Search For:

Displaying 1-50 out of 218 total
i-Function of Electronic Cigarette: Building Social Network by Electronic Cigarette
Found in: International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing
By Bo Li,Shafiq ur Réhman,Haibo Li
Issue Date:October 2011
pp. 634-637
In this paper the role of electronic cigarette (e-cigarette) is considered in context of social networking and internet based help for smoking cessation or reduction in smoking behavior. Electronic cigarette can be a good conversation starter and interacti...
 
Digital Image Watermarking Algorithm Based on Wavelet Transform and the NMF
Found in: Intelligent Human-Machine Systems and Cybernetics, International Conference on
By Jing Li,Bo Fu,Li Li,Yingwei Huang,Bo Li
Issue Date:August 2011
pp. 27-30
A kind of combination of wavelet transform and NMF of digital watermarking algorithm is proposed in this paper. First the original image is transformed by wavelet transform twice. We embed the watermark into the intermediate frequency sub-image by NMF. Com...
 
Image Analysis by Discrete Radial Bi-Tchebichef Moments
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Li Luo, Bo Li, Li Li, Bo Fu, Guojun Zhang, Xi Zheng
Issue Date:March 2010
pp. 414-417
The feature extracted by the rotation invariants of radial Tchebichef moments could make the image analysis more effectively. However, the classical method adopted integral point sampling which has defects of too many sampling points in the centre of unit ...
 
VMInsight: Hardware Virtualization-Based Process Security Monitoring System
Found in: Network Computing and Information Security, International Conference on
By Xianxian Li, Changhui Jiang, Jianxin Li, Bo Li
Issue Date:May 2011
pp. 62-66
Malicious software is one of the primary threats to information system on Internet, while the traditional host-based and network-based monitoring systems are vulnerable to prevent the malicious behavior of software because most current malicious software i...
 
A Prefetching Framework for the Streaming Loading of Virtual Software
Found in: Parallel and Distributed Systems, International Conference on
By Liang Zhong, Junbin Kang, Chunming Hu, Tianyu Wo, Haibing Zheng, Bo Li
Issue Date:December 2010
pp. 712-717
In recent years, the Software as a Service, largely enabled by the Internet, has become an innovative software delivery model. During the streaming execution of virtualization software, the execution will wait until the missing data was downloaded, which g...
 
EnaCloud: An Energy-Saving Application Live Placement Approach for Cloud Computing Environments
Found in: Cloud Computing, IEEE International Conference on
By Bo Li, Jianxin Li, Jinpeng Huai, Tianyu Wo, Qin Li, Liang Zhong
Issue Date:September 2009
pp. 17-24
With the increasing prevalence of large scale cloud computing environments, how to place requested applications into available computing servers regarding to energy consumption has become an essential research problem, but existing application placement ap...
 
Online Storage and Content Distribution System at a Large Scale: Peer-Assistance and Beyond
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Bo Li
Issue Date:May 2009
pp. 3
Online storage and content distribution systems within the “cloud” of the Internet have provided a wide variety of services ranging from file sharing, software downloads, to stored or live video streaming, to a large community. With the increasing populari...
 
A Universal Fault Diagnostic Expert System Based on Bayesian Network
Found in: Computer Science and Software Engineering, International Conference on
By Ting Han, Bo Li, Limei Xu
Issue Date:December 2008
pp. 260-263
Fault diagnosis is an area of great concern of any industry to reduce maintenance cost and increase profitability in the mean time. But most of the researches tend to rely on sensor data and equipment structure, which are expensive because each category of...
 
Multi-label Classification based on Association Rules with Application to Scene Classification
Found in: Young Computer Scientists, International Conference for
By Bo Li, Hong Li, Min Wu, Ping Li
Issue Date:November 2008
pp. 36-41
In this paper, a multi-label classification based on association rules is proposed. To deal with multiple class labels problem which is hard to settle by existing methods, this algorithm decomposes multi-label data to mine single-label rules, then combines...
 
