Search For:

Displaying 1-50 out of 140 total
Reconstruction of Transcriptional Regulatory Networks by Stability-Based Network Component Analysis
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Xi Chen,Jianhua Xuan,Chen Wang,Ayesha N. Shajahan,Rebecca B. Riggins,Robert Clarke
Issue Date:November 2013
pp. 1347-1358
Reliable inference of transcription regulatory networks is a challenging task in computational biology. Network component analysis (NCA) has become a powerful scheme to uncover regulatory networks behind complex biological processes. However, the performan...
 
Throughput Enhancement through Selective Time Sharing and Dynamic Grouping
Found in: 2013 IEEE International Symposium on Parallel & Distributed Processing (IPDPS)
By Junliang Chen,Bing Bing Zhou,Chen Wang,Peng Lu,Penghao Wang,Albert Y. Zomaya
Issue Date:May 2013
pp. 1183-1192
Space sharing approaches are widely used in job scheduling for HPC systems. The main drawback of these approaches is the blocking of short jobs, which results in low throughput. The research on gang scheduling has shown the potential of time sharing in imp...
 
Modelling Collaborative Services for Business and QoS Compliance
Found in: Web Services, IEEE International Conference on
By Jinhui Yao,Shiping Chen,Chen Wang,David Levy,John Zic
Issue Date:July 2011
pp. 299-306
In recent years, we witnessed a range of innovations in the ¡®service' related technologies, such as Software as a Service, Platform as a Service and Infrastructure as a Service. Along with the Service Oriented Architecture, companies can wrap their tech...
 
A Distributed Localization System Based on Phase Measurement for Wireless Sensor Networks
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Chen Wang, Wei Han, Qinye Yin, Wenjie Wang, Jie Chen
Issue Date:April 2009
pp. 505-508
We present a localization system based on phase measurement for wireless sensor networks. The system features at least 3 anchor nodes with known locations. The anchor nodes broadcast synchronized reference signal to the location-unknown user nodes. The use...
 
Multi-attribute Decision-Making Model Based on Grey Game Theory with Mixed Strategy
Found in: Advanced Computer Control, International Conference on
By Chen Wang, Jun Chen
Issue Date:January 2009
pp. 752-756
As for the multi-attribute decision-making problem, most common methods used based on AHP are imprecise and complicated for taking weights of indices into account. The paper introduces game theory avoiding the discussion of weights which are inevitable in ...
 
Biomarker Identification by Knowledge-Driven Multi-Level ICA and Motif Analysis
Found in: Machine Learning and Applications, Fourth International Conference on
By Li Chen, Chen Wang, Ie-Ming Shih, Tian-Li Wang, Zhen Zhang, Yue Wang, Robert Clarke, Eric Hoffman, Jianhua Xuan
Issue Date:December 2007
pp. 560-566
Many statistical methods often fail to identify biologically meaningful biomarkers related to a specific disease under study from expression data alone. In this paper, we develop a novel strategy, namely knowledge-driven multi-level independent component a...
 
Priority-Based Consolidation of Parallel Workloads in the Cloud
Found in: IEEE Transactions on Parallel and Distributed Systems
By Xiaocheng Liu,Chen Wang,Bing Bing Zhou,Junliang Chen,Ting Yang,Albert Y. Zomaya
Issue Date:September 2013
pp. 1874-1883
The cloud computing paradigm is attracting an increased number of complex applications to run in remote data centers. Many complex applications require parallel processing capabilities. Parallel applications of certain nature often show a decreasing utiliz...
 
Workload Characteristic Oriented Scheduler for MapReduce
Found in: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS)
By Peng Lu,Young Choon Lee,Chen Wang,Bing Bing Zhou,Junliang Chen,Albert Y. Zomaya
Issue Date:December 2012
pp. 156-163
Applications in many areas are increasingly developed and ported using the Map Reduce framework (more specifically, Hadoop) to exploit (data) parallelism. The application scope of Map Reduce has been extended beyond the original design goal which was large...
 
Backfilling under Two-tier Virtual Machines
Found in: 2012 IEEE International Conference on Cluster Computing (CLUSTER)
By Xiaocheng Liu,Chen Wang,Xiaogang Qiu,Bing Bing Zhou,Bin Chen,Albert Y. Zomaya
Issue Date:September 2012
pp. 514-522
The cloud computing paradigm attracts increasing amount of efforts to move high performance parallel applications to run in remote data cenetres. How to balance the performance requirements of parallel applications and the datacentre utilization is essenti...
 
