Search For:

Displaying 1-35 out of 35 total
Fault-Tolerant Routing in Meshes/Tori Using Planarly Constructed Fault Blocks
Found in: Parallel Processing, International Conference on
By Dong Xiang, Jia-Guang Sun, Jie Wu, Krishnaiyan Thulasiraman
Issue Date:June 2005
pp. 577-584
A few faulty nodes can make an n-dimentional mesh or torus network unsafe for fault-tolerant routing methods based on the block fault model, where the whole system (n-dimensional space) forms a fault block. A new concept, called extended local safety infor...
 
A Combined Static and Dynamic Software Birthmark Based on Component Dependence Graph
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Xiaoming Zhou, Xingming Sun, Guang Sun, Ying Yang
Issue Date:August 2008
pp. 1416-1421
Software birthmarking provides an effective approach to detect software theft by computing the similarity of unique characteristics between the suspected program and the original. In this paper, we present and empirically evaluate a novel birthmarking tech...
 
Dynamic K-Gram Based Software Birthmark
Found in: Software Engineering Conference, Australian
By Yameng Bai, Xingming Sun, Guang Sun, Xiaohong Deng, Xiaoming Zhou
Issue Date:March 2008
pp. 644-649
Software theft is a threat for companies that consider code as a core asset. A birthmark can help to prove software theft by identifying intrinsic properties of a program. Two programs with the same birthmark are likely to share a common origin. In this pa...
 
Dynamically Constructing Mixed Pyramid for Fast VQ Encoding
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Hong-Wei Sun, Kwok-Yan Lam, Jia-Guang Sun, Siu-Leung Chung
Issue Date:November 2007
pp. 449-452
This paper presents a new VQ encoding method using a dynamically constructed mixed pyramid for fast image com- pression. Our method enhances the speed of VQ encoding by allowing the
 
Detection of Hidden Information in Tags of Webpage Based on Tag-Mismatch
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Hua-Jun Huang, Xing-Ming Sun, Guang Sun, Jun-Wei Huang
Issue Date:November 2007
pp. 257-260
Secret messages can be embedded in a webpage by switching the uppercase-lowercase states of letters in tags. In this paper, a novel steganalytic approach called Tag-Mismatch analysis for detection of hidden information embedded in tags is presented. In ord...
 
Detection of Hidden Information in Webpage
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Huajun Huang, Xingming Sun, Zishuai Li, Guang Sun
Issue Date:August 2007
pp. 317-321
Invisible characters, such as spaces and tabs, can be hidden at the end of each line of webpage, and covert communication happens. To determine whether there is hidden information in webpage, the statistical analysis of stego-webpage is anatomized, and a d...
 
A Stern-based Collusion-Secure Software Watermarking Algorithm and Its Implementation
Found in: Multimedia and Ubiquitous Engineering, International Conference on
By Jieqing Ai, Xingming Sun, Yunhao Liu, Ingemar J. Cox, Guang Sun, Yi Luo
Issue Date:April 2007
pp. 813-818
Stern algorithm is a robust static software watermarking scheme. It can resist many common attacks except collusive attacks. In this paper we propose an improved Stern algorithm, make it has the ability of resisting collusive attacks and simplify its imple...
 
A New Worst-Case Throughput Bound for Oblivious Routing in Odd Radix Mesh Network
Found in: IEEE Computer Architecture Letters
By Guang Sun, Chia-Wei Chang,B. Lin
Issue Date:January 2013
pp. 9-12
1/2 network capacity is often believed to be the limit of worst-case throughput for mesh networks. However, this letter provides a new worst-case throughput bound, which is higher than 1/2 network capacity, for odd radix two-dimensional mesh networks. In a...
 
Oblivious routing design for mesh networks to achieve a new worst-case throughput bound
Found in: 2012 IEEE 30th International Conference on Computer Design (ICCD 2012)
By Guang Sun,Chia-Wei Chang,Bill Lin,Lieguang Zeng
Issue Date:September 2012
pp. 427-432
1/2 network capacity is often believed to be the limit of worst-case throughput for mesh networks. However, this paper provides a new worst-case throughput bound, which is higher than 1/2 network capacity, for odd radix two-dimensional mesh networks. In ad...
 