Design and Analysis of a Rate-Based Algorithm for Active Queue Management
Found in: Local Computer Networks, Annual IEEE Conference on
By Chonggang Wang, Bo Li, Y. Thomas Hou, Kazem Sohraby, Weiwen Tang
Issue Date:November 2004
pp. 206-213
This paper proposes a rate-based active queue management algorithm or RAQM. It uses the aggregated traffic input rate to calculate packet drop probability according to an exponential rule. We analyze the stability and investigate practical implementation i...
   
Application of numerical analysis visualization multimedia technology in the teaching of electrical engineering
Found in: Frontiers in Education, Annual
By Ma Bo, Li Xin, Cui Xueshen, Luo Yingli, Xie Chen
Issue Date:October 2004
pp. S2C/4-S2C/7 Vol. 3
An important content in the teaching of electrical engineering courses is how to explicitly illustrate the spatial structure and operating principle of some complicated power facilities. In this paper the multimedia technology and the visualization technol...
 
Optimization and Benchmark of Cryptographic Algorithms on Network Processors
Found in: IEEE Micro
By Zhangxi Tan, Chuang Lin, Hao Yin, Bo Li
Issue Date:September 2004
pp. 55-69
This work compares and analyzes architectural characteristics of many widespread cryptographic algorithms on the Intel IXP2800 network processor. It also investigates several implementation and optimization principles that can improve overall performance. ...
 
A Novel Analysis Technique for Investigating Transient Performance of Queueing Systems
Found in: Modeling, Analysis, and Simulation of Computer Systems, International Symposium on
By Guang-Liang Li, Jun-Hong Cui, Bo Li, Fang-Ming Li
Issue Date:July 1998
pp. 211
Conventional analysis techniques of queueing systems typically assume that the stochastic process under study is already in steady state. This assumption is, however, not valid if the life cycle of the process is not large enough. Previous work in transien...
 
iAware: Making Live Migration of Virtual Machines Interference-Aware in the Cloud
Found in: IEEE Transactions on Computers
By Fei Xu,Fangming Liu,Linghui Liu,Hai Jin,Bo Li,Baochun Li
Issue Date:December 2014
pp. 3012-3025
Large-scale datacenters have been widely used to host cloud services, which are typically allocated to different virtual machines (VMs) through resource multiplexing across shared physical servers. Although recent studies have primarily focused on harnessi...
 
Price Competition in an Oligopoly Market with Multiple IaaS Cloud Providers
Found in: IEEE Transactions on Computers
By Yuan Feng,Baochun Li,Bo Li
Issue Date:January 2014
pp. 59-73
As an increasing number of infrastructure-as-a-service (IaaS) cloud providers start to provide cloud computing services, they form a competition market to compete for users of these services. Due to different resource capacities and service workloads, user...
 
The Visual Object Tracking VOT2013 Challenge Results
Found in: 2013 IEEE International Conference on Computer Vision Workshops (ICCVW)
By Matej Kristan,Roman Pflugfelder,Ale Leonardis,Jiri Matas,Fatih Porikli,Luka Cehovin,Georg Nebehay,Gustavo Fernandez,Toma Vojir,Adam Gatt,Ahmad Khajenezhad,Ahmed Salahledin,Ali Soltani-Farani,Ali Zarezade,Alfredo Petrosino,Anthony Milton,Behzad Bozorgtabar,Bo Li,Chee Seng Chan,Cherkeng Heng,Dale Ward,David Kearney,Dorothy Monekosso,Hakki Can Karaimer,Hamid R. Rabiee,Jianke Zhu,Jin Gao,Jingjing Xiao,Junge Zhang,Junliang Xing,Kaiqi Huang,Karel Lebeda,Lijun Cao,Mario Edoardo Maresca,Mei Kuan Lim,Mohamed El Helw,Michael Felsberg,Paolo Remagnino,Richard Bowden,Roland Goecke,Rustam Stolkin,Samantha Yueying Lim,Sara Maher,Sebastien Poullot,Sebastien Wong,Shin'Ichi Satoh,Weihua Chen,Weiming Hu,Xiaoqin Zhang,Yang Li,Zhiheng Niu
Issue Date:December 2013
pp. 98-111
Visual tracking has attracted a significant attention in the last few decades. The recent surge in the number of publications on tracking-related problems have made it almost impossible to follow the developments in the field. One of the reasons is that th...
 
