Search For:

Displaying 1-50 out of 209 total
Joint power allocation and relay assignment for max-min fairness in cooperative networks
Found in: Computers and Communications, IEEE Symposium on
By Hongli Xu, Liusheng Huang, Gang Wang, Gang Liu, He Huang
Issue Date:June 2010
pp. 123-126
Cooperative communication is shown to be a promising technology to enhance the capacity of wireless transmission without additional equipments. Under this communication paradigm, both relay selection and power allocation significantly affect the overall sy...
 
A Strategy of Collaborative Negotiation for Dynamic Supply Chain Coordination
Found in: Artificial Intelligence, International Joint Conference on
By Xiao-Gang Wang,Gang Liu,Yue Li
Issue Date:April 2009
pp. 46-49
This paper applies the multi-agent system Strategy to collaborative negotiation in manufacturing supply chain coordination. Multi-agent computational environments are suitable for studying a broad class of coordination and negotiation issues involving mult...
 
A Strategy of Collaborative Negotiation for Dynamic Supply Chain Coordination
Found in: Artificial Intelligence, International Joint Conference on
By Xiao-Gang Wang,Gang Liu,Yue Li
Issue Date:April 2009
pp. 59-62
This paper applies the multi-agent system Strategy to collaborative negotiation in manufacturing supply chain coordination. Multi-agent computational environments are suitable for studying a broad class of coordination and negotiation issues involving mult...
 
Crime Data Mining: A General Framework and Some Examples
Found in: Computer
By Hsinchun Chen, Wingyan Chung, Jennifer Jie Xu, Gang Wang, Yi Qin, Michael Chau
Issue Date:April 2004
pp. 50-56
The volume of crime data is increasing along with the incidence and complexity of crimes. Data mining is a powerful tool that criminal investigators who may lack extensive training as data analysts can use to explore large databases quickly and efficiently...
 
An Improved Algorithm for Image Decomposing Based on Separse Representation
Found in: Intelligent Systems, WRI Global Congress on
By Gang Wang, Shu-yan Liu, Zhi-feng Zhang, De-hua Wang, Liang Xiao
Issue Date:May 2009
pp. 140-144
A novel image decomposing algorithm is proposed in this paper, it can separate images into texture and cartoon parts under the complicated background. The main idea is the use of two appropriate dictionaries, one for the representation of textures, and the...
 
ESnapII: A Writable Dependent Snapshot System with Shared Cache
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Guangjun Xie, Lu Qi, Feng Wang, Gang Wang, XiaoGuang Liu, Jing Liu
Issue Date:August 2008
pp. 677-682
Snapshot technology, which has been widely used in data storage system for data protections and other tasks such as data mining and data cloning, is becoming one of the key technologies in storage area. ESnap improved the performance, resource consumption ...
 
Data Mining and Value Chain Analysis of City Operation Applied Innovation Park
Found in: New Trends in Information and Service Science, International Conference on
By Wang Jian, Chen Rui, Song Gang, Wang Jia, Yu Ningjie
Issue Date:July 2009
pp. 1180-1183
The ultimate goal of City Operation Applied Innovation Park (COAIP) is to promote utilization of technology fruit in practice. In the future, the industrial development of Beijing is set to be high-tech oriented. That developing high-tech industry, exertin...
 
QoS-Based Service Composition under Various QoS Requirements
Found in: 2013 20th Asia-Pacific Software Engineering Conference (APSEC)
By Gang Wang,Li Zhang,Jing Jiang,Wei Jiang
Issue Date:December 2013
pp. 67-74
There are various approaches for QoS-based web service composition. However, most of them are concerned about the algorithms of service compositions while ignoring the flexibility and expressiveness of users to set QoS constraints. Most of them assume that...
 
Optimal packet size design for multimedia transmissions in cognitive radio networks
Found in: Software Maintenance and Reengineering, European Conference on
By Xin-Lin Huang, Gang Wang, Fei Hu,Sunil Kumar, Ye Zhang
Issue Date:August 2011
pp. 827-830
This paper proposes an optimal packet size search method for multimedia transmission over multi-channel link in multi-class cognitive radio networks. Since the transmission power is limited for users, optimal packet size and corresponding power allocation ...
 
Characterization of Nanoparticle Based on the Power Spectrum Density of Dynamic Light Scattering
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Liu Guobin, Yang Hui, Zheng Gang, Wang Yajing, Yang Yifeng
Issue Date:January 2011
pp. 704-707
We describe a new measurement suitable for processing dynamic light scattering data of nanoparticles in dispersion. The program by the Power Spectrum Density of the scattering light developed in VC++6.0 using a standard photon counting unit, a fast countin...
 