Just Satisfactory Resource Provisioning for Parallel Applications in the Cloud
Found in: 2012 IEEE World Congress on Services (SERVICES)
By Chen Wang,Junliang Chen,Bing Bing Zhou,Albert Y. Zomaya
Issue Date:June 2012
pp. 285-292
The paper discusses a resource management method at the cloud tenant level. It concerns efficiently running a profitable service on resources leased from a cloud infrastructure provider. Particularly, the paper focuses on services that handle parallelizabl...
 
Profiling Applications for Virtual Machine Placement in Clouds
Found in: Cloud Computing, IEEE International Conference on
By Anh Vu Do,Junliang Chen,Chen Wang,Young Choon Lee,Albert Y. Zomaya,Bing Bing Zhou
Issue Date:July 2011
pp. 660-667
Application profiling is an important technique for efficient resource management. The decision making of scheduling and resource allocation typically takes great advantage of such a technique primarily for improving resource utilization. With the advent o...
 
Extended XML Tree Pattern Matching: Theories and Algorithms
Found in: IEEE Transactions on Knowledge and Data Engineering
By Jiaheng Lu, Tok Wang Ling, Zhifeng Bao, Chen Wang
Issue Date:March 2011
pp. 402-416
As business and enterprises generate and exchange XML data more often, there is an increasing need for efficient processing of queries on XML data. Searching for the occurrences of a tree pattern query in an XML database is a core operation in XML query pr...
 
Accountability as a Service for the Cloud
Found in: Services Computing, IEEE International Conference on
By Jinhui Yao, Shiping Chen, Chen Wang, David Levy, John Zic
Issue Date:July 2010
pp. 81-88
Computing resource provisioning through the use of the Cloud computing paradigm has triggered revolutions in modern day computing. It is a new paradigm for deploying services on rented machines. On the other hand, Service Oriented Architecture (SOA) has ga...
 
Accountability as a Service for the Cloud: From Concept to Implementation with BPEL
Found in: Services, IEEE Congress on
By Jinhui Yao, Shiping Chen, Chen Wang, David Levy, John Zic
Issue Date:July 2010
pp. 91-98
The emergence of computing resource provisioning known as the Cloud has revolutionized the modern day computing. It has provided a cheap and yet reliable alternative computing platform for whoever with huge needs for computing resources. Moreover, its char...
 
Optimal Control of Auxiliary Service Queueing System
Found in: Genetic and Evolutionary Computing, International Conference on
By Xia Chen, Chen Wang
Issue Date:October 2009
pp. 773-776
We consider an M/M/1 queueing system with auxiliary service in addition to primary service. When the auxiliary service is requested, the server allocates part of its capacity to process the additional service. We show that the possible optimal auxiliary ca...
 
A Contract-Based Accountability Service Model
Found in: Web Services, IEEE International Conference on
By Chen Wang, Shiping Chen, John Zic
Issue Date:July 2009
pp. 639-646
As growing number of real-world activities are performed through Internet connected services, there are increasing needs to make the behaviors of both service consumer and provider accountable. Many efforts attempting to regulate services and to guarantee ...
 
An Evaluation of Comparison between Multivariate Fuzzy Time Series with Traditional Time Series Model for Forecasting Taiwan Export
Found in: Computer Science and Information Engineering, World Congress on
By Hsien-Lun Wong, Yi-Hsien Tu, Chi-Chen Wang
Issue Date:April 2009
pp. 462-467
Fuzzy Time Series methods have been applied for forecasting problems for over one decade. In this paper, we evaluate the forecasting accuracy by comparing three popular multivariate Fuzzy Time Series models (MFTS) with two Traditional Time Series models. T...
 
Set Pair Analysis for Mass Transit Grey Model Selection
Found in: Intelligent Computation Technology and Automation, International Conference on
By Chen Wang, Jun Chen
Issue Date:October 2008
pp. 693-697
The mass rapid transit system is essential both to rational utilization of the economical resource and optimization of overall arrangement of urban land use. Choice models diffusely used in China now are largely based on the certain values which fall short...
 
Facilitating Dynamic Collaborations with eContract Services
Found in: Web Services, IEEE International Conference on
By Shiping Chen, Surya Nepal, Chen Wang, John Zic
Issue Date:September 2008
pp. 521-528
Electronic Contract (eContract) has been recognized as a good combination of technical specification and legal documentation for establishing and regulating virtual organizations built for dynamic collaborations. This paper presents a design and implementa...
 