A MapReduce and Information Compression Based Social Community Structure Mining Method
Found in: 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)
By Jin Songchang,Li Aiping,Yang Shuqiang,Lin Wangqun,Deng Bo,Li Shudong
Issue Date:December 2013
pp. 971-980
As the rapid development of social media, social community structure mining has become a popular research field in recent years. But traditional social community mining methods are not able to effectively deal with the data of large scale networks. We firs...
 
Surface Mesh to Volumetric Spline Conversion with Generalized Polycubes
Found in: IEEE Transactions on Visualization and Computer Graphics
By Bo Li, Xin Li, Kexiang Wang, Hong Qin
Issue Date:September 2013
pp. 1539-1551
This paper develops a novel volumetric parameterization and spline construction framework, which is an effective modeling tool for converting surface meshes to volumetric splines. Our new splines are defined upon a novel parametric domain called generalize...
 
Peer-Assisted On-Demand Streaming: Characterizing Demands and Optimizing Supplies
Found in: IEEE Transactions on Computers
By Fangming Liu,Bo Li,Baochun Li,Hai Jin
Issue Date:February 2013
pp. 351-361
Nowadays, there has been significant deployment of peer-assisted on-demand streaming services over the Internet. Two of the most unique and salient features in a peer-assisted on-demand streaming system are the differentiation in the demand (or request) an...
 
Software Aging in Virtualized Environments: Detection and Prediction
Found in: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS)
By Lei Cui,Bo Li,Jianxin Li,James Hardy,Lu Liu
Issue Date:December 2012
pp. 718-719
Software aging has been cited in many scenarios including Operating System, Web Servers, Real-time Systems. However, few studies have been conducted in long running virtualized environments where more and more software is being delivered as a service. Furt...
 
iROW: An Efficient Live Snapshot System for Virtual Machine Disk
Found in: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS)
By Jianxin Li,Hanqing Liu,Lei Cui,Bo Li,Tianyu Wo
Issue Date:December 2012
pp. 376-383
The high-availiablity of mission-critical data and services hosted in a virtual machine (VM) is one of the top concerns in a cloud computing environment. The live disk snapshot is an emerging technology to save the whole state and the data of a VM at a spe...
 
Airlift: Video conferencing as a cloud service using inter-datacenter networks
Found in: 2012 20th IEEE International Conference on Network Protocols (ICNP)
By Yuan Feng,Baochun Li,Bo Li
Issue Date:October 2012
pp. 1-11
It is typical for enterprises to rely on services from cloud providers in order to build a scalable platform with abundant available resources to satisfy user demand, and for cloud providers to deploy a number of datacenters inter-connected with high-capac...
 
The NiosII Dual-Core Processor Realizing the Digital Image Watermark
Found in: 2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science
By Xinliang He,Yuhui Li,Bo Li,Bowen Zhu
Issue Date:October 2012
pp. 388-391
Digital watermark is the effective way to realize the copyright protection, the digital watermark application with the multi-core technology is being more and more widely in embedded systems today. This paper proposes a way that NiosII dual-core realizes t...
 
A Video Front Collection Method of Watermarking Embedding and Blind-Extraction
Found in: 2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science
By Chengxu Luo,Yuhui Li,Bo Li,Ji Huang
Issue Date:October 2012
pp. 401-404
In this paper, we put forward a video front collection method of watermark embedding and blind extraction. Under the premise of not affecting the video quality and the use value, this method uses the relationship of DCT coefficients to realize embedding wa...
 