Combinatorial Constructions of Multi-erasure-Correcting Codes with Independent Parity Symbols for Storage Systems
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Gang Wang, Sheng Lin, Xiaoguang Liu, Guangjun Xie, Jing Liu
Issue Date:December 2007
pp. 61-68
In this paper, we present a new class of t-erasure horizontal codes with independent parity symbols based on Column-Hamiltonian Latin Squares (CHLS). We call the codes PIHLatin (Parity Independent Horizontal Latin) codes. We prove the necessary and suffici...
 
Constructing double- and triple-erasure-correcting codes with high availability using mirroring and parity approaches
Found in: Parallel and Distributed Systems, International Conference on
By Gang Wang, Xiaoguang Liu, Sheng Lin, Guangjun Xie, Jing Liu
Issue Date:December 2007
pp. 1-8
With the rapid progress of the capacity and slow pace of the speed/MTTF of hard disks, and increasing size of storage systems, the reliability and availability of storage systems become more and more serious. This paper discusses the method of constructing...
 
CMedPort: A Cross-Regional Chinese Medical Portal
Found in: Digital Libraries, Joint Conference on
By Yilu Zhou, Jialun Qin, Hsinchun Chen, Zan Huang, Yiwen Zhang, Wingyan Chung, Gang Wang
Issue Date:May 2003
pp. 379
CMedPort is a cross-regional Chinese medical Web portal developed in the AI Lab at the University of Arizona. We will demonstrate the major system functionalities.
   
Tracklet Association in Detect-Then-Track Paradigm for Long-Term Multi-person Tracking
Found in: 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
By Bing Wang,Gang Wang,Kap Luk Chan,Li Wang
Issue Date:June 2014
pp. 716-717
This paper presents a novel introduction of online target-specific metric learning in track fragment (tracklet) association by network flow optimization for long-term multi-person tracking. Different from other network flow formulation, each node in our ne...
 
Tracklet Association with Online Target-Specific Metric Learning
Found in: 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Bing Wang,Gang Wang,Kap Luk Chan,Li Wang
Issue Date:June 2014
pp. 1234-1241
This paper presents a novel introduction of online target-specific metric learning in track fragment (tracklet) association by network flow optimization for long-term multi-person tracking. Different from other network flow formulation, each node in our ne...
 
Application Research on Cubic Spline Interpolation Based on Particle Swarm Optimization in Mine Pressure Missing Data
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Sun Gang,Wang Feng,Wang Xiuyou,Wang Hao,Chen Jing
Issue Date:November 2011
pp. 87-90
To interpolate mine pressure missing data, it is proposed that cubic spline interpolation algorithm based particle swarm optimization. The algorithm use particle swarm optimization to solve the coefficients of cubic spline interpolation function, in order ...
 
Distributed High-Frequency RFID Antennas for Smart Storage Racks
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Xiafei Wang, Hongjin Wang, Gang Wang
Issue Date:April 2010
pp. 472-474
In this paper, novel coil antennas distributed on storage racks are designed for high frequency (HF) radiofrequency identification (RFID) reader. To enlarge the reading coverage on a large storage rack without using large current excitation, several small-...
 
Appliance-Based Autonomic Provisioning Framework for Virtualized Outsourcing Data Center
Found in: Autonomic Computing, International Conference on
By XiaoYing Wang, DongJun Lan, Gang Wang, Xing Fang, Meng Ye, Ying Chen, QingBo Wang
Issue Date:June 2007
pp. 29
As outsourcing data centers emerge to host applications or services from many different organizations and companies, it is critical for data center owners to isolate different applications while dynamically and optimally allocate resources among them. To a...
 
Motion Analysis and Research of Local Navigation System for Visual-Impaired Person Based on Improved LK Optical Flow
Found in: 2012 5th International Conference on Intelligent Networks and Intelligent Systems (ICINIS)
By Zhao Gang,Wang Xiaoli,Wang Lirong
Issue Date:November 2012
pp. 348-351
For the problem of low detection accuracy and slow speed to fast motion object, when solving the basic optical flow constraint equation with the traditional algorithm, an improved optical flow algorithm based on LK optical flow algorithm has been put forwa...
 
A diode-based predistortion linearizer for traveling wave tube amplifiers
Found in: IEEE International Vacuum Electronics Conference
By Xin Hu, Gang Wang, Zi-Cheng Wang, Ji-Run Luo
Issue Date:February 2011
pp. 239-240
The simulation and design of a predistortion linearizer based on schottky and varactor diodes are presented. The linearizer is capable of providing different combinations of the amplitude and phase characteristics for the use of the different traveling wav...
 
