Search For:

Displaying 1-32 out of 32 total
Matrix-based Kernel Principal Component analysis for large-scale data set
Found in: Neural Networks, IEEE - INNS - ENNS International Joint Conference on
By Weiya Shi, Yue-Fei Guo, Xiangyang Xue
Issue Date:June 2009
pp. 2908-2913
Kernel Principal Component Analysis (KPCA) is a nonlinear feature extraction approach, which generally needs to eigen-decompose the kernel matrix. But the size of kernel matrix scales with the number of data points, it is infeasible to store and compute th...
 
Visualizing the Expertise Space
Found in: Hawaii International Conference on System Sciences
By Zan Huang, Hsinchun Chen, Fei Guo, Jennifer Jie Xu, Soushan Wu, Wun-Hwa Chen
Issue Date:January 2004
pp. 10038b
Expertise management systems are being widely adopted in organizations to manage tacit knowledge embedded in employees? heads. These systems have successfully applied many information technologies developed in fields such as information retrieval and docum...
   
Research on Semantic Similarity Calculation of Linked Data Based on Multiple Factors
Found in: 2013 International Conference on Cloud and Green Computing (CGC)
By Zheng Zhi-Yun, Jia Li-Mei, Wang Zhen-Fei, Guo Yi-Ke
Issue Date:September 2013
pp. 358-362
Semantic similarity calculation has been an important role in information retrieval of linked data, so calculation results will directly affect data mining results. To solve the problem of lower computation precision caused by the unity of factors on the r...
 
Development of an in vitro Grafting Method for the Enhancement of Growth of Isolated Shoots and Buds in Soybean (Glycine max L.)
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Ying Liu,Lei Yu,You-Liang Fu,Zhen-Fei Guo,Hai Nian,Yue-Sheng Yang
Issue Date:May 2012
pp. 1003-1006
In most Agro bacterium-mediated soybean transformation systems antibiotics are used for suppressing the growth of the bacteria. However, these antibiotics could also hinder largely the transformed cells, caused the further growth of the resulted buds very ...
 
ES<sup>2</sup>: A cloud data storage system for supporting both OLTP and OLAP
Found in: Data Engineering, International Conference on
By Yu Cao,Chun Chen,Fei Guo,Dawei Jiang,Yuting Lin,Beng Chin Ooi,Hoang Tam Vo,Sai Wu,Quanqing Xu
Issue Date:April 2011
pp. 291-302
Cloud computing represents a paradigm shift driven by the increasing demand of Web based applications for elastic, scalable and efficient system architectures that can efficiently support their ever-growing data volume and large-scale data analysis. A typi...
 
A New Ellipse Detector Based on Hough Transform
Found in: Information and Computing Science, International Conference on
By Han Fei, Guo Yanling, Wang Lili
Issue Date:May 2009
pp. 301-305
In this paper a novel ellipse detector that can be used in real image processing is proposed. Since the drawbacks of standard Hough transform (SHT) and other ellipse detection methods such as least square method require large computation and the large stor...
 
An Improved Generalized Discriminant Analysis for Large-Scale Data Set
Found in: Machine Learning and Applications, Fourth International Conference on
By Weiya Shi, Yue-Fei Guo, Cheng Jin, Xiangyang Xue
Issue Date:December 2008
pp. 769-772
In order to overcome the computation and storage problem for large-scale data set, an efficient iterative method of Generalized Discriminant Analysis is proposed. Because sample vectors cannot explicitly be denoted in kernel space, some mathematical tricks...
 
A Framework for Providing Quality of Service in Chip Multi-Processors
Found in: Microarchitecture, IEEE/ACM International Symposium on
By Fei Guo, Yan Solihin, Li Zhao, Ravishankar Iyer
Issue Date:December 2007
pp. 343-355
The trends in enterprise IT toward service-oriented com- puting, server consolidation, and virtual computing point to a future in which workloads are becoming increasingly di- verse in terms of performance, reliability, and availability requirements. It ca...
 
Efficient Feature Extraction for Image Classification
Found in: Computer Vision, IEEE International Conference on
By Wei Zhang, Xiangyang Xue, Zichen Sun, Yue-Fei Guo, Mingmin Chi, Hong Lu
Issue Date:October 2007
pp. 1-8
In many image classification applications, input feature space is often high-dimensional and dimensionality reduction is necessary to alleviate the curse of dimensionality or to reduce the cost of computation. In this paper, we extract discriminant feature...
 
A New Initial Rotor Position Detection Technology Based on HF Injection and Software PLL
Found in: Innovative Computing ,Information and Control, International Conference on
By Shujin Chen, Baozhu Ma, Zhengyun Ran, Fei Guo, Huade Li
Issue Date:September 2006
pp. 673-677
In order to improve the start performance of electrical vehicles, a new method used to track the initial rotor position is proposed. .is method is based on the high-frequency (HF) voltage model and the software phase locked loop (PLL). After HF voltage sig...
 
Parallel Algorithm for Computing Reversal Distance
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Yi-Fei She, Guo-Liang Chen
Issue Date:December 2005
pp. 950-953
Computing reversal distance of two signed permutations has gained increasing attention over the last decade with the study of genome rearrangements in computational molecular biology. In this paper, we present a parallel algorithm to computing reversal dis...
 
