Search For:

Displaying 1-50 out of 53 total
An Empirical Analysis of Spillover Effect of Open-End Fund Industry
Found in: Computational Sciences and Optimization, International Joint Conference on
By Hong Fang Xia, Cong Cong Wang, Gao Feng Li
Issue Date:April 2011
pp. 427-430
We use multiple regression models to analyze the impact of the performance of an open-end fund on the capital inflow of the fund itself and other funds in the same fund family. The empirical study starts from the analysis of correlation of capital inflows ...
 
Study of Image Display with NetCDF Data on WebGIS
Found in: Information Technology and Computer Science, International Conference on
By Xiong Cong-cong, Wang Li-ying
Issue Date:July 2010
pp. 368-371
In order to obtain accurate, specific and timely weather forecasting image information, meteorological department want to issue weather forecast using WebGIS. With ArcGIS, the paper finished image display of the NetCDF(Network Common Data Format) data that...
 
Security Challenges for the Public Cloud
Found in: IEEE Internet Computing
By Kui Ren,Cong Wang,Qian Wang
Issue Date:January 2012
pp. 69-73
Cloud computing represents today's most exciting computing paradigm shift in information technology. However, security and privacy are perceived as primary obstacles to its wide adoption. Here, the authors outline several critical security challenges and m...
 
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
Found in: Distributed Computing Systems, International Conference on
By Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing Lou
Issue Date:June 2011
pp. 393-402
In the emerging cloud computing paradigm, data owners become increasingly motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. For the consideration of user...
 
Secure Ranked Keyword Search over Encrypted Cloud Data
Found in: Distributed Computing Systems, International Conference on
By Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
Issue Date:June 2010
pp. 253-262
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypted before outsourcing, which makes effective data utilization a very challeng...
 
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
Found in: IEEE Transactions on Parallel and Distributed Systems
By Cong Wang,Kui Ren,Jia Wang,Qian Wang
Issue Date:June 2013
pp. 1172-1181
Cloud computing economically enables customers with limited computational resources to outsource large-scale computations to the cloud. However, how to protect customers' confidential data involved in the computations then becomes a major security concern....
 
Is Mobility Always Harmful to Routing Protocol Performance of MANETs
Found in: Cyber-Enabled Distributed Computing and Knowledge Discovery, International Conference on
By Xi Hu, J. K. Wang, C. R. Wang, Cong Wang
Issue Date:October 2010
pp. 108-112
Mobility is a prominent characteristic of MANETs, and is the main factor affecting topology change and route invalidation, which finally leads to increase the design difficulty of effective routing protocol. In this paper, we have studied the impacts of mo...
 
B2DPCA vs B2DLDA: Face Feature Extraction Based on Image Matrix
Found in: Information Technology and Computer Science, International Conference on
By Xiaoguo Wang, Yanbo Wang, Ming Tian, Cong Wang, Xiongwei Zhang
Issue Date:July 2009
pp. 95-98
In this paper, the Bilateral Two-dimensional Principle Component Analysis(B2DPCA) and Bilateral Two-dimensional Linear Discriminant Analysis (B2DLDA) are proposed to extract face feature by directly projecting the image matrix. Experimental results on the ...
 
An Improved Algorithm for CART Based on the Rough Set Theory
Found in: 2013 Fourth Global Congress on Intelligent Systems (GCIS)
By Weiguang Wang,Wanlin Gao,Cong Wang,Jinbin Li
Issue Date:December 2013
pp. 11-15
Data prediction and classification is a critical method in medical nutrition data analysis area. As for the characteristics of being intuitive, efficient and easy to understand, the decision tree algorithm is widely used in this field. However, the classif...
 
Privacy-Preserving Public Auditing for Secure Cloud Storage
Found in: IEEE Transactions on Computers
By Cong Wang,Sherman S.M. Chow,Qian Wang,Kui Ren,Wenjing Lou
Issue Date:February 2013
pp. 362-375
Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that...
 