A New Structured Peer-to-Peer Architecture Based on Physical Distance
Found in: Parallel and Distributed Systems, International Conference on
By Song Wang, Yong Ma, Gang Wang, Xiaoguang Liu
Issue Date:December 2010
pp. 243-250
Recently, structured P2P (Peer-to-Peer) system has become more and more popular. However, P2P systems' large scale and high dynamics have brought a great challenge to data availability and accessing performance. Redundancy techniques are used to solve thes...
 
Automated age regression for personalized IPTV services
Found in: Multimedia and Expo, IEEE International Conference on
By Hee Lin Wang, Jian-Gang Wang, Wei-Yun Yau
Issue Date:July 2010
pp. 1333-1336
The increasing penetration rates of high speed broadband networks have infused strong impetus for IPTV adoption and usage. One of the more intriguing possibilities of personalizing the IPTV experience is to install automated age classification capabilities...
 
A Batched GPU Algorithm for Set Intersection
Found in: Parallel Architectures, Algorithms, and Networks, International Symposium on
By Di Wu, Fan Zhang, Naiyong Ao, Fang Wang, Xiaoguang Liu, Gang Wang
Issue Date:December 2009
pp. 752-756
Intersection of inverted lists is a frequently used operation in search engine systems. Efficient CPU and GPU intersection algorithms for large problem size are well studied. We propose an efficient GPU algorithm for high performance intersection of invert...
 
Inverse Time Dependency in Convex Regularized Learning
Found in: Data Mining, IEEE International Conference on
By Zeyuan Allen Zhu, Weizhu Chen, Chenguang Zhu, Gang Wang, Haixun Wang, Zheng Chen
Issue Date:December 2009
pp. 667-676
In the conventional regularized learning, training time increases as the training set expands. Recent work on L2 linear SVM challenges this common sense by proposing the inverse time dependency on the training set size. In this paper, we first put forward ...
 
Consistent Message Ordering in Wireless Sensor and Actor Networks
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Yang Wang, Liusheng Huang, Hongli Xu, Gang Wang
Issue Date:August 2009
pp. 333-339
Wireless sensor and actor networks (WSANs) have attracted much attention in the recent years. In WSANs, sensor nodes are in charge of the sensing task, while the actor nodes take actions in response to the sensed phenomena or the detected event. In order t...
 
Research on One New Optimized Algorithm of Headlight Distribution Characteristics
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Weiwei Liu, Ping'an Mu, Gang Wang, Lin Wang
Issue Date:April 2009
pp. 880-882
This paper, aiming at demands on automobile headlight distribution characteristics, proposed one new optimized algorithm of headlight distribution characteristics. This kind of algorithm has not only fast speed, strong stability, but also has an ability of...
 
MKtrace: An Innovative Debugging Tool for Multi-Threaded Programs on Multiprocessor Systems
Found in: Asia-Pacific Software Engineering Conference
By Yusen Li, Feng Wang, Gang Wang, Xiaoguang Liu, Jing Liu
Issue Date:December 2007
pp. 510-517
<p>In this paper, we propose an innovative debugging tool called MKtrace to help programmers identify bugs in multi-threaded programs on multiprocessor systems with little overhead. Unlike the traditional debugging tools, we use the trace log to anal...
 
Fuzzy Petri Net-Based Evaluation to the Process of ERP Implementation
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Shaojun Wang, Gang Wang, Guoan Gao
Issue Date:December 2006
pp. 11-17
To avoid the risks on the process of enterprise resource planning(ERP) implementation, summarize the process of ERP implementation, and sum up the experiences and lessons, establishing an evaluation system to the process of ERP implementation. The evaluati...
 
Stochastic Stability of the Discrete-time Kalman Filter
Found in: Intelligent Systems Design and Applications, International Conference on
By Yuan Wang, Gang Wang
Issue Date:October 2006
pp. 31-36
The problem of stochastic stability of the Kalman filter with stochastic time varying system parameters has been treated. In this paper, we first introduce a suitable stochastic observability (or excitation) condition to guarantee both the Lr and exponenti...
 
Extracting Micro-calcification Clusters on Mammograms for Early Breast Cancer Detection
Found in: International Conference on Information Acquisition
By Yuanjiao Ma, Ziwu Wang, Jeffrey Zheng, Lian Lu, Gang Wang, Peng Li, Tianxin Ma, Yinfu Xie
Issue Date:August 2006
pp. 499-504
At present, Mammography is one of the most effective methods to detect early breast cancers. However, the signs of most micro-calcifications that are the early signs of malignant tumours cannot appear clearly in an inhomogeneous background because of the c...
 