Postcard: Minimizing Costs on Inter-Datacenter Traffic with Store-and-Forward
Found in: 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops)
By Yuan Feng,Baochun Li,Bo Li
Issue Date:June 2012
pp. 43-50
It is typical for cloud providers to operate a number of geographically distributed data centers, where inter-data center traffic constitutes a large portion of a cloud provider's traffic demand over the Internet. Though such inter-data center traffic incu...
 
Restricted Trivariate Polycube Splines for Volumetric Data Modeling
Found in: IEEE Transactions on Visualization and Computer Graphics
By Kexiang Wang, Xin Li, Bo Li, Huanhuan Xu, Hong Qin
Issue Date:May 2012
pp. 703-716
This paper presents a volumetric modeling framework to construct a novel spline scheme called restricted trivariate polycube splines (RTP-splines). The RTP-spline aims to generalize both trivariate T-splines and tensor-product B-splines; it uses solid poly...
 
Optimal Relay Placement for Indoor Sensor Networks
Found in: Distributed Computing in Sensor Systems and Workshops, International Conference on
By Cuiyao Xue,Yanmin Zhu,Lei Ni,Minglu Li,Bo Li
Issue Date:May 2012
pp. 209-215
To many sensor networks, the robust operation depends on deploying relays to ensure wireless coverage. This paper considers the crucial problem of optimal relay placement for wireless sensor networks in indoor environments. The placement of relays is essen...
 
Research on Operation Optimization Algorithm of Milling System
Found in: Computer Science and Electronics Engineering, International Conference on
By Xiang-feng Wang,Bo Li,Gang Zhang,Li Sun,Jun-yu Hu
Issue Date:March 2012
pp. 107-110
A method of milling system operation optimization is proposed in this paper. First, use Support Vector Machine to get the relations between milling unit consumption and its related operation parameters. Second, optimize the model with the help of genetic a...
 
Research on Solid State Storage Based Remote Sensing Data Storage
Found in: Intelligent System Design and Engineering Application, International Conference on
By HongShan Nie,QiYou Xie,YuMei Zhang,Miao Li,Qiang Liu,HuSheng Liu,JiDong Zhang,Bo Li
Issue Date:January 2012
pp. 1294-1297
the storage for mass data in geo-information system always restricts its development. Solid State storage is an efficient storage method based on semiconductor device, with superior performance and flexible management. Aiming at meeting the storage require...
 
Resource Scheduling Algorithm of Space Objects Surveillance for Collision Warning
Found in: Intelligent System Design and Engineering Application, International Conference on
By Li Bo,Li Daqi
Issue Date:January 2012
pp. 736-739
Space objects surveillance for collision warning is a constraint satisfaction scheduling problem of multiple targets measurement. This paper summarizes the various factors in the scheduling process and proposes the mathematical model of non-cooperative mea...
 
The Research on Network Vulnerability Analysis Methods
Found in: Intelligent System Design and Engineering Application, International Conference on
By Shiguo Sun,Senlin Luo,Xiang Li,Bo Li
Issue Date:January 2012
pp. 593-597
Vulnerability analysis is the basis of satellite network construction. This paper summarized the popular vulnerability Analysis Methods in the field of computer network security. This paper also described and compared these methods. Then this paper introdu...
 
Flash Crowd in P2P Live Streaming Systems: Fundamental Characteristics and Design Implications
Found in: IEEE Transactions on Parallel and Distributed Systems
By Fangming Liu,Bo Li,Lili Zhong,Baochun Li,Hai Jin,Xiaofei Liao
Issue Date:July 2012
pp. 1227-1239
Peer-to-peer (P2P) live video streaming systems have recently received substantial attention, with commercial deployment gaining increased popularity in the internet. It is evident from our practical experiences with real-world systems that, it is not unco...
 
