Search For:

Displaying 1-50 out of 144 total
Design and In-Orbit Test of the Integrated Electronic System Based on General Cell
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Xu Guo-dong, Dong Li-min, Shi Li
Issue Date:September 2010
pp. 920-923
Based on the General Cell concept, proposed a satellite system which integrated on-board computer, attitude and orbit control system and TT&C system into an integrated electronic system, and had carried out In-orbit test on Test Satellite III. The comp...
 
The Research and Implementation of the Collaborative Commerce Platform's Access Control Service
Found in: Computer Science and Information Engineering, World Congress on
By Fan Li-lin, Yue Dong-li, Wang Xiao-dong, Sun Bin
Issue Date:April 2009
pp. 675-678
The access control service has been an important orientation in the security research. In this paper, the essentiality of access control service in the E-Commerce Web was analyzed; the relative technologies were introduced at the same time. And through des...
 
Privacy-Preserving Approximate Convex Hulls Protocol
Found in: Education Technology and Computer Science, International Workshop on
By Youwen Zhu, Liusheng Huang, Wei Yang, Dong Li, Lingjun Li, Yonglong Luo, Fan Dong
Issue Date:March 2009
pp. 208-214
Secure Multi-party Computation has been a research focus for more than two decades. The Convex Hulls problem is a special case of Secure Multi-party Computation. However, the precise convex hulls will certainly expose every vertex and even bring about unfa...
 
A Study on Privacy Preservation for Multi-user and Multi-granularity
Found in: 2013 IEEE 13th International Conference on Data Mining Workshops (ICDMW)
By Dong Li,Xiangmang He,Huahui Chen,Yihong Dong,Yefang Chen
Issue Date:December 2013
pp. 638-645
Currently, all the existing studies with good privacy guarantees focus on a single privacy level. Namely, a certain degree of privacy protection is implemented on all anonymized data released. However, this is not consistent with the actual scene that the ...
 
Recipe for uncovering predictive genes using support vector machines based on model population analysis
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Hong-Dong Li, Yi-Zeng Liang, Qing-Song Xu, Dong-Sheng Cao, Bin-Bin Tan, Bai-Chuan Deng, Chen-Chen Lin
Issue Date:November 2011
pp. 1633-1641
Selecting a small number of informative genes for microarray-based tumor classification is central to cancer prediction and treatment. Based on model population analysis, here we present a new approach, called Margin Influence Analysis (MIA), designed to w...
 
Design and Implementation of XSQS System
Found in: Information Technology and Applications, International Forum on
By Lukai Hong, Dong Li, Ning Gu
Issue Date:May 2009
pp. 385-388
XML (eXtensible Markup Language) has become the standard of data representation and data exchange in the Internet. A highly efficient management on XML documents has become an urgent problem. In this paper, we introduce the development of a native XML data...
 
Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application
Found in: International Workshop on Knowledge Discovery and Data Mining
By Youwen Zhu, Liusheng Huang, Wei Yang, Dong Li, Yonglong Luo, Fan Dong
Issue Date:January 2009
pp. 554-558
Privacy-preserving Data Mining aims at securely extracting knowledge from two or more parties' private data. Secure Multi-party Computation is the paramount approach to it. In this paper, we study Privacy-preserving Add and Multiply Exchanging Technology a...
 
Recipe for Uncovering Predictive Genes Using Support Vector Machines Based on Model Population Analysis
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
By Bai-Chuan Deng, Bin-Bin Tan, Bin-Bin Tan, Chen-Chen Lin, Chen-Chen Lin, Dong-Sheng Cao, Dong-Sheng Cao, Hong-Dong Li, Hong-Dong Li, Qing-Song Xu, Qing-Song Xu, Yi-Zeng Liang, Yi-Zeng Liang
Issue Date:November 2011
pp. 1633-1641
HASH(0x391f150)
     
An Autonomic Performance-Aware Workflow Job Management for Service-Oriented Computing
Found in: Grid and Cloud Computing, International Conference on
By Chenyang Zhao, Shoubo Li, Yi Yang, Junling Wang, Zhen Dong, Li Liu, Lian Li
Issue Date:November 2010
pp. 270-275
Workflow job is composed of several ordered subtasks which invoke different computing services. These computing services are deployed on geographically distributed servers. Towards Workflow Job Management, how to schedule workflow jobs to achieve high serv...
 
