Search For:

Displaying 1-50 out of 108 total
A research of resource provider-oriented pricing mechanism based on game theory in Cloud Bank model
Found in: Cloud and Service Computing, International Conference on
By Huixi Li,Hao Li
Issue Date:December 2011
pp. 126-130
Cloud computing is becoming more and more mature, and an IaaS cloud computing model called Cloud Bank [1, 2, 3, 4, 13], which is based on commercial bank model, has been designed. Cloud Bank model can be partly distinguished from other traditional IaaS pro...
A Service Level Agreement for the Resource Transaction Risk Based on Cloud Bank Model
Found in: 2012 International Conference on Cloud and Service Computing (CSC)
By Mojun Su,Hao Li,Shenglin Yang,Joan Lu
Issue Date:November 2012
pp. 198-203
Cloud computing is a new business computing model. The environment of the resources is very complex. The resources are physically distributed and connected by the network. There are many risks existing in the resource transactions. So how to make sure that...
L-UCON: Towards Layered Access Control with UCON
Found in: Computational Science and Engineering, IEEE International Conference on
By Hao Hu, Hao Li, Dengguo Feng
Issue Date:August 2009
pp. 823-829
Traditional access control solutions suffer from difficulties in access rights authorization and usage policy enforcement, especially in highly distributed environments. The layered nature of common digital content should also be exploited to efficiently p...
Topic-Sensitive Link-Ranking Approach for Academic Expert Recruiting
Found in: Computer and Computational Sciences, International Multi-Symposiums on
By Hao Wu, Hao Li, Xuejie Zhang, Shaowen Yao
Issue Date:October 2008
pp. 150-157
The problem of academic expert recruiting is concerned with finding the experts on a specified research field. It has many real-world applications and has recently attracted much attention. However, the existing methods are not versatile and entirely suit ...
Example-based facial rigging
Found in: ACM Transactions on Graphics (TOG)
By Hao Li, Mark Pauly, Thibaut Weise, Hao Li, Mark Pauly, Thibaut Weise, Hao Li, Mark Pauly, Thibaut Weise, Hao Li, Mark Pauly, Thibaut Weise
Issue Date:July 2010
pp. 1-10
We introduce a method for generating facial blendshape rigs from a set of example poses of a CG character. Our system transfers controller semantics and expression dynamics from a generic template to the target blendshape model, while solving for an optima...
Analysis of electrode shape effect on single HeLa cell impedance using COMSOL simulation
Found in: 2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
By Jai-Hao Li,Wen-Hao Chang,Min-Haw Wang
Issue Date:December 2013
pp. 47
In disease prophylaxis, single cell inspection provides more in-depth information than that made available from conventional examinations. At the single cell level, the electrical properties of the cell are helpful in understanding the effects of the cellu...
Unit Model of Binary SVM with DS Output and its Application in Multi-class SVM
Found in: Computational Intelligence and Design, International Symposium on
By Zhou Hao,Li Shaohong,Sun Jinping
Issue Date:October 2011
pp. 101-104
A unit model of binary SVM with DS output is set up by using sigmoid function which maps the relative algebraic distance between the sample and the bound of each class into the BPA of DS evidence theory. As its application, a new multi-class SVM is designe...
A Pricing Algorithm for Cloud Computing Resources
Found in: Network Computing and Information Security, International Conference on
By Hao Li, Jianhui Liu, Guo Tang
Issue Date:May 2011
pp. 69-73
Currently, resource scheduling methods of cloud computing are mainly focused on scheduling and optimization of the underlying physical resources, but there is no satisfactory resource scheduling for providers from the aspect of economic principles in the c...
A Research and Design on Surface EMG Amplifier
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Hao Li, Shan Xu, Peng Yang, Lingling Chen
Issue Date:March 2010
pp. 306-309
As the characteristics of SEMG are weak and vulnerable to external noise, it must to establish the appropriate acquisition and amplification system. INA128 chip is used to be as the core IC of the SEMG amplifier. The IC UAF42 is used to be the notch filter...
Dynamic Performance Evaluation Model of Collaborative Knowledge Chain in Collaborative Manufacturing Process
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Hao Li, Guofu Luo, Jun Ma, Bin Wang
Issue Date:April 2009
pp. 762-766
Building a dynamic performance evaluation model is an important part in the management of collaborative manufacturing process. By analyzing the current evaluating method, this paper firstly put forward the mathematical model of dynamic performance evaluati...
