Search For:

Displaying 1-50 out of 123 total
Vehicle Retrieval Using Eigen Color and Multiple Instance Learning
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Shin-Yu Chen, Jun-Wei Hsieh, Jui-Chen Wu, Yung-Sheng Chen
Issue Date:September 2009
pp. 657-660
With the Internet crime growing, such as phishing, money mules, personal data stealing and trafficking, DDoS (Distributed Denial of Service), and other cases often heard by people from time to time. DDoS mostly uses botnet as source of attack, and distribu...
Joint-aware manipulation of deformable models
Found in: ACM Transactions on Graphics (TOG)
By Baining Guo, Falai Chen, Jun Wang, KangKang Yin, Kun Zhou, Michiel van de Panne, Weiwei Xu, Baining Guo, Falai Chen, Jun Wang, KangKang Yin, Kun Zhou, Michiel van de Panne, Weiwei Xu, Baining Guo, Falai Chen, Jun Wang, KangKang Yin, Kun Zhou, Michiel van de Panne, Weiwei Xu, Baining Guo, Falai Chen, Jun Wang, KangKang Yin, Kun Zhou, Michiel van de Panne, Weiwei Xu
Issue Date:July 2009
pp. 1-2
Complex mesh models of man-made objects often consist of multiple components connected by various types of joints. We propose a joint-aware deformation framework that supports the direct manipulation of an arbitrary mix of rigid and deformable components. ...
Detection and Correction of Conflicting Source Updates for View Maintenance
Found in: Data Engineering, International Conference on
By Songting Chen, Jun Chen, Xin Zhang, Elke A. Rundensteiner
Issue Date:April 2004
pp. 436
Data integration over multiple heterogeneous data sources has become increasingly important for modern applications. The integrated data is usually stored in materialized views for high availability and better performance. Such views must be maintained aft...
Vehicle Detection and Counting by Using Headlight Information in the Dark Environment
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Thou-Ho Chen, Jun-Liang Chen, Chin-Hsing Chen
Issue Date:November 2007
pp. 519-522
This paper is dedicated to detecting and counting vehicles in dark (nighttime) environment by using headlight information. The basic idea is to use variation ratio in color space to detect the ground- illumination resulted from the head-lighting of vehicle...
Predictive Queries Algorithm Based on Probability Model over Data Streams
Found in: International Conference on Natural Computation
By Guohui Li, Hui Chen, Bing Yang, Gang Chen, Jun Xiang
Issue Date:August 2007
pp. 256-260
Mining the evolving trends of an online data stream and forecasting the data values in the future can provide important support for the decision-making in many time-sensitive applications. This paper models an online data stream as a continuous state trans...
An Expert System Application for Respiratory Infection Diagnostic
Found in: 2012 IEEE 9th Int'l Conference on Ubiquitous Intelligence & Computing / 9th Int'l Conference on Autonomic & Trusted Computing (UIC/ATC)
By Sheng-Ta Hsieh,Chih-Dao Chen,Jun-Horng Chen,Chin-Lun Lai,Yu-Long Syu
Issue Date:September 2012
pp. 673-678
In this paper, an application of fuzzy-based expert system for respiratory infection diagnostic is introduced. Due to the symptoms of respiratory infections, such as influenza and common cold, are very similar. It¡¦s very difficult to determine if patients...
AC-Suffix-Tree: Buffer Free String Matching on Out-of-Sequence Packets
Found in: Symposium On Architecture For Networking And Communications Systems
By Xinming Chen,Kailin Ge,Zhen Chen,Jun Li
Issue Date:October 2011
pp. 36-44
TCP and IP fragmentation can be used to evade signature detection at Intrusion Detection/Prevention System (IDS / IPS). Such fragments may arrive out-of-sequence to escape from being detected by the string matching algorithm of IDS / IPS. The common defens...
