Search For:

Displaying 1-50 out of 65 total
Improving the Computational Efficiency of Recursive Cluster Elimination for Gene Selection
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Lin-Kai Luo, Deng-Feng Huang, Ling-Jun Ye, Qi-Feng Zhou, Gui-Fang Shao, Hong Peng
Issue Date:January 2011
pp. 122-129
The gene expression data are usually provided with a large number of genes and a relatively small number of samples, which brings a lot of new challenges. Selecting those informative genes becomes the main issue in microarray data analysis. Recursive clust...
 
Target Tracking in Interference Environments Reinforcement Learning and Design for Cognitive Radar Soft Processing
Found in: Image and Signal Processing, Congress on
By Feng Zhou, Deyun Zhou, Geng Yu
Issue Date:May 2008
pp. 73-77
For target tracking in Interference Environments of cognitive radar problem, Extended Karman, Particle filter algorithms etc. are generally used to be regarded as usual solutions to state estimation. Many techniques have been developed to improve performan...
 
Time-Mapping Using Space-Time Saliency
Found in: 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Feng Zhou,Sing Bing Kang,Michael F. Cohen
Issue Date:June 2014
pp. 3358-3365
We describe a new approach for generating regular-speed, low-frame-rate (LFR) video from a high-frame-rate (HFR) input while preserving the important moments in the original. We call this time-mapping, a time-based analogy to high dynamic range to low dyna...
 
Exemplar-Based Graph Matching for Robust Facial Landmark Localization
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Feng Zhou,Jonathan Brandt,Zhe Lin
Issue Date:December 2013
pp. 1025-1032
Localizing facial landmarks is a fundamental step in facial image analysis. However, the problem is still challenging due to the large variability in pose and appearance, and the existence of occlusions in real-world face images. In this paper, we present ...
 
Trustworthiness Evaluation of Registered Information in a Trusted E-Commerce Data Service
Found in: 2013 IEEE 10th International Conference on e-Business Engineering (ICEBE)
By Yinsheng Li, Feng Zhou, Jiao Li, Yi Liao, Yueting Chai
Issue Date:September 2013
pp. 353-357
Authors developed a trusted ecommerce data service as a public infrastructure. Ecommerce trading participants, commodities and their makers are to register the specified information to the data service. Both ecommerce players and consumers can get trusted ...
 
Hierarchical Aligned Cluster Analysis for Temporal Clustering of Human Motion
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Feng Zhou,F. De la Torre,J. K. Hodgins
Issue Date:March 2013
pp. 582-596
Temporal segmentation of human motion into plausible motion primitives is central to understanding and building computational models of human motion. Several issues contribute to the challenge of discovering motion primitives: the exponential nature of all...
 
Using the Maximum Between-Class Variance for Automatic Gridding of cDNA Microarray Images
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Gui-Fang Shao, Fan Yang, Qian Zhang, Qi-Feng Zhou, Lin-Kai Luo
Issue Date:January 2013
pp. 181-192
Gridding is the first and most important step to separate the spots into distinct areas in microarray image analysis. Human intervention is necessary for most gridding methods, even if some so-called fully automatic approaches also need preset parameters. ...
 
Scalable Feedback Aggregating (SFA) Overlay for Large-Scale P2P Trust Management
Found in: IEEE Transactions on Parallel and Distributed Systems
By Xiaoyong Li,Feng Zhou,Xudong Yang
Issue Date:October 2012
pp. 1944-1957
In Peer-to-Peer (P2P) trust management, feedback provides an efficient and effective way to build a reputation-based trust relationship among peers. There is no doubt that the scalability of a feedback aggregating overlay is the most fundamental requiremen...
 
Personalized Travel Service Discovery and Usage in Cloud Environment
Found in: 2012 IEEE 9th International Conference on e-Business Engineering (ICEBE)
By Feng Zhou,Yong Fang,Hao Chen
Issue Date:September 2012
pp. 333-337
Service recommendation is prerequisite for end users to discover and use cloud services. In this paper, we provide a discovery and usage process for tourists to use travel services, featured with OWL-based service selection and BPEL-based service execution...
 
CloudExplorer: A User-Centered Cloud Browser for Cloud Services
Found in: 2012 IEEE 9th International Conference on e-Business Engineering (ICEBE)
By Yinsheng Li,Jiao Li,Feng Zhou,Yong Fang,Hao Chen
Issue Date:September 2012
pp. 214-220
A user-centered cloud browser, i.e., Cloud Explorer, is proposed to discover, process and execute emerging cloud services, as Web browsers are used to search and display Web information. Cloud Explorer is the first attempt for end users to explore cloud se...
 