The Global Synthetical Processing of Network Security Events
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Yang-ming Ma, Zhi-tang Li, Jie Lei, Li Wang, Dong Li
Issue Date:August 2007
pp. 492-496
This paper presents the global synthetical processing of network security events in Network Security Intelligent Centralized Management System, which aims to build up an integrated management platform for security events management. The system framework an...
 
Reducing False Positives Based on Time Sequence Analysis
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Dong Li, Zhitang Li, Li Wang
Issue Date:August 2007
pp. 67-71
Various IDS devices produce large number of alert, the majority of which are false positives. It is laborious for the security officers to find real intrusions. To find intrusions in real time, we should first remove false positives in the alerts. Accordin...
 
A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Zhi-tang Li, Jie Lei, Li Wang, Dong Li
Issue Date:August 2007
pp. 307-311
A network attack graph provides a global view of all possible sequences of exploits which an intruder may use to penetrate a system. Attack graphs can be gen- erated by model checking techniques or intrusion alert correlation. In this paper we proposed a d...
 
Assessing Attack Threat by the Probability of Following Attacks
Found in: Networking, Architecture, and Storage, International Conference on
By Zhi-tang Li, Jie Lei, Li Wang, Dong Li
Issue Date:July 2007
pp. 91-100
In this paper a novel approach to assessing the threat of network intrusions is proposed. Unlike the present approaches which assess the attack threat either from a backward perspective (how probable a security state can be reached) or from the perspective...
 
Discovering Novel Multistage Attack Patterns in Alert Streams
Found in: Networking, Architecture, and Storage, International Conference on
By Ai-fang Zhang, Zhi-tang Li, Dong Li, Li Wang
Issue Date:July 2007
pp. 115-121
With the growing deployment of network security devices, the large volume of alerts gathered from these devices often overwhelm the administrator, and make it almost impossible to discover complicated multistage attacks in time. It is necessary to develop ...
 
HPPAC Introduction
Found in: 2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW)
By Bronis R. de Supinski,Dong Li
Issue Date:May 2013
pp. 851-852
No summary available.
 
Reconstruction of Signaling Network from Protein Interactions Based on Function Annotations
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Wei Liu,Dong Li,Yunping Zhu,Hongwei Xie,Fuchu He
Issue Date:March 2013
pp. 514-521
The directionality of protein interactions is the prerequisite of forming various signaling networks, and the construction of signaling networks is a critical issue in the discovering the mechanism of the life process. In this paper, we proposed a novel me...
 
Workshop on Collaborative Software Product Line Engineering
Found in: Software Engineering Education and Training, Conference on
By David M. Weiss,Dong Li
Issue Date:April 2012
pp. 77-78
Software Product Line Engineering (SPLE) is a promising process for software development that has started to mature in the past ten years. Early indications are that it provides an improvement in productivity of about 3 to 1 over the software production an...
 
Initiating and Institutionalizing Software Product Line Engineering: From Bottom-Up Approach to Top-Down Practice
Found in: Computer Software and Applications Conference, Annual International
By Dong Li, Carl K. Chang
Issue Date:July 2009
pp. 53-60
A software-intensive company generally grows from one of its remarkable software products. Different approaches adopted by a company will contribute to its future evolution. The approach employed by FISCAN, a leading manufacturer of security inspection sys...
 
