Search For:

Displaying 1-50 out of 52 total
BIGSIR: A Bipartite Graph Based Service Recommendation Method
Found in: 2013 IEEE World Congress on Services (SERVICES)
By Bo Jiang,Xiao-xiao Zhang,Wei-feng Pan,Bo Hu
Issue Date:June 2013
pp. 363-369
Cloud computing is an Internet-based computing. It relies on sharing computing resources which are delivered as services on the Internet. Web service is one of the most important types of services that can be used in cloud computing. But many of them may b...
 
Online Japanese Composition Correction System
Found in: International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing
By Yuqin Liu,Guohai Jiang,Bo Jiang,Bing Yan
Issue Date:October 2011
pp. 581-584
In japanese language learning fields in recent years, Writing is always regarded as one of the major skills in japanese language learning. But in actual teaching practice, it is often a heavy burden for the teachers to view and correct the students' compos...
 
Prioritizing Test Cases for Regression Testing of Location-Based Services: Metrics, Techniques, and Case Study
Found in: IEEE Transactions on Services Computing
By Ke Zhai,Bo Jiang,W.K. Chan
Issue Date:January 2014
pp. 54-67
Location-based services (LBS) are widely deployed. When the implementation of an LBS-enabled service has evolved, regression testing can be employed to assure the previously established behaviors not having been adversely affected. Proper test case priorit...
 
Expressive Image Sketching with Two-Layer Image Features
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Bo Jiang,Shuyu Liu
Issue Date:July 2013
pp. 927-931
The paper presents a framework for automatically natural image sketching, motivated by imitating the human line drawing process. The algorithm consists of two steps: sketch extraction and sketch rendering, using the recent computer vision and graphics tech...
 
Prioritizing Structurally Complex Test Pairs for Validating WS-BPEL Evolutions
Found in: 2013 IEEE International Conference on Web Services (ICWS)
By Lijun Mei,Yan Cai,Changjiang Jia,Bo Jiang,W.K. Chan
Issue Date:June 2013
pp. 147-154
Many web services represent their artifacts in the semi-structural format. Such artifacts may or may not be structurally complex. Many existing test case prioritization techniques however treat test cases of different complexity generically. In this paper,...
 
Probability-Based Prediction and Sleep Scheduling for Energy-Efficient Target Tracking in Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Bo Jiang,B. Ravindran, Hyeonjoong Cho
Issue Date:April 2013
pp. 735-747
A surveillance system, which tracks mobile targets, is one of the most important applications of wireless sensor networks. When nodes operate in a duty cycling mode, tracking performance can be improved if the target motion can be predicted and nodes along...
 
An Efficient Grouped Virtual Mapreduce Cluster
Found in: 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA)
By Yang Yang,Xiang Long,Bo Jiang
Issue Date:March 2013
pp. 613-620
Virtualization technology and MapReduce program model are sharp swords for the big data and cloud computing era. The combination of them exhibits powerful ability of easy-management, fast-deployment, feasible-scalability and high-efficiency. However, the d...
 
An Empirical Study of the Influence Factor of Tourism E-Commerce Purchase
Found in: 2012 Fifth International Conference on Business Intelligence and Financial Engineering (BIFE)
By Bo Jiang
Issue Date:August 2012
pp. 56-59
In order to enhance the industrialization of the tourism e-commerce in china, the author of this paper, adopts SPSS17.0 statistical software to process the hands-on data based on the questionnaires and analyzes the influence factor of the tourism e-commerc...
 
Application and Testing Technology of Analog Small-Signal Power Meter
Found in: Computing, Measurement, Control and Sensor Network, International Conference on
By Bing Ai,Bo Jiang
Issue Date:July 2012
pp. 37-40
In order to adapt to the development of smart substation metering technology, it requires a set of measurement system which is consistent the feature of smart substation on the basis of the new technical conditions, with electronic transformer measurement ...
 
Preemptive Regression Test Scheduling Strategies: A New Testing Approach to Thriving on the Volatile Service Environments
Found in: 2012 IEEE 36th Annual Computer Software and Applications Conference - COMPSAC 2012
By Lijun Mei,Ke Zhai,Bo Jiang,W. K. Chan,T. H. Tse
Issue Date:July 2012
pp. 72-81
A workflow-based web service may use ultra-late binding to invoke external web services to concretize its imple¬mentation at run time. None¬theless, such external services or the availability of recently used external services may evolve without prior noti...
 