The Use of Cloud Speech Recognition Technology in Vehicle Diagnosis Applications
Found in: Innovative Mobile and Internet Services in Ubiquitous Computing, International Conference on
By Shi-Huang Chen, Jun-Yu Chen, Kuo-Yuan Lu
Issue Date:July 2011
pp. 567-570
This paper developed a speech controlled interface with cloud computing technology for vehicle on-board diagnostic (OBD) system. The proposed vehicle OBD system is constructed by two parts. They are OBD embedded global position system (GPS-OBD) module and ...
Scheme Design of Extended Configuration for in-Pipe Robot Adapting Mechanism
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Chen Jun, Chen Tao, Deng Zongquan
Issue Date:January 2011
pp. 210-212
The configuration design of in-pipe robot adapting mechanism has a significant impact on its motion performance. By analyzing the operation principle and structure composition of adapting mechanism, the four-bar linkage is chosen as basic unit to make topo...
Vision-Based Vehicle Surveillance and Parking Lot Management Using Multiple Cameras
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Li-Chih Chen, Jun-Wei Hsieh, Wei-Ru Lai, Chih-Xuan Wu, Shin-Yu Chen
Issue Date:October 2010
pp. 631-634
This paper proposes a vision-based vehicle surveillance system for parking lot management in outdoor environments. Due to the limited field of view of camera, this system uses multiple cameras for monitoring a wide parking area. Then, an affine transformat...
The improved central decoder of a multiple description and distributed codec for videos
Found in: Multimedia and Expo, IEEE International Conference on
By Shih-Chieh Lee, Jyun-Jie Jhuang, Ching-Hua Chen, Jiann-Jone Chen, Jun-Lin Liu, De-Hui Shiue
Issue Date:July 2010
pp. 561-266
Multiple description coding (MDC) provides stable wireless multimedia communications with the help of multiple transmission paths, while distributed video coding (DVC) effectively shifts the encoder complexity to decoder for mobile media devices. We propos...
Intrusion Detection System Research Based on Data Mining for IPv6
Found in: Information Technology and Applications, International Forum on
By Chen Jun, Chen Xiaowei
Issue Date:July 2010
pp. 384-388
IPv6 will inevitably take the place of IPv4 as the next generation of the Internet Protocol. Despite IPv6 has better security than IPv4, but there still have some security issues. So it is an urgent problem to requirement of IDS for IPv6 networks. Many int...
Error Compensation and Implementation of Embedded High-Precision Magnetometer
Found in: Electrical and Control Engineering, International Conference on
By Lei Yu, Shi Chen, Jun Ouyang, Chao Zuo, Xinguo Chen, Shaobin Wu, Xiaofei Yang
Issue Date:June 2010
pp. 911-914
An embedded tri-axial magnetometer of high precision based on AMR (Anisotropy Magnetic Resistance) sensor was designed and achieved in this paper. For purpose of avoiding ferromagnetic disturbances to magnetic sensor, this device applied the manner of sepa...
A Low-cost RFID Authentication Protocol with Location Privacy Protection
Found in: Information Assurance and Security, International Symposium on
By Yu-Yi Chen, Jun-Chao Lu, Shin-I Chen, Jinn-Ke Jan
Issue Date:August 2009
pp. 109-113
RFID system is gaining popularity and attracting interest from both the enterprises and academic institutes. But now, we face several security problems and challenges in RFID systems. In human centric applications, location privacy problem is the most impo...
TransRank: A Novel Algorithm for Transfer of Rank Learning
Found in: Data Mining Workshops, International Conference on
By Depin Chen, Jun Yan, Gang Wang, Yan Xiong, Weiguo Fan, Zheng Chen
Issue Date:December 2008
pp. 106-115
Recently, learning to rank technique has attracted much attention. However, the lack of labeled training data seriously limits its application in real-world tasks. In this paper, we propose to break this bottleneck by considering the cross-domain “transfer...
