Search For:

Displaying 1-50 out of 180 total
Peregrine: An All-Layer-2 Container Computer Network
Found in: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)
By Tzi-cker Chiueh,Cheng-Chun Tu,Yu-Cheng Wang,Pai-Wei Wang,Kai-Wen Li,Yu-Ming Huang
Issue Date:June 2012
pp. 686-693
ITRI container computer is a modular computer designed to be a building block for constructing cloud-scale data centers. Rather than using a traditional data center network architecture, which is typically based on a combination of Layer 2 switches and Lay...
Task Migration for Energy Conservation in Real-Time Multi-processor Embedded Systems
Found in: Cyber-Enabled Distributed Computing and Knowledge Discovery, International Conference on
By Hwang-Cheng Wang,Cheng-Wen Yao
Issue Date:October 2011
pp. 393-398
In recent years, portable devices and tablet PCs grow fast and become more convenient and mobile. Applications like multimedia, SIP, and 3D movies become more diverse than before. However, the complex architecture and heavy computing demands increase energ...
Energy-Efficient DRX Scheduling for QoS Traffic in LTE Networks
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Kuo-Chang Ting, Hwang-Cheng Wang, Chih-Cheng Tseng, Fang-Chang Kuo
Issue Date:May 2011
pp. 213-218
LTE has been touted as a leading-edge mobile communication technology offering high data rate and low latency. However, with a sophisticated physical layer to boost performance, the processing demand on user equipment (UE) is tremendous, which implies that...
Revisting Tag Collision Problem in RFID Systems
Found in: Parallel Processing, International Conference on
By Lei Yang, Jinsong Han, Yong Qi, Cheng Wang, Yunhao Liu, Ying Cheng, Xiao Zhong
Issue Date:September 2010
pp. 178-187
In RFID systems, the reader is unable to discriminate concurrently reported IDs of tags from the overlapped signals, and a collision happens. Many algorithms for anticollision are proposed to improve the throughput and reduce the latency for tag identifica...
Applying Neural Networks to Consumer-Oriented Product Design
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Yang-Cheng Lin, Chung-Hsing Yeh, Chen-Cheng Wang
Issue Date:November 2009
pp. 497-502
How to create highly-reputable designs and hot-selling products is an essential issue on product design. This paper presents an experimental study to explore the relationship between the consumers’ perceptions and product form elements, using one linear qu...
Investigation on Three Dimensional Image Measurement for Geometrical Parameters of the Cutter
Found in: Intelligent Systems, WRI Global Congress on
By Yung-Cheng Wang, Chien-Cheng Chang, Jui-Chang Lin, Bee-Yin Lee, Wei-Shin Lin
Issue Date:May 2009
pp. 24-27
In this investigation, image measurement technology is applied for development of an image measurement system for geometrical parameters of the cutter. CCD, LED light source, servo motor and x-y bi-axial stage have been integrated in this system. It can be...
PUFFIN: A Novel Compact Block Cipher Targeted to Embedded Digital Systems
Found in: Digital Systems Design, Euromicro Symposium on
By Huiju Cheng, Howard M. Heys, Cheng Wang
Issue Date:September 2008
pp. 383-390
In this paper, we examine the digital hardware design and implementation of a novel compact block cipher, referred to as PUFFIN, that is suitable for embedded applications. An implementation of PUFFIN targeted to ASIC technology is considered. The proposed...
Multi-mode Target Tracking on a Crowd Scene
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Cheng-Chang Lien, Jian-Cheng Wang, Yue-Min Jiang
Issue Date:November 2007
pp. 427-430
Conventional video surveillance systems often have several shortcomings. First, target detection can't be accurate under the light variation environment or clustering backgrounds. Second, multiple targets tracking become difficult on a crowd scene because ...