Adaptive Fuzzy Predictive Control of Satellite Attitude Based on Hierarchical Fuzzy Systems
Found in: Intelligent System Design and Engineering Application, International Conference on
By Guang Sun, Wei Huo
Issue Date:October 2010
pp. 208-211
Based on the hierarchical fuzzy systems (HFS), the tracking control of satellite attitude with uncertain dynamical models is investigated, and a direct adaptive fuzzy predictive control method is presented. First, a nonlinear generalized predictive control...
 
A Watermark-Aware Trusted Running Environment for Software Clouds
Found in: ChinaGrid, Annual Conference
By Junning Fu, Chaokun Wang, Zhiwei Yu, Jianmin Wang, Jia-Guang Sun
Issue Date:July 2010
pp. 144-151
A software cloud is ready-made for software delivery or Software as a Service (SaaS). As it becomes more and more popular, security problems of software running in the cloud also become an important issue. The threats, such as destroying system softwares a...
 
On Steganalysis of Invisible Characters Hidden in Webpage
Found in: Electrical and Control Engineering, International Conference on
By Guang Sun
Issue Date:June 2010
pp. 5369-5372
Invisible characters, such as spaces and tabs, can be hidden at the end of each line of webpage, and covert communication happens. To determine whether there is hidden information in webpage, the singular character detection algorithm is presented. The thr...
 
The Transition Between Sharp and Rounded Features and the Manipulation of Incompatible Boundary in Filling n-sided Holes
Found in: Shape Modeling and Applications, International Conference on
By Kan-Le Shi, Jun-Hai Yong, Peng Liu, Jia-Guang Sun, Jean-Claude Paul
Issue Date:June 2010
pp. 131-142
N-sided hole filling plays an important role in vertex blending. Piegl and Tiller presented an algorithm to interpolate the given boundary and cross-boundary derivatives in B-spline form. To deal with the incompatible cases that their algorithm cannot hand...
 
An Algorithm of Webpage Information Hiding Based on Class Selectors
Found in: Intelligent Information Technology and Security Informatics, International Symposium on
By Guang Sun
Issue Date:April 2010
pp. 691-694
The traditional algorithms of webpage information hiding have the common shortcoming that their embedding location is separated from the content of the webpage, so the ability of contradict with auto filtration is very poor. Based on the specification of c...
 
Automated Test Data Generation Algorithm Based on Reversed Binary Tree
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Jun-Yi Li, Jia-Guang Sun
Issue Date:August 2007
pp. 1124-1128
Automated test data generation technology is a hot researching area in automated software test. Some kinds of new concepts such as base node, control node, definition node and definition related control node set are proposed, and in addition, a solution to...
 
Automated Test Data Generation Based on Program Execution
Found in: Software Engineering Research, Management and Applications, ACIS International Conference on
By Jun-Yi Li, Jia-Guang Sun, Ying-Ping Lu
Issue Date:August 2006
pp. 229-236
Software test is a very important phase in software development, and an important means to ensure the software?s reliability. Path-oriented testing is a main approach in software test. In this paper, an automated test data generation method for linear appr...
 
On the Numerical Redundancies of Geometric Constraint Systems
Found in: Computer Graphics and Applications, Pacific Conference on
By Yan-Tao Li, Shi-Min Hu, Jia-Guang Sun
Issue Date:October 2001
pp. 0118
Determining redundant constraints is a critical task for geometric constraint solvers, since it dramatically affects the solution speed, accuracy, and stability. This paper attempts to determine the numerical redundancies of three-dimensional geometric con...
 
An Effective Feature-Preserving Mesh Simplification Scheme Based on Face Constriction
Found in: Computer Graphics and Applications, Pacific Conference on
By Jian-Hua Wu, Shi-Min Hu, Jia-Guang Sun, Chiew-Lan Tai
Issue Date:October 2001
pp. 0012
A new mesh simplification scheme that uses the face constriction process is presented. By introducing a statistical measure that can distinguish triangles having vertices of high local roughness from triangles in flat regions into our weight-ordering equat...
 
