Search For:

Displaying 1-47 out of 47 total
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
Found in: IEEE Transactions on Dependable and Secure Computing
By Jinyuan Sun,Chi Zhang,Yanchao Zhang,Yuguang Fang
Issue Date:March 2011
pp. 295-307
Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensivel...
A Solution to Manage Copyright Information of TV Program Based on Three-Dimensional Model
Found in: Computational Sciences and Optimization, International Joint Conference on
By Haoran Yu, Chi Zhang, Pengzhou Zhang
Issue Date:April 2011
pp. 849-851
This paper proposes a solution to manage copyright information of TV program. We design a three-dimensional model to describe the complete program copyright information. And then we introduce a Copyright Information Management System in detail, named CIMS,...
Exposing Digital Image Forgeries by Using Canonical Correlation Analysis
Found in: Pattern Recognition, International Conference on
By Chi Zhang, Hongbin Zhang
Issue Date:August 2010
pp. 838-841
In this paper, we propose a new method to detect the forgeries in digital images by using photo-response non-uniformity (PRNU) noise features. The method utilizes canonical correlation analysis (CCA) to measure linear correlation relationship between two s...
Design of a DRM System for Electronic Document Publication
Found in: Education Technology and Computer Science, International Workshop on
By Yang Liu, Chi Zhang, PengZhou Zhang
Issue Date:March 2010
pp. 311-314
This paper introduces a DRM system for electronic document publication. Through merging the process of encryption and authentication, and the system can prevent from attacking through reverse engineering to a certain degree. In this system, a part of the e...
A Coverage Inference Protocol for Wireless Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Chi Zhang, Yanchao Zhang, Yuguang Fang
Issue Date:June 2010
pp. 850-864
After a wireless sensor network (WSN) is deployed, sensor nodes are usually left unattended for a long period of time. There is an inevitable devolution of the connected coverage of the WSN due to battery exhaustion of sensor nodes, intended physical destr...
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fang
Issue Date:September 2010
pp. 1227-1239
Vehicular ad hoc network (VANET) can offer various services and benefits to users and thus deserves deployment effort. Attacking and misusing such network could cause destructive consequences. It is therefore necessary to integrate security requirements in...
Implementation of E-commerce in Market-Oriented Cluster Based on Online Agent: A Case Study of Yiwu
Found in: e-Education, e-Business, e-Management and e-Learning, International Conference on
By Xiaodi Zhang, Chi Zhang, Yuzhe Jia
Issue Date:January 2010
pp. 188-192
E-commerce based on the online agent helps the market-oriented cluster overcome growth constraints caused by information overloading. Taking Yiwu as an example, this paper introduces the preconditions for implementing e-commerce in the market-oriented clus...
Digital camera identification based on curvelet transform
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Chi Zhang, Hongbin Zhang
Issue Date:April 2009
pp. 1389-1392
In this paper, A new method is proposed for digital camera identification from its color images using image sensor noise. Currently the proposed camera identification methods use wavelet-based denoising filter to extract the sensor noise feature. However, ...
The Organization and Application of Multimedia information Based on Ontology
Found in: Computational Sciences and Optimization, International Joint Conference on
By Pengzhou Zhang, Xiaogang Yang, Chi Zhang, Yang Li
Issue Date:April 2009
pp. 399-402
In order to use the multimedia sources efficiently, finding the semantic content behind the resources and analyzing them, a framework to uniformly describe multimedia resources is used in this paper by using the theory of ontology. Based on fifteen element...
Defending Against Physical Destruction Attacks on Wireless Sensor Networks
Found in: MILCOM
By Chi Zhang, Yanchao Zhang, Yuguang Fang
Issue Date:October 2006
pp. 1-7
In order to defeat physical destruction attacks on wireless sensor networks, the base station (BS) need have the ability to continuously self-monitor the change of the WSN's coverage performance. In this paper, we propose a secure coverage inference protoc...
Marker-Controlled Perception-Based Mesh Segmentation
Found in: Image and Graphics, International Conference on
By Chi Zhang, Ning Zhang, Chengjun Li, Guoping Wang
Issue Date:December 2004
pp. 390-393
This paper introduces an interactive marker-controlled mesh segmentation algorithm. In many applications, we need to partition a given mesh according to human perception or particular requirements. The algorithm presented in this paper is based on Fast Mar...