Are Personalization Systems Really Personal? -- Effects of Conformity in Reducing Information Overload
Found in: Hawaii International Conference on System Sciences
By Jyun-Cheng Wang, Juo-Ping Lin
Issue Date:January 2003
pp. 222c
This study attempts to extend the meaning of personalization and argues that not only personal information needs but also emotional or mental needs aroused by outside influences need to be taken into account. This study introduces a new dimension in the pr...
Constructing Internet Futures Exchange for Teaching Derivatives Trading in Financial Markets
Found in: Computers in Education, International Conference on
By An Sing Chen, Jyun-Cheng Wang, Shu Ching Yang
Issue Date:December 2002
pp. 1392
No summary available.
Network Structure of Innovation: Can Brokerage or Closure Predict Patent Quality?
Found in: Hawaii International Conference on System Sciences
By Jyun-Cheng Wang, Cheng-Hsin Chiang, Shu-Wei Lin
Issue Date:January 2009
pp. 1-10
Patents are important intellectual assets. Approaches to evaluating patent quality are mostly a posteriori uses of factual information of patent quality. This paper examines whether patent quality can be predicted a priori, i.e., at an early stage after a ...
Groupsona: A Method for Discovering the Needs of Social Interaction Embedded Services
Found in: Hawaii International Conference on System Sciences
By Jyun-Cheng Wang, Cheng-Hsin Chiang, Ching-Hui Chang, Pei-Wen Chung
Issue Date:January 2011
pp. 1-11
Service design determines the success of a business operation. How to identify customers' needs and design high-quality services are important issues. Persona has been adopted as a tool for identifying needs of individual users for service design. Its focu...
More Efficient Steganoraphic Embedding and Capacity-Improvement by Generalized Exploiting Modification Direction Method
Found in: Innovative Computing ,Information and Control, International Conference on
By Wen-Chung Kuo, Jiin-Chiou Cheng, Chun-Cheng Wang
Issue Date:December 2009
pp. 1168-1171
Using the EMD method to enhance the capacity of embedding secret message were introduced by ZhangWang and Lee et al., respectively. There are particular characteristics such as good stego-image quality and more embedding capacities in these two schemes. Ho...
SVM-based state transition framework for dynamical human behavior identification
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Chen-Yu Chen, Ta-Cheng Wang, Jhing Fa Wang, Li Pang Shieh
Issue Date:April 2009
pp. 1933-1936
This investigation proposes an SVM-based state transition framework (named as STSVM) to provide better performance of discriminability for human behavior identification. The STSVM consists of several state support vector machines (SSVM) and a state transit...
A Policy Model for Logistics Based on Complex System Theory
Found in: Intelligent Computation Technology and Automation, International Conference on
By Xizhou Zhang, Cheng Wang, Ying Wen, Yi-lu Sun
Issue Date:October 2008
pp. 609-614
Nowadays the logistics system has evolved into an open complex giant system along with the progress in global economics and technology and the era of network, so that more and more factors have to be considered in the constitution of logistics policy. In o...
A diode-based predistortion linearizer for traveling wave tube amplifiers
Found in: IEEE International Vacuum Electronics Conference
By Xin Hu, Gang Wang, Zi-Cheng Wang, Ji-Run Luo
Issue Date:February 2011
pp. 239-240
The simulation and design of a predistortion linearizer based on schottky and varactor diodes are presented. The linearizer is capable of providing different combinations of the amplitude and phase characteristics for the use of the different traveling wav...
A Reversible Steganographic Algorithm for Point-Sampled Geometry
Found in: Intelligent Systems Design and Applications, International Conference on
By Peng-Cheng Wang, Kuo-Chen Wu, Chung-Ming Wang
Issue Date:November 2008
pp. 296-301
This paper proposes a new reversible steganographic algorithm for point-sampled geometry. To the best of our knowledge, our scheme is the first in the literature for recovering the original point-sampled model using little amount of information (two intege...