A Customer Privacy Protection Protocol on Agent-Based Electronic Commerce Transaction
Found in: Intelligent Systems Design and Applications, International Conference on
By Yu-Yi Chen, Jun-Chao Lui, Shin-I Chen
Issue Date:November 2008
pp. 6-10
Mobile agent technology is going to play an important role in the future electronic commerce due to the characteristics of mobility and autonomy of the agents. Therefore, security issues should be solved before we use this new technology. However, privacy ...
Design of a Hybrid Multi-Slot Optical Code Division/Wavelength Division Multiple Access System
Found in: Communication Networks and Services Research, Annual Conference on
By Po-Hao Chang, Hung-Shiang Chen, Jun-Ren Chen
Issue Date:May 2006
pp. 34-41
For optical communication networks, the Wavelength Division Multiple Access (WDMA) system has been developed at first and maturely commercialized. Although WDMA can be used to satisfy the requirement mentioned above, it has the disadvantage of low efficien...
HW/SW Auto-Coupling for Fast IP Integration in SoC Designs
Found in: Embedded Software and Systems, Second International Conference on
By Yin-Tsung Hwang, Jun-Yen Chen, Jun-Jieh Chiu
Issue Date:July 2008
pp. 556-563
IP intergration in SoC nowadays contains two design aspects, i.e. hardware interface and software driver. The hardware interface supports necessary signal mapping, protocol translation and data buffering so that an IP can adapt to various system architectu...
A Modeling of Software Architecture Reliability
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Jun Wang, Weiru Chen, Jun Liu
Issue Date:September 2007
pp. 983-986
This paper introduces software architecture reliability estimation and some typical software reliability model based architecture. We modify model of software reliability estimation so that to improve precision of estimating software architecture reliabili...
Importance-Driven Isosurface Decimation for Visualization of Large Simulation Data Based on OpenCL
Found in: Computing in Science & Engineering
By Yi Peng,Li Chen,Jun-Hai Yong
Issue Date:January 2014
pp. 24-32
A new way to define mesh importance for decimation uses transfer functions and visualizes large simulation data in cases where normal visualization methods are insufficient due to memory limit. Next, a parallel isosurface simplification framework uses pyra...
Large-Margin Predictive Latent Subspace Learning for Multiview Data Analysis
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Ning Chen, Jun Zhu, Fuchun Sun,E. P. Xing
Issue Date:December 2012
pp. 2365-2378
Learning salient representations of multiview data is an essential step in many applications such as image classification, retrieval, and annotation. Standard predictive methods, such as support vector machines, often directly use all the features availabl...
TSS: Efficient Term Set Search in Large Peer-to-Peer Textual Collections
Found in: IEEE Transactions on Computers
By Hanhua Chen, Jun Yan, Hai Jin, Yunhao Liu, Lionel M. Ni
Issue Date:July 2010
pp. 969-980
Previous multikeyword search in DHT-based P2P systems often relies on multiple single keyword search operations, suffering from unacceptable traffic cost and poor accuracy. Precomputing term-set-based index can significantly reduce the cost but needs expon...
Vibration Controller of Marine Electromagnetic Vibrator
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Feng Sun, Zu Bin Chen, Jun Lin
Issue Date:April 2009
pp. 926-929
Marine electromagnetic vibrator is a non-explosive seismic source, for high resolution detection of marine seismic exploration ,which used sublevel sweep mode of marine electromagnetic vibrator. The vibration controller provides sublevel Chirp signal by ma...
Document Transformation for Multi-label Feature Selection in Text Categorization
Found in: Data Mining, IEEE International Conference on
By Weizhu Chen, Jun Yan, Benyu Zhang, Zheng Chen, Qiang Yang
Issue Date:October 2007
pp. 451-456
Feature selection on multi-label documents for automatic text categorization is an under-explored research area. This paper presents a systematic document transformation framework, whereby the multi-label documents are transformed into single-label documen...