Method on Change Impact Analysis for Object-Oriented Program
Found in: 2011 4th International Conference on Intelligent Networks and Intelligent Systems
By Zhou Xiao-Bo, Jiang Ying, Wang Hai-Tao
Issue Date:November 2011
pp. 161-164
Software changes are inevitable during the process of software evolution. To accommodate the changes in the software process, it is necessary to analyze the impacts of the changes. Software change impact analysis (CIA) is a key technique for identifying un...
 
Precise Propagation of Fault-Failure Correlations in Program Flow Graphs
Found in: Computer Software and Applications Conference, Annual International
By Zhenyu Zhang,W. K. Chan,T. H. Tse,Bo Jiang
Issue Date:July 2011
pp. 58-67
Statistical fault localization techniques find suspicious faulty program entities in programs by comparing passed and failed executions. Existing studies show that such techniques can be promising in locating program faults. However, coincidental correctne...
 
On Practical Adequate Test Suites for Integrated Test Case Prioritization and Fault Localization
Found in: Quality Software, International Conference on
By Bo Jiang, W.K. Chan, T.H. Tse
Issue Date:July 2011
pp. 21-30
An effective integration between testing and debugging should address how well testing and fault localization can work together productively. In this paper, we report an empirical study on the effectiveness of using adequate test suites for fault localizat...
 
A User Access Policy Based on Dynamic Sensitivity Label
Found in: Network Computing and Information Security, International Conference on
By Li Bo, Jiang Chunxia, Lin Yilin
Issue Date:May 2011
pp. 13-16
the analysis of Isandhu method [1] points out that it strengthens role relations and provides the support to the notation of trusted subject by using assistant role hierarchies. Additionally, some errors of it are revealed, such as roles leaping, authority...
 
Completely Distributed Particle Filters for Target Tracking in Sensor Networks
Found in: Parallel and Distributed Processing Symposium, International
By Bo Jiang,Binoy Ravindran
Issue Date:May 2011
pp. 334-344
Particle filters (or PFs) are widely used for the tracking problem in dynamic systems. Despite their remarkable tracking performance and flexibility, PFs require intensive computation and communication, which are strictly constrained in wireless sensor net...
 
An Emprical Analysis of the Relations between Hunan Rural Finance and Economic Growth
Found in: Computational Sciences and Optimization, International Joint Conference on
By En Deng, A'lan Zhang, En Deng, Bo Jiang, Yu Wang, Chaohua He, Yan Lu
Issue Date:April 2011
pp. 540-544
The theorem of carrying out an empirical analysis on the relations between the rural finance and economic growth has already aroused widespread concerns of various countries' academia, this theorem's application, however, is quite rare in China, especially...
 
Framework for SaaS Management Platform
Found in: E-Business Engineering, IEEE International Conference on
By Kai Tang, Jian Ming Zhang, Zhong Bo Jiang
Issue Date:November 2010
pp. 345-350
Software-as-a-service (SaaS) is becoming a popular software delivery model. Especially for enterprise software, the shift to SaaS model is happening rapidly. This triggers more complex SaaS ecosystems come into being, and demands more supporting and enabli...
 
Research on Tenant Placement Based on Business Relations
Found in: E-Business Engineering, IEEE International Conference on
By Kai Tang, Zhong Bo Jiang, Wei Sun, Xin Zhang, Wei Shan Dong
Issue Date:November 2010
pp. 479-483
Multi-tenancy supporting becomes a basic characteristic of Software-as-a-Service (SaaS) operation. In multi-tenancy environment, tenant placement problem is critical for balance the database server workload. In this paper, we discuss how the cross-tenant d...
 
Property Checking for 1-Place-Unbounded Petri Nets
Found in: Theoretical Aspects of Software Engineering, Joint IEEE/IFIP Symposium on
By Yunhe Wang, Bo Jiang, Li Jiao
Issue Date:August 2010
pp. 117-125
The reach ability tree for an unbounded net system is infinite. By using $\omega$ symbol to represent infinitely many markings, cover ability tree can provide a finite form. However, with too much information lost, it can not check properties such as reach...
 
Regression Testing Process Improvement for Specification Evolution of Real-World Protocol Software
Found in: Quality Software, International Conference on
By Bo Jiang, T.H. Tse, Wolfgang Grieskamp, Nicolas Kicillof, Yiming Cao, Xiang Li
Issue Date:July 2010
pp. 62-71
Model-based testing helps test engineers automate their testing tasks so that they can be more cost-effective. When the model is changed due to the evolution of the specification, it is important to maintain the test suites up to date for regression testin...
 