Towards Secure and Effective Utilization over Encrypted Cloud Data
Found in: Distributed Computing Systems Workshops, International Conference on
By Cong Wang, Qian Wang, Kui Ren
Issue Date:June 2011
pp. 282-286
Cloud computing enables an economic paradigm of data service outsourcing, where individuals and enterprise customers can avoid committing large capital outlays in the purchase and management of both software and hardware and the operational overhead therei...
 
Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations
Found in: Distributed Computing Systems, International Conference on
By Cong Wang, Kui Ren, Jia Wang, Karthik Mahendra Raje Urs
Issue Date:June 2011
pp. 549-558
Cloud computing economically enables customers with limited computational resources to outsource large-scale computations to the cloud. However, how to protect customers' confidential data involved in the computations then becomes a major security concern....
 
Toward Secure and Dependable Storage Services in Cloud Computing
Found in: IEEE Transactions on Services Computing
By Cong Wang,Qian Wang,Kui Ren,Ning Cao,Wenjing Lou
Issue Date:January 2012
pp. 220-232
Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physic...
 
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
Found in: IEEE Transactions on Parallel and Distributed Systems
By Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li
Issue Date:May 2011
pp. 847-859
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Thi...
 
A High Performance, Low-Cost Network Architecture for Data Centers
Found in: Cyber-Enabled Distributed Computing and Knowledge Discovery, International Conference on
By Cong Wang, Cuirong Wang, Ying Yuan
Issue Date:October 2010
pp. 284-287
The goal of data center networking is to interconnect a large number of servers with low equipment cost, high performance and balanced network capacity, and robustness to link and server failures. In this paper, we present a new network interconnection str...
 
Application Research of a Fault Diagnosis Expert System for Cement Kiln Based on .Net Platform
Found in: Intelligent Human-Machine Systems and Cybernetics, International Conference on
By Cong Wang, Shaolin Wang, Guoli Yu, Xuefeng Li
Issue Date:August 2010
pp. 208-212
This paper describes a fault diagnosis expert system for cement kiln developed in the way of integrating the new theories and methods of artificial intelligence and network technology with related production technology. The system can give online fault dia...
 
Cascade Two-dimensional Locality Preserving Projections for Face Recognition
Found in: Circuits, Communications and Systems, Pacific-Asia Conference on
By Xiaoguo Wang,Ming Tian,Cong Wang,Yong Huang,Jun Liu,Xiongwei Zhang
Issue Date:May 2009
pp. 749-751
In this paper, we propose a novel algorithm for face feature extraction, namely the cascade two-dimensional locality preserving projections (C2DLPP), which directly extracts the proper features from image matrices based on locality preserving criterion. Ex...
 
A Text Network Representation Model
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Jianyi Liu, Jinghua Wang, Cong Wang
Issue Date:October 2008
pp. 150-154
Text representation is the basis of text processing. Most current text representation models ignore the words' inter-relations, which result in the loss of text’s structure information. This paper proposed a novel text representation model, which uses lexi...
 
Game Based Dynamical Bandwidth Allocation Model for Virtual Networks
Found in: Information Science and Engineering, International Conference on
By Cong Wang, Cuirong Wang, Ying Yuan
Issue Date:December 2009
pp. 1745-1747
Running multiple virtual networks is a promising way to support diverse applications over a shared substrate. Despite being simple, a static division of bandwidth between virtual networks can be highly inefficient, while dynamic bandwidth allocation perfor...
 
Joint Mobile Data Gathering and Energy Provisioning in Wireless Rechargeable Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Songtao Guo,Cong Wang,Yuanyuan Yang
Issue Date:December 2014
pp. 2836-2852
The emerging wireless energy transfer technology enables charging sensor batteries in a wireless sensor network (WSN) and maintaining perpetual operation of the network. Recent breakthrough in this area has opened up a new dimension to the design of sensor...
 
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
Found in: IEEE Transactions on Parallel and Distributed Systems
By Ning Cao,Cong Wang,Ming Li,Kui Ren,Wenjing Lou
Issue Date:January 2014
pp. 222-233
With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data hav...
 
NETWRAP: An NDN Based Real Time Wireless Recharging Framework for Wireless Sensor Networks
Found in: 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS)
By Ji Li, Cong Wang, Fan Ye, Yuanyuan Yang
Issue Date:October 2013
pp. 173-181
A mobile vehicle equipped with wireless energy transmission technology can move around a wireless sensor network and recharge nodes over the air, leading to potentially perpetual operation if nodes can always be recharged before energy depletion. When to r...
 