An Improved Shark-Search Algorithm Based on Multi-information
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Zhumin Chen, Jun Ma, Jingsheng Lei, Bo Yuan, Li Lian
Issue Date:August 2007
pp. 659-658
With the enormous growth of World Wide Web, existing general-purpose search engines have presented much more limitations. Focused crawling is increasingly seen as a potential solution. The key of focused crawling is how to accurately predict the relevance ...
Establishing Customers' Beer Tastes Analysis Model on the Basis of Fuzzy Neural Network Simulation
Found in: Information Science and Management Engineering, International Conference of
By Jun-qi Yang, Xia Gao, Li-jia Chen, Jun-mei Li
Issue Date:August 2010
pp. 177-180
This paper uses fuzzy neural network method to establish simulation model about the evaluations of customers’ beer tastes and preference degree. It explains the methods of building, training and simulating networks in the development environment of MATLAB ...
Systems Architecture Design of Cloud-Based Human Resources Information Management Systems (cHRIMS) for Higher Education Institutions
Found in: 2013 Seventh International Conference on Internet Computing for Engineering and Science (ICICSE 2013)
By Qun Chen, Jun Ni
Issue Date:September 2013
pp. 9-14
This paper first reviews the cutting-edge technologies of cloud computing through various concepts of cloud computing and its three service architectures for human resource management system (HRIMS) in scope of domestic and global levels. After revealing m...
Ant Colony Optimization for Software Project Scheduling and Staffing with an Event-Based Scheduler
Found in: IEEE Transactions on Software Engineering
By Wei-Neng Chen,Jun Zhang
Issue Date:January 2013
pp. 1-17
Research into developing effective computer aided techniques for planning software projects is important and challenging for software engineering. Different from projects in other fields, software projects are people-intensive activities and their related ...
Development and Application of Recycling Utilization for Vanadium Recovery Converter Sludge
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Chen Yong, Chen Jun, He Wei
Issue Date:February 2011
pp. 2047-2052
Based on the theoretical analysis of the feasibility to use the Vanadium sludge of converter to make vanadium-recovery coolant, ingredient of a cold-pellet suitable for vanadium recovery process has been developed. Industrial production and practice indica...
Exploiting Combined Multi-level Model for Document Sentiment Analysis
Found in: Pattern Recognition, International Conference on
By Si Li, Hao Zhang, Weiran Xu, Guang Chen, Jun Guo
Issue Date:August 2010
pp. 4141-4144
This paper focuses on the task of text sentiment analysis in hybrid online articles and web pages. Traditional approaches of text sentiment analysis typically work at a particular level, such as phrase, sentence or document level, which might not be suitab...
Ontology Based Semantic Relation Verification for TCM Semantic Grid
Found in: ChinaGrid, Annual Conference
By Xiaogang Zhang, Huajun Chen, Jun Ma, Jinhuo Tao
Issue Date:August 2009
pp. 185-191
Traditional Chinese Medicine (TCM) Semantic Grid is an application of Semantic Grid technique in TCM domain. It comprises TCM ontology and TCM Databases as data resources and Dart Search, Dart Query etc. as TCM application. This paper reports an ontology e...
Research on DFT Domain Digital Audio Watermarking Algorithm Based on Quantization
Found in: Education Technology and Computer Science, International Workshop on
By Wei Tan, Senbin Yang, Yanpu Chen, Jun Zhou
Issue Date:March 2009
pp. 736-739
Quantization index modulation is one of the popular digital audio watermarking algorithms. The principle of the algorithm is analyzed firstly, and then embedding and extracting formulas of less computational complexity are given. The performances of algori...
Credit Risk Assessment Model Based on Domain Knowledge Constraint
Found in: Computer and Computational Sciences, International Multi-Symposiums on
By Jingping Chen, Haiwei Pan, Qilong Han, Linghu Chen, Jun Ni
Issue Date:October 2008
pp. 144-149
With the continuous rising of real-estate prices and the upsurge demands by residents, the loan default risk has been raised gradually due to the individual housing loan increased with years. The efficient measurement and management systems for the credit ...