Predicting Cache Space Contention in Utility Computing Servers
Found in: Parallel and Distributed Processing Symposium, International
By Yan Solihin, Fei Guo, Seongbeom Kim
Issue Date:April 2005
pp. 226b
The need to provide performance guarantee in high performance servers has long been neglected. Providing performance guarantee in current and future servers is difficult because fine-grain resources, such as on-chip caches, are shared by multiple processor...
 
Predicting Inter-Thread Cache Contention on a Chip Multi-Processor Architecture
Found in: High-Performance Computer Architecture, International Symposium on
By Dhruba Chandra, Fei Guo, Seongbeom Kim, Yan Solihin
Issue Date:February 2005
pp. 340-351
This paper studies the impact of L2 cache sharing on threads that simultaneously share the cache, on a Chip Multi-Processor (CMP) architecture. Cache sharing impacts threads non-uniformly, where some threads may be slowed down significantly, while others a...
 
NanoPort: An Example for Building Knowledge Portals for Scientific Domains
Found in: Digital Libraries, Joint Conference on
By Jialun Qin, Zan Huang, Yilu Zhou, Michael Chau, Chunju Tseng, Alan Yip, T. Gavin Ng, Fei Guo, Zhi-Kai Chen, Hsinchun Chen
Issue Date:May 2003
pp. 387
We describe the NanoPort (www.nanoport.org) system to demonstrate a general framework of building domainspecific knowledge portals. These portals consolidate diverse information resources and provide rich functionalities to support effective information re...
   
NanoPort: An Example for Building Knowledge Portals for Scientific Domains
Found in: Digital Libraries, Joint Conference on
By Jialun Qin, Zan Huang, Yilu Zhou, Michael Chau, Chunju Tseng, Alan Yip, T. Gavin Ng, Fei Guo, Zhi-Kai Chen, Hsinchun Chen
Issue Date:May 2003
pp. 387
We describe the NanoPort (www.nanoport.org) system to demonstrate a general framework of building domainspecific knowledge portals. These portals consolidate diverse information resources and provide rich functionalities to support effective information re...
   
Research on the Quality Control Method of Urban Engineering Geological Database
Found in: Information Science and Engineering, International Conference on
By Yongzhi Wang, Fei Guo, Liangchen Zhou, Haichao Wang, Cheng Ge
Issue Date:December 2009
pp. 963-966
By studying on the existing theories and methods of database quality control, the characteristics of urban engineering geological database are analyzed, and the topological consistency of spatial data and the logical consistency of attribute data are excav...
 
An Image Encryption Algorithm Based on Scrambling and Substitution Using Hybrid Chaotic Systems
Found in: Computational Intelligence and Security, International Conference on
By Xiang Fei,Guo Xiao-cong
Issue Date:December 2011
pp. 882-885
The paper presents an image encryption algorithm based on two-dimensional (2D) Logistic map and complicated Chua's system. Firstly it utilizes two chaotic sequences generated by 2D Logistic map to scramble a color image, and then uses the chaotic sequences...
 
Supporting Quality of Service in High-Performance Servers
Found in: Parallel and Distributed Processing Symposium, International
By Yan Solihin, Fei Guo, Seongbeom Kim, Fang Liu
Issue Date:March 2007
pp. 318
This paper describes issues that we have analyzed and technology that we have developed in supporting Quality of Service in high-performance servers. More specifically, we target on-chip cache resource allocation and efficiency needed for guaranteeing cert...
 
Parallel proximal support vector machine for high-dimensional pattern classification
Found in: Proceedings of the 21st ACM international conference on Information and knowledge management (CIKM '12)
By Xiangyang Xue, Xingquan Zhu, Yangdong Ye, Yue-Fei Guo, Zhenfeng Zhu
Issue Date:October 2012
pp. 2351-2354
Proximal support vector machine (PSVM) is a simple but effective classifier, especially for solving large-scale data classification problems. An inherent deficiency of PSVM lies on its inefficiency for dealing with high-dimensional data. In this paper, we ...
     
Transfer active learning
Found in: Proceedings of the 20th ACM international conference on Information and knowledge management (CIKM '11)
By Xiangyang Xue, Xingquan Zhu, Yangdong Ye, Yue-Fei Guo, Zhenfeng Zhu
Issue Date:October 2011
pp. 2169-2172
Active learning traditionally assumes that labeled and unlabeled samples are subject to the same distributions and the goal of an active learner is to label the most informative unlabeled samples. In reality, situations may exist that we may not have unlab...
     
Quality of service shared cache management in chip multiprocessor architecture
Found in: ACM Transactions on Architecture and Code Optimization (TACO)
By Fei Guo, Li Zhao, Ravishankar Iyer, Yan Solihin
Issue Date:December 2010
pp. 1-33
The trends in enterprise IT toward service-oriented computing, server consolidation, and virtual computing point to a future in which workloads are becoming increasingly diverse in terms of performance, reliability, and availability requirements. It can be...
     