Factorized graph matching
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Feng Zhou,F. De la Torre
Issue Date:June 2012
pp. 127-134
Graph matching plays a central role in solving correspondence problems in computer vision. Graph matching problems that incorporate pair-wise constraints can be cast as a quadratic assignment problem (QAP). Unfortunately, QAP is NP-hard and many algorithms...
 
Generalized time warping for multi-modal alignment of human motion
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Feng Zhou,F. De la Torre
Issue Date:June 2012
pp. 1282-1289
Temporal alignment of human motion has been a topic of recent interest due to its applications in animation, telerehabilitation and activity recognition among others. This paper presents generalized time warping (GTW), an extension of dynamic time warping ...
 
Surface Analysis from Video Volumes for Fetal Alcohol Syndrome Classification
Found in: Digital Image Computing: Techniques and Applications
By Shiaofen Fang, Ying Liu, Sophia Vinci-Booher, Bruce Anthony, Feng Zhou
Issue Date:December 2010
pp. 22-26
3D shape reconstruction is often a necessary step to obtain geometric information from multiple 2D images for shape analysis. In this paper, a new shape analysis technique is proposed using surface features derived directly from the video volume of 2D imag...
 
Using PWM Output as a Digital-to-Analog Converter on DSP
Found in: System Science, Engineering Design and Manufacturing Informatization, International Conference on
By Feng Zhou, Wei Xiong
Issue Date:November 2010
pp. 278-281
This paper presents a method for utilizing the on-chip PWM (pulse width modulated) generators on a TMS320C240 DSP for digital-to-analog (D/A) conversion. The method involves analog low-pass filtering the PWM signal to remove high frequency components, leav...
 
Decision Under Insufficient Evidence: A Scalable Probabilistic Way
Found in: Semantics, Knowledge and Grid, International Conference on
By Xiaoqing Zheng, Hongjun Zhang, Feng Zhou
Issue Date:November 2010
pp. 406-409
Some problematic cases, such as collective defeat and odd-length defeat cycles, which tend to be handled incorrectly by all of the current theories of no monotonic reasoning, including default logic and circumscription, have been well recognized in the lit...
 
Simulation of Waterway Traffic Flow at Harbor Based on the Ship Behavior and Cellular Automata
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Jingxian Liu, Feng Zhou, Maoqing Wang
Issue Date:October 2010
pp. 542-546
Simulation of waterway traffic flow at harbor can effectively verify the rationality of its statistics and prediction, revealing the basic law of its development. On basis of different classes of vessels, safe distance, ship arriving law and berths’ servic...
 
Unsupervised discovery of facial events
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Feng Zhou, Fernando De la Torre, Jeffrey F. Cohn
Issue Date:June 2010
pp. 2574-2581
Automatic facial image analysis has been a long standing research problem in computer vision. A key component in facial image analysis, largely conditioning the success of subsequent algorithms (e.g. facial expression recognition), is to define a vocabular...
 
Effects of Grinding Aids on Grinding Fineness and Activity Index of Ground Blast Furnace Slag
Found in: Electrical and Control Engineering, International Conference on
By Huifen Yang, Feng Zhou
Issue Date:June 2010
pp. 5191-5194
This paper investigates and compares the effects of five kinds of grinding aids, i.e., triethanolamine, calcium lignosulphonate, sodium oleate, sodium tripolyphosphate and glyceryl alcohol, on grinding fineness and activity index of ground blast furnace sl...
 
Review on Station-to-Station OD Matrix Estimation Model and Algorithm for Urban Rail Transit
Found in: Computer Modeling and Simulation, International Conference on
By Liu Jianfeng,Li Jinhai,Chen Feng,Zhou Yanqiu
Issue Date:January 2010
pp. 149-153
In recent years, the metro network in China’s metropolitan areas has taken shape. In view of this, it is important to understand the traffic pattern for improvement of the operation, organization, and management practice. Station-to-station OD Matrix, a ba...
 
The Strategic Upgrading and Restructuring of China's Shanzhai Cellphone Industry under Financial Crisis
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Liu Xue Feng, Zhou Xiao Chao
Issue Date:December 2009
pp. 562-565
The 2008 financial crisis has brought about detriments as well as opportunities to Shanzai cellphones industry in Shenzhen, China, and to the small and medium-sized manufacturing enterprises in China as a whole. While the detriments are the suffering of dr...
 
A New Frame Size Adjusting Method for Framed Slotted Aloha Algorithm
Found in: E-Business Engineering, IEEE International Conference on
By Cuicui Yu, Feng Zhou
Issue Date:October 2009
pp. 493-496
In this paper, a new frame size adjusting method is proposed for framed slotted ALOHA algorithm in RFID system. This method does not predict the number of tags. The reader just use the current frame size and the total number of successful slots, idle slots...
 