Segmentation of Cerebral Venous Vessel in SWI Based on Multi-adaptive Threshold with Vessel Enhancement and Background Effects Elimination
Found in: International Conference on Internet Computing in Science and Engineering
By Xiu Xu,Feifei Dou,Cheng Wang,Shi Shuo,Jiejun Chen,Jianrong Xu,Lijun Qian,Xin Huang
Issue Date:April 2012
pp. 107-111
Accurate segmentation and extraction of the cerebral veins in susceptibility weighted MR image is helpful to clinical diagnosis. This paper demonstrates a multi-step combination approach, which uses region dividing method to suppress the high-frequency bac...
Development of two Ka-band high efficiency helix-TWTs at IECAS
Found in: IEEE International Vacuum Electronics Conference
By Ming-Guang Huang, Bao-Liang Hao, Pu-Kun Liu, Wei Liu, Zi-Cheng Wang
Issue Date:February 2011
pp. 457-458
Two new Ka-band traveling wave tubes (TWTs), included a narrow band 40W with 50% efficiency and a 26.5 -- 40GHz 100W with 30% efficiency, has been designed and tested at the Institute of Electronic, Chinese Academy of Sciences (IECAS).
Modified PCNN Model and Its Application to Mixed-Noise Removal
Found in: Innovative Computing and Communication and Asia-Pacific Conference on Information Technology and Ocean Engineering, International Conference on
By Kai He, Shao-Fa Li, Cheng Wang
Issue Date:January 2010
pp. 213-216
Pulse coupled neural networks (PCNN) model is a bionic system. It emulates the behavior of visual cortical neurons of cats and has been extensively applied in image processing. We proposed an adaptive mixed-noise removal algorithm, in this paper, based on ...
A Multi-agent and GIS Based Simulation for Emergency Evacuation in Park and Public Square
Found in: Computational Intelligence and Security, International Conference on
By Bo Yang, Yong-gang Wu, Cheng Wang
Issue Date:December 2009
pp. 211-216
The emergency evacuation is an important measure for the public safety. However, the insufficient facilities and complex environment of parks and public squares make public difficult to evacuation efficiently. This paper presents a new emergency evacuation...
Influencing Factors on the Knowledge Sharing in Transition China
Found in: Intelligent Computation Technology and Automation, International Conference on
By Cheng Wang, Hailin Lan, Hongming Xie
Issue Date:October 2008
pp. 739-742
This study develops an integrated model of commitment to learning, common vision, knowledge sharing and organizational performance. We analyze the model using a structural equation model approach, and 208 manufacturing and service firms in China are select...
Antecedents and Consequences of Knowledge Application on Management of E-Commerce
Found in: Management of e-Commerce and e-Government, International Conference on
By Cheng Wang, Hailin Lan, Hongming Xie
Issue Date:October 2008
pp. 120-123
This study develops an integrated model of trust, open-mindedness, knowledge application and organizational performance. We analyze the model using a structural equation model approach, and 208 manufacturing and service firms in China are selected as the s...
The Ipv6 Deployment and Projects in Taiwan
Found in: Applications and the Internet Workshops, IEEE/IPSJ International Symposium on
By Nen-Fu Huang, Han-Chieh Chao, Reen-Cheng Wang, Whai-En Chen, Tzu-Fang Sheu
Issue Date:January 2003
pp. 157
With the rapid growth of Internet applications, 1A, and 3G wireless communications, the requirement of IP addresses is beyond our imagination. IPv4, the most common Internet protocol we are using today, is unable to satisfy the explosively requirements in ...
Using a Multipath Network for Reducing the Effects of Hot Spots
Found in: IEEE Transactions on Parallel and Distributed Systems
By Mu-Cheng Wang, Howard Jay Siegel, Mark A. Nichols, Seth Abraham
Issue Date:March 1995
pp. 252-268
<p><it>Abstract—</it>One type of interconnection network for a medium to large-scale parallel processing system (i.e., a system with <math><tmath>$2^6$</tmath></math> to <math><tmath>$2^{16}$</tmath&...