Trading Replication Consistency for Performance and Availability: an Adaptive Approach
Found in: Distributed Computing Systems, International Conference on
By Chi Zhang, Zheng Zhang
Issue Date:May 2003
pp. 687
Replication system is one of the most fundamental building blocks of wide-area applications. Due to the inevitable dependencies on wide-area communication, trade-off between performance, availability and replication consistency is often a necessity. While ...
Secure Spatial Top-<i>k</i> Query Processing via Untrusted Location-based Service Providers
Found in: IEEE Transactions on Dependable and Secure Computing
By Rui Zhang,Jingchao Sun,Yanchao Zhang,Chi Zhang
Issue Date:May 2014
pp. 1
This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosive growth of Internet-capable and location-aware mobile devices. The system consists of ...
PSaD: A Privacy-Preserving Social-Assisted Content Dissemination Scheme in DTNs
Found in: IEEE Transactions on Mobile Computing
By Linke Guo,Chi Zhang,Hao Yue,Yuguang Fang
Issue Date:December 2014
pp. 2903-2918
Content dissemination is very useful for many mobile applications, like instant messaging, file sharing, and advertisement broadcast, etc. In real life, for various kinds of time-insensitive contents, such as family photos and video clips, the process of c...
GROPING: Geomagnetism and cROwdsensing Powered Indoor NaviGation
Found in: IEEE Transactions on Mobile Computing
By Chi Zhang,Kalyan Subbu,Jun Luo,Jianxin Wu
Issue Date:May 2014
pp. 1
Although a large number of WiFi fingerprinting based indoor localization systems have been proposed, our field experience with Google Maps Indoor (GMI), the only system available for public testing, shows that it is far from mature for indoor navigation. I...
Path Selection under Budget Constraints in Multihop Cognitive Radio Networks
Found in: IEEE Transactions on Mobile Computing
By Miao Pan,Hao Yue,Chi Zhang,Yuguang Fang
Issue Date:June 2013
pp. 1133-1145
Cognitive radio (CR) technology opens the licensed spectrum bands for opportunistic usage and initiates spectrum trading to improve the spectrum utilization. In this paper, we investigate the path selection problem in multihop cognitive radio networks (CRN...
GreenGPU: A Holistic Approach to Energy Efficiency in GPU-CPU Heterogeneous Architectures
Found in: 2012 41st International Conference on Parallel Processing (ICPP)
By Kai Ma,Xue Li,Wei Chen,Chi Zhang,Xiaorui Wang
Issue Date:September 2012
pp. 48-57
In recent years, GPU-CPU heterogeneous architectures have been increasingly adopted in high performance computing, because of their capabilities of providing high computational throughput. However, the energy consumption is a major concern due to the large...
PAAS: A Privacy-Preserving Attribute-Based Authentication System for eHealth Networks
Found in: 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS)
By Linke Guo,Chi Zhang,Jinyuan Sun,Yuguang Fang
Issue Date:June 2012
pp. 224-233
Recently, eHealth systems have replaced paper based medical system due to its prominent features of convenience and accuracy. Also, since the medical data can be stored on any kind of digital devices, people can easily obtain medical services at any time a...
Experimental Study on the Steady Flow in the Carotid Siphon: The Geometric Effect on the Hemodynamics
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Chi Zhang,Shuyu Li,Fang Pu,Xiaoyan Deng,Yubo Fan,Deyu Li,Sheng Xie
Issue Date:May 2012
pp. 264-267
The siphon bend of internal carotid artery (ICA) has been reported as the most preferred location for stenoses. The geometry of the siphon is considered to be associated with the atherosclerotic stenos is. In the present study, the shape of ICA was classif...
Theoretical Derivations of Min-Max Information Clustering Algorithm
Found in: Internet Computing and Information Services, International Conference on
By Chi Zhang,Xu-Lei Yang,Guanzhou Zhao,Jie Wan
Issue Date:September 2011
pp. 128-131
The min-max information (MMI) clustering algorithm was proposed in [8] for robust detection and separation of spherical shells. In current paper, we make efforts to revisit the proposed MMI algorithm theoretically and practically. Firstly, we present the t...
HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare
Found in: Distributed Computing Systems, International Conference on
By Jinyuan Sun, Xiaoyan Zhu, Chi Zhang, Yuguang Fang
Issue Date:June 2011
pp. 373-382
Privacy concern is arguably the major barrier that hinders the deployment of electronic health record (EHR) systems which are considered more efficient, less error-prone, and of higher availability compared to traditional paper record systems. Patients are...
The Capacity of Wireless Ad Hoc Networks Using Directional Antennas
Found in: IEEE Transactions on Mobile Computing
By Pan Li, Chi Zhang, Yuguang Fang
Issue Date:October 2011
pp. 1374-1387
Considering a disk of unit area with n nodes, we investigate the capacity of wireless networks using directional antennas. First, we study the throughput capacity of random directional networks with multihop relay schemes, and find that the capacity gain c...
Thermal Treatment of Coal-Gangue: Activation and Relevant Factors
Found in: Digital Manufacturing and Automation, International Conference on
By Chi Zhang, Xiao-yi Yang, Yong-feng Li
Issue Date:December 2010
pp. 843-848
This paper presents a systematic study of the thermal activation of coal-gangue and factors that influence this process under different conditions. Our samples were tested and analyzed using Differential Thermal Analysis (DTA), X-ray diffraction (XRD), Fou...
Processor affinity and MPI performance on SMP-CMP clusters
Found in: Parallel and Distributed Processing Workshops and PhD Forum, 2011 IEEE International Symposium on
By Chi Zhang, Xin Yuan,Ashok Srinivasan
Issue Date:April 2010
pp. 1-8
Clusters of Symmetric MultiProcessing (SMP) nodes with multi-core Chip-Multiprocessors (CMP), also known as SMP-CMP clusters, are becoming ubiquitous today. For Message Passing interface (MPI) programs, such clusters have a multi-layer hierarchical communi...
Reliability Analysis for Full-2 Code
Found in: Parallel Architectures, Algorithms, and Networks, International Symposium on
By Sheng Lin, Chi Zhang, Gang Wang, Xiaoguang Liu, Jing Liu
Issue Date:December 2009
pp. 454-459
Recently, with the fast development of storage system, 2-erasure coding schemes were widely used in industrial society. To meet different requirements, many kinds of 2-erasure coding schemes were presented, such as Reed-Solomon codes, binary linear codes, ...
An Architecture of Semantic Knowledge System for Biosafety
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Xianggen Wang, Tiejian Luo, Chi Zhang, Wei Liu
Issue Date:August 2009
pp. 178-182
The development and maintenance of domain knowledge based system need a lot of manual operations, and with the increasing amount of contents in the system, it is more and more difficult to find the relevant information. The keyword based search usually can...
Stochastic Traffic Engineering in Multihop Cognitive Wireless Mesh Networks
Found in: IEEE Transactions on Mobile Computing
By Yang Song, Chi Zhang, Yuguang Fang
Issue Date:March 2010
pp. 305-316
In this work, the stochastic traffic engineering problem in multihop cognitive wireless mesh networks is addressed. The challenges induced by the random behaviors of the primary users are investigated in a stochastic network utility maximization framework....
Approach to Worm Detection, Early Warning Based on Local Victim Behavior
Found in: Computer Science and Software Engineering, International Conference on
By Tao Liu, Chi Zhang
Issue Date:December 2008
pp. 880-884
Traditional algorithm to scanning worms early warning cannot be used to distinguish P2P activity which can produce infection-like traffic, it also cannot be used to forecast the multi-vector worms which propagate by exploiting several vulnerabilities. To s...
Decentralized Routing in Nonhomogeneous Poisson Networks
Found in: Distributed Computing Systems, International Conference on
By Chi Zhang, Pan Li, Yuguang Fang, Pramod P. Khargonekar
Issue Date:June 2008
pp. 478-485
In his seminal work, Jon Kleinberg considers a small-world network model consisting of a k-dimensional lattice augmented with shortcuts. Under the assumption that the probability of a shortcut being present between two nodes u and v decays as a power, d(u,...
