escherichia coli and Staphylococcus aureus were investigated, and th...
Dynamically reconfigurable hybrid cache: An energy-efficient last-level cache design
Found in: 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE 2012)
By Yu-Ting Chen,J. Cong, Hui Huang, Bin Liu, Chunyue Liu,M. Potkonjak,G. Reinman
Issue Date:March 2012
pp. 45-50
The recent development of non-volatile memory (NVM), such as spin-torque transfer magnetoresistive RAM (STT-RAM) and phase-change RAM (PRAM), with the advantage of low leakage and high density, provides an energy-efficient alternative to traditional SRAM i...
A MPPT Control Method of PV System Based on Fuzzy Logic and Particle Swarm Optimization
Found in: Intelligent System Design and Engineering Application, International Conference on
By Yufeng Hu,Jun Liu,Bin Liu
Issue Date:January 2012
pp. 73-75
In the view of the fact that if crystalline silicon cell's photovoltaic system used for power output can not be controlled, it is hard to grantee the maximum power output, which will cause energy dissipation and high cost. Regarding the PV inverter system ...
The Development and Design of the Sharing Management Information System Based on WEBGIS Wireless Base Station
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Liu Bin,Liu Guodong
Issue Date:November 2011
pp. 405-407
This article describes the design and implementation of the sharing management information system based on WEBGIS wireless base station, regarding the information sharing of the wireless base station as the main object. It designs information management th...
Personalized Modeling for SaaS Based on Extended WSCL
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Liu Ying, Zhang Bin, Liu Guoqi, Wang Deshuai, Gao Yan
Issue Date:December 2010
pp. 355-362
Software as a service (SaaS) is an emerging software framework in which business data and logic typically integrate with other applications. It requires a unified subscriber to describe SaaS to make for easy integration, however, SaaS provides services to ...
A New Two Level Difference Scheme for Solving One-Dimensional Second-Order Hyperbolic Equations
Found in: Computational Sciences and Optimization, International Joint Conference on
By Tang-Wei Liu, Li-Bin Liu, He-Hua Xu, Li-Hua Le
Issue Date:May 2010
pp. 218-221
In this paper, a new numerical method is developed for solving one-dimensional second-order hyperbolic quations. By using a new unconditionally stable two level difference scheme based on the quartic spline interpolation method in space direction and gener...
A Research on Supplier Assessment Indices System of Green Purchasing
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Bin Liu, Hong-jun Liu
Issue Date:March 2010
pp. 314-317
With the worse environment for human survival and the limited resource, enterprises are forced to improve their environmental management to enhance their competitiveness. The level of purchasing management can affect not only enterprises’ economic performa...
Field-Based Branch Prediction for Packet Processing Engines
Found in: Parallel and Distributed Systems, International Conference on
By David Bermingham, Zhen Liu, Xiaojun Wang, Bin Liu
Issue Date:December 2009
pp. 276-283
Network Processors have exploited many aspects of architecture design, such as employing multi-core, multi-threading and hardware accelerator, to support both the ever-increasing line rates and the higher complexity of network applications. Micro-architect...
The Research for Knowledge Management System Oriented Aircraft Engine Tools Design
Found in: Computational Intelligence and Design, International Symposium on
By Bin Liu, Rong Mo, Wei-wei Liu, Jin-liang Chen
Issue Date:December 2009
pp. 52-55
Tools are very important for aircraft engine design and making, the trend is implementing knowledge management. On the basis of the analyzing tools design in nowadays, aimed at problems in them, present a model of design knowledge based on the ontology, it...
Multi-Engine Packet Classification Hardware Accelerator
Found in: Computer Communications and Networks, International Conference on
By Alan Kennedy, Zhen Liu, Xiaojun Wang, Bin Liu
Issue Date:August 2009
pp. 1-6
No summary available.
A New Model for Complete Ranking Problems in MCDA Based on Multi-graded Dominance Relations
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Zhang Rong, Liu Bin, Liu Sifeng
Issue Date:August 2009
pp. 46-51
After Greco et al. introduce PCT (Pairwise Comparison Table) into rough sets, with this extension rough sets method can resolve ranking and choice problems in MCDA. But there are still two problems: one is how to change decision table into PCT, meanwhile t...
Evaluation of Static Analysis Techniques for Fixed-Point Precision Optimization
Found in: Field-Programmable Custom Computing Machines, Annual IEEE Symposium on
By Jason Cong, Karthik Gururaj, Bin Liu, Chunyue Liu, Zhiru Zhang, Sheng Zhou, Yi Zou
Issue Date:April 2009
pp. 231-234
Precision analysis and optimization is very important when transforming a floating-point algorithm into fixed-point hardware implementations. The core analysis techniques are either based on dynamic analysis or static analysis. We believe in static error a...
A Cubic Spline Method for Solving Singularly-Perturbed Boundary-Value Problems
Found in: Computational Sciences and Optimization, International Joint Conference on
By Li-Bin Liu, Huan-Wen Liu
Issue Date:April 2009
pp. 556-559
In this paper, a new difference scheme by using cubic splines for solving a singularly-perturbed two-point boundary-value problem for second-order ordinary differential equations is derived. The proposed scheme is fourth order accurate, which is better tha...