Data Center Power Cost Optimization via Workload Modulation
Found in: 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing (UCC)
By Cheng Wang,Bhuvan Urgaonkar,Qian Wang,George Kesidis,Anand Sivasubramaniam
Issue Date:December 2013
pp. 260-263
We formulate optimization problems to study how data centers might modulate their power demands for cost-effective operation taking into account various complexities exhibited by real-world electricity pricing schemes. For computational tractability reason...
A Heuristic Information Based System for People Counting
Found in: Intelligent Human-Machine Systems and Cybernetics, International Conference on
By Xiaohua Wang,Cheng Wang,Jinliang Yao
Issue Date:August 2011
pp. 22-26
In this paper, we present a people counting system by accumulating the moving pixels in a region of interest (ROI) called Virtual Gate frame by frame. The proposed heuristic method is based on pedestrian detection and is used to determine the proportion of...
SFL: Energy-Aware Spline Function Localization Scheme for Wireless Sensor Networks
Found in: Mobile Ad-hoc and Sensor Networks, International Conference on
By Yuanfang Chen, Shaojie Tang, Xiang-Yang Li, Min Gyung Kwak, Cheng Wang, Lei Wang
Issue Date:December 2010
pp. 116-121
Localization problem in wireless sensor networks (WSNs) has been widely studied recently. However, most previous work simply assume that all the nodes stay awake during the localization phase. This assumption clearly overlooks the common scenario that sens...
Research on the Reengineering of Government Business Processes Based on the Environment of E-government
Found in: International Conference on E-Business and E-Government
By Shi-Bo Wang,Cheng Wang,Jian-xiu Yang
Issue Date:May 2010
pp. 4503-4506
By studying the concepts and the relationships of e-government and government business processes, this paper analyzes the necessity and describes the principles and objectives of implementing of government business process reengineering based on the enviro...
An Empirical Study on Privacy and Secure Multi-party Computation Using Exponentiation
Found in: Computational Science and Engineering, IEEE International Conference on
By I-Cheng Wang, Chih-Hao Shen, Kung Chen, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang
Issue Date:August 2009
pp. 182-188
Protocols for secure multi-party computation allow participants to share a computation while each party learns only what can be inferred from their own inputs and the output of the computation. However, the execution time of a secure protocol may be too hi...
Research on Resource Sharing Architecture for Web-Based Education Based on OGSA
Found in: Information Engineering, International Conference on
By Dan Guo, Cheng Wang, Bo Ren, Xulei Wang
Issue Date:July 2009
pp. 445-448
The paper has presented a resource sharing architecture for Web-Based Education based on Open Grid Services Architecture (OGSA) to integrate educational resources and improve resources utilization. Using technologies of the Grid and Web services, the archi...
Feedforward Neural Network Based on Convex Optimization Theory and Its Application on Urban Information Extraction from Remote Sensing Images
Found in: Computing, Communication, Control and Management, ISECS International Colloquium on
By Wenchen Jia, Shiwei Ye, Juanle Wang, Cheng Wang, Xiangyun Jia, Fuyin Li
Issue Date:August 2008
pp. 3-7
According to Young inequality of convex function’s conjugate properties, a new error function is constructed for feedforward neural network. The function is convex to both connection weight value and hidden layer's output, so it has no local minimum points...
Regularized Image Restoration Based on Adaptively Selecting Parameter and Operator
Found in: Pattern Recognition, International Conference on
By Xianjin Wu, Runsheng Wang, Cheng Wang
Issue Date:August 2004
pp. 662-665
Regularization has been widely used in image restoration. However, selection of the regularization parameter and the regularization operator is not solved completely and is still the main difficulty for adaptively regularized image restoration. This paper ...