TouchableAR: A New Experience of Augmented Reality
Found in: 2013 International Conference on Virtual Reality and Visualization (ICVRV)
By Dong Li,Dongdong Weng,Yuqian Li,Jinghui Xie
Issue Date:September 2013
pp. 37-42
This paper mainly discusses the concept of Touchable AR (Touchable Augmented Reality), introduces how to create a natural tactile experience without the haptic device and introduces how the tactile experience could improve effect of AR system. This paper f...
 
Study of Fermentation Conditions for Bone Meal with the Lactobacillus
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Yong Zuo,Hui Xie,Yang Li,Dong Li,Liping Liu,Feng Qi,Shuai Ju,Jing Zhang
Issue Date:May 2012
pp. 539-542
After the bone meal was fermented by lactobacillus at different temperature, time, inoculation volume and bone concentration, the TCA-NSI and PTA-SN were investigated. Then, orthogonal experiments were adopted to analyze the effect of each factor according...
 
Method of a Fuzzy Cluster Analysis to Evaluate Microbial Enhanced Oil Recovery
Found in: Communication Systems and Network Technologies, International Conference on
By Yongjun Zhou,Jing Wang,Ming Li,Jing Tian,Guang Ji,Hanping Dong,Li Yu
Issue Date:May 2012
pp. 282-284
Fuzzy clustering analysis is a widely used fuzzy mathematics method ,which could be applied in various fields. Based on the fuzzy set theory, application of fuzzy clustering analysis in microbial enhanced oil recovery (MEOR) was studied. At first, strains ...
 
Design and Research on the Control of Biped Robot System Based on RUP
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Meiqiang Zhu,Jun Wang,Ming Li,Dong Li
Issue Date:October 2011
pp. 109-112
According to the task characteristics of biped robots, the overall design of the robot control structure, namely, data acquisition module, the output control module, intelligent decision-making module and communication module. In the data acquisition modul...
 
A Three-Dimensional Variational Analysis Using Sequential Filter
Found in: Computational Sciences and Optimization, International Joint Conference on
By Xinrong Wu, Guijun Han, Dong Li, Wei Li
Issue Date:April 2011
pp. 1016-1020
A three-dimensional variational (3D-Var) data assimilation (DA) scheme which introduces sequential filter is designed to improve state estimation from observations. The sequential filter employed in this new hybrid scheme, operating on the background field...
 
Research on the Impact of Mobile Communications Service Quality for Customer Loyalty
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Li Dong, Li Hongwei, Liu Caijuan
Issue Date:November 2010
pp. 504-507
In recent years, telecom operators have to bear increasingly intense competitive pressure, so how to provide customers with better service to enhance customer satisfaction and loyalty, which has become the first one of the issues that telecom operators fac...
 
Research on Sensitivity Analysis of Operational Effectiveness Based on LS-SVM
Found in: Information and Computing Science, International Conference on
By Guo-Lin Li, Dong Li, Zhao-Hui Qu, Miao Qin
Issue Date:June 2010
pp. 305-309
In efficiency analysis of weapon system, in order to capture and represent the decision maker's preferences and then to select the most desirable alternative, sensitivity analysis method of operational effectiveness based on LS-SVM is proposed. Firstly, th...
 
Client/Server Framework-Based Passenger Line Ticket System Using 2-D Barcode on Mobile Phone
Found in: International Conference on E-Business and E-Government
By Dong Li,Yuhao Wang,Linli Hu,Jing Li,Xuezhao Guo,Jiance Lin,Jie Liu
Issue Date:May 2010
pp. 97-100
Passenger line flow in China is so huge that current ticketing systems cannot be viewed optimistic. After pointing out the disadvantages of existing telephone and web network ticketing systems and further comparing barcode, two-dimensional barcode and RFID...
 
