Search For:

Displaying 1-50 out of 242 total
Semantic-Aware Metadata Organization Paradigm in Next-Generation File Systems
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yu Hua,Hong Jiang,Yifeng Zhu,Dan Feng,Lei Tian
Issue Date:February 2012
pp. 337-344
Existing data storage systems based on the hierarchical directory-tree organization do not meet the scalability and functionality requirements for exponentially growing data sets and increasingly complex metadata queries in large-scale, Exabyte-level file ...
 
Discriminant Analysis with Tensor Representation
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Shuicheng Yan, Dong Xu, Qiang Yang, Lei Zhang, Xiaoou Tang, Hong-Jiang Zhang
Issue Date:June 2005
pp. 526-532
In this paper, we present a novel approach to solving the supervised dimensionality reduction problem by encoding an image object as a general tensor of 2nd or higher order. First, we propose a Discriminant Tensor Criterion (DTC), whereby multiple interrel...
 
Automatic Performance Evaluation for Video Text Detection
Found in: Document Analysis and Recognition, International Conference on
By Xian-Sheng Hua,Liu Wenyin,Hong-Jiang Zhang
Issue Date:September 2001
pp. 0545
Abstract: In this paper, we propose an objective, comprehensive and difficulty-independent performance evaluation protocol for video text detection algorithms. The protocol includes a positive set and a negative set of indices at textbox level, which evalu...
 
Motion Retrieval by Temporal Slices Analysis
Found in: Pattern Recognition, International Conference on
By Chong-Wah Ngo, Ting-Chuen Pong, Hong-Jiang Zhang
Issue Date:August 2002
pp. 40064
In this papel; we investigate video shots retrieval based on the analysis of temporal slice images. Temporal slices are a set of2D images extracted along the time dimension of image sequences. They encode rich set of motion clues for shot similarity measur...
 
Neighborhood Preserving Embedding
Found in: Computer Vision, IEEE International Conference on
By Xiaofei He, Deng Cai, Shuicheng Yan, Hong-Jiang Zhang
Issue Date:October 2005
pp. 1208-1213
Recently there has been a lot of interest in geometrically motivated approaches to data analysis in high dimensional spaces. We consider the case where data is drawn from sampling a probability distribution that has support on or near a submanifold of Eucl...
 
Highlight sound effects detection in audio stream
Found in: Multimedia and Expo, IEEE International Conference on
By Rui Cai, Lie Lu, Hong-Jiang Zhang, Lian-Hong Cai
Issue Date:July 2003
pp. 37-40
This paper addresses the problem of highlight sound effects detection in audio stream, which is very useful in fields of video summarization and highlight extraction. Unlike researches on audio segmentation and classification, in this domain, it just locat...
 
An Efficient Multiple Paths Routing Protocol for Ad-hoc Networks
Found in: Information Networking, International Conference on
By Ming-Hong Jiang, Rong-Hong Jan
Issue Date:February 2001
pp. 544
In this paper we present an efficient routing protocol, called as Multiple Next Hops (MNH) routing protocol, which is based on Ad-hoc On-demand Distance Vector (AODV) routing protocol for ad-hoc networks. The pro-posed MNH protocol establishes multiple pat...
 
Modeling of Learning Inference and Decision-Making Engine in Cognitive Radio
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Yuqing Huang, Jiao Wang, Hong Jiang
Issue Date:April 2010
pp. 258-261
Cognitive radio (CR) is an intelligent wireless communication system and the core of it is the cognitive engine. Cognitive engine is expected to implement cognitive learning, inference, decision-making through the artificial intelligence technology to deci...
 
Graph Embedding: A General Framework for Dimensionality Reduction
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Shuicheng Yan, Dong Xu, Benyu Zhang, Hong-Jiang Zhang
Issue Date:June 2005
pp. 830-837
In the last decades, a large family of algorithms —. supervised or unsupervised; stemming from statistic or geometry theory.have been proposed to provide different solutions to the problem of dimensionality reduction. In this paper, beyond the different mo...
 