Research of Fuzzy Control for Elevation Attitude of 3-DOF Helicopter
Found in: Intelligent Human-Machine Systems and Cybernetics, International Conference on
By Feng Zhou, Denghua Li, Peirong Xia
Issue Date:August 2009
pp. 367-370
A method of tracking control based on fuzzy control for elevation attitude of a laboratory 3 degrees of freedom (3-DOF) helicopter is introduced. The 3-DOF helicopter model is a typical multi-input multi-output (MIMO) system with the inherent characteristi...
 
Data Mining for Bibliometric Analysis of Traffic Flow
Found in: Web Mining and Web-based Application, Pacific-Asia Conference on
By Chaozhong Wu, Hu Lei, Xinping Yan, Feng Zhou
Issue Date:June 2009
pp. 28-31
The quantitative analyses of the traffic flow research performance was made based on 3870 papers published in Science Citation Index(expanded) –indexed periodicals from 1976 to 2005. Bradford’s law was used to find the core journals of traffic flow. The to...
 
Component-Based Design of Software for Embedded Control Systems: The Medical Ventilator Case Study
Found in: Embedded Software and Systems, Second International Conference on
By Feng Zhou, Wei Guan, Krzysztof Sierszecki, Christo Angelov
Issue Date:May 2009
pp. 157-163
COMDES-II is a component-based framework for distributed control systems featuring open architecture and predictable operation under hard real-time constraints. It has been experimentally validated in a number of case studies, including the Medical Ventila...
 
Techniques Analysis for Implementing Shared Relocatable Buffers Using the TMS320 DSP Algorithm Standard
Found in: Networking and Digital Society, International Conference on
By Feng Zhou, Yun Wu
Issue Date:May 2009
pp. 255-258
This paper presents several techniques supported by the TMS320 DSP Algorithm Standard (referred to as XDAIS) which can be employed by algorithm writers to assist application developers in optimizing their system’s performance and sharing of memory resource...
 
Quantifying Performance Properties of Virtual Machine
Found in: Information Science and Engieering, International Symposium on
By Xianghua Xu, Feng Zhou, Jian Wan, Yucheng Jiang
Issue Date:December 2008
pp. 24-28
In this paper we present results from test and quantitative analysis of leading hypervisors Xen, Kvm and Vmware. Our test comparison was carried out using benchmarks which can performance on the Overall performance, performance isolation, and scalability o...
 
Developing a Trusted System for Tracking Asset on the Move
Found in: Young Computer Scientists, International Conference for
By Tianle Zhang, Zongwei Luo, Feng Zhou, Xudong Yang
Issue Date:November 2008
pp. 2008-2013
With the advances of technologies in RFID, sensors, GPS, GPRS, IP networks and wireless networks, monitoring asset on move is becoming feasible. In this paper, we develop a trusted system for tracking asset on the move based on an integrated service networ...
 
A Novel Pre-segmentation Algorithm of Handwritten Chinese Characters in e-Commerce
Found in: Management of e-Commerce and e-Government, International Conference on
By Zili Li, Feng Zhou
Issue Date:October 2008
pp. 265-269
With the development of Chinese E-commerce, handwritten Chinese characters recognition has became an important problem in electronic payment systems andso on. However, the Chinese segmentation is the basis for Chinese character recognition. In the existing...
 
Trends in augmented reality tracking, interaction and display: A review of ten years of ISMAR
Found in: Mixed and Augmented Reality, IEEE / ACM International Symposium on
By Feng Zhou, Henry Been-Lirn Duh, Mark Billinghurst
Issue Date:September 2008
pp. 193-202
Although Augmented Reality technology was first developed over forty years ago, there has been little survey work giving an overview of recent research in the field. This paper reviews the ten-year development of the work presented at the ISMAR conference ...
 
A Software Framework for Hard Real-Time Distributed Embedded Systems
Found in: Software Engineering and Advanced Applications, Euromicro Conference
By Christo Angelov, Krzysztof Sierszecki, Feng Zhou
Issue Date:September 2008
pp. 385-392
The paper presents a framework for distributed embedded applications that can be used to engineer open, and the same time, predictable embedded systems. Applications are composed from components (actors), which communicate transparently by exchanging label...
 