A Difference Scheme Based on Spline Approximations to Solve the Singularly-perturbed Neumann Problems
Found in: Computer Modeling and Simulation, International Conference on
By Huan-Wen Liu, Li-Bin Liu
Issue Date:February 2009
pp. 209-212
In this paper, a difference scheme based on the quartic splines for solving the singularly-perturbed two-point boundary-value problem of second-order ordinary differential equations subject to Neumann-type boundary conditions are derived. The accuracy orde...
A Non-polynomial Spline Method for Solving the One-Dimensional Heat Equation
Found in: Information Science and Engieering, International Symposium on
By Huan-Wen Liu, Li-Bin Liu
Issue Date:December 2008
pp. 782-785
In this paper, a numerical method based on non-polynomial spline functions is presented to solve the one-dimensional heat equation. The new method is unconditionally stable. The accuracy order of the new method is of O(k^5+h^4),where k and h denote the mes...
Collaborative Distributed Intrusion Detection System
Found in: Future Generation Communication and Networking
By Wei Lin, Liu Xiang, Derek Pao, Bin Liu
Issue Date:December 2008
pp. 172-177
In order to protect Internet users from various attacks such as worms, viruses and other intrusions, signature-based intrusion detection system (IDS) should be deployed at the critical part of the network with rapid response for updating newly emerged atta...
Revisiting the Cache Effect on Multicore Multithreaded Network Processors
Found in: Digital Systems Design, Euromicro Symposium on
By Zhen Liu, Jia Yu, Xiaojun Wang, Bin Liu, Laxmi Bhuyan
Issue Date:September 2008
pp. 317-324
Caching mechanism has achieved great success in general purpose processor; however, its deployment in Network Processor (NP) raises questions over its effectiveness under the new context. In this study, we thoroughly evaluate the performance of caches in N...
Inter-frame Correlation Based Compressed Video Steganalysis
Found in: Image and Signal Processing, Congress on
By Bin Liu, Fenlin Liu, Ping Wang
Issue Date:May 2008
pp. 42-46
A novel blind compressed video stream steganalysis algorithm employing the inter-frame correlation (IFCS) is proposed. The steganalysis process is executed wholly in the compressed domain for the real time requirement. Statistical features of inter-frame c...
Secure Steganography in Compressed Video Bitstreams
Found in: Availability, Reliability and Security, International Conference on
By Bin Liu, Fenlin Liu, Chunfang Yang, Yifeng Sun
Issue Date:March 2008
pp. 1382-1387
A new compressed video secure steganography (CVSS) algorithm is proposed. In the algorithm, embedding and detection operations are both executed entirely in the compressed domain, with no need for the decompression process. The new criteria employing stati...
Discovering Protein Complexes from Protein-Protein Interaction Data by Local Cluster Detecting Algorithm
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Juan Liu, Bin Liu, Deyi Li
Issue Date:August 2007
pp. 280-284
Proteins are usually grouped into complexes to perform functional tasks in organisms. So discovery of protein complexes is critical to understand principles of cellular organization and function. Recently high-throughput techniques have produced large amou...
Utility-Based Bandwidth Allocation for Triple-Play Services
Found in: European Conference on Universal Multiservice Networks
By Changbin Liu, Lei Shi, Bin Liu
Issue Date:February 2007
pp. 327-336
It is expected that, in near future, the multi-class traffic previously in Public Switched Telephone network (PSTN), cable television network and IP network will be multiplexed at backbone and carried by the converged Next-Generation Network (NGN). A pragm...
Detecting LSB Steganography Based on Dynamic Masks
Found in: Intelligent Systems Design and Applications, International Conference on
By Xiangyang Luo, Bin Liu, Fenlin Liu
Issue Date:September 2005
pp. 251-255
This paper presents a dynamic regular groups steganalysis (DRS) algorithm to detect LSB steganography. This algorithm dynamically selects an appropriate mask for each image to reduce the initial bias, and estimates the LSB embedding message ratio by constr...
The Research on Flame Image Segmentation Based on Fuzzy Clustering and Genetic Algorithm
Found in: Information Science and Engineering, International Conference on
By Bin Liu, Xin Zhang, Pu Zhao, Ying Liu
Issue Date:December 2009
pp. 1491-1494
In this paper, linking with the basic principle of FCM algorithm, on the basis of theory research, a method of the cluster analysis that FCM and the genetic algorithm are combined together is proposed. Firstly, the approximate optimal solution obtained by ...
A General Geographical Probabilistic Factor Model for Point of Interest Recommendation
Found in: IEEE Transactions on Knowledge and Data Engineering
By Bin Liu,Hui Xiong,Spiros Papadimitriou,Yanjie Fu,Zijun Yao
Issue Date:February 2015
pp. 1
The problem of point of interest (POI) recommendation is to provide personalized recommendations of places, such as restaurants and movie theaters. The increasing prevalence of mobile devices and of location based social networks (LBSNs) poses significant ...