Concurrent Subspaces Analysis
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Dong Xu, Shuicheng Yan, Lei Zhang, Hong-Jiang Zhang, Zhengkai Liu, Heung-Yeung Shum
Issue Date:June 2005
pp. 203-208
A representative subspace is significant for image analysis, while the corresponding techniques often suffer from the curse of dimensionality dilemma. In this paper, we propose a new algorithm, called Concurrent Subspaces Analysis (CSA), to derive represen...
 
Automatic Video Summarization by Graph Modeling
Found in: Computer Vision, IEEE International Conference on
By Chong-Wah Ngo, Yu-Fei Ma, Hong-Jiang Zhang
Issue Date:October 2003
pp. 104
We propose a unified approach for summarization based on the analysis of video structures and video highlights. Our approach emphasizes both the content balance and perceptual quality of a summary. Normalized cut algorithm is employed to globally and optim...
 
Motion-Based Video Representation for Scene Change Detection
Found in: Pattern Recognition, International Conference on
By Chong-Wah Ngo, Ting-Chuen Pong, Roland T. Chin, Hong-Jiang Zhang
Issue Date:September 2000
pp. 1827
We present a newly developed scheme for automatically partitioning videos into scenes. A scene is generally referred to as a group of shots taken place in the same site. In this paper, we first propose a motion annotation algorithm based on the analysis of...
 
An application-aware approach to systems support for big data [Keynote address]
Found in: 2013 IEEE 24th International Conference on Application-specific Systems, Architectures and Processors (ASAP)
By Hong Jiang
Issue Date:June 2013
pp. 1
Summary form only given. Everyday 2.5 quintillion (2.5×1018, or 2.5 million trillion) bytes of data are created by people. This data comes from everywhere: from traditional scientific computing and on-line transactions, to popular social network and mobile...
 
Forest Carbon Sinks Information Acquisition and Regional Low Carbon Development Analysis
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Hong Jiang, Fu-ji Chen, Qin-min Wang
Issue Date:November 2010
pp. 409-412
Scientific decision is normally based on the scientific data or valid information. The forest carbon sinks information of Fujian Province, China was simulated by the boreal ecosystem productivity simulator (BEPS) and validated by the field measurement samp...
 
Testing collaborative traffic over wireless protocols
Found in: Frontiers in Education, Annual
By A. Eck,L.-K. Soh, Hong Jiang,T. Chou
Issue Date:October 2007
pp. F4J-11-F4J-16
As technology advances, new opportunities present themselves for computer supported learning in educational environments. One of the enabling technologies for these opportunities is wireless networking. Without being tethered to wires, students can use lap...
 
Implementing and Evaluating Security Controls for an Object-Based Storage System
Found in: Mass Storage Systems and Technologies, IEEE / NASA Goddard Conference on
By Zhongying Niu, Ke Zhou, Dan Feng, Hong Jiang, Frank Wang, Hua Chai, Wei Xiao, Chunhua Li
Issue Date:September 2007
pp. 87-99
This paper presents the implementation and performance evaluation of a real, secure object-based storage system compliant to the T10 OSD standard. In contrast to previous work, our system implements the entire three security methods of the OSD security pro...
 
Activity-Aware Registers Placement for Low Power Gated Clock Tree Construction
Found in: VLSI, IEEE Computer Society Annual Symposium on
By Weixiang Shen, Yici Cai, Xianlong Hong, Jiang Hu
Issue Date:March 2007
pp. 383-388
As power consumption of the clock tree dominates over 40% of the total power in modern high performance VLSI designs, measures must be taken to keep it under control. One of the most effective methods is based on clock gating to shut off the clock when the...
 
Graph Embedding and Extensions: A General Framework for Dimensionality Reduction
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Shuicheng Yan, Dong Xu, Benyu Zhang, Hong-Jiang Zhang, Qiang Yang, Stephen Lin
Issue Date:January 2007
pp. 40-51
Over the past few decades, a large family of algorithms—supervised or unsupervised; stemming from statistics or geometry theory—has been designed to provide different solutions to the problem of dimensionality reduction. Despite the different motivations o...
 