Ant Colony Optimization for Resource-Constrained Project Scheduling with Generalized Precedence Relations
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Shipeng Luo, Cheng Wang, Jinwen Wang
Issue Date:November 2003
pp. 284
This paper presents an ant colony optimization (ACO) approach to solve the resource-constrained project scheduling problem (RCPSP) with generalized precedence relations (RCPSP-GPR) with the objective of minimizing the project duration. The general ACO is i...
Reconstruction of Ancient Operons From Complete Microbial Genome Sequences
Found in: Computational Systems Bioinformatics Conference, International IEEE Computer Society
By Yuhong Wang, John P. Rose, Bi-Cheng Wang, Dawei Lin
Issue Date:August 2003
pp. 486
No summary available.
The Impact of Rate Adaptation on Capacity-Delay Tradeoffs in Mobile Ad Hoc Networks
Found in: IEEE Transactions on Mobile Computing
By Cheng Wang,Xiang-Yang Li,Changjun Jiang,Huiya Yan
Issue Date:November 2014
pp. 2661-2674
In this paper, we focus on the asymptotic capacity and delay, and their tradeoffs in mobile ad hoc networks (MANETs). As we all know, some fixed rate communication models such as the protocol model and the physical model have been studied in the past. Howe...
A Framework for Amazon EC2 Bidding Strategy under SLA Constraints
Found in: IEEE Transactions on Parallel and Distributed Systems
By Shaojie Tang,Jing Yuan,Cheng Wang,Xiang-Yang Li
Issue Date:January 2014
pp. 2-11
With the recent introduction of Spot Instances in the Amazon Elastic Compute Cloud (EC2), users can bid for resources and, thus, control the balance of reliability versus monetary costs. Mechanisms and tools that deal with the cost-reliability tradeoffs un...
DM-Midware: A Middleware to Enable High Performance Data Mining in Heterogeneous Cloud
Found in: 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)
By Guoyu Ou,Ying Liu,Xinyu Ma,Cheng Wang
Issue Date:November 2013
pp. 70-73
Cloud computing has become a popular high performance computing model where resources are provided as services over the Web. Users are starting to adopt cloud model in data mining applications. However, due to the complexity of parallel/cloud computing, it...
Vegetation Extraction Based on the Visual Characteristics of Plants from Remote Sensing Image
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Chen Renxi,Li Cheng,Wang Chengfang
Issue Date:July 2013
pp. 243-247
In urban planning, the measure and mapping of the green vegetation play an important role. On high resolution remote sensing images, the vegetation can be extracted accurately without any priori knowledge by using the tone characteristics of the image itse...
Scaling Laws of Cognitive Ad Hoc Networks over General Primary Network Models
Found in: IEEE Transactions on Parallel and Distributed Systems
By Cheng Wang,Changjun Jiang,Shaojie Tang,Xiang-Yang Li
Issue Date:May 2013
pp. 1030-1041
We study the capacity scaling laws for the cognitive network that consists of the primary hybrid network (PhN) and secondary ad hoc network (SaN). PhN is further comprised of an ad hoc network and a base station-based (BS-based) network. SaN and PhN are ov...
The Inter-cell Interference Suppression Algorithm Based on the JP-CoMP and Performance Simulation
Found in: 2013 Workshops of International Conference on Advanced Information Networking and Applications (WAINA)
By Weihong Fu,Lili Ma,Cheng Wang,Qingliang Kong,Weixin Tian
Issue Date:March 2013
pp. 528-533
Inter-cell interference is serious in LTE-Advance (LTE-A) system and the existing interference suppression technique cannot solve this issue very well. So Coordinated Multi-Point transmission/reception (CoMP) technology is proposed in LTE-A system. Under t...
Acceldroid: Co-designed acceleration of Android bytecode
Found in: 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO)
By Cheng Wang,Youfeng Wu,Marcelo Cintra
Issue Date:February 2013
pp. 1-10
A hardware/software co-designed processor transparently supports a ubiquitous ISA (e.g. ×86) with diversified and innovative microarchitectural implementations. It leverages co-designed HW features and dynamic binary translation (DBT) SW to morph existing ...