On the Integration of Test Adequacy, Test Case Prioritization, and Statistical Fault Localization
Found in: Quality Software, International Conference on
By Bo Jiang, W.K. Chan
Issue Date:July 2010
pp. 377-384
Testing and debugging account for at least 30% of the project effort. Scientific advancements in individual activities or their integration may bring significant impacts to the practice of software development. Fault localization is the foremost debugging ...
 
Taking Advantage of Service Selection: A Study on the Testing of Location-Based Web Services Through Test Case Prioritization
Found in: Web Services, IEEE International Conference on
By Ke Zhai, Bo Jiang, W.K. Chan, T.H. Tse
Issue Date:July 2010
pp. 211-218
Dynamic service compositions pose new verification and validation challenges such as uncertainty in service membership. Moreover, applying an entire test suite to loosely coupled services one after another in the same composition can be too rigid and restr...
 
The Research of Intrusion Detection Model Based on Clustering Analysis
Found in: Computer and Communications Security, International Conference on
By Li Bo, Jiang Dong-Dong
Issue Date:December 2009
pp. 24-27
Through the research and analysis of the intrusion detection techniques and data mining, this paper presents a intrusion detection model which is based on cluster analysis K-means algorithm.
 
Adaptive Random Test Case Prioritization
Found in: Automated Software Engineering, International Conference on
By Bo Jiang, Zhenyu Zhang, W. K. Chan, T. H. Tse
Issue Date:November 2009
pp. 233-244
Regression testing assures changed programs against unintended amendments. Rearranging the execution order of test cases is a key idea to improve their effectiveness. Paradoxically, many test case prioritization techniques resolve tie cases using the rando...
 
Robust Operation Strategy Design for an Electronic Market Enabled Supply Chain with Uncertain Variable Costs
Found in: Management of e-Commerce and e-Government, International Conference on
By Jiawang Xu, Yunlong Zhu, Bo Jiang, Zuopeng Wang
Issue Date:September 2009
pp. 359-362
An operation model is proposed in this paper for an electronic market enabled supply chain with uncertain variable costs. The supply chain consists of multi-supplier and multi-customer, suppliers can provide many kinds of product to different customers dir...
 
How Well Do Test Case Prioritization Techniques Support Statistical Fault Localization
Found in: Computer Software and Applications Conference, Annual International
By Bo Jiang, Zhenyu Zhang, T. H. Tse, T. Y. Chen
Issue Date:July 2009
pp. 99-106
In continuous integration, a tight integration of test case prioritization techniques and fault-localization techniques may both expose failures faster and locate faults more effectively. Statistical fault-localization techniques use the execution informat...
 
Research on the Economical Evaluation for Airlines Code Sharing
Found in: Information Processing, Asia-Pacific Conference on
By Ling-Yu Kong, Xiao-jin Li, Shu-long Zhao, Bo Jiang
Issue Date:July 2009
pp. 259-261
Code share agreements, whereby an airline can market seats on some of its partners’ flights, have been a common practice in the airline industry for the past thirty years. The quantitative analysis is very valuable for China civil aviation to research the e...
 
Study on the Economical Evaluation for Airlines Code Sharing Based on MNL Model
Found in: Future Computer and Communication, International Conference on
By Ling-Yu Kong, Xiao-jin Li, Shu-long Zhao, Bo Jiang
Issue Date:June 2009
pp. 131-133
In this paper, based on relevant assumptions, the Maximum Profit Function (MPF) among different code sharing options has been established , in which the optimum fare can be gained to calculate the airlines maximum profit. Then the results would be tested b...
 
Determining task priority in dual-shore collaborative software design via Petri Net based behavior compatibility analysis
Found in: International Conference on Computer Supported Cooperative Work in Design
By Bin Xu, Yun Ling, Xiaojun Li, Yi Zhuang, Bo Jiang
Issue Date:April 2009
pp. 179-184
A well arranged task priority in dual-shore collaborative software design phase will smooth the collaboration and reduces the potential coordination lag. However, it is really difficult to determine the priority when there are many collaboration tasks and ...
 
SDSPM-based user interest prediction in collaborative graphics design systems under ubiquitous environment
Found in: International Conference on Computer Supported Cooperative Work in Design
By Bo Jiang, Jian Zhou, Jiajun Bu
Issue Date:April 2009
pp. 414-419
Rapid advances in the enabling technologies for mobile and ubiquitous computing help portable devices to join collaborative graphics design conveniently. The limitation of display size and computational power of these embedded devices makes it hard for mob...
 