Semi-Supervised Kernel Regression
Found in: Data Mining, IEEE International Conference on
By Meng Wang, Xian-Sheng Hua, Yan Song, Li-Rong Dai, Hong-Jiang Zhang
Issue Date:December 2006
pp. 1130-1135
Insufficiency of training data is a major obstacle in machine learning and data mining applications. Many different semi-supervised learning algorithms have been proposed to tackle this difficulty by leveraging a large amount of unlabeled data. However, mo...
 
Towards Load Balancing Support for I/O-Intensive Parallel Jobs in a Cluster of Workstations
Found in: Cluster Computing, IEEE International Conference on
By Xiao Qin, Hong Jiang, Yifeng Zhu, David R. Swanson
Issue Date:December 2003
pp. 100
While previous CPU- or memory-centric load balancing schemes are capable of achieving the effective usage of global CPU and memory resources in a cluster system, the cluster exhibits significant performance drop under I/O-intensive workload conditions due ...
 
A Case Study of Parallel I/O for Biological Sequence Search on Linux Clusters
Found in: Cluster Computing, IEEE International Conference on
By Yifeng Zhu, Hong Jiang, Xiao Qin, David Swanson
Issue Date:December 2003
pp. 308
<p>In this paper we analyze the I/O access patterns of a widely-used biological sequence search tool and implement two variations that employ parallel-I/O for data access based on PVFS (Parallel Virtual File System) and CEFT-PVFS (Cost-Effective Faul...
 
Speech segmentation without speech recognition
Found in: Multimedia and Expo, IEEE International Conference on
By Dong Wang, Lie Lu, Hong-Jiang Zhang
Issue Date:July 2003
pp. 405-408
In this paper, we presented a semantic speech segmentation approach, in particular sentence segmentation, without speech recognition. In order to get phoneme level information without word recognition information, a novel vowel/consonant/pause (V/C/P) clas...
 
Improved Read Performance in a Cost-Effective, Fault-Tolerant Parallel Virtual File System (CEFT-PVFS)
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Yifeng Zhu, Hong Jiang, Xiao Qin, Dan Feng, David R. Swanson
Issue Date:May 2003
pp. 730
Due to the ever-widening performance gap between processors and disks, I/O operations tend to become the major performance bottleneck of data-intensive applications on modern clusters. If all the existing disks on the nodes of a cluster are connected toget...
 
Applications of Video-Content Analysis and Retrieval
Found in: IEEE Multimedia
By Nevenka Dimitrova, Hong-Jiang Zhang, Behzad Shahraray, Ibrahim Sezan, Thomas Huang, Avideh Zakhor
Issue Date:July 2002
pp. 42-55
<p>Managing multimedia data requires more than collecting the data into storage archives and delivering it via networks to homes or offices. We survey technologies and applications for video-content analysis and retrieval. We also give specific examp...
 
A NEWAPPROACH TO QUERY BY HUMMING IN MUSIC RETRIEVAL
Found in: Multimedia and Expo, IEEE International Conference on
By Lie Lu, Hong You, Hong-Jiang Zhang
Issue Date:August 2001
pp. 152
In this paper, we present a method for querying desired songs from music database by humming a tune. Since errors are inevitable in humming, tolerance should be considered. In order to suit or adapt to people's humming habit, a new melody representation an...
 
Making of Intelligent Processing System of Experiment Data in Physics Experiment
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Xing-fang Jiang, Xiang Li, Hong Jiang
Issue Date:August 2009
pp. 257-261
The intelligent processing system of experiment data was developped based on Multimedia ToolBook. There were many techniques in the system, such as intelligent table looking up, linear interpolation, diagnosing automatically the number of data, fitting of ...
 