The Correlation Analysis of S and T Policy and Innovation of Hi-tech Enterprises
Found in: Intelligent Computation Technology and Automation, International Conference on
By Jiang Dong, Li Ting, Duan Huifang, Zhang Zhiwei, Li Zhixiang
Issue Date:May 2010
pp. 743-746
S&T policy is an important force to promote innovation and development of high-tech enterprises and an important support to enhance the power and vitality of high-tech enterprises. In this paper, the existing S&T policies will be hackled and those ...
 
Revealing the functional modularity of yeast transcriptional regulatory network by using a novel topological measurement
Found in: Computer Science and Information Technology, International Conference on
By Qijun Liu, Zhenghua Wang, Mansheng Li,Dong Li,Yunping Zhu
Issue Date:August 2009
pp. 267-271
It has been reported that function implementations in biological systems, including transcriptional regulatory networks (TRN), show modular architecture. Analyzing functional modularity of biological networks can describe characteristics of function implem...
 
A Case-Based Component Selection Framework for Mobile Context-Aware Applications
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Fan Dong, Li Zhang, Dexter H. Hu, Cho-Li Wang
Issue Date:August 2009
pp. 366-373
This paper proposes a new semi-reliable multicast algorithm based on the (m, k)-firm scheduling technique, where in each consecutive k window messages sent by a sender, at least m of these messages must be received by the receiver. To assure this restricti...
 
A Practical Solution for Privacy-Preserving Approximate Convex Hulls Problem
Found in: Communications and Mobile Computing, International Conference on
By Dong Li, Liusheng Huang, Wei Yang, Youwen Zhu, Yonglong Luo, Lingjun Li, Zhili Chen
Issue Date:January 2009
pp. 539-544
Convex Hulls Problem is a special case of Privacy-preserving Geometry problems in the inquiry of Secure Multi-Party Computation (SMC). It can be applied in military, commercial and many other fields. However, because of the definition's inherent defect, cu...
 
A Practical Three-Dimensional Privacy-Preserving Approximate Convex Hulls Protocol
Found in: Frontier of Computer Science and Technology, Japan-China Joint Workshop on
By Dong Li, Liusheng Huang, Wei Yang, Youwen Zhu, Yonglong Luo, Zhili Chen, Lingjun Li, Yun Ye
Issue Date:December 2008
pp. 17-23
Convex Hulls Problem is a special case of Privacy-preserving Geometry Problem in the inquiry of Secure Multi-Party Computation. In the past, only in two-dimensional space privacy-preserving convex hulls have been investigated, and there is little focus in ...
 
Processing Intrusion Detection Alerts in Large-scale Network
Found in: Electronic Commerce and Security, International Symposium
By Dong Li, Zhitang Li, Jie Ma
Issue Date:August 2008
pp. 545-548
Intrusion detection system will produce large numbers of alerts, most of which are fasle positives. This paper wants to associate multiple intrusion detection systems in large-scale network to reduce overwhelming false alerts and discover real security eve...
 
Hotness-Aware Sensor Networks
Found in: Distributed Computing Systems, International Conference on
By Dong Li, Yanmin Zhu, Li Cui, Lionel M. Ni
Issue Date:June 2008
pp. 793-800
In a realistic sensor network, in particular with a non-uniform deployment, sensor nodes inevitably have varying workloads. This causes a natural problem that some sensor nodes are subject to excessive power consumption and thus become hot. These hot nodes...
 
Demonstration of a WSN Application in Relic Protection and an Optimized System Deployment Tool
Found in: International Conference on Information Processing in Sensor Networks
By Dong Li, Wei Liu, Ze Zhao, Li Cui
Issue Date:April 2008
pp. 541-542
This paper presents an overview of our demonstration of a real application of a WSN system for relic protection applied in the Forbidden City of China. We briefly introduce the EasiNet hardware platform we have developed and the corresponding mesh-architec...
 
Research on Evaluation Method of Weapon Equipment Based on LS-SVM with Parameters Optimization
Found in: Information Science and Engineering, International Conference on
By Dong Li, Guo-lin Li, Da-sheng Che
Issue Date:December 2009
pp. 4082-4085
In efficiency analysis of weapon system, in order to achieve and represent the preferences of decision maker and make the most optimum selection, an efficiency evaluation method of weapon equipment based on LS-SVM with parameters optimization is proposed. ...
 