Mobile Intelligence for Delay Tolerant Logistics and Supply Chain Management
Found in: Sensor Networks, Ubiquitous, and Trustworthy Computing, International Conference on
By Tianle Zhang, Zongwei Luo, Edward C. Wong, C. J. Tan, Feng Zhou
Issue Date:June 2008
pp. 280-284
In this paper, we present Mobile Intelligence (MI) to develop delay tolerant RFID network for enabling delay tolerant logistics and supply chain applications. It provides intelligent and ubiquitous information access, relay, search and delivery over Mobile...
 
A Novel Technique for Improving Temperature Independency of Ring-ADC
Found in: Design, Automation and Test in Europe Conference and Exhibition
By Shun Li, Hua Chen, Feng Zhou
Issue Date:March 2008
pp. 694-697
A new temperature compensation technique for ring-oscillator-based ADC is proposed in this paper. It employs a novel fixed-number-based algorithm and a CTAT current biasing technology to compensate the temperature-dependent variations of the output, thus e...
 
Constructing Support Vector Machine Kernels from Orthogonal Polynomials for Face and Speaker Verification
Found in: Image and Graphics, International Conference on
By Feng Zhou, Zhigang Fang, Jie Xu
Issue Date:August 2007
pp. 627-632
This paper presents an alternative to construct support vector machine (SVM) kernels from orthogonal polynomials. After describing some knowledge about orthogonal polynomials, we construct kernels from orthogonal polynomials according to Mercer?s condition...
 
Evaluating and Optimizing Power Consumption of Anti-Collision Protocols for Applications in RFID Systems
Found in: Low Power Electronics and Design, International Symposium on
By Feng Zhou, Chunhong Chen, Dawei Jin, Chenling Huang, Hao Min
Issue Date:August 2004
pp. 357-362
For low-cost RFID systems, the design of passive tags is a key issue in anti-collision protocols where lower power consumption allows a longer working distance between tags and the reader. In this paper, we look at anti-collision protocols in tags' process...
 
Simulation and Analysis of FC Network
Found in: Local Computer Networks, Annual IEEE Conference on
By Chao-Yang Wang, Feng Zhou, Yao-Long Zhu, Chong Tow Chong, Bo Hou, Wei-Ya Xi
Issue Date:October 2003
pp. 285
The modeling and simulation are the flexible and effective methods to design and evaluate FC-SAN. We study the impact of link failure on performance of FC network with a core/edge topology using SANSim, a simulation tool for storage area network. Simulatio...
 
Physical Planning Of On-Chip Interconnect Architectures
Found in: Computer Design, International Conference on
By Hongyu Chen, Bo Yao, Feng Zhou, Chung-Kuan Cheng
Issue Date:September 2002
pp. 30
Interconnect architecture plays an important role in determining the throughput of meshed communication structures. We assume a mesh structure with uniform communication demand for communication. A multi-commodity flow (MCF) model is proposed to find the t...
 
Balancing the Interconnect Topology for Arrays of Processors between Cost and Power
Found in: Computer Design, International Conference on
By Esther Y. Cheng, Feng Zhou, Bo Yao, Chung-Kuan Cheng, Ronald Graham
Issue Date:September 2002
pp. 180
High performance SoC requires nonblocking interconnections between an array of processors built on one chip. With the advent of deep sub-micron technologies, switches are becoming much cheaper while wires are still expensive. Therefore, optimization effort...
 
High Speed DCT/IDCT Using a Pipelined CORDIC Algorithm
Found in: Computer Arithmetic, IEEE Symposium on
By Feng Zhou, Peter Kornerup
Issue Date:July 1995
pp. 180
This paper describes DCT (IDCT) computations using the CORDIC algorithm. By rewriting the DCT, for a 1*8 DCT only 6 CORDIC computations are needed, whereas a 1*16 DCT requires 22 CORDIC computations. But these can all be pipelined through a single CORDIC u...
 
Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
Found in: IEEE Transactions on Parallel and Distributed Systems
By Xiaoyong LI,Huadong Ma,Feng Zhou,Xiaolin Gui
Issue Date:May 2014
pp. 1
This paper proposes a service operator-aware trust scheme (SOTS) for resource matchmaking across multiple clouds. Through analyzing the built-in relationship between the users, the broker, and the service resources, this paper proposes a middleware framewo...
 
Enhancing the accuracy of knowledge discovery: A supervised learning method
Found in: 2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
By Liangxi Cheng,Hongfei Lin,Feng Zhou,Zhihao Yang
Issue Date:December 2013
pp. 620
Given that the amount of biomedical literature available is growing at an explosive speed and people's ability to read literature is limited, the development of a computer-assisted approach for mining central but hidden knowledge from extensive literature ...
   