Structured Light Based Reconstruction under Local Spatial Coherence Assumption
Found in: 3D Data Processing Visualization and Transmission, International Symposium on
By Hao Li, Raphael Straub, Hartmut Prautzsch
Issue Date:June 2006
pp. 575-582
3D scanning techniques based on structured light usually achieve robustness against outliers by performing multiple projections to simplify correspondence. However, for cases such as dynamic scenes, the number of frames captured from a certain view must be...
Achieving Energy Conservation, Coverage and Connectivity Requirements in Wireless Sensor Networks
Found in: Distributed Computing Systems Workshops, International Conference on
By Li Liu, Bin Hu, Huifang Miao, Hao Li, Lian Li, Qinglin Zhao
Issue Date:June 2009
pp. 227-232
critical application requirements in wireless sensor networks. Related researches have either concerned coverage, connectivity, and energy conservation separately or required sensing/communication range restrictions. In this paper, we aim to maximize the n...
A Quantifiable Trust Model for Multi-agent System Based on Equal Relations
Found in: Computational Intelligence and Security, International Conference on
By Li Li, Hao Li, Gehao Lu, ShaoWen Yao
Issue Date:December 2007
pp. 291-295
The paper first analyzes trust relations, combining the characteristic of multi-agent system, investigates the equal-relations based trust mechanism for multi- agent system, and proposes a possible trust model to quantify and manage the reliability of agen...
Study on the Service Model of Product Service Provider
Found in: System Science, Engineering Design and Manufacturing Informatization, International Conference on
By Hao Li, Xiao-Min Li
Issue Date:November 2010
pp. 42-44
On the base of the analysis about the concept and classification of product service system(PSS), the author classified the product service provider(PSP) into three types, including product-oriented PSP, use-oriented PSP and result-oriented PSP, and points ...
Distributed Compressed Sensing-Based Data Fusion in Sensor Networks
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Jian Kang, Liwei Tang, Xianzhang Zuo, Aihua Li, Hao Li
Issue Date:September 2010
pp. 1083-1086
Aiming at the monitored nonstationary signal in sensor networks, distributed compressed sensing-based data aggregation model and algorithm, DCS-DF-1, is presented to reduce the number of transmissions in sensor networks and improve the precision of sensing...
The Design and Accomplish of Three-Tier Framework in the Meteorological Visualization System
Found in: Intelligent Computation Technology and Automation, International Conference on
By Li Ma, Zhihong Jiang, Hao Li, Jie Chen
Issue Date:May 2010
pp. 751-754
It’s a problem to achieve the combination of automatic drawing and the professional knowledge of meteorological expert when people develop the Lightning Warning Interactive and Visible System with Java. This paper gives a visualization system based on Java...
Implementation of Thermistor Linearization Using LabVIEW
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Chin-Fu Tsai, Lung-Tsai Li, Chin-Hao Li, Ming-Shing Young
Issue Date:September 2009
pp. 530-533
Thermistor nonlinearity is an important problem in the applications of temperature measurement. Much research has been devoted to accurate linearization but typical methods still involve complicated circuits or require algorithms for training neural networ...
A Novel Approach to Commercial Detection in News Video
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Shijin Li, Hao Li, Zhijian Wang
Issue Date:August 2007
pp. 86-90
The Detection of commercials in news video has been a challenging problem because of the diversity of the commercial programs. In this paper, we propose a novel algorithm for the detection of commercials in news program. In our method, firstly shot transit...
Research on Group Decision Making Based on Linguistic Information Processing
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Wang Hao,Li Donghui
Issue Date:June 2013
pp. 430-433
In this paper, to settle the problem of group decision making in terms of partial information formed in a kind of linguistic verdict matrix, a group decision making approach is put forward based on rough sets using the dominance-based rough sets model. It ...
A Heuristic Reinforcement Learning Based on State Backtracking Method
Found in: 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)
By Min Fang,Hao Li,Xiaosong Zhang
Issue Date:December 2012
pp. 673-678
Since learning action selection strategy is time-consuming due to the reinforcement learning algorithm, a heuristic reinforcement learning algorithm is presented based on the state backtracking reinforcement learning to improve the action selection strateg...