An Improved Off-Line Electronic Cash Scheme
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Cong Wang,Hongxiang Sun,Hua Zhang,Zhengping Jin
Issue Date:June 2013
pp. 438-441
With the development of the electronic commerce (e-commerce), the untraceable electronic cash is an attractive payment tool for e-commerce, because its anonymity property can ensure the privacy of spenders. Recently, Ziba et al. proposed a new untraceable ...
 
Multi-vehicle Coordination for Wireless Energy Replenishment in Sensor Networks
Found in: 2013 IEEE International Symposium on Parallel & Distributed Processing (IPDPS)
By Cong Wang,Ji Li,Fan Ye,Yuanyuan Yang
Issue Date:May 2013
pp. 1101-1111
Mobile vehicles equipped with wireless energy transmission technology can recharge sensor nodes over the air. When to recharge which nodes, and in what order, critically impact the network performance. So far only a few works have studied the recharging po...
 
A Practical System for Privacy-Preserving Collaborative Filtering
Found in: 2012 IEEE 12th International Conference on Data Mining Workshops
By Richard Chow,Manas A. Pathak,Cong Wang
Issue Date:December 2012
pp. 547-554
Collaborative filtering is a widely-used technique in online services to enhance the accuracy of a recommender system. This technique, however, comes at the cost of users having to reveal their preferences, which has undesirable privacy implications. We pr...
 
A Novel Blind Evaluation Method on Image Scrambling Degree
Found in: 2012 Eighth International Conference on Computational Intelligence and Security (CIS)
By Congli Wang,Zhibin Chen,Mingxi Xue,Chao Zhang
Issue Date:November 2012
pp. 631-635
Most of the algorithms for evaluating image scrambling degree depend on the plain image and they cannot achieve blind evaluation. This paper indicates that the ideal scrambled image is similar to the uniform noise in spatial domain, advances a definition o...
 
The Reader Design of Intelligent Community Management on RFID and GSM
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Jie Zhao,Cong Wang
Issue Date:August 2012
pp. 302-304
To solve the problem that temporary users enter community need managers to record information and that increases their workload. We design a reader system combine radio frequency identification (RFID) and global system of mobile communication (GSM). Using ...
 
Greedy Algorithms, Ordering of Variables, and d-degenerate Instances
Found in: Multiple-Valued Logic, IEEE International Symposium on
By Cong Wang,Andrei A. Bulatov
Issue Date:May 2012
pp. 31-36
We consider the MAX-2-SAT problem on d-degenerate formulas. This class of 2-CNFs is a generalization of 2-CNFs of bounded tree width. We first show that the class of d-degenerate formulas is very broad, since random formulas can be shown to be d-degenerate...
 
Parallelizing and Optimizing H.264 on Synchronous Data Triggered Architecture
Found in: Computer Science and Electronics Engineering, International Conference on
By Liu Cong,Wang Zhiying,Lai Xin,Gan Xinbiao,Chen Fangyuan
Issue Date:March 2012
pp. 185-190
Synchronous data triggered architecture (SDTA) is advantaged with high-performance, flexible scalability, low-cost communication between processor elements. With the prevalence of multimedia nowadays, it is significant to parallelize and optimize the imple...
 
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
Found in: IEEE Transactions on Parallel and Distributed Systems
By Cong Wang,Ning Cao,Kui Ren,Wenjing Lou
Issue Date:August 2012
pp. 1467-1479
Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive cloud data have to be encrypted before outsourced to the commercial public cloud, which makes effective data utilization service a ve...
 
Study of Experiment Structure in the Computer Networks Course Using PBL Methodology
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Li Cheng,Cong Wang
Issue Date:November 2011
pp. 1294-1297
In the computer networks course, experiments are critical complements to lectures. Experiments help students understand how networks and protocols work and learn how to build and manage networks in practice. Problem-solving skills are also developed from e...
 