Deformable Graph Matching
Found in: 2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Feng Zhou,Fernando De la Torre
Issue Date:June 2013
pp. 2922-2929
Graph matching (GM) is a fundamental problem in computer science, and it has been successfully applied to many problems in computer vision. Although widely used, existing GM algorithms cannot incorporate global consistence among nodes, which is a natural c...
 
Autopedia: automatic domain-independent Wikipedia article generation
Found in: Proceedings of the 20th international conference companion on World wide web (WWW '11)
By Conglei Yao, Feng Zhou, Hongyan Liu, Shicong Feng, Sicong Shou, Xu Jia
Issue Date:March 2011
pp. 161-162
This paper proposes a general framework, named Autopedia, to generate high-quality wikipedia articles for given concepts in any domains, by automatically selecting the best wikipedia template consisting the sub-topics to organize the article for the input ...
     
Improving the Computational Efficiency of Recursive Cluster Elimination for Gene Selection
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
By Deng-Feng Huang, Gui-Fang Shao, Hong Peng, Lin-Kai Luo, Ling-Jun Ye, Qi-Feng Zhou
Issue Date:January 2011
pp. 122-129
The gene expression data are usually provided with a large number of genes and a relatively small number of samples, which brings a lot of new challenges. Selecting those informative genes becomes the main issue in microarray data analysis. Recursive clust...
     
Using the Maximum Between-Class Variance for Automatic Gridding of cDNA Microarray Images
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
By Fan Yang, Gui-Fang Shao, Lin-Kai Luo, Qi-Feng Zhou, Qian Zhang
Issue Date:January 2013
pp. 181-192
Gridding is the first and most important step to separate the spots into distinct areas in microarray image analysis. Human intervention is necessary for most gridding methods, even if some so-called fully automatic approaches also need preset parameters. ...
     
Towards a new reading experience via semantic fusion of text and music
Found in: Proceeding of the 11th annual international ACM/IEEE joint conference on Digital libraries (JCDL '11)
By Feng Zhou, Jian Shao, Jiangqin Wu, Ling Zhuang, Zhenchao Ye
Issue Date:June 2011
pp. 149-152
In CADAL, there preserve a lot of Chinese classical literatures, including graceful prose and verse. These works written in ancient Chinese comparatively are concise in vocabulary and sentence patterns. But they express rich feelings and convey a wealth of...
     
Unsupervised summarization of rushes videos
Found in: Proceedings of the international conference on Multimedia (MM '10)
By Feng Zhou, Fernando De la Torre, Wei Liu, Yan Liu, Yang Liu
Issue Date:October 2010
pp. 751-754
This paper proposes a new framework to formulate summarization of rushes video as an unsupervised learning problem. We pose the problem of video summarization as one of time-series clustering, and proposed Constrained Aligned Cluster Analysis (CACA). CACA ...
     
Keyboard acoustic emanations revisited
Found in: ACM Transactions on Information and System Security (TISSEC)
By Feng Zhou, J. D. Tygar, Li Zhuang
Issue Date:October 2009
pp. 1-26
We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard and recovering up to 96% of typed characters. There is no need for training ...
     
Facial image classification of mouse embryos for the animal model study of fetal alcohol syndrome
Found in: Proceedings of the 2009 ACM symposium on Applied Computing (SAC '09)
By Bruce Anthony, Feng Zhou, Jeffrey Huang, Shiaofen Fang, Sophia Vinci-Booher, Ying Liu
Issue Date:March 2009
pp. 1-5
Fetal Alcohol Syndrome (FAS) is a developmental disorder caused by maternal drinking during pregnancy. Computerize imaging techniques have been applied to study human facial dysmorphology associated with FAS. This paper describes a new facial image analysi...
     
A novel technique for improving temperature independency of ring-ADC
Found in: Proceedings of the conference on Design, automation and test in Europe (DATE '08)
By Feng Zhou, Hua Chen, Shun Li
Issue Date:March 2008
pp. 1-30
A new temperature compensation technique for ringoscillator-based ADC is proposed in this paper. It employs a novel fixed-number-based algorithm and a CTAT current biasing technology to compensate the temperature-dependent variations of the output, thus el...
     
Digitalization of coastal management and decision making supported by multi-dimensional geospatial information and analysis
Found in: Proceedings of the 2006 national conference on Digital government research (dg.o '06)
By Aidong Zhang, C. K. Shum, Feng Zhou, J. Raul Ramirez, Keith Bedford, Ron Li, Vasilia Velissariou, Xutong Niu
Issue Date:May 2006
pp. 429-430
This paper summarizes the results and outcomes of our NSF Digital Government project. During four years, this project concentrated on investigating, integrating and developing geospatial technologies to enhance the operational capabilities of federal, stat...
     
 1  2 Next >>