Credit Contract between Bank and Third-party Logistics Firm in Inventory Financing in China
Found in: 2012 International Conference on Business Computing and Global Informatization (BCGIN)
By Peng Xu,Hao Li,Yong Wang,Kai Rao
Issue Date:October 2012
pp. 78-82
In our study we apply the principal-agent model to study credit contract proposed by banks to motivate third-party logistics firms (TPL) and consider supervision as an important variable. Our results indicate that when supervision is introduced into contra...
Botnet Topology Reconstruction: A Case Study
Found in: 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
By Ming-Yi Liao,Jynu-Hao Li,Chu-Sing Yang,Min Chen,Chun-Wei Tsai,Ming-Cho Chang
Issue Date:July 2012
pp. 529-534
Over the past decade, bot net has been a serious threat to the Internet because it can be used to launch a variety of attacks on the Internet. To prevent the attacks, we have to fully understand the infection paths and attack methods of bot net. Hence, thi...
Multi-view hair capture using orientation fields
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Linjie Luo, Hao Li,S. Paris,T. Weise,M. Pauly,S. Rusinkiewicz
Issue Date:June 2012
pp. 1490-1497
Reconstructing realistic 3D hair geometry is challenging due to omnipresent occlusions, complex discontinuities and specular appearance. To address these challenges, we propose a multi-view hair reconstruction algorithm based on orientation fields with str...
An Implementation of GPU Accelerated MapReduce: Using Hadoop with OpenCL for Data- and Compute-Intensive Jobs
Found in: Service Sciences, International Joint Conference on
By Miao Xin,Hao Li
Issue Date:May 2012
pp. 6-11
MapReduce is an efficient distributed computing model for large-scale data processing. However, single-node performance is gradually to be the bottleneck in compute-intensive jobs. This paper presents an approach of MapReduce improvement with GPU accelerat...
Demo Abstract: Monitoring Wide-Area Nature Reserves Based on Long-Distance Wireless Mesh Networks
Found in: Cyber-Physical Systems, IEEE/ACM International Conference on
By Zenghua Zhao,Ziwei Liu,Junjiao Ye,Hao Li
Issue Date:April 2012
pp. 226
Wireless sensor networks have been proved to be mature technologies to monitor nature reserves for wildlife and ecological environment protection. Nature reserves are particularly wide-area and consist of complex terrains. Moreover most of them have no 2G/...
The Study of Comparison and Conversion about Traditional Mongolian and Cyrillic Mongolian
Found in: Intelligent Networks and Intelligent Systems, International Workshop on
By Hao Li,Bao Sarina
Issue Date:November 2011
pp. 199-202
Traditional Mongolian and Cyrillic Mongolian are both the characters used by Mongolians, although their pronunciations are basically the same, the shapes of characters and the styles of writing are quite different from each other. In this paper, through th...
Classification and Screening of Recognition Protein Complexes with Genetic Programming
Found in: Bioinformatic and Bioengineering, IEEE International Symposium on
By Huang-Cheng Kuo,Jia-Hao Li
Issue Date:October 2011
pp. 287-290
No summary available.
Research of Voice Activity Detection Algorithm
Found in: Computational and Information Sciences, International Conference on
By Zheng Hao,Li Deming
Issue Date:October 2011
pp. 853-855
In this paper, voice activity detection (VAD) algorithms and the development are introduced firstly, and then the analysis and comparison of the dominating VAD algorithms are proposed. Finally, the development characteristics of VAD are summarized. The sim...
A New Type Reducer Design Method of First Selection
Found in: Digital Manufacturing and Automation, International Conference on
By Kui Jin,Hao Li
Issue Date:August 2011
pp. 5-7
In order to solve the gear reducer first selection design basis, the problem of insufficient, apply optimized design theory, write gear reducer first selection design mathematical model. Use level 2 incLined gear reducer as an example, write MATLAB and gra...
Feedback reduction for MIMO broadcast channel with heterogeneous fading
Found in: Computers and Communications, IEEE Symposium on
By Jin-Hao Li, Hsuan-Jung Su
Issue Date:July 2011
pp. 573-578
This paper considers feedback load reduction for multiuser multiple input multiple output (MIMO) broadcast channel where the users' channel distributions are not homogeneous. A cluster-based feedback scheme is proposed such that the range of possible signa...