A Framework of 2D Fisher Discriminant Analysis: Application to Face Recognition with Small Number of Training Samples
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Hui Kong, Lei Wang, Eam Khwang Teoh, Jian-Gang Wang, Ronda Venkateswarlu
Issue Date:June 2005
pp. 1083-1088
A novel framework called 2D Fisher Discriminant Analysis (2D-FDA) is proposed to deal with the Small Sample Size (SSS) problem in conventional One-Dimensional Linear Discriminant Analysis (1D-LDA). Different from the 1D-LDA based approaches, 2D-FDA is base...
 
DL-SFA: Deeply-Learned Slow Feature Analysis for Action Recognition
Found in: 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Lin Sun,Kui Jia,Tsung-Han Chan,Yuqiang Fang,Gang Wang,Shuicheng Yan
Issue Date:June 2014
pp. 2625-2632
Most of the previous work on video action recognition use complex hand-designed local features, such as SIFT, HOG and SURF, but these approaches are implemented sophisticatedly and difficult to be extended to other sensor modalities. Recent studies discove...
 
Hard Drive Failure Prediction Using Classification and Regression Trees
Found in: 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Jing Li,Xinpu Ji,Yuhan Jia,Bingpeng Zhu,Gang Wang,Zhongwei Li,Xiaoguang Liu
Issue Date:June 2014
pp. 383-394
Some statistical and machine learning methods have been proposed to build hard drive prediction models based on the SMART attributes, and have achieved good prediction performance. However, these models were not evaluated in the way as they are used in rea...
 
Image Set Classification Using Holistic Multiple Order Statistics Features and Localized Multi-kernel Metric Learning
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Jiwen Lu,Gang Wang,Pierre Moulin
Issue Date:December 2013
pp. 329-336
This paper presents a new approach for image set classification, where each training and testing example contains a set of image instances of an object captured from varying viewpoints or under varying illuminations. While a number of image set classificat...
 
Learning to Share Latent Tasks for Action Recognition
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Qiang Zhou,Gang Wang,Kui Jia,Qi Zhao
Issue Date:December 2013
pp. 2264-2271
Sharing knowledge for multiple related machine learning tasks is an effective strategy to improve the generalization performance. In this paper, we investigate knowledge sharing across categories for action recognition in videos. The motivation is that man...
 
Efficiency of Command and Control in Cyberspace: Visit from the Perspective of Complexity Theory
Found in: 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
By Gang Wang, Yinhui Yang, Qinhua Ren, Runnian Ma
Issue Date:October 2013
pp. 398-401
To envision the evolution of cyberspace, the efficiency of command and control (C2) in cyberspace is investigated from the perspective of complexity theory. Compared with platform operation and network centric operation, the mechanism of C2 in cyberspace i...
 
Detecting malicious landing pages in Malware Distribution Networks
Found in: 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Gang Wang,Jack W. Stokes,Cormac Herley,David Felstead
Issue Date:June 2013
pp. 1-11
Drive-by download attacks attempt to compromise a victim's computer through browser vulnerabilities. Often they are launched from Malware Distribution Networks (MDNs) consisting of landing pages to attract traffic, intermediate redirection servers, and exp...
 
Reinforced Similarity Integration in Image-Rich Information Networks
Found in: IEEE Transactions on Knowledge and Data Engineering
By Xin Jin,Jiebo Luo,Jie Yu,Gang Wang,Dhiraj Joshi,Jiawei Han
Issue Date:February 2013
pp. 448-460
Social multimedia sharing and hosting websites, such as Flickr and Facebook, contain billions of user-submitted images. Popular Internet commerce websites such as Amazon.com are also furnished with tremendous amounts of product-related images. In addition,...
 
Discriminative Multimanifold Analysis for Face Recognition from a Single Training Sample per Person
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Jiwen Lu, Yap-Peng Tan, Gang Wang
Issue Date:January 2013
pp. 39-51
Conventional appearance-based face recognition methods usually assume that there are multiple samples per person (MSPP) available for discriminative feature extraction during the training phase. In many practical face recognition applications such as law e...
 
A Novel Approach for Personalized Article Recommendation in Online Scientific Communities
Found in: 2013 46th Hawaii International Conference on System Sciences (HICSS)
By Jianshan Sun,Jian Ma,Xiaoyan Liu,Zhiying Liu,Gang Wang,Hongbing Jiang,Thushari Silva
Issue Date:January 2013
pp. 1543-1552
Rapid proliferation of information technologies has generated sheer volume of information which makes scientific research related information searching more challenging. Personalized recommendation is the widely adopted technique to recommend relevant docu...
   