Service Differentiation for Business Process by Value Based Service Scheduling
Found in: Web Services, IEEE International Conference on
By Chen Wang, Qiming Tian, Xiaoyan Chen, Chun Ying
Issue Date:September 2008
pp. 830-831
Service differentiation is a practical approach for service provider to deliver “good” service quality to different customers or customer segments under limited computing resources. In this paper, we address the problem of differentiating business process ...
 
Game Theory Choice Model for Public Transportation Priority ? Take Nanjing for Example
Found in: Power Electronics and Intelligent Transportation System, Workshop on
By Chen Wang, Jun Chen
Issue Date:August 2008
pp. 423-429
Public transportation priority is the most effective way to improve the efficiency of the public transportation which is the most important part of the urban transportation. For the choice of the Public transportation priority, the methods usually used now...
 
Notice of Retraction A Subjective Trust Model Based on Two-Dimensional Measurement
Found in: 2009 International Conference on Computer Engineering and Technology (ICCET 2009)
By Chang Chaowen, Liu Chen, Wang Yuqiao
Issue Date:January 2009
pp. 37-41
Notice of Retraction After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles. We hereby retract the content of this paper. Reas...
 
A Self-Organizing Search Engine for RSS Syndicated Web Contents
Found in: Data Engineering Workshops, 22nd International Conference on
By Ying Zhou, Xin Chen, Chen Wang
Issue Date:April 2006
pp. 52
The exponentially growing information published on the Web relies largely on a few major search engines like Google to be brought to the public nowadays. This raises issues such as: 1. how many percents of coverage do these search engines provide for the w...
 
Human Identification Using Temporal Information Preserving Gait Template
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Chen Wang, Junping Zhang, Liang Wang, Jian Pu, Xiaoru Yuan
Issue Date:November 2012
pp. 2164-2176
Gait Energy Image (GEI) is an efficient template for human identification by gait. However, such a template loses temporal information in a gait sequence, which is critical to the performance of gait recognition. To address this issue, we develop a novel t...
 
A Secure Model in Agent-Based Marketplace
Found in: Advanced Information Networking and Applications, International Conference on
By Ying-Hong Wang, Chen-An Wang, Jen-Shium Chiang, Wen-Hung Lo
Issue Date:March 2003
pp. 302
<p>Due to the popularity of broadband network and World Wide Web, network service advances more completely. In spite of lots of network companies suffer deficits, E-Commerce still attracts numerous enterprises to invest in.</p> <p>But con...
 
Intelligent Agents in the Nuclear Industry
Found in: Computer
By Huaiqing Wang, Chen Wang
Issue Date:November 1997
pp. 28-34
<p>The Advanced Plant Analysis and Control System introduces intelligent agents into the operation of a modern nuclear operating environment. APACS was designed to demonstrate the benefits of introducing intelligent agent technology into the real-tim...
 
Delay and Capacity Analysis in MANETs with Correlated Mobility and
Found in: IEEE Transactions on Parallel and Distributed Systems
By Chen Wang,Baoliu Ye,Xiaoliang Wang,Song Guo,Sanglu Lu
Issue Date:November 2014
pp. 2829-2839
Many studies have presented the order sense results of information transmission capacity and packet delivery delay in mobile ad hoc networks (MANETs). To achieve the fundamental understanding of MANETs, we focus on deriving the closed-form expressions of t...
 
A New Ring Signature Scheme from NTRU Lattice
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Chen Wang,Huaixi Wang
Issue Date:August 2012
pp. 353-356
In this paper, we propose a new lattice-based ring signature scheme which security can be reduced to a well-known signature scheme, NTRUSign. This new ring signature greatly decreases the key space and the signature length comparing with the existing latti...
 
The Research on Software Test Pattern
Found in: Future Computer Sciences and Application, International Conference on
By Wang Yi-chen, Wang Yi-kun
Issue Date:June 2011
pp. 109-113
the purpose to introduce PATTERN into software test area is to solve the problem of repeatedly tested software and to diminish the uncertainty problem in software test, so that the efficiency and quality of software test will be improved. This paper will i...
 
Dynamic network visualization in 1.5D
Found in: 2011 IEEE Pacific Visualization Symposium (PacificVis)
By Lei Shi, Chen Wang, Zhen Wen
Issue Date:March 2011
pp. 179-186
The dynamic network visualization has been a challenging topic due to the complexity introduced by the extra time dimension. Existing solutions to this problem are usually good for the overview and presentation, but not for the interactive analysis. We pro...
 