A New Digital Watermark Algorithm Based on the DWT and SVD
Found in: International Symposium on Distributed Computing and Applications to Business, Engineering and Science
By Yuhui Li,Wei Gou,Bo Li
Issue Date:October 2011
pp. 207-210
In this paper, we consider the application of the discrete wavelet transform (DWT) and singular value decomposition (SVD) in the digital watermark systerm. Based on this algorithm, it is efficient to protect the rights of the owners' digital content. This ...
 
Design of HPC Node with Heterogeneous Processors
Found in: Cluster Computing, IEEE International Conference on
By Zheng Cao,Hongwei Tang,Qiang Li,Bo Li,Fei Chen,Kai Wang,Xuejun An,Ninghui Sun
Issue Date:September 2011
pp. 130-138
Heterogeneous Computing is becoming an important technology trend in HPC, where more and more heterogeneous processors are used. However, in traditional node architecture, heterogeneous processors are always used as coprocessors. Such usage increases the c...
 
Design of CMOS Image Sensor's Initialization Based on FPGA
Found in: Digital Manufacturing and Automation, International Conference on
By Baofeng Zhang,Bo Li,Junchao Zhu,Xinzhi Li
Issue Date:August 2011
pp. 393-396
CMOS image sensor can convert analog video signals into digital video signals, so the initiaLization of CMOS image sensor is essential to image capture and processing system. This paper briefly introduces the specification of I2C bus and working principle ...
 
Cost-Effective Partial Migration of VoD Services to Content Clouds
Found in: Cloud Computing, IEEE International Conference on
By Haitao Li,Lili Zhong,Jiangchuan Liu,Bo Li,Ke Xu
Issue Date:July 2011
pp. 203-210
Since user demand for a Video-on-demand (VoD) service varies with time in one-day period, provisioning self-owned servers for the peak load it must sustain a few hours per day l eads to bandwidth underutilization at other times. Content clouds, e.g. Amazon...
 
New System for the Spectrophotometric Determination of Arsenic in Water
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Guifeng Lin, Yanhong Wang, Guochen Li, Shicheng Wang, Hong Zhang, Bo Li
Issue Date:February 2011
pp. 385-388
was established for detecting the trace arsenic in water. With the existence of strong acid, the trace concentrations of arsenic after concentrating by JM-33resin reacted with disulfoantipyl methane to form a 1¡Ã2complex which the maximum absorption wave...
 
Scheduling of a Relaxed Backfill Strategy with Multiple Reservations
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Bo Li, Ying Li, Min He, Hao Wu, Jundong Yang
Issue Date:December 2010
pp. 311-316
Backfilling is well known in parallel job scheduling to increase system utilization and user satisfaction over traditional non-backfilling scheduling algorithms, which allow small jobs from the back of the queue to execute before larger jobs arriving earli...
 
A VMM-Based System Call Interposition Framework for Program Monitoring
Found in: Parallel and Distributed Systems, International Conference on
By Bo Li, Jianxin Li, Tianyu Wo, Chunming Hu, Liang Zhong
Issue Date:December 2010
pp. 706-711
System call interposition is a powerful method for regulating and monitoring program behavior. A wide variety of security tools have been developed which use this technique. However, traditional system call interposition techniques are vulnerable to kernel...
 
Peer-assisted VoD prefetching in double auction markets
Found in: Network Protocols, IEEE International Conference on
By Yuan Feng, Baochun Li, Bo Li
Issue Date:October 2010
pp. 275-284
In peer-assisted video-on-demand (VoD) streaming systems, server bandwidth costs can be astronomical when the number of videos and peers scales up. Since peers are able to seek to an arbitrary point of playback in any video at any time, prefetching is ofte...
 
Using Analog Network Coding to Improve the RFID Reading Throughput
Found in: Distributed Computing Systems, International Conference on
By Ming Zhang, Tao Li, Shigang Chen, Bo Li
Issue Date:June 2010
pp. 547-556
RFID promises to revolutionize the inventory management in large warehouses, retail stores, hospitals, transportation systems, etc. Periodically reading the IDs of the tags is an important function to guard against administration error, vendor fraud and em...
 