Correlative multilabel video annotation with temporal kernels
Found in: ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
By Guo-Jun Qi, Hong-Jiang Zhang, Hong-Jiang Zhang, Jinhui Tang, Jinhui Tang, Meng Wang, Meng Wang, Tao Mei, Tao Mei, Xian-Sheng Hua, Xian-Sheng Hua, Yong Rui, Yong Rui
Issue Date:October 2008
pp. 1-27
Automatic video annotation is an important ingredient for semantic-level video browsing, search and navigation. Much attention has been paid to this topic in recent years. These researches have evolved through two paradigms. In the first paradigm, each con...
     
Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yinjin Fu,Hong Jiang,Nong Xiao,Lei Tian,Fang Liu,Lei Xu
Issue Date:May 2014
pp. 1155-1165
In personal computing devices that rely on a cloud storage environment for data backup, an imminent challenge facing source deduplication for cloud backup services is the low deduplication efficiency due to a combination of the resource-intensive nature of...
 
SANE: Semantic-Aware Namespacein Ultra-Large-Scale File Systems
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yu Hua,Hong jiang,Yifeng Zhu,Dan Feng,Lei Xu
Issue Date:May 2014
pp. 1328-1338
The explosive growth in data volume and complexity imposes great challenges for file systems. To address these challenges, an innovative namespace management scheme is in desperate need to provide both the ease and efficiency of data access. In almost all ...
 
Haswell: The Fourth-Generation Intel Core Processor
Found in: IEEE Micro
By Per Hammarlund,Alberto J. Martinez,Atiq A. Bajwa,David L. Hill,Erik Hallnor,Hong Jiang,Martin Dixon,Michael Derr,Mikal Hunsaker,Rajesh Kumar,Randy B. Osborne,Ravi Rajwar,Ronak Singhal,Reynold D'Sa,Robert Chappell,Shiv Kaushik,Srinivas Chennupaty,Stephan Jourdan,Steve Gunther,Tom Piazza,Ted Burton
Issue Date:March 2014
pp. 6-20
Haswell, Intel's fourth-generation core processor architecture, delivers a range of client parts, a converged core for the client and server, and technologies used across many products. It uses an optimized version of Intel 22-nm process technology. Haswel...
 
Exploring and Exploiting the Multilevel Parallelism Inside SSDs for Improved Performance and Endurance
Found in: IEEE Transactions on Computers
By Yang Hu,Hong Jiang,Dan Feng,Lei Tian,Hao Luo,Chao Ren
Issue Date:June 2013
pp. 1141-1155
Given the multilevel internal SSD parallelism at the different four levels: channel-level, chip-level, die-level, and plane-level, how to exploit these levels of parallelism will directly and significantly impact the performance and endurance of SSDs, whic...
 
SAR: SSD Assisted Restore Optimization for Deduplication-Based Storage Systems in the Cloud
Found in: 2012 IEEE 7th International Conference on Networking, Architecture, and Storage (NAS)
By Bo Mao,Hong Jiang,Suzhen Wu,Yinjin Fu,Lei Tian
Issue Date:June 2012
pp. 328-337
The explosive growth of digital content results in enormous strains on the storage systems in the cloud environment. The data deduplication technology has been demonstrated to be very effective in shortening the backup window and saving the network bandwid...
 
P-Dedupe: Exploiting Parallelism in Data Deduplication System
Found in: 2012 IEEE 7th International Conference on Networking, Architecture, and Storage (NAS)
By Wen Xia,Hong Jiang,Dan Feng,Lei Tian,Min Fu,Zhongtao Wang
Issue Date:June 2012
pp. 338-347
Data deduplication, an efficient space reduction method, has gained increasing attention and popularity in data-intensive storage systems. Most existing state-of-the-art deduplication methods remove redundant data at either the file level or the chunk leve...
 
SUV: A Novel Single-Update Version-Management Scheme for Hardware Transactional Memory Systems
Found in: 2012 IEEE International Symposium on Parallel & Distributed Processing (IPDPS)
By Zhichao Yan,Hong Jiang,Dan Feng,Lei Tian,Yujuan Tan
Issue Date:May 2012
pp. 131-143
In order to maintain the transactional semantics, Transactional Memory (TM) must guarantee isolated read and write operations in each transaction, meaning that it must spend a non-negligible and potentially significant amount of time on keeping track of th...
 