Opportunistic Channel Sharingin Cognitive Radio Networks
Found in: IEEE Transactions on Mobile Computing
By Tarun Bansal,Dong Li,Prasun Sinha
Issue Date:April 2014
pp. 852-865
Licensed white space channels can now be used opportunistically by unlicensed users, provided the channels are relinquished when needed by the primary users. In order to maximize their potential, these channels need to be assigned to the secondary users in...
 
RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary Time Partitioning
Found in: IEEE Transactions on Mobile Computing
By Dong Li,Prasun Sinha
Issue Date:February 2014
pp. 263-273
With increasing prevalence of mobile wireless devices with WiFi and Bluetooth capability, new applications that can make use of limited contact opportunities when the devices are physically close are emerging. Proximity-based social networking, and locatio...
 
Motion Interactive System with Omni-Directional Display
Found in: 2013 International Conference on Virtual Reality and Visualization (ICVRV)
By Dong Li,Dongdong Weng,Haiyun Zhou,Jinghui Xie
Issue Date:September 2013
pp. 237-240
Majority of present applications used buttons or touch panels as their human-computer interface. The limitation of these methods is that users can not interact with the equipments in a natural way, since people should operate the equipments according to ce...
 
A Versatile Performance and Energy Simulation Tool for Composite GPU Global Memory
Found in: 2013 IEEE 21st International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS)
By Bin Wang,Yizheng Jiao,Weikuan Yu,Xipeng Shen,Dong Li,Jeffrey S. Vetter
Issue Date:August 2013
pp. 298-302
As a cost-effective compute device, Graphic Processing Unit (GPU) has been widely embraced in the field of high performance computing. GPU is characterized by its massive thread-level parallelism and high memory bandwidth. Although GPU has exhibited tremen...
 
How to implement effective prediction and forwarding for fusable dynamic multicore architectures
Found in: 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA)
By Behnam Robatmili,Dong Li,Hadi Esmaeilzadeh,Sibi Govindan,Aaron Smith,Andrew Putnam,Doug Burger,Stephen W. Keckler
Issue Date:February 2013
pp. 460-471
Dynamic multicore architectures, that fuse and split cores at run time, potentially offer a level of performance/energy agility that static multicore designs cannot achieve. Conventional ISAs, however, have scalability limits to fusion. EDGE-based designs ...
 
Strategies for Energy-Efficient Resource Management of Hybrid Programming Models
Found in: IEEE Transactions on Parallel and Distributed Systems
By Dong Li,Bronis R. de Supinski,Martin Schulz,Dimitrios S. Nikolopoulos,Kirk W. Cameron
Issue Date:January 2013
pp. 144-157
Many scientific applications are programmed using hybrid programming models that use both message passing and shared memory, due to the increasing prevalence of large-scale systems with multicore, multisocket nodes. Previous work has shown that energy effi...
 
The Beam Pumping Unit Synchronization Test Data Analysis and the Application
Found in: 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)
By Sun Dong,Li Wei,Liu Huawei,Zhou Liang
Issue Date:January 2013
pp. 1142-1145
As the prime working character of beam pumping unit dynamometer card and electrical characteristics can be captured by the high speed synchronous data acquisition with the PC as the core. The motion of beam pumping unit can be divided into four quadrant's ...
 
Classifying soft error vulnerabilities in extreme-Scale scientific applications using a binary instrumentation tool
Found in: 2012 SC - International Conference for High Performance Computing, Networking, Storage and Analysis
By Dong Li,Jeffrey S. Vetter,Weikuan Yu
Issue Date:November 2012
pp. 1-11
Extreme-scale scientific applications are at a significant risk of being hit by soft errors on supercomputers as the scale of these systems and the component density continues to increase. In order to better understand the specific soft error vulnerabiliti...
 