Generalized PolyCube Trivariate Splines
Found in: Shape Modeling and Applications, International Conference on
By Bo Li, Xin Li, Kexiang Wang, Hong Qin
Issue Date:June 2010
pp. 261-265
This paper develops a new trivariate hierarchical spline scheme for volumetric data representation. Unlike conventional spline formulations and techniques, our new framework is built upon a novel parametric domain called Generalized PolyCube (GPC), compris...
 
CloudVO: Building a Secure Virtual Organization for Multiple Clouds Collaboration
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Jianxin Li, Bo Li, Zongxia Du, Linlin Meng
Issue Date:June 2010
pp. 181-186
Cloud computing has become a popular computing paradigm in which virtualized and scalable resources are consolidated to provide services over Internet. However, the resource capability of a single cloud is generally limited, and some applications often req...
 
Implementation of Far Query Based on Texture of Image in Web
Found in: International Conference on E-Business and E-Government
By Li Bo,Li Wenfeng
Issue Date:May 2010
pp. 4111-4114
Because of the features of image information itself, the results of query by text in many cases are not useful. How to query by texture of image have been studied especially in this paper. A solution of using ISAPI for image database based on B/S is provid...
 
HiTrust: A Hybrid Tree Based Trust Negotiation Service
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Jianxin Li, Bo Li, Linlin Meng, Dazhi Sun
Issue Date:April 2010
pp. 854-859
Various promising distributing computing paradigms such as Grids, P2P and Clouds have emerged over Internet. How to build the trust relationship among principals in such an open computing environment has become an important issue. Automated trust negotiati...
 
A Virtualization-Based SaaS Enabling Architecture for Cloud Computing
Found in: Autonomic and Autonomous Systems, International Conference on
By Liang Zhong, Tianyu Wo, Jianxin Li, Bo Li
Issue Date:March 2010
pp. 144-149
With the increasing prevalence of large scale cloud computing environment, researchers has draw more attention about how to provide software as a service through the internet. In this paper, a novel approach named vSaaS is proposed in iVIC platform, which ...
 
FS2You: Peer-Assisted Semipersistent Online Hosting at a Large Scale
Found in: IEEE Transactions on Parallel and Distributed Systems
By Fangming Liu, Ye Sun, Bo Li, Baochun Li, Xinyan Zhang
Issue Date:October 2010
pp. 1442-1457
It has been widely acknowledged that online file hosting systems within the “cloud” of the Internet have provided valuable services to end users who wish to share files of any size. Such online hosting services are typically provided by dedicated servers, ...
 
Electronic Seal Based on Hash Function and Digital Watermark
Found in: Computer and Communications Security, International Conference on
By Li Bo, Li Wei
Issue Date:December 2009
pp. 28-31
To address the defect of the simplex digital signature in E-Commerce and E-Government, the paper presents a method of electronic seal based on the digital watermark technology. The method combines one-way hash function and digital watermarking, implements ...
 
Quota: Rationing server resources in peer-assisted online hosting systems
Found in: 2009 17th IEEE International Conference on Network Protocols. ICNP 2009
By Fangming Liu, Ye Sun, Bo Li, Baochun Li
Issue Date:October 2009
pp. 103-112
The increasingly popular online hosting systems are designed to provide versatile and convenient platforms for content hosting and sharing. To guarantee adequate levels of service quality while conserving prohibitive server costs, such systems are often de...
 
An Improving Technique of Color Histogram in Segmentation-based Image Retrieval
Found in: Information Assurance and Security, International Symposium on
By Zhenhua Zhang, Wenhui Li, Bo Li
Issue Date:August 2009
pp. 381-384
The distribution of pixel colors in an image generally contains interesting information. Recently, many researchers have analyzed the color attributes of an image and used it as the features of the images for querying [1,2,3]. Color histogram [1, 2, 3] is ...
 
 1  2 Next >>