Fitting Curve Passing through Designated Point to Data for Promoting the Reproducibility of Peripheral Quantitative Computed Tomography (pQCT)
Found in: BioMedical Engineering and Informatics, International Conference on
By Lianwen Sun, Tian Xie, Yubo Fan, Chi Zhang
Issue Date:May 2008
pp. 867-871
The Peripheral quantitative computed tomography (pQCT) is increasingly being used to monitor bone mineral density (BMD) change in both research and clinical practice in order to evaluate the fracture susceptibility in old people or the effect following the...
Throughput Maximization in Multi-channel Wireless Mesh Access Networks
Found in: Network Protocols, IEEE International Conference on
By Yang Song, Chi Zhang, Yuguang Fang
Issue Date:October 2007
pp. 11-20
The throughput maximization problem of wireless mesh access networks is addressed. For the case of cooperative access points, we present a negotiation-based throughput maximization algorithm which adjusts the operating frequency and power level among acces...
A Model Combined Fuzzy Optimum Theory with Analytical Hierarchy Process for Engineering Design
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Chi Zhang, Xumei Song, Wei Li
Issue Date:August 2007
pp. 447-454
Engineering scheme optimization is of particular importance in the concept design process, which involves multiple objectives with uncertainty. Also, the objective set, used to evaluate and select the satisfying alternative, consists of many qualitative an...
A Supervised Algorithm for Fuzzy Multi-criteria Decision Making
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Chi Zhang, Wei Li, Xumei Song, Jianming Wang
Issue Date:August 2007
pp. 77-80
This paper attempts to develop a model for fuzzy multi- criteria decision making under the supervision of subjective preference information. A supervised algorithm, which amalgamates the subjective and objective weights into optimization, and can simultane...
Optimizing Schemas of Flood Control and Disaster Reduction Engineering Based on Variable Fuzzy Sets Theory
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Huicheng Zhou, Wei Li, Chi Zhang
Issue Date:August 2007
pp. 598-603
Due to significance of engineering schemas for flood control and disaster reduction (FCDR), the variable fuzzy sets (VFS) theory is presented and the river network models (MIKE11 and MIKE21) are introduced to calculate and analyze the flood submerging proc...
Asymptotic Connectivity in Wireless Networks Using Directional Antennas
Found in: Distributed Computing Systems, International Conference on
By Pan Li, Chi Zhang, Yuguang Fang
Issue Date:June 2007
pp. 43
Connectivity is a crucial issue in wireless networks. Gupta and Kumar show that with omnidirectional antennas, the critical transmission range for a wireless network to achieve asymptotic connectivity is O(log n n ) if n nodes are uniformly and independent...
An Experimental Approach to Integrating NetFlow Flow-level Records and NLANR Packet-level Traces
Found in: Internet Monitoring and Protection, International Conference on
By Chi Zhang, Bin Liu, Xun Su, Heidi Alvarez, Julio Ibarra
Issue Date:July 2007
pp. 22
In this paper, we investigate the integration of flow-level records (exemplified by Cisco NetFlow) and packet-level traces (exemplified by NLANR PMA), in order to facilitate cross-validation and complementary utility. However, identifying the correspondenc...
CyberBridges A Model Collaboration Infrastructure for e-Science
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Heidi L. Alvarez, David Chatfield, Donald A. Cox, Eric Crumpler, Cassian D'Cunha, Ronald Gutierrez, Julio Ibarra, Eric Johnson, Kuldeep Kumar, Tom Milledge, Giri Narasimhan, S. Masoud Sadjadi, Chi Zhang
Issue Date:May 2007
pp. 65-72
The ?CyberBridges? pilot project is an innovative model for creating a new generation of scientists and engineers who are capable of fully integrating cyberinfrastructure into the whole educational, professional, and creative process of their respective di...
A Communication Virtual Machine
Found in: Computer Software and Applications Conference, Annual International
By Yi Deng, S. Masoud Sadjadi, Peter J. Clarke, Chi Zhang, Vagelis Hristidis, Raju Rangaswami, Nagarajan Prabakar
Issue Date:September 2006
pp. 521-531
The convergence of data, voice and multimedia communication over digital networks, coupled with continuous improvement in network capacity and reliability has significantly enriched the ways we communicate. However, the stovepipe approach used to develop t...