SMARQ: Software-Managed Alias Register Queue for Dynamic Optimizations
Found in: 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)
By Cheng Wang,Youfeng Wu,Hongbo Rong,Hyunchul Park
Issue Date:December 2012
pp. 425-436
Traditional alias analysis is expensive and ineffective for dynamic optimizations. In practice, dynamic optimization systems perform memory optimizations speculatively, and rely on hardware, such as alias registers, to detect memory aliases at runtime. Exi...
Multicast Capacity Scaling Laws for Multihop Cognitive Networks
Found in: IEEE Transactions on Mobile Computing
By Cheng Wang,Shaojie Tang,Xiang-Yang Li,Changjun Jiang
Issue Date:November 2012
pp. 1627-1639
In this paper, we study multicast capacity for cognitive networks. We consider the cognitive network model consisting of two overlapping ad hoc networks, called the primary ad hoc network (PaN) and secondary ad hoc network (SaN), respectively. PaN and SaN ...
SelectCast: Scalable Data Aggregation Scheme in Wireless Sensor Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Cheng Wang,Changjun Jiang,Shaojie Tang,Xiang-Yang Li
Issue Date:October 2012
pp. 1958-1969
In this work, for a wireless sensor network (WSN) of n randomly placed sensors with node density \lambda \in [1,n], we study the tradeoffs between the aggregation throughput and gathering efficiency. The gathering efficiency refers to the ratio of the numb...
Capacity and delay tradeoffs in mobile networks under Gaussian channel model
Found in: 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS)
By Cheng Wang,Xiang-Yang Li,Shaojie Tang,Changjun Jiang
Issue Date:October 2012
pp. 272-280
Extensive efforts have been made to study the asymptotic capacity, delay, and their tradeoffs for large-scale mobile ad hoc networks, under different mobility models and communication models. Majority results adopt the fixed-rate communication model, such ...
On minimum delay duty-cycling protocol in sustainable sensor network
Found in: 2012 20th IEEE International Conference on Network Protocols (ICNP)
By Shaojie Tang,Jie Wu, Guihai Chen, Cheng Wang, Xuefeng Liu,Tao Li,Xiang-Yang Li
Issue Date:October 2012
pp. 1-9
To ensure sustainable operations of wireless sensor networks, environmental energy harvesting has been well recognized as one promising solution for long-term applications. Unlike in battery-powered sensor networks, we are targeting a duty-cycle adjustment...
Optimize Block-Level Cloud Storage System with Load-Balance Strategy
Found in: 2012 26th IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)
By Li Zhou,Yi-Cheng Wang,Ji-Lin Zhang,Jian Wan,Yong-Jian Ren
Issue Date:May 2012
pp. 2162-2167
Cloud storage systems take advantage of distributed storage technology and virtualization technology, to provide virtual machine clients with customizable storage service. They can be divided into two types: distributed file system and block level storage ...
Application of Wavelet Transform in Detecting GABA Levels in Drug-naive Patients with Major Depression Disorder
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Wen Ting Ren,Cheng Wang,Hong Quan,Su Lui,Si Han Chen,Qi Yong Gong
Issue Date:May 2012
pp. 740-743
Gamma amino butyric acid (GABA) is the major inhibitory neurotransmitter in the human brain. Alterations in GABA Level are associated with a variety of neurological and psychiatric disorders. However, noninvasive in vivo measurement of GABA is hindered by ...
A Method to Resolve Weak and Overlapping Signals in Proton Magnetic Resonance Spectroscopy
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Gang Jiang,Hong Quan,Cheng Wang
Issue Date:May 2012
pp. 12-15
In this paper a new method of combining translation invariant (TI) and wavelet-threshold (WT) algorithm to resolve overlapping signals in proton magnetic resonance spectroscopy(1H-MRS) is presented. First, the 1H-MRS spectrum signal was transformed into wa...
 1  2 Next >>