BFCD: A Component Coordination Method based on Grid Workflow Engine
Found in: Grid and Cloud Computing, International Conference on
By Yang Qin, Chen Jun-Liang, Meng Xiang-Wu, Li Li
Issue Date:August 2007
pp. 737-744
The development of grid technology and the springing up of services oriented computing bring both opportunity and challenge to the field oriented software development. The component composition technology researches based on business flow have not yet full...
Diverse Topic Phrase Extraction through Latent Semantic Analysis
Found in: Data Mining, IEEE International Conference on
By Jilin Chen, Jun Yan, Benyu Zhang, Qiang Yang, Zheng Chen
Issue Date:December 2006
pp. 834-838
We propose a novel algorithm for extracting diverse topic phrases in order to provide summary for large corpora. Previous works often ignore the importance of diversity and thus extract phrases crowded on some hot topics while failing to cover other less o...
K-Cluster Algorithm for Automatic Discovery of Subgoals in Reinforcement Learning
Found in: Computational Intelligence for Modelling, Control and Automation, International Conference on
By Ben-Nian Wang, Yang Gao, Zhao-Qian Chen, Jun-Yuan Xie, Shi-Fu Chen
Issue Date:November 2005
pp. 658-662
Options have proven to be useful to accelerate agent's learning in many reinforcement learning tasks. determining useful subgoals is a key step for agent to create options. A K-cluster algorithm for automatic discovery of subgoals is presented in this pape...
LMRL: A Multi-Agent Reinforcement Learning Model and Algorithm
Found in: Information Technology and Applications, International Conference on
By Ben-Nian Wang, Yang Gao, Zhao-Qian Chen, Jun-Yuan Xie, Shi-Fu Chen
Issue Date:July 2005
pp. 303-307
Multi-agent reinforcement learning technologies are mainly investigated from two perspectives: One is from the concurrence, and the other from the Game Theory. The former chiefly applies to cooperative multi-agent systems, while the latter usually applies ...
System-level power and thermal modeling and analysis by orthogonal polynomial based response surface approach (OPRS)
Found in: Computer-Aided Design, International Conference on
By J.M. Wang, B. Srinivas, Dongsheng Ma, C.C.-P. Chen, Jun Li
Issue Date:May 2005
pp. 728-735
This paper proposes a new statistical response surface based power estimation technique. The new approach is able to include a number of parameters such as multiple Vdd, multiple Vth and gate sizing parameters. It has both deterministic ability and statist...
Security Vulnerabilities — From Data Analysis to Protection Mechanisms
Found in: Object-Oriented Real-Time Dependable Systems, IEEE International Workshop on
By Ravishankar K. Iyer, Shuo Chen, Jun Xu, Zbigniew Kalbarczyk
Issue Date:October 2003
pp. 331
This paper combines an analysis of data on security vulnerabilities (published in the Bugtraq database) and a focused source-code examination to (i) develop a finite state machine (FSM) model to depict and reason about security vulnerabilities and (ii) to ...
Discriminative Relational Topic Models
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Ning Chen,Jun Zhu,Fei Xia,Bo Zhang
Issue Date:February 2015
pp. 1
Relational topic models (RTMs) provide a probabilistic generative process to describe both the link structure and document contents for document networks, and they have shown promise on predicting network structures and discovering latent topic representat...
Traffic Identification in Semi-known Network Environment
Found in: 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)
By Xiao Chen,Jun Zhang,Yang Xiang,Wanlei Zhou
Issue Date:December 2013
pp. 572-579
Network traffic classification has attracted more and more attentions from both academia and industry. It has been widely adopted in network management and security, such as QoS measurements. Due to rapid emergence of new applications in current network en...