Considering the Energy Consumption of Mobile Storage Alternatives
Found in: Modeling, Analysis, and Simulation of Computer Systems, International Symposium on
By Fengzhou Zheng, Nitin Garg, Sumeet Sobti, Chi Zhang, Russell E. Joseph, Arvind Krishnamurthy, Randolph Y. Wang
Issue Date:October 2003
pp. 36
This paper is motivated by a simple question: what are the energy consumption characteristics of mobile storage design space of multiple dimensions. Two important dimensions alternatives? To answer this question, we are faced with a are the type of storage...
A New Method of Color Image Segmentation Based on Intensity and Hue Clustering
Found in: Pattern Recognition, International Conference on
By Chi Zhang, P. Wang
Issue Date:September 2000
pp. 3617
A new method of color image segmentation is proposed in this paper. It is based on K-means algorithm in HSI space and has the advantage over those based on the RGB space. Both the hue and the intensity components are fully utilized. In the process of hue c...
Fault Analysis-Based Logic Encryption
Found in: IEEE Transactions on Computers
By Jeyavijayan Rajendran,Huan Zhang,Chi Zhang,Garrett S. Rose,Youngok Pino,Ozgur Sinanoglu,Ramesh Karri
Issue Date:October 2013
pp. 1
Globalization of the integrated circuit (IC) design industry is making it easy for rogue elements in the supply chain to pirate ICs, overbuild ICs, and insert hardware trojans. Due to supply chain attacks, the IC industry is losing approximately $4 billion...
A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks
Found in: IEEE Transactions on Mobile Computing
By Linke Guo,Chi Zhang,Jinyuan Sun,Yuguang Fang
Issue Date:September 2014
pp. 1-1
Electronic healthcare (eHealth) systems have replaced paper-based medical systems due to the attractive features such as universal accessibility, high accuracy, and low cost. As a major component of eHealth systems, mobile healthcare (mHealth) applies mobi...
A Dual-Sensor Enabled Indoor Localization System with Crowdsensing Spot Survey
Found in: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS)
By Chi Zhang,Jun Luo,Jianxin Wu
Issue Date:May 2014
pp. 75-82
We present MaWi - a smart phone based scalable indoor localization system. Central to MaWi is a novel framework combining two self-contained but complementary localization techniques: Wi-Fi and Ambient Magnetic Field. Combining the two techniques, MaWi not...
Bringing business intelligence to healthcare informatics curriculum: a preliminary investigation
Found in: Proceedings of the 45th ACM technical symposium on Computer science education (SIGCSE '14)
By Chi Zhang, Guangzhi Zheeng, Lei Li
Issue Date:March 2014
pp. 205-210
Business intelligence (BI) and healthcare analytics are emerging technologies that provide analytical capability to help healthcare industry improve service quality, reduce cost, and manage risks. However, such component on analytical healthcare data proce...
UNFOLD: uniform fast on-line boundary detection for dynamic 3D wireless sensor networks
Found in: Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '11)
By Chi Zhang, Feng Li, Jun Luo, Shiqing Xin, Ying He
Issue Date:May 2011
pp. 1-11
A wireless sensor network becomes dynamic if it is monitoring a time-variant event (e.g., expansion of oil spill in ocean). In such applications, on-line boundary detection is a crucial function, as it allows us to track the event variation in a timely fas...
Technology acceptance in learning settings from a student perspective: a theoretical framework
Found in: Proceedings of the 2010 ACM conference on Information technology education (SIGITE '10)
By Chi Zhang
Issue Date:October 2010
pp. 37-42
As learning and training with internet technologies and web-based distance learning become more and more popular, more emerging technologies are utilized in delivering instructional material to students. User acceptance of technology has been an important ...
Improving TCP smoothness by synchronized and measurement-based congestion avoidance
Found in: Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video (NOSSDAV '03)
By Chi Zhang, Vassilis Tsaoussidis
Issue Date:June 2003
pp. 131-140
In this paper, we observe that although multiplicative decrease is necessary to accomplish fairness in congestion control, it does not inevitably sacrifice system throughput, as long as the system operates between the knee and the cliff, according to an eq...