Application of Wireless Sensor Networks in Post-Disaster Road Monitoring System
Found in: Intelligent Networks and Intelligent Systems, International Workshop on
By Xu-Guang Sun,Xiao-Ling Sun,Qiu-Ge Yang,Shu-Nan Ma
Issue Date:November 2011
pp. 105-108
The post-disaster road monitoring system provides an interesting application area for wireless sensor networks. After the earthquake, roads are subject to be blocked by landslides. The people require a scalable and low-cost technology for getting real-time...
 
Improving Test Quality of Scan-Based BIST by Scan Chain Partitioning
Found in: Asian Test Symposium
By Dong Xiang, Ming-Jing Chen, Jia-Guang Sun, Hideo Fujiwara
Issue Date:November 2003
pp. 12
Test effectiveness of a test-per-scan BIST scheme is highly dependent on the length and the number of the scan chains. Fewer cycles are adopted to capture test responses when the length of the scan chains increases. On the other hand, the number of test in...
 
A Cost-Effective Scan Architecture for Scan Testing with Non-Scan Test Power and Test Application Cost
Found in: Design Automation Conference
By Dong Xiang, Shan Gu, Jia-Guang Sun, Yu-liang Wu
Issue Date:June 2003
pp. 744
A new scan architecture is proposed for full scan designed circuits. Scan flip-flops are grouped together if they do not have nay common successors. This technique produces no new redundant faults. Scan flip-flops in the same group have the same values in ...
 
A Matrix-Based Approach to Reconstruction of 3D Objects from Three Orthographic Views
Found in: Computer Graphics and Applications, Pacific Conference on
By Shi-Xia Liu, Shi-Min Hu, Jia-Guang Sun, Chiew-Lan Tai
Issue Date:October 2000
pp. 254
In this paper, we present a matrix-based technique for reconstructing solids with quadric surface from three orthographic views. First, the relationship between a conic and its orthographic projections is developed using matrix theory. We then address the ...
 
An on-chip global broadcast network design with equalized transmission lines in the 1024-core era
Found in: Proceedings of the International Workshop on System Level Interconnect Prediction (SLIP '12)
By Bill Lin, Chung-Kuan Cheng, Guang Sun, Lieguang Zeng, Shih-Hung Weng
Issue Date:June 2012
pp. 11-18
Based on current trends in multicore scaling, chips with 1024 cores may be available within the next decade. For such number of cores, cache coherence becomes a critical challenge because of the broadcasting operation. For the conventional electrical mesh ...
     
A cloud based SIM DRM scheme for the mobile internet
Found in: Proceedings of the 17th ACM conference on Computer and communications security (CCS '10)
By Chaokun Wang, Jia-Guang Sun, Jianmin Wang, Peng Zou, Zhang Liu
Issue Date:October 2010
pp. 759-761
With the rapid growth of the mobile industry, a considerable amount of mobile applications and services are available. Meanwhile, pirates and illegal distributions of digital contents have become serious issues. Digital Rights Management (DRM) aims at prot...
     
Identification of sections from engineering drawings based on evidence theory
Found in: Proceedings of the 2008 ACM symposium on Solid and physical modeling (SPM '08)
By Bin Jiang, Hui Zhang, Jia-Guang Sun, Jie-Hui Gong
Issue Date:June 2008
pp. 13-14
View identification is the basal process for solid reconstruction from engineering drawings. A new method is presented to label various views from a section-involved drawing and identify geometric planes through the object at which the sections are to be l...
     
Converting hybrid wire-frames to B-rep models
Found in: Proceedings of the 2007 ACM symposium on Solid and physical modeling (SPM '07)
By Hui Zhang, Jia-Guang Sun, Jie-Hui Gong, Yi-Wen Zhang
Issue Date:June 2007
pp. 283-289
Solid reconstruction from engineering drawings is one of the efficient technologies to product solid models. The B-rep oriented approach provides a practical way for reconstructing a wide range of objects. However, its major limitation is the computational...
     