Transfer incremental learning for pattern classification
Found in: Proceedings of the 19th ACM international conference on Information and knowledge management (CIKM '10)
By Xiangyang Xue, Xingquan Zhu, Yue-Fei Guo, Zhenfeng Zhu
Issue Date:October 2010
pp. 1709-1712
Traditional machine learning methods, such as Support Vector Machines (SVMs), usually assume that training and test data share the same distributions. Due to the inherent dynamic data nature, it is often observed that (1) the volumes of the training data m...
     
On the capacity of k-MPR wireless networks using multi-channel multi-interface
Found in: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly (IWCMC '09)
By Min-You Wu, Ming-Fei Guo, Xinbing Wang
Issue Date:June 2009
pp. 5-6
Multi-packet reception (MPR) offers increased number of concurrent transmissions, which improves the capacity of wireless ad hoc networks. By equipping each node with multiple wireless interface, the transmissions can be separated into different channels a...
     
Characterizing and modeling the behavior of context switch misses
Found in: Proceedings of the 17th international conference on Parallel architectures and compilation techniques (PACT '08)
By Abdulaziz Eker, Fang Liu, Fei Guo, Seongbeom Kim, Yan Solihin
Issue Date:October 2008
pp. 133-133
One of the essential features in modern computer systems is context switching, which allows multiple threads of execution to time-share a limited number of processors. While very useful, context switching can introduce high performance overheads, with one ...
     
QoS policies and architecture for cache/memory in CMP platforms
Found in: Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems (SIGMETRICS '07)
By Don Newell, Fei Guo, Li Zhao, Lisa Hsu, Ramesh Illikkal, Ravi Iyer, Srihari Makineni, Steve Reinhardt, Yan Solihin
Issue Date:June 2007
pp. 25-36
As we enter the era of CMP platforms with multiple threads/cores on the die, the diversity of the simultaneous workloads running on them is expected to increase. The rapid deployment of virtualization as a means to consolidate workloads on to a single plat...
     
An analytical model for cache replacement policy performance
Found in: Proceedings of the joint international conference on Measurement and modeling of computer systems (SIGMETRICS '06/Performance '06)
By Fei Guo, Yan Solihin
Issue Date:June 2006
pp. 1928-1929
Due to the increasing gap between CPU and memory speed, cache performance plays an increasingly critical role in determining the overall performance of microprocessor systems. One of the important factors that a affect cache performance is the cache replac...
     
Fingerprinting relational databases
Found in: Proceedings of the 2006 ACM symposium on Applied computing (SAC '06)
By Deyi Li, Fei Guo, Jianmin Wang
Issue Date:April 2006
pp. 487-492
In this paper, we propose a fingerprinting solution to protect valuable numeric relational data from illegal duplications and redistributions. We introduce a twice-embedding scheme. In the first embedding process, we embed a unique fingerprint to identify ...
     
Space Registration Algorithm Based on Constrictive Total Least Squares
Found in: Intelligent Computation Technology and Automation, International Conference on
By Lei Hu, Yue-song Lin, Yun-fei Guo
Issue Date:May 2010
pp. 359-362
The precision of space registration is generally low with the situation of a big random error in radar network. In the case of neglecting model linearization errors, this shortcoming is due to the fact that the coefficient matrix of measurement equation ex...
 
A Study of Fast Network Self-Healing Mechanism for Distance Vector Routing Protocol
Found in: Multimedia Information Networking and Security, International Conference on
By Bin Wang, Jian-hui Zhang, Yun-fei Guo, Jia Zhou
Issue Date:November 2009
pp. 413-416
In order to improve the survivability of IP networks, this paper presents a fast self-healing mechanism for distance vector routing protocol called FS-DVP.(Fast Self-healing distance vector protocol). The mechanism can dealing with network failures effecti...
 
A Fast Reroute Mechanism for RIP Protocol
Found in: Circuits, Communications and Systems, Pacific-Asia Conference on
By Bin Wang,Jian-hui Zhang,Wen-ping Chen,Yun-fei Guo
Issue Date:May 2009
pp. 74-77
Aiming at the RIP (Routing Information Protocol) can’t dealing with network failures effectively, causing significant forwarding discontinuity after a failure. The drawback with this protocol is that it need to trade off routing stability and forwarding co...
 
A New Anonymous Conference Authentication Scheme Based on Knapsack Problem
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Bin Wang, Yun-fei Guo, Jia Zhou, Jian-hui Zhang
Issue Date:April 2009
pp. 512-515
Considered the especial requirements to protect the identity of the user who join a networks conference, a secure and anonymous conference authentication scheme was proposed which is based on 0/1 Knapsack problem. The security of authentication and anonymi...
 
APVP: An Aggregate-Based Path Verification Routing Protocol for the Ad Hoc Networks
Found in: Computational Intelligence and Security, International Conference on
By Bin Wang, Jian-hui Zhang, Yun-fei Guo
Issue Date:December 2008
pp. 386-390
A Mobile Ad hoc Network (MANET) is a collection of mobile nodes that forms a provisional network dynamically without the aid of any predetermined infrastructure. In particular, the route security is more important. In order to solve the problem several rou...
 
 1