Similarity Assessment of Program Samples Based on Theory of Fuzzy
Found in: 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)
By Yuxiang Li,Yinliang Zhao,Bin Liu
Issue Date:December 2013
pp. 202-207
Using machine learning has proven effective at choosing the right set of optimizations for a particular program. For machine learning techniques to be most effective, compiler writers have to develop expressive means of characterizing the program being opt...
Interplay of Failure Rate, Performance, and Test Cost in TCAM under Process Variations
Found in: 2013 22nd Asian Test Symposium (ATS)
By Hsunwei Hsiung,Da Cheng,Bin Liu,Ramesh Govindan,Sandeep K. Gupta
Issue Date:November 2013
pp. 251-258
As process variations grow with technology scaling, failure rates increase and are predicted to be so high as to render devices unusable for computing domain. In order to continue to benefit from scaling, three dimensions can be explored: increasing operat...
GreenRouter: Reducing Power by Innovating Router's Architecture
Found in: IEEE Computer Architecture Letters
By Yi Kai,Yi Wang,Bin Liu
Issue Date:July 2013
pp. 51-54
High speed routers in Internet are becoming more powerful, as well as more energy hungry. In this paper, we present a new architecture of router named GreenRouter which separates a line-card into two parts: network interface card (DB) and packet processing...
Moving Object Detection for Moving Cameras on Superpixel Level
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Qiyu Liao,Nenghai Yu,Bin Liu
Issue Date:July 2013
pp. 307-312
In this paper, we will present a novel algorithm for detecting moving objects from relatively dynamic background in particular video sequences. To achieve our goal, we introduced a new conception called "feature super pixel". As is well known, by...
MOS-Based Channel Allocation Schemes for Mixed Services over Cognitive Radio Networks
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Lei He,Bin Liu,Yuanzhi Yao,Nenghai Yu,Chang Wen Chen
Issue Date:July 2013
pp. 832-837
In cognitive radio (CR) networks, secondary users (SUs) may have various applications such as multimedia delivery and file download, resulting in different bandwidth requirements. In this paper, we propose a channel allocation scheme for mixed services, es...
High Precision Image Rotation Angle Estimation with Periodicity of Pixel Variance
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Ruohan Qian,Weihai Li,Nenghai Yu,Bin Liu
Issue Date:July 2013
pp. 106-111
The credibility of digital images is decreasing with the fast development of easy-to-use image manipulation tools such as Photoshop and Picasso. Although good forged images are deceptive to human eyes, the manipulation process often leaves some statistical...
Parallel AES Encryption Engines for Many-Core Processor Arrays
Found in: IEEE Transactions on Computers
By Bin Liu,Bevan M. Baas
Issue Date:March 2013
pp. 536-547
By exploring different granularities of data-level and task-level parallelism, we map 16 implementations of an Advanced Encryption Standard (AES) cipher with both online and offline key expansion on a fine-grained many-core system. The smallest design util...
Modeling of a Large-scale Photovoltaic Generation and Analysis of its Security and Stability Operation in West-Qinghai Grid
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By He Bin,Liu Dichen
Issue Date:January 2013
pp. 958-962
Based on modeling of photovoltaic cell and array according to project requirement and modeling of converter according to grid-connected control tragedy, the model of photovoltaic generation system is established. By principle of constant power-loss, the eq...
Effective Caching Schemes for Minimizing Inter-ISP Traffic in Named Data Networking
Found in: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS)
By Jun Li,Hao Wu,Bin Liu,Jianyuan Lu
Issue Date:December 2012
pp. 580-587
Internet has evolved to be content-oriented and its key usage focuses on content dissemination and retrieval, while Internet architecture is designed for host-oriented services. To address the challenge, Named Data Networking (NDN) has been proposed, where...
Using Information Content to Evaluate Semantic Similarity on HowNet
Found in: 2012 Eighth International Conference on Computational Intelligence and Security (CIS)
By You Bin,Liu Xiao-Ran,Li Ning,Yan Yue-Song
Issue Date:November 2012
pp. 142-145
Evaluating Semantic similarity has a widely application areas range from Psychology, Linguistics, Cognitive Science to Artificial Intelligence. This paper proposes the merely use of HowNet to evaluate Information Content (IC) as the semantic similarity of ...
Virtual routing tables polymerization for lookup and update
Found in: 2012 20th IEEE International Conference on Network Protocols (ICNP)
By Tong Yang,Shenjiang Zhang,Xianda Sun,Huichen Dai Ruian Duan,Jianyuan Lu,Zhian Mi,Bin Liu
Issue Date:October 2012
pp. 1-2
Virtual router research has drawn increasing attention in recent years, and the most challenging issues of virtual routers are compression, lookup, and incremental update of 10∼200 routing tables. In this paper, we propose a set of solutions to achieve tha...
 1  2 Next >>