A cost-effective scan architecture for scan testing with non-scan test power and test application cost
Found in: Proceedings of the 40th conference on Design automation (DAC '03)
By Dong Xiang, Jia-Guang Sun, Shan Gu, Yu-liang Wu
Issue Date:June 2003
pp. 744-747
A new scan architecture is proposed for full scan designed circuits. Scan flip-flops are grouped together if they do not have any common successors. This technique produces no new redundant faults. Scan flip-flops in the same group have the same values in ...
     
Foam Ingredients Transformation and Control Method of Leachate Treatment by MBR System
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Yao Hong, Shan Wen-guang, Sun Ming-Dong, Lv Ze-yu
Issue Date:February 2011
pp. 75-79
In the present work, the formation of foam from leach ate in a bench-scale Membrane Bio-reactor(MBR) was analyzed, and three kinds of defoamers (A (triethyl phosphate), B (fungicide), C(silicone) )was studied to control biologic foam by parallely pilot. Th...
 
Face Recognition Method Based on FLPP
Found in: Electronic Commerce and Security, International Symposium
By Yang Liu, Jin-guang Sun
Issue Date:July 2010
pp. 298-301
In view of the problems of features in face recognition, a new face image feature extraction and recognition method----Fractal Locality Preserving Projections (FLPP) is proposed in this paper. FLPP first gets the high order statistic information by calcula...
 
Research and Implementation of the CMOS Camera Device Driver Based on S3C2440
Found in: Intelligent Computation Technology and Automation, International Conference on
By Min Zhang, Jin-guang Sun, Shi Wang
Issue Date:May 2010
pp. 1039-1042
With the processing of CMOS technology, the technology of video acquisition based on CMOS is becoming a new trend. However, manyCMOS camera chip is not supported by the newest Linux kernel yet. In this paper, the method of designing the CMOS camera driver ...
 
Video Watermarking Scheme Based on Normalization of Pseudo-Zernike Moment
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Wei He, Jin-guang Sun, Zhong-xu Yang, Di Yang
Issue Date:March 2010
pp. 1080-1082
Present an anti-geometric attacks video watermarking scheme based on normalization of pseudo-Zernike moment. Employing the RST invariant property of improved Pseudo-Zernike moment magnitudes, the watermark image is embedded into the centre circle area of I...
 
RST Invarian Watermarking Scheme Based on SIFT Feature and Pseudo-Zernike Moment
Found in: Computational Intelligence and Design, International Symposium on
By Jin-guang Sun, Wei He
Issue Date:December 2009
pp. 10-13
RST invarian watermarking scheme is proposed in this paper based on the SIFT feature points and improved pseudo-Zernike moment. Firstly, feature points are detected using SIFT, and some suitable points are selected to form localized feature regions which a...
 
A New Fractal Watermarking Scheme Based on Image Normalization
Found in: Multimedia Information Networking and Security, International Conference on
By Xi-kui Miao, Jin-guang Sun, Yu-han Zhang
Issue Date:November 2009
pp. 149-153
Geometric attacks are the challenging problems for most image watermarking today. Such attacks are very simple to implement, yet they can defeat most of the existing watermarking algorithms without causing serious perceptual image distortion. In the paper,...
 
The Bayesian Analysis of Reliability of Electrical Products
Found in: Computer Science and Computational Technology, International Symposium on
By Shao-hua Jin, Jian-guo Lu, Yan-ping Wan, Shu-guang Sun
Issue Date:December 2008
pp. 430-433
The technology of the reliability theory and its application is a new technology. It has important effect to ensure and improve the quality of the products of electrical engineering. In the reliability test of the products of electrical engineering, assume...
 
A New Evaluation Method about the Reliability of the Electrical Products
Found in: Intelligent Computation Technology and Automation, International Conference on
By Shao-hua Jin, Yan-ping Wan, Shu-guang Sun, Nan Li
Issue Date:October 2008
pp. 953-956
The technology of the reliability theory and its application is a new technology. It has important effect to ensure and improve the quality of the products. This paper studies on the evaluation method of the reliability characters of the electrical product...
 
 1