Learning Image Similarity from Flickr Groups Using Fast Kernel Machines
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Gang Wang,D. Hoiem,D. Forsyth
Issue Date:November 2012
pp. 2177-2188
Measuring image similarity is a central topic in computer vision. In this paper, we propose to measure image similarity by learning from the online Flickr image groups. We do so by: Choosing 103 Flickr groups, building a one-versus-all multiclass classifie...
 
Numerical Simulation and Experiment Study on Internal Flow Field in Impeller of Torque Converter
Found in: 2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science
By Ying Yu,Qingliu Yang,Gang Wang
Issue Date:October 2012
pp. 264-267
The internal flow field in impeller of a torque converter will have great effect on the working characteristics of the torque converter. The numerical model of internal flow field in impeller of the torque converter was established by using the hexahedron ...
 
Neighborhood repulsed metric learning for kinship verification
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Jiwen Lu, Junlin Hu, Xiuzhuang Zhou, Yuanyuan Shang, Yap-Peng Tan, Gang Wang
Issue Date:June 2012
pp. 2594-2601
Kinship verification from facial images is a challenging problem in computer vision, and there is a very few attempts on tackling this problem in the literature. In this paper, we propose a new neighborhood repulsed metric learning (NRML) method for kinshi...
 
Neuromarketing: Marketing through Science
Found in: Service Sciences, International Joint Conference on
By Du-Jian Gang,Wang Lin,Zheng Qi,Liu-Li Yan
Issue Date:May 2012
pp. 285-289
Neuro marketing is still less than a decade since it emerged. Although Magnetic Resonance Imaging (fMRI) has already applied to the practice by marketing practicers, it is controversial in the academic field. The authors reviewed neuromarketing academic pa...
 
Classification of UDP traffic from P2P applications
Found in: Networks, IEEE International Conference on
By Gang Wang,Wei Ding,Shi Dong
Issue Date:December 2011
pp. 252-257
In this paper, we select several prevalent Peer-to-peer (P2P) network TV as research objects, and analyze their differences in port usage and packet size distribution thoroughly, based on their traffic from local captured files. By observing and summarizin...
 
Parallel Optimization of Queries in XML Dataset Using GPU
Found in: Parallel Architectures, Algorithms and Programming, International Symposium on
By Xujie Si,Airu Yin,Xiaocheng Huang,Xiaojie Yuan,Xiaoguang Liu,Gang Wang
Issue Date:December 2011
pp. 190-194
As XML is playing a crucial role in web services, databases, and document processing, efficient processing of XML queries has become an important issue. On the other hand, due to the increasing number of users, high throughput of XML queries is also requir...
 
Top-k Queries Processing with Uncertain Data on Graphics Processing Units
Found in: Parallel Architectures, Algorithms and Programming, International Symposium on
By Haozhe Chang,Tingting Qin,Xiaoguang Liu,Gang Wang,Airu Yin
Issue Date:December 2011
pp. 310-314
Considering the complex uncertain database, top-kquery processing in uncertain databases is semantically and computationally different from classical top-kprocessing. Score is not the only factor we should concern. The interplay between score and membershi...
 
hUBI: An Optimized Hybrid Mapping Scheme for NAND Flash-Based SSDs
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Guangjun Xie,Guangzhi Xu,Gang Wang,Xiaoguang Liu,Rui Cao,Yan Gao
Issue Date:November 2011
pp. 1015-1022
NAND flash-based SSDs have become attractive alternatives to hard disk drivers due to their high random read performances and low power consumptions. However, the poor random write performances highly limit their popularization in commercial applications. ...
 
Exploit TIVs to Find Faster Paths
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Yanhua Zhang,Chunhong Zhang,Gang Wang
Issue Date:November 2011
pp. 1779-1782
The phenomenon of Triangle inequality violations (TIVs) is very common in the Internet today. And it will remain as a property of the Internet for the foreseeable future. Though TIVs may bring some problems to the research on the Internet, they can also be...
 
Discriminative multi-manifold analysis for face recognition from a single training sample per person
Found in: Computer Vision, IEEE International Conference on
By Jiwen Lu,Yap-Peng Tan, Gang Wang
Issue Date:November 2011
pp. 1943-1950
Conventional appearance-based face recognition methods usually assume there are multiple samples per person (MSPP) available during the training phase for discriminative feature extraction. In many practical face recognition applications such as law enhanc...
 
 1  2 Next >>