Towards Optimal Discriminating Order for Multiclass Classification
Found in: Data Mining, IEEE International Conference on
By Dong Liu,Shuicheng Yan,Yadong Mu,Xian-Sheng Hua,Shih-Fu Chang,Hong-Jiang Zhang
Issue Date:December 2011
pp. 388-397
In this paper, we investigate how to design an optimized discriminating order for boosting multiclass classification. The main idea is to optimize a binary tree architecture, referred to as Sequential Discriminating Tree (SDT), that performs the multiclass...
 
Classification Mining in Securities Investment Cost
Found in: Multimedia Information Networking and Security, International Conference on
By Qingsong Yu,Hong Jiang,Yongjun Yu
Issue Date:November 2011
pp. 205-209
Transaction cost plays an important role in the return on investment of the stock market. A classification model is proposed based on logistic regression, which can seek out the stocks with high costs, improve trading strategies, reduce total transaction c...
 
AA-Dedupe: An Application-Aware Source Deduplication Approach for Cloud Backup Services in the Personal Computing Environment
Found in: Cluster Computing, IEEE International Conference on
By Yinjin Fu,Hong Jiang,Nong Xiao,Lei Tian,Fang Liu
Issue Date:September 2011
pp. 112-120
The market for cloud backup services in the personal computing environment is growing due to large volumes of valuable personal and corporate data being stored on desktops, laptops and smart phones. Source deduplication has become a mainstay of cloud backu...
 
A Resource Reservation Algorithm with Muti-parameters
Found in: ChinaGrid, Annual Conference
By Ningning Gao,Hong Jiang
Issue Date:August 2011
pp. 211-214
Advance reservation as an effective technique to support QoS guarantees the availability of resources at specific time. However, it will produce resource fragmentations for processing resource by time sequence, moreover result in lowering resource utilizat...
 
DBA: A Dynamic Bloom Filter Array for Scalable Membership Representation of Variable Large Data Sets
Found in: Modeling, Analysis, and Simulation of Computer Systems, International Symposium on
By Jiansheng Wei,Hong Jiang,Ke Zhou,Dan Feng
Issue Date:July 2011
pp. 466-468
This paper proposes a Dynamic Bloom filter Array (DBA) to represent membership for variable large data sets in storage systems in a scalable way. DBA consists of dynamically created groups of space-efficient Bloom Filters (BFs) to accommodate changes in se...
 
Detecting Duplicates over Sliding Windows with RAM-Efficient Detached Counting Bloom Filter Arrays
Found in: Networking, Architecture, and Storage, International Conference on
By Jiansheng Wei,Hong Jiang,Ke Zhou,Dan Feng,Hua Wang
Issue Date:July 2011
pp. 382-391
Detecting duplicates over sliding windows is an important technique for monitoring and analysing data streams. Since recording the exact information of elements in a sliding window can be RAM-resource-intensive and introduce an unacceptable search complexi...
 
A Comprehensive Study on RAID-6 Codes: Horizontal vs. Vertical
Found in: Networking, Architecture, and Storage, International Conference on
By Chao Jin,Dan Feng,Hong Jiang,Lei Tian
Issue Date:July 2011
pp. 102-111
The RAID-6 architecture is playing an increasingly important role in modern storage systems. There are generally two kinds of RAID-6 codes, horizontal codes and vertical codes. Horizontal codes have been extensively studied and widely implemented, while ve...
 
SHHC: A Scalable Hybrid Hash Cluster for Cloud Backup Services in Data Centers
Found in: Distributed Computing Systems Workshops, International Conference on
By Lei Xu, Jian Hu, Stephen Mkandawire, Hong Jiang
Issue Date:June 2011
pp. 61-65
Data deduplication techniques are ideal solutions for reducing both bandwidth and storage space requirements for cloud backup services in data centers. Current data deduplication solutions rely on comparing fingerprints (hash values) of data chunks to iden...
 