Study on the Inaccuracies of Air Velocity Measured by Pitots with Different Outer Diameter in a Air Duct
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Wu Hubiao, Zou Zhijun, Huang Chen, Wang Fei, Li Hao, Wang Zhongchao
Issue Date:February 2011
pp. 1815-1818
The inaccuracies for air velocity measured by Pitots with different diameter have been demonstrated by several experiments. It is defined that the measurement ranges of air velocity by Pitots with different outer diameter. Experiments show that: measuremen...
 
Computational Analysis of Muscular Dystrophy Sub-types Using a Novel Integrative Scheme
Found in: Machine Learning and Applications, Fourth International Conference on
By Chen Wang, Sook Ha, Yue Wang, Jianhua Xuan, Eric Hoffman
Issue Date:December 2010
pp. 287-292
To construct biologically interpretable features and facilitate Muscular Dystrophy (MD) sub-types classification, we propose a novel integrative scheme utilizing PPI network, functional gene sets information, and mRNA profiling. The workflow of the propose...
 
A Composite Kernel Regression Method Integrating Spatial and Gray Information for Infrared Small Target Detection
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Yanfeng Gu, Chen Wang, Baoxue Liu, Zhenlin Liu, Ye Zhang
Issue Date:September 2010
pp. 1095-1098
Small target detection in infrared imagery with complex background is always an important task in infrared target tracking system. Complex clutter background usually results in serious false alarm because of low contrast of infrared imagery. In this paper,...
 
Study on High-tech Industry's Innovative Capacity of East China
Found in: International Conference on E-Business and E-Government
By Yan Zhao,Chen Wang,Ruibo Zhou
Issue Date:May 2010
pp. 1242-1245
High-tech industry acts as a strong radiating role in national economy. This paper builds an index system to evaluate the innovative capacity of high-tech industry after literature review. Then it applies Factor Analysis and Cluster Analysis to empirically...
 
The Impact of Venture Capital on Firms' Accounting Performance - Taking Chinese Listed Companies in SME Board as Examples
Found in: International Conference on E-Business and E-Government
By Yan Zhao,Yujun Xiao,Chen Wang
Issue Date:May 2010
pp. 1271-1276
This paper analyzes the impact of venture capital on accounting performance of the firms, taking 66 Chinese listed companies in SME Board of Shenzhen Stock Exchange as examples. Although ANOVA and cross-section regression analysis show no significant diffe...
 
Utilization of Temporal Continuity in Video Text Detection
Found in: MultiMedia and Information Technology, International Conference on
By Chen Wang, Hongliang Wang
Issue Date:April 2010
pp. 335-338
In this paper, based on an asteroid filter method, temporal continuity is used in both video text localization and tracking. To utilize the temporal continuity in localization, heuristic thresholding scheme is first designed to pick out strong horizontal, ...
 
Formal Analysis of SET Registration Protocol Based on Strand Space
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Hong Wang, Chen Wang, Weijing Yin
Issue Date:December 2009
pp. 594-598
In this paper, we focus on formal analysis of SET Registration protocol and in order to prove it satisfies two security properties, that is, authentication and secrecy, reasonable method Strand Space is used. First, we describe SET Registration protocol in...
 
A Logic-Based Approach to Web Services Composition and Verification
Found in: Services Part II, IEEE Congress on
By Hongbing Wang, Chen Wang, Yan Liu
Issue Date:September 2009
pp. 103-110
Services composition is a challenging research issue which comprises services composition and verification. Existing solutions focus on either composition or verification. In this paper, we propose such a complete solution using Temporal Logic of Actions (...
 
Design of Aviation Logistics Network for GZARFCAFTA Based on the Gravity Model
Found in: Services Science, Management and Engineering, IITA International Conference on
By Chen Wang, Zhixue Liu, Qiankai Qing, Kunpeng Li, Hua Li
Issue Date:July 2009
pp. 352-357
The objective of this research is to construct aviation logistics network of Guangxi Zhuang Autonomous Region facing to China-ASEAN Free Trade Area (GZARFCAFTA). The gravity model is incorporated in the air nodes evaluation through which the gravitations o...
 
Fetal Electrocardiogram Extraction by Local Projections in Embedding Spaces
Found in: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE
By Mingrong Ren, Chen Wang, Pu Wang, Bin Fang
Issue Date:December 2008
pp. 804-807
Because the difference among mother electrocardio- gram(MECG)' attractors, fetal ECG (FECG)’s and other noise's, a local linear projection technique is presented for extraction FECG from an abdominal ECG recording of a pregnant woman. The basic idea of the...
 