Model-based, memory-centric performance and power optimization on NUMA multiprocessors
Found in: 2012 IEEE International Symposium on Workload Characterization (IISWC)
By ChunYi Su,Dong Li,Dimitrios S. Nikolopoulos,Kirk W. Cameron,Bronis R. de Supinski,Edgar A. Leon
Issue Date:November 2012
pp. 164-173
Non-Uniform Memory Access (NUMA) architectures are ubiquitous in HPC systems. NUMA along with other factors including socket layout, data placement, and memory contention significantly increase the search space to find an optimal mapping of applications to...
 
PCM-Based Durable Write Cache for Fast Disk I/O
Found in: 2012 IEEE 20th International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS)
By Zhuo Liu,Bin Wang,Patrick Carpenter,Dong Li,Jeffrey S. Vetter,Weikuan Yu
Issue Date:August 2012
pp. 451-458
Flash based solid-state devices (FSSDs) have been adopted within the memory hierarchy to improve the performance of hard disk drive (HDD) based storage system. However, with the fast development of storage-class memories, new storage technologies with bett...
 
A Comprehensive Model for Evaluation of Carbon Footprint and Greenhouse Gages Emission in Household Biogas Plants
Found in: 2012 Third International Conference on Digital Manufacturing and Automation (ICDMA)
By Jie Zhou,Shubiao Wu,Wanqin Zhang,Changle Pang,Baozhi Wang,Renjie Dong,Li Chen
Issue Date:July 2012
pp. 30-35
Based on Life Cycle Assessment and other related methods, this paper introduced a comprehensive model for the evaluation of the carbon footprint and greenhouse gases emission in household biogas plants including nearly all the processes of the household bi...
 
Distributed Demand and Response Algorithm for Optimizing Social-Welfare in Smart Grid
Found in: 2012 IEEE International Symposium on Parallel & Distributed Processing (IPDPS)
By Qifen Dong,Li Yu,Wen-Zhan Song,Lang Tong,Shaojie Tang
Issue Date:May 2012
pp. 1228-1239
This paper presents a distributed Demand and Response algorithm for smart grid with the objective of optimizing social-welfare. Assuming the power demand range is known or predictable ahead of time, our proposed distributed algorithm will calculate demand ...
 
Identifying Opportunities for Byte-Addressable Non-Volatile Memory in Extreme-Scale Scientific Applications
Found in: 2012 IEEE International Symposium on Parallel & Distributed Processing (IPDPS)
By Dong Li,Jeffrey S. Vetter,Gabriel Marin,Collin McCurdy,Cristian Cira,Zhuo Liu,Weikuan Yu
Issue Date:May 2012
pp. 945-956
Future exascale systems face extreme power challenges. To improve power efficiency of future HPC systems, non-volatile memory (NVRAM) technologies are being investigated as potential alternatives to existing memories technologies. NVRAMs use extremely low ...
 
The Exploration and Practice of Gradually Industrialization Model in Software Engineering Education - A Factual Instance of the Excellent Engineer Plan of China
Found in: Software Engineering Education and Training, Conference on
By Shu Liu,Peijun Ma,Dong Li
Issue Date:April 2012
pp. 23-31
The current education model and practices in the Higher education sector in China have been successful in educating students for academic excellence, for producing industry-linked and practice-oriented graduates, who could quickly fit into the industrial w...
 
Initial Orbit Determination of Space Object Using Space-Based Optical Observations
Found in: Computer Science and Electronics Engineering, International Conference on
By Dong Li,Dongyun Yi
Issue Date:March 2012
pp. 128-132
An algorithm for initial orbit determination of space object using two short arcs from space-based optical observations is implemented and its feasibility is tested by simulation. The concept of attributable is introduced to represent the information in a ...
 
 1  2 Next >>