CABdedupe: A Causality-Based Deduplication Performance Booster for Cloud Backup Services
Found in: Parallel and Distributed Processing Symposium, International
By Yujuan Tan,Hong Jiang,Dan Feng,Lei Tian,Zhichao Yan
Issue Date:May 2011
pp. 1266-1277
Due to the relatively low bandwidth of WAN (Wide Area Network) that supports cloud backup services, both the backup time and restore time in the cloud backup environment are in desperate need for reduction to make cloud backup a practical and affordable se...
 
RAID6L: A log-assisted RAID6 storage architecture with improved write performance
Found in: Mass Storage Systems and Technologies, IEEE / NASA Goddard Conference on
By Chao Jin,Dan Feng,Hong Jiang,Lei Tian
Issue Date:May 2011
pp. 1-6
The RAID6 architecture is playing an increasingly important role in modern storage systems due to its provision of very high reliability. However, its high write penalty, because of the double-parity-update overheads upon each write operation, has been a p...
 
Spatial Smoothing Based Permutation Deambiguity in Blind Separation of Coherent Mixtures for DOA Estimation
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Maowei Yin, Lixue Ren, Hong Jiang
Issue Date:January 2011
pp. 318-321
In this paper, a new method is proposed to perform direction of arrival (DOA) estimation when coherent sources mixtures are present. Fast independent component analysis (FastICA) algorithm is first used to estimate generalized steering matrix. Then, spatia...
 
Composite Agent Service Selection Algorithm for Non-functional Attributes Based on Simulated Annealing
Found in: Software Engineering, World Congress on
By Zhang Kun, Zhang Hong, Jiang Liming, Xu Jian
Issue Date:December 2010
pp. 101-106
With the development of autonomic computing, composite agent service selection problem for non-functional attributes has been taken as one of the most important issue in field of autonomic computing based on agent. Such a constrained composition selection ...
 
Vehicle Guidance Algorithm Considering Delays at Intersections
Found in: Digital Manufacturing and Automation, International Conference on
By Xiao Rui, Li Hong, Jiang Jia
Issue Date:December 2010
pp. 890-892
In urban traffic network, there is turning delays and turning prohibition etc. So it is more practical to use the algorithm considering delays at intersections than general algorithm to search optimal route. In order to save space, this paper proposes a ne...
 
STEM: Spatiotemporal Management of Capacity for Intra-core Last Level Caches
Found in: Microarchitecture, IEEE/ACM International Symposium on
By Dongyuan Zhan, Hong Jiang, Sharad C. Seth
Issue Date:December 2010
pp. 163-174
Efficient management of last level caches (LLCs) plays an important role in bridging the performance gap between processor cores and main memory. This paper is motivated by two key observations, based on our study of LLCs: 1) the capacity demand is highly ...
 
TRIP: Temporal Redundancy Integrated Performance Booster for Parity-Based RAID Storage Systems
Found in: Parallel and Distributed Systems, International Conference on
By Chao Jin, Dan Feng, Hong Jiang, Lei Tian, Jingning Liu, Xiongzi Ge
Issue Date:December 2010
pp. 205-212
Parity redundancy is widely employed in RAID-structured storage systems to protect against disk failures. However, the small-write problem has been a persistent root cause of the performance bottleneck of such parity-based RAID systems, due to the addition...
 
Improving Availability of RAID-Structured Storage Systems by Workload Outsourcing
Found in: IEEE Transactions on Computers
By Suzhen Wu, Hong Jiang, Dan Feng, Lei Tian, Bo Mao
Issue Date:January 2011
pp. 64-79
Due to the contention for the shared disk bandwidth, the user I/O intensity can significantly impact the performance of the online low-priority background tasks, thus reducing the reliability and availability of RAID-structured storage systems. In this pap...
 
 1  2 Next >>