A 3D Model Retrieval System Using the Derivative Elevation and 3D-ART
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Jau-Ling Shih, Ting-Yen Huang, Yu-Chen Wang
Issue Date:December 2008
pp. 739-744
In recent years, the demand for a content-based 3D model retrieval system becomes an important issue. In this study, a novel feature, derivative elevation descriptor (DED), is proposed to extract the exterior information of 3D model. The derivative elevati...
 
Study on the Innovation Process and Synergy Mechanism of Industrial Cluster
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Haiyan Yan, Bo Xu, Chen Wang
Issue Date:December 2008
pp. 372-376
The key to elevate the cluster innovation ability and technical level is to expedite the creation of technical synergy. In this research, a synergy process model of cluster innovation is structured based on the synergetic analysis on the innovation process...
 
A New Approach to Describe Web Services
Found in: Web Intelligence, IEEE / WIC / ACM International Conference on
By Hongbing Wang, Hui Liu, Chen Wang, Patrick Hung
Issue Date:November 2007
pp. 568-571
This paper is based on the theory of Finite State Automata (FSA?s), models a web service as a FSA, extends WSDL for conceptually describing the behaviors of Web services, and introduces the concept of Temporal Logic of Actions (short for TLA) to describe a...
 
Defect Aware Test Patterns
Found in: Design, Automation and Test in Europe Conference and Exhibition
By Huaxing Tang, Gang Chen, Sudhakar M. Reddy, Chen Wang, Janusz Rajski, Irith Pomeranz
Issue Date:March 2005
pp. 450-455
A method to generate test patterns referred to as defect aware test patterns is proposed. Defect aware test patterns have greater ability to detect un-modeled defects. The proposed method can be used with any test generation procedure to improve the effect...
 
Open Source Software Adoption: A Status Report
Found in: IEEE Software
By Huaiqing Wang, Chen Wang
Issue Date:March 2001
pp. 90-95
Because of many misgivings and myths regarding open source's state of maturity, organizations often struggle to make informed software adoption decisions. The authors systematically apply a generally accepted set of requirements-oriented criteria to a repr...
 
Hidden Surfaces: Visibility Determination on Projected Grid Surfaces
Found in: IEEE Computer Graphics and Applications
By Sue-Ling Chen Wang, John Staudhammer
Issue Date:July 1990
pp. 36-43
<p> An algorithm is presented for solving the hidden-line and hidden-surface problems on grid surfaces, such as graphs of bivariate functions specified by their values on a set of grid points. The algorithm is implemented in image space, taking advan...
 
The Comparison between Multivariate Fuzzy Time Series and Traditional Time Series Modeling to Forecasting China Exports
Found in: Innovative Computing ,Information and Control, International Conference on
By Chi-Chen Wang, Yi-Hsien Tu, Hsien-Lun Wong
Issue Date:December 2009
pp. 1487-1490
The paper evaluates three Multivariate Fuzzy Time Series models (MFTS) and traditional times models for the comparison of forecasting accuracy. The data for model test are obtained from State Administration of Foreign Exchange Website, Mainland China, incl...
 
Virt-B: Towards Performance Benchmarking of Virtual Machine Systems
Found in: IEEE Internet Computing
By Kejiang Ye,Zhaohui Wu,Bing Bing Zhou,Xiaohong Jiang,Chen Wang,Albert Y. Zomaya
Issue Date:May 2014
pp. 64-72
Modern cloud computing environments often use virtualization technology to implement resource sharing. However, virtualization incurs performance overheads due to the additional hypervisor layer placed between virtual machines (VMs) and hardware resources....
 
An Online Query Authentication System for Outsourced Databases
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Ying Zhou, Chen Wang
Issue Date:July 2013
pp. 570-577
The cloud computing paradigm moves increasing amount of data across administrative domains to be managed by various outsourced database (ODB) service providers. There needs a means for a data owner to verify the correctness and completeness of query result...
 
Developing a Novel Approach for 3D Visualisation of Tarland
Found in: 2013 17th International Conference on Information Visualisation
By Chen Wang,David Miller,Yang Jiang,Jane Morrice
Issue Date:July 2013
pp. 499-504
The objective of this paper is to report on the development of prototype models for use in raising public awareness of changes in rural areas, focusing on green spaces, and testing responses to scenarios of change. Specifically, the focus is on the design ...
 
 1  2 Next >>