Research of Model about Leaguer Selecting of Virtual Enterprise Based on Project Logistics
Found in: International Workshop on Knowledge Discovery and Data Mining
By Bo Jiang, Kelin Xu, Yongchang Qian
Issue Date:January 2009
pp. 452-455
Aim at need of project logistics in practice, a parameter evaluating system about leaguer of virtual enterprise is presented, and then the BP neural network model of qualification layer and target layer of this system are build and modularized. Based this,...
 
Developing Information Service Platform for Clusters of Small-Medium Enterprises in Heterogenous Environment
Found in: Computing, Communication, Control and Management, ISECS International Colloquium on
By Bo Jiang
Issue Date:August 2008
pp. 249-253
Industrial cluster has been developing very quickly in China. However, most of them are low-cost-based clusters that are composed of small-medium enterprises. In this paper, we present an on-demand information service platform for small-medium enterprise c...
 
Debugging through Evaluation Sequences: A Controlled Experimental Study
Found in: Computer Software and Applications Conference, Annual International
By Zhenyu Zhang, Bo Jiang, W. K. Chan, T. H. Tse
Issue Date:August 2008
pp. 128-135
Predicate-based statistical fault-localization techniques locate fault-relevant predicates in a program by contrasting the statistics of the values of individual predicates between successful and failure-causing runs. While short-circuit evaluations are co...
 
Enzymatic Synthesis of ?-D-2', 3'-unsaturated-5-fluorocytidine by Whole Cell of Lactobacillus helveticus
Found in: BioMedical Engineering and Informatics, International Conference on
By Yan Zheng, Li-Min Zhu, Na Qi, Bo Jiang
Issue Date:May 2008
pp. 813-817
Utilizing whole cell as biocatalyst instead of free or immobilized enzyme is a potential way to reduce the cost of catalyst in enzyme-catalyzed ?-D-2',3'- unsaturated-5 -fluorocytidine (D-D4FC). In this paper, D-D4FC was successfully synthesized by the who...
 
Energy efficient sleep scheduling based on moving directions in target tracking sensor network
Found in: Parallel and Distributed Processing Symposium, International
By Bo Jiang, Kai Han, Binoy Ravindran, Hyeonjoong Cho
Issue Date:April 2008
pp. 1-10
This paper presents a target direction-based sleep scheduling algorithm (TDSS) for target tracking surveillance sensor networks. TDSS reduces the number of the proactively awakened sensor nodes and schedules their sleep pattern to enhance energy efficiency...
 
Adapted Clustering Based on Maximal Spanning Tree in Collaborative Editing Systems
Found in: Convergence Information Technology, International Conference on
By Guozheng Wang,Bo Jiang
Issue Date:November 2007
pp. 470-475
Collaborative applications across mobile end and immobile end became more and more popular recently; however, the control over user interface became more intricate or flexible. The clustering of editing objects could give users not only a clear document or...
 
Remote Awareness of Complicated Pattern Group in Ubiquitous Collaborative Graphics Editing Systems
Found in: International Conference on Artificial Reality and Telexistence
By Bo Jiang, Guozheng Wang
Issue Date:December 2006
pp. 153-156
The proliferation of computer devices and wireless networks allows users to access pattern information and collaborative edit graphics with others in ubiquitous environment. However, the limitation of display size and unreliable network of these embedded d...
 
State-of-Art Techniques for Object Caching over the Internet
Found in: Computer and Computational Sciences, International Multi-Symposiums on
By Keqiu Li, Takashi Nanya, Bo Jiang, Wenyu Qu
Issue Date:June 2006
pp. 199-206
Web caching is an important technology for reducing Internet access latency, alleviating network traffic, and spreading server load. An important issue that affects the performance of web caching is object caching, which is used to distribute copies of the...
 
BPEL4WS Unit Testing: Framework and Implementation
Found in: Web Services, IEEE International Conference on
By Zhongjie Li, Wei Sun, Zhong Bo Jiang, Xin Zhang
Issue Date:July 2005
pp. 103-110
The Business Process Execution Language for Web Services (BPEL4WS) offers a new standards-based approach to building flexible business processes by orchestrating multiple Web Services. Unit testing is critical to guarantee the creation of correct and relia...
 
Enable collaborative graphics editing in mobile environment
Found in: International Conference on Computer Supported Cooperative Work in Design
By Bo Jiang, Haixiang Zhang, Chun Chen, Jianxv Yang
Issue Date:May 2005
pp. 313-316 Vol. 1
The proliferation of computer devices and wireless networks allows users to access information and collaborative edit documents with others from anywhere and at anytime. Mobile network and device capabilities constrain the application implementation, which...
 
