Search For:

Displaying 1-11 out of 11 total
Algebraic Representation of Asynchronous Multiple-Valued Networks and Its Dynamics
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Chao Luo, Xingyuan Wang
Issue Date:July 2013
pp. 927-938
In this paper, dynamics of asynchronous multiple-valued networks (AMVNs) are investigated based on linear representation. By semitensor product of matrices, we convert AMVNs into the discrete-time linear representation. A general formula to calculate all o...
 
Model-Based Performance Optimization of Generalized Snapshot Isolation in Database System
Found in: 2012 IEEE 9th Int'l Conference on Ubiquitous Intelligence & Computing / 9th Int'l Conference on Autonomic & Trusted Computing (UIC/ATC)
By Chao Luo,Hiroyuki Okamura,Tadashi Dohi
Issue Date:September 2012
pp. 494-500
This paper proposes probabilistic models for snapshot isolation of database management system. The snapshot isolation is known as an effective method to enhance the performance of database system. However, it degrades the system performance in the case whe...
 
Testing of Component-Based Software: A Metamorphic Testing Methodology
Found in: Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on
By Xiao-li Lu, Yun-wei Dong, Chao Luo
Issue Date:October 2010
pp. 272-276
In the process of testing Component-based software, Oracle problem comes into existence frequently because of the diversity of component running environment and complicated interactions among components. In this paper, we exploit the features of the compon...
 
Range Query Using Learning-Aware RPS in DHT-Based Peer-to-Peer Networks
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Ze Deng, Dan Feng, Ke Zhou, Zhan Shi, Chao Luo
Issue Date:May 2009
pp. 180-187
Range query in Peer-to-Peer networks based on Distributed Hash Table (DHT) is still an open problem. The traditional way uses order-preserving hashing functions to create value indexes that are placed and stored on the corresponding peers to support range ...
 
Mining Exceptional Activity Patterns in Microstructure Data
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Yuming Ou, Longbing Cao, Chao Luo, Li Liu
Issue Date:December 2008
pp. 884-887
Market Surveillance plays an important role in maintaining market integrity, transparency and fairness. The existing trading pattern analysis only focuses on interday data which discloses explicit and high-level market dynamics. In the mean time, the exist...
 
Exception Mining on Multiple Time Series in Stock Market
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Chao Luo, Yanchang Zhao, Longbing Cao, Yuming Ou, Chengqi Zhang
Issue Date:December 2008
pp. 690-693
This paper presents our research on exception mining on multiple time series data which aims to assist stock market surveillance by identifying market anomalies. Traditional technologies on stock market surveillance have shown their limitations to handle l...
 
Scalability Support for SMI-S with Chord
Found in: High Performance Computing and Communications, 10th IEEE International Conference on
By Ze Deng, Dan Feng, Zhan Shi, Chao Luo
Issue Date:September 2008
pp. 219-225
The Storage Management Initiative Specification (SMI-S) has been proposed for years to standardize the management of storage resources in Storage Area Network (SAN). However, current management architecture mainly focuses on local area management. In this ...
 
Developing Actionable Trading Strategies for Trading Agents
Found in: Intelligent Agent Technology, IEEE / WIC / ACM International Conference on
By Longbing Cao, Chao Luo, Chengqi Zhang
Issue Date:November 2007
pp. 72-75
Trading agents are very useful for developing and backtesting quality trading strategies for actions taking in the real world. However, the existing trading agent research mainly focuses on simulation using artificial data and market models. As a result, t...
 
Integration of Business Intelligence Based on Three-Level Ontology Services
Found in: Web Intelligence, IEEE / WIC / ACM International Conference on
By Longbign Cao, Chao Luo, Dan Luo, Chengqi Zhang
Issue Date:September 2004
pp. 17-23
Usually, integration of business intelligence (BI) from realistic telecom enterprise is by packing data warehouse (DW), OLAP, data mining and reporting from different vendors together. As a result, BI system users are transferred to a reporting system with...
 
Modeling and Analysis of Multi-version Concurrent Control
Found in: 2013 IEEE 37th Annual Computer Software and Applications Conference (COMPSAC)
By Chao Luo,Hiroyuki Okamura,Tadashi Dohi
Issue Date:July 2013
pp. 53-58
A multi-version concurrent control (MVCC) is widely spread as an important scheme to ensure the data integrity even in on-line storage services such as Dropbox as well as database management system. The scheme of MVCC is to make a snapshot of the current d...
 
Algebraic Representation of Asynchronous Multiple-Valued Networks and Its Dynamics
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
By Chao Luo, Xingyuan Wang
Issue Date:July 2013
pp. 927-938
In this paper, dynamics of asynchronous multiple-valued networks (AMVNs) are investigated based on linear representation. By semitensor product of matrices, we convert AMVNs into the discrete-time linear representation. A general formula to calculate all o...
     
 1