Virtual Network Mapping with Traffic Matrices
Found in: Symposium On Architecture For Networking And Communications Systems
By Cong Wang,Tilman Wolf
Issue Date:October 2011
pp. 225-226
Network virtualization allows multiple logical networks to coexist on the same physical infrastructure. A key problem that needs to be solved in this context is management of substrate network resources, in particular when mapping virtual network requests ...
 
The Road Impacts on the River Landscape in a Typical Valley in Yunnnan Province
Found in: Asia-Pacific Power and Energy Engineering Conference
By Shiliang Liu, Cong Wang, Juejie Yang, Li Deng, Qinghe Zhao
Issue Date:March 2011
pp. 1-4
NA
 
A New Hierarchical Key AuthData Management Scheme for Trusted Platform
Found in: Multimedia Information Networking and Security, International Conference on
By Weiping Peng, Yajian Zhou, Cong Wang, Yixian Yang, Yuan Ping
Issue Date:November 2010
pp. 463-467
The purpose of TPM authorization mechanism is to authenticate the owner of a TPM or to authorize the use of an instance of a TPM capability. The TPM treats knowledge of the AuthData as complete proof of ownership of the entity. The main specification defin...
 
Research on Direct Power Control Strategy for PWM Rectifier
Found in: Future Power and Energy Engineering, International Conference on
By Zheng Zheng, Cong Wang
Issue Date:June 2010
pp. 95-98
The traditional direct power control (DPC) strategy exits the problems that the switching frequency is not fixed, the sampling frequency is high and so on. To combat these problems, a control system of improved virtual-flux control strategy with DPC (VF-DP...
 
Application of Hardware-in-Loop Simulation in Flaw Detection via Eddy Current
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Haorui Liu, Changxin Nai, Cong Wang, Jing Fan, Yuqiang Liu
Issue Date:March 2010
pp. 630-633
Inspired by spiral development method in software engineering, we explore a new top-down design method in Matlab environments. Data acquisition and data-out devices which can work in Matlab environments are designed, including the digital filter and cohere...
 
Errata to “Isosurface Extraction and View-Dependent Filtering from Time-Varying Fields Using Persistent Time-Octree (PTOT)”
Found in: IEEE Transactions on Visualization and Computer Graphics
By Cong Wang, Yi-Jen Chiang
Issue Date:March 2010
pp. 350-351
No summary available.
 
Passive NATted Hosts Detect Algorithm Based on Directed Acyclic Graph Support Vector Machine
Found in: Multimedia Information Networking and Security, International Conference on
By Rui Li, Hongliang Zhu, Yang Xin, Shoushan Luo, Yixian Yang, Cong Wang
Issue Date:November 2009
pp. 474-477
Unauthorized network address translation (NAT) devices may be a significant security problem. They provide unrestricted access to any number of hosts connecting to them. Some attackers may use computers hidden behind NAT devices to conduct malicious activi...
 
Isosurface Extraction and View-Dependent Filtering from Time-Varying Fields Using Persistent Time-Octree (PTOT)
Found in: IEEE Transactions on Visualization and Computer Graphics
By Cong Wang, Yi-Jen Chiang
Issue Date:November 2009
pp. 1367-1374
We develop a new algorithm for isosurface extraction andview-dependent filtering from large time-varying fields, by using anovel Persistent Time-Octree (PTOT) indexingstructure. Previously, the Persistent Octree (POT) was proposed toperform isosurface extr...
 
VAOFS: A Verifiable Append-Only File System for Regulatory Compliance
Found in: Grid and Cloud Computing, International Conference on
By Da Xiao, Wenbin Yao, Chunhua Wu, Cong Wang, Yixian Yang
Issue Date:August 2009
pp. 325-330
Append-only file systems, with which data can only be updated in an append-only manner, are of great importance to the regulatory compliance requirements for storing immutable data. However, existing approaches fail to provide the verifiability of the appe...
 
A Hybrid Improved Ant Colony Optimization and Random Forests Feature Selection Method for Microarray Data
Found in: Networked Computing and Advanced Information Management, International Conference on
By Wen Xiong, Cong Wang
Issue Date:August 2009
pp. 559-563
Microarray gene expression data have been used in cancer discovery and prediction characterized by their small samples and large dimensionality. This paper proposes a hybrid method based on improved Ant Colony Optimization (ACO) and Random Forests (RF) for...
 