System forecast locking in collaborative pattern design
Found in: International Conference on Computer Supported Cooperative Work in Design
By Jiajun Bu, Jianxv Yang, Chun Chen, Bo Jiang
Issue Date:May 2005
pp. 74-78 Vol. 1
Locking is a common technique in distributed editing system used to prevent conflicting, maintain user intention and result consistency. Collaborative pattern design system is a special class, thus has special locking scheme. A novel scheme system forecast...
 
High-Speed Discrete Content Sensitive Pattern Match Algorithm for Deep Packet Filtering
Found in: Computer Networks and Mobile Computing, International Conference on
By Bo Jiang, Bin Liu
Issue Date:October 2003
pp. 149
Network security has long been a spotlight that draws increasing attention from all sides of society. Against this backdrop, deep processing of network packets has become an important subject for researchers. Since malicious packets often disguise their se...
 
A Subsumption Hierarchy of Test Case Prioritization for Composite Services
Found in: IEEE Transactions on Services Computing
By Lijun Mei,Yan Cai,Changjiang Jia,Bo Jiang,W.K. Chan,Zhenyu Zhang,T.H. Tse
Issue Date:June 2014
pp. 1
Many composite workflow services utilize non-imperative XML technologies such as WSDL, XPath, XML schema, and XML messages. Regression testing should assure the services against regression faults that appear in both the workflows and these artifacts. In th...
 
Preemptive Regression Testing of Workflow-based Web Services
Found in: IEEE Transactions on Services Computing
By Lijun Mei,W.K. Chan,T.H. Tse,Bo Jiang,Ke Zhai
Issue Date:May 2014
pp. 1
An external web service may evolve without prior notification. In the course of the regression testing of a workflow-based web service, existing test case prioritization techniques may only verify the latest service composition using the not-yet-executed t...
 
Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links
Found in: IEEE Transactions on Computers
By Shuo Guo,Liang He,Yu Gu,Bo Jiang,Tian He
Issue Date:July 2013
pp. 1
Flooding service has been investigated extensively in wireless networks to efficiently disseminate network-wide commands, configurations and code binaries. However, little work has been done on low-duty-cycle wireless sensor networks in which nodes stay as...
 
Bypassing Code Coverage Approximation Limitations via Effective Input-Based Randomized Test Case Prioritization
Found in: 2013 IEEE 37th Annual Computer Software and Applications Conference (COMPSAC)
By Bo Jiang,W.K. Chan
Issue Date:July 2013
pp. 190-199
Test case prioritization assigns the execution priorities of the test cases in a given test suite with the aim of achieving certain goals. Many existing test case prioritization techniques however assume the full-fledged availability of code coverage data,...
 
Graph-Laplacian PCA: Closed-Form Solution and Robustness
Found in: 2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Bo Jiang,Chris Ding,Bio Luo,Jin Tang
Issue Date:June 2013
pp. 3492-3498
Principal Component Analysis (PCA) is a widely used to learn a low-dimensional representation. In many applications, both vector data X and graph data W are available. Laplacian embedding is widely used for embedding graph data. We propose a graph-Laplacia...
 
Neural Network IMC-PID Control of CPE Polymerization Temperature Based on DDE
Found in: Computer Science and Information Technology, International Conference on
By Shu-Fen Qi,Yi-Lin Zhou,Hai-Bo Jiang
Issue Date:September 2008
pp. 79-82
The production process of chlorinated polyethylene (CPE) is mainly a chemical polymerization. The CPE polymerization temperature has characteristics of time varying, nonlinear and large delay. In order to realize a steady and accurate automatic control sys...
 
Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links
Found in: Proceedings of the 15th annual international conference on Mobile computing and networking (MobiCom '09)
By Bo Jiang, Shuo Guo, Tian He, Yu Gu
Issue Date:September 2009
pp. 133-144
Intended for network-wide dissemination of commands, configurations and code binaries, flooding has been investigated extensively in wireless networks. However, little work has yet been done on low-duty-cycle wireless sensor networks in which nodes stay as...
     
Capturing propagation of infected program states
Found in: Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering on European software engineering conference and foundations of software engineering symposium (ESEC/FSE '09)
By Bo Jiang, T. H. Tse, W. K. Chan, Xinming Wang, Zhenyu Zhang
Issue Date:August 2009
pp. 171-172
Coverage-based fault-localization techniques find the fault-related positions in programs by comparing the execution statistics of passed executions and failed executions. They assess the fault suspiciousness of individual program entities and rank the sta...
     
 1  2 Next >>