Efficient Information Dissemination in Dynamic Networks
Found in: 2013 42nd International Conference on Parallel Processing (ICPP)
By Zhiwei Yang, Weigang Wu, Yishun Chen, Jun Zhang
Issue Date:October 2013
pp. 603-610
Dynamic network is the abstraction of networks with frequent topology changes arising from node mobility or other reasons. With the model of dynamic network, distributed computation problems can be formally studied with rigorous correctness. Information di...
Network Optimization Method Based on Improved Quantum Genetic Algorithm
Found in: 2012 Fourth International Symposium on Information Science and Engineering (ISISE)
By Xin Fan,Wei Li,Zhihuan Chen,Jun Yi
Issue Date:December 2012
pp. 422-425
To solve structure optimization problems of the information transmission networks, based on quantum genetic algorithm (QGA), the paper proposes an improved quantum genetic algorithm (IQGA). The core of the algorithm is to take full advantage of interferenc...
Data-Driven Visualization of the Body Thermal Distributions
Found in: 2012 4th International Conference on Digital Home (ICDH)
By Chen Jun,Mao Aihua,Luo Jie
Issue Date:November 2012
pp. 156-160
This paper presents an alternative method, which is economical and easy-to-operate, to visualize the 3D skin temperature distribution of the body based on the data of skin temperature of available body points. The interpolation and mapping functions is pre...
A Mixed Localization Algorithm Based on RSSI and APIT with Fitness Analysis and Optimization
Found in: 2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science
By Bo Chen,Jun Sun,Wen Bo Xu,Jian Xu
Issue Date:October 2012
pp. 164-168
As a new information acquisition and processing technology, wireless sensor networks can achieve tasks with complex large-scale monitoring and tracking in wide range of applications, but the localization for node itself is the basis of most applications. A...
Adaptive and Online Fault Detection Using RPCA Algorithm in Wireless Sensor Network Nodes
Found in: Intelligent System Design and Engineering Application, International Conference on
By Yingxin Xie,Xiangguang Chen,Jun Zhao
Issue Date:January 2012
pp. 1371-1374
A wide range of applications have started to use Wireless Sensor Network (WSN) as an information collection and monitoring tool. Reliable and accurate performance of sensor nodes is necessary in critical applications. For characteristics of the WSN data st...
The Co-evolution of Producer Services and Manufacturing Industry - Case of PuJiang Padlock Sector
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Chen Jun
Issue Date:November 2011
pp. 491-495
This paper analyzes the co-evolution of producer services and manufacturing industry from evolutionary economics perspective, constructs a trinity model of co-evolution of producer services and manufacturing industry, and proposes depth analysis of co-evol...
Research on Compatibility of Prescription of TCP Based on the Principle of Attribute Partial Order Chart
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Fengjie Fan,Wenxue Hong,Xin Li,Tao Zhang,Xulong Liu,Weidong Chen,Jun Jing
Issue Date:October 2011
pp. 82-86
In order to solve the problems that how to mine and express classification knowledge and rules in compatibility of prescription, this paper introduces a new theory of formal concept analysis (FCA), and realizes the compatibility of prescription knowledge m...
A Fast Exact Euclidean Distance Transform Algorithm
Found in: Image and Graphics, International Conference on
By Shuang Chen,Junli Li,Xiuying Wang
Issue Date:August 2011
pp. 45-49
Euclidean distance transform is widely used in many applications of image analysis and processing. Traditional algorithms are time-consuming and difficult to realize. This paper proposes a novel fast distance transform algorithm. Firstly, mark each foregro...
Sewage-source Heat Pump Based on WebAaccess - Remote Monitoring System
Found in: Intelligent Computation Technology and Automation, International Conference on
By Chen Jun,Lian Xiaoqin,Zhang Xiaoli,Duan Zhengang,Zhang Yi
Issue Date:March 2011
pp. 719-722
This paper proposes a design about sewage-source Heat Pump - Remote Monitoring System based on Web access internet configuration software. The main purpose of this design is to achieve the remote monitoring device parameters, and provide data reference for...
 1  2 Next >>