Feature Selection: A Hybrid Approach Based on Self-Adaptive Ant Colony and Support Vector Machine
Found in: Computer Science and Software Engineering, International Conference on
By Wen Xiong,Cong Wang
Issue Date:December 2008
pp. 751-754
Ant Colony Optimization (ACO) is a kind of bionic swarm intelligence algorithm belongs to artificial intelligence (AI) field and has been successfully applied in resolving complex optimization problems. Support vector machine (SVM) is a new machine learnin...
 
The Building of Chinese Emotion Thesaurus Using HowNet Based on the Main Sememe
Found in: International Conference on Natural Computation
By Bin Liu, Fuji Ren, Cong Wang
Issue Date:October 2008
pp. 91-95
We propose a novel, convenient way for the building of emotion thesaurus which can be used in assessing the affective qualities of natural languages contained in text. Our main goals are fast analysis and visualization of affective content for machines to ...
 
Automatic Technical Term Extraction Based on Term Association
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Miao Wan, Song Liu, Jian-Yi Liu, Cong Wang
Issue Date:October 2008
pp. 19-23
This paper proposes a new automatic Chinese term extracting algorithm combining both statistics-based and rule-based methods. This algorithm firstly uses a statistical method to extract two-word candidates from raw corpus, and then extends these candidates...
 
Research on Web QoS Control Strategy Based on User Behaviour
Found in: Web-Age Information Management, International Conference on
By Xiaolei Guo, Zhiguang Shan, Cong Wang
Issue Date:July 2008
pp. 564-568
This paper proposes a new Web QoS control strategy based on user behavior. Web QoS control strategy mainly include request classification, admission control, content adaptation technologies. The approach we take to Web QoS control first analyzes user acces...
 
An Internet Traffic Forecasting Model Adopting Radical Based on Function Neural Network Optimized by Genetic Algorithm
Found in: International Workshop on Knowledge Discovery and Data Mining
By Cong Wang, Xiaoxia Zhang, Han Yan, Linlin Zheng
Issue Date:January 2008
pp. 367-370
Traditional traffic forecasting model is hard to show non-liner characteristic of Internet. Neural networks and genetic algorithm are representatives of modern algorithms. Considering that BP neural networks model is easy to take local convergence, this pa...
 
Linear Decision Fusions in Multilayer Perceptrons for Breast Cancer Diagnosis
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Yunfeng Wu, Jinming Zhang, Cong Wang, Sin Chun Ng
Issue Date:November 2005
pp. 699-700
We introduce a non-parametric linear decision fusion called Perceptron Average (PA) for breast cancer diagnosis. We concretely compare the accuracy between both two fusion strategies for breast cancer diagnosis. The PA fusion demonstrates a higher overall ...
   
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Miao Zhao,Yuanyuan Yang,Cong Wang
Issue Date:July 2014
pp. 1
In this paper, a three-layer framework is proposed for mobile data collection in wireless sensor networks, which includes the sensor layer, cluster head layer, and mobile collector (called SenCar) layer. The framework employs distributed load balanced clus...
 
V-OpenCL: a method to use remote GPGPU
Found in: Proceedings of the 27th international ACM conference on International conference on supercomputing (ICS '13)
By Cong Wang, Rui Hou
Issue Date:June 2013
pp. 493-494
GPGPU can boost the performance significantly for many compute intensive tasks. However, in datacenter scenarios, not all the applications need GPGPU. Thus, it is not necessary to equip GPGPU in each node considering its high price and infrequent usage dem...
     
Experimental evaluation of an adiabiatic quantum system for combinatorial optimization
Found in: Proceedings of the ACM International Conference on Computing Frontiers (CF '13)
By Catherine C. McGeoch, Cong Wang
Issue Date:May 2013
pp. 1-11
This paper describes an experimental study of a novel computing system (algorithm plus platform) that carries out quantum annealing, a type of adiabatic quantum computation, to solve optimization problems. We compare this system to three conventional softw...
     
 1  2 Next >>