The Construct of Data Integration Model of Heterogeneous E-Government System Based on Topic Maps
Found in: Intelligent Computation Technology and Automation, International Conference on
By Fei Ye,Hao Li,Min Hu
Issue Date:March 2011
pp. 263-266
Based on the study of data integration in the unified information platform of heterogeneous e-government system and the investigation of the design of e-government, the technology of topic maps and the relational database, a new data integrated model was i...
Research on the Voltage Distribution of Interconnected Distributed Network - Distributed Generation
Found in: Asia-Pacific Power and Energy Engineering Conference
By Shu-ying Yang, Hao Li
Issue Date:March 2011
pp. 1-4
The Research of Grid Resource Scheduling Mechanism Based on Pareto Optimality
Found in: Software Engineering, World Congress on
By Ran Chen, Hao Li
Issue Date:December 2010
pp. 9-12
As a new computing pattern, Grid computing makes the aggregation, selection, and sharing of geographically distributed heterogeneous resources possible to solve large-scale issues of commerce, engineering, and science. However, it is problematic that the g...
The Pricing Scheme of the Grid Resource Based on Cournot Equilibrium
Found in: Software Engineering, World Congress on
By Hao Li, Bo Wang
Issue Date:December 2010
pp. 5-8
As the complexity of grid environment, grid contains a variety of resources. We introduce the economic model in order to respond the changes of resource supply and demand. In this paper, we based on the original economic model and subdivision the role of r...
An Evaluation Method on Service Capability of Product Maintenance Service Provider
Found in: System Science, Engineering Design and Manufacturing Informatization, International Conference on
By Hao Li, Xu-Ming Pei
Issue Date:November 2010
pp. 49-51
One of types about complex product maintenance is to outsource the business to product service providers. A set of service capability evaluation indices about complex product maintenance service provider were established, the indices were given by using De...
The Study on Surface Roughness and Fatigue Life of Fastener Holes for 7075 Al Alloy
Found in: System Science, Engineering Design and Manufacturing Informatization, International Conference on
By Xu-ming Pei, Hao Li, Jie Liu, Duan-qin Zhang
Issue Date:November 2010
pp. 301-305
The aim of investigation is to analyze the effects of conventional drilling processes with multiple step and Winslow(one-step compound process) on the surface roughness and fatigue life of fastener holes drilled on 7075-7351 Al alloy for aircraft assembly....
Road Boundaries Extraction Using a Centre-Surround Cell Operator and Phase Congurency
Found in: 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010)
By Shaoguang Zhou, Hao Li, Renxi Chen
Issue Date:October 2010
pp. 321-325
In this paper, we present a novel system for extracting road map from pyramid data sets generated from high resolution images. With the model of two Gaussian functions, we design a centre-surround cell operator and subsequent half-wave rectification may he...
Research of Control Method for a Flight Vehicle
Found in: 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010)
By Hao Li, Junyi Wang, Zhigang Xu, Yu He
Issue Date:October 2010
pp. 162-165
A separation control method for a flight vehicle is presented. The difficulty of the control system of the flight vehicle lies in the sequential control in the separation process. Through test on the electromagnetism characteristic of the electromagnetism ...
Research on Key Technologies in Pervasive Simulation Based on Multi-agent System
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Liu Hao, Li Ni
Issue Date:September 2010
pp. 1248-1251
Currently, modeling and simulation systems have not gotten rid of “computer-centric” and “desktop computing” pattern. The new pattern of simulation of combing physical space with cyberspace can be realized by bringing pervasive technologies into simulation...
Personal Authentication Using Human Iris Recognition Based on Embedded Zerotree Wavelet Coding
Found in: Computing in the Global Information Technology, International Multi-Conference on
By Lili Hsieh, Wen-Shiung Chen, Tzung-Hao Li
Issue Date:September 2010
pp. 99-103
This paper presents a biometric recognition system based on the iris of a human eye using embedded zerotree wavelet coding. The proposed system consists of three modules: image pre-processing, feature extraction, and recognition modules. Image pre-processi...
Dynamic Web Services Composition Based on Linear Temporal Logic
Found in: Information Science and Management Engineering, International Conference of
By Shengang Hao, Li Zhang
Issue Date:August 2010
pp. 362-365
Dynamic composition of web services is a crucial aspect of web service technology, which gives us the opportunity of selecting new services and best suits we need. In this paper we discuss a technique based on linear temporal logic that solves the problem ...
Effective Multi-level Image Representation for Image Categorization
Found in: Pattern Recognition, International Conference on
By Hao Li, Yuxin Peng
Issue Date:August 2010
pp. 1048-1051
This paper proposes a novel approach for image categorization based on effective multi-level image representation(MLIR). On one hand, to exploit fully the information of segmented regions at different levels in the image, we recursively segment the image i...
A Study of Pseudo-Automorphism Group about the C_n
Found in: Information Technology and Computer Science, International Conference on
By Yanzhong Hu, Shan Lin, Huazhong Jin, Hao Li
Issue Date:July 2010
pp. 332-335
This paper proposes an approach based on graph isomorphism to find the correspondence in relational matching. We describe a pseudo-automorphism group as Pseudo-aut (G) of a graph G, which is a set of all pseudo-automorphisms of G. We discuss some propertie...
Electrically Excited Synchronous Motor Three-Level DTC_SVM Control Based on Novel Flux Observer
Found in: Electrical and Control Engineering, International Conference on
By Xuanqin Wu, Guojun Tan, Meng Liu, Hao Li
Issue Date:June 2010
pp. 3689-3692
The accurate observer and effective control of the stator flux for electrically excited synchronous motor, has a significant sense to the performance improvement of direct torque control system. For this, a novel full-order closed-loop stator flux estimato...
Semantic Web Service Matching Based on Service Hierarchy
Found in: Electrical and Control Engineering, International Conference on
By Shen-gang Hao, Li Zhang
Issue Date:June 2010
pp. 2999-3002
A kind of semantic web service matching method based on service hierarchy is proposed, which utilizes the automatic reasoning capability of OWL to construct concept hierarchy and then encodes concept hierarchy in order to transform the complex deduction of...
Semantic Web Services Composition Based on Secure Conversation Mode
Found in: Electrical and Control Engineering, International Conference on
By Shen-gang Hao, Li Zhang
Issue Date:June 2010
pp. 3003-3008
Automation of semantic web service composition is one of the most promising challenges in semantic web service research area, in which security research on service composition has attracted more attention. In this paper, we present a model of Action labele...
Information Security Risk Management Framework for the Cloud Computing Environments
Found in: Computer and Information Technology, International Conference on
By Xuan Zhang, Nattapong Wuwong, Hao Li, Xuejie Zhang
Issue Date:July 2010
pp. 1328-1334
The security risks associated with each cloud delivery model vary and are dependent on a wide range of factors including the sensitivity of information assets, cloud architectures and security controls involved in a particular cloud environment [7]. Over t...
Modal Analysis and Dynamic Response Test of Floor-Type Boring and Milling Machine
Found in: Computing, Control and Industrial Engineering, International Conference on
By Wu You-De, Situ Yu, Yang Hao, Li Bai-Lin
Issue Date:June 2010
pp. 166-169
The dynamic response analysis on TX6916 floor type boring and milling machine is made with the finite element in a testing method so as to test the dynamic response of this machine. The finite element analysis software ANSYS is adopted and the finite eleme...
Knowledge-Guided Docking of Flexible Ligands to SH2 Domain Proteins
Found in: Bioinformatic and Bioengineering, IEEE International Symposium on
By Haiyun Lu, Shamima Banu Bte Sm Rashid, Hao Li, Wee Kheng Leow, Yih-Cherng Liou
Issue Date:June 2010
pp. 185-190
Studies of interactions between protein domains and ligands are important in many aspects such as cellular signaling and regulation. In this work, we applied a three-stage knowledge-guided approach of docking flexible peptide ligands to SH2 domains. The fi...
A Coverage-Aware QoS Control in Wireless Sensor Networks
Found in: Communications and Mobile Computing, International Conference on
By Rong-Guei Tsai, Hao-Li Wang
Issue Date:April 2010
pp. 192-196
Wireless Sensor Networks (WSN) get more and more attentions in recent years. Most of WSN research focus on routing and data aggregation, but only a few papers discuss the QoS area. In an earlier work, an approach based on the Gur game was introduced. The G...
 1  2 Next >>