Search For:

Displaying 1-42 out of 42 total
Voiceprint-biometric template design and authentication based on cloud computing security
Found in: Cloud and Service Computing, International Conference on
By Hua-Hong Zhu,Qian-Hua He,Hua-Hong Zhu,Hong Tang,Wei-Hua Cao
Issue Date:December 2011
pp. 302-308
To improve the security of voiceprint storage and transmission, we present a novel voiceprint protection approach with homomorphic encryption and authentication scheme for cloud computing environment in this paper. System supports to calculate distortion m...
Application of Genetic Neural Network to Water-Flooded Zone Identification
Found in: Computational and Information Sciences, International Conference on
By Hong Tang,Hong-qi Liu,Song Jin
Issue Date:October 2011
pp. 646-648
It is very important for oilfield development to identify water flooded zone effectively and evaluate the flooding degree or grade quantitatively because of high water cut for most oilfields in China. Automatic identification of water flooded zones is real...
Study on Fractal Characteristics of Cementation Exponent in Porous Media
Found in: Computational and Information Sciences, International Conference on
By Hong-Qi Liu,Hong Tang,Jing Liu
Issue Date:October 2011
pp. 637-641
This paper discussed the fractal properties of well logging curve, and according to the Hausdorff fractal dimension, defined the logging curve's fractal dimension, and as examples, resistivity and porosity fractal dimension, DR and D¦Õ, were given. Subse...
An SPMD-Like Algorithm for Parallelizing Molecular Dynamics Using OpenMP
Found in: Computing in Science & Engineering
By Mingze Bai,Shixin Sun,Hong Tang,Yusheng Dou,Glenn V. Lo
Issue Date:July 2013
pp. 48-56
The efficiency and scalability of early efforts to parallelize molecular dynamics calculations on shared-memory systems using OpenMP have been limited by attempts to avoid data race. Recent work has produced better performance, but involves significant rev...
Analysis of User Behavior in Mobile Internet Using Bipartite Network
Found in: 2012 Eighth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)
By Guo-Feng Zhao,Wen-Jing Lai,Chuan Xu,Hong Tang
Issue Date:December 2012
pp. 38-44
With the popularization of mobile network and smart phone, the number of mobile Internet users has been growing rapidity and various kinds of services have emerged. It is significant for both academia and industries to understand its user behavior. This pa...
The Priority Backoff Algorithm and PUSCH Power Control for Random Access in TD-LTE Trunking System
Found in: 2012 International Conference on Business Computing and Global Informatization (BCGIN)
By Hong Tang,Meijia Lei,Xueqian Wang,Cong Sun
Issue Date:October 2012
pp. 580-583
In this paper we propose priority back off algorithm for random access procedure setting different re-access probability to users depending on their different group priority grades, different user priority grades and different number of collisions in TD-LT...
Trajectory Algorithm for Localization of a Mobile Beacon in Wireless Sensor Networks
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Hong Tang,Lu Zhong
Issue Date:August 2012
pp. 1104-1107
After the general principle and the calculation process of some localization algorithms of wireless sensor network being introduced and analyzed, a novel algorithm of mobile beacon trajectory is proposed in this paper. Since a static trajectory does not wo...
Multi-level Selective Deduplication for VM Snapshots in Cloud Storage
Found in: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)
By Wei Zhang,Hong Tang,Hao Jiang,Tao Yang,Xiaogang Li,Yue Zeng
Issue Date:June 2012
pp. 550-557
In a virtualized cloud computing environment, frequent snapshot backup of virtual disks improves hosting reliability but storage demand of such operations is huge. While dirty bit-based technique can identify unmodified data between versions, full deduplic...
A New Algorithm of Multi-cell Time Slot Allocation in TD-SCDMA Trunking Communication System
Found in: Multimedia Information Networking and Security, International Conference on
By Hong Tang,Yan Zhang,Sheng Yao
Issue Date:November 2011
pp. 159-162
At present, most of the slot allocation algorithms are put forward based on a single BS, and lock of slot allocation for joint multi-cell. To solve this problem, the joint multi-cell time slot allocation algorithm based on the residual interference is prop...
A New Proactive Routing Method with L2-Trigger Based on Cross-layer Design in MANET
Found in: Business Computing and Global Informatization, International Conference on
By Hong Tang, Sheng Yao, Wei Wang, Yan Zhang, Jiezhen Liu
Issue Date:July 2011
pp. 611-614
The traditional way to design Mobile Ad hoc Network (MANET) routing has great limitations on account of only considering the performance and factors of the network layer itself. The popular Dynamic Source Routing (DSR) protocol used in MANET does not disco...
Research on 3-D DCT Operation Based on Transformation Basic Matrix
Found in: Multimedia and Signal Processing, International Conference on
By Sun Wenbang, Chen Hexin, Chen Hong, Tang Haiyan
Issue Date:May 2011
pp. 11-14
The 3-D DCT is different to be described by mathematical expression, and the transform is accomplished by computing 1-D DCT to each dimension of 3-D signal successively, which cannot embody the overall space character of 3-D transformation well. To overcom...
Research on Single Premium Model of Term Life Insurance Under Stochastic Interest
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Liu Hong, Tang Hengzhou
Issue Date:November 2010
pp. 174-178
In this paper, according to the time series theory and the term life insurance of fixed insurance amount, a mathematical model of single premium of term life insurance under stochastic interest is established, and the example analysis illustrates the signi...
Programming support and adaptive checkpointing for high-throughput data services with log-based recovery
Found in: Dependable Systems and Networks, International Conference on
By Jingyu Zhou, Caijie Zhang, Hong Tang, Jiesheng Wu, Tao Yang
Issue Date:July 2010
pp. 91-100
Many applications in large-scale data mining and offline processing are organized as network services, running continuously or for a long period of time. To sustain high-throughput, these services often keep their data in memory, thus susceptible to failur...
Performance of LAMMPS Code on Intel Quad-Core Xeon
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Mingze Bai, Yusheng Dou, Hong Tang, Shixin Sun
Issue Date:October 2009
pp. 156-160
Large-scale Atomic/Molecular Massively Parallel Simulator (LAMMPS) code was examined in an Intel Quad-Core Xeon platform for its speedup and scaling ability. The study shows that the most time-consuming task in the code is force computing and this part can...
A Network Emergent Computing Model Based on Cellular Automaton
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Hong Tang, Ying Wang, Haitao Wang, Yu Wu
Issue Date:October 2009
pp. 240-245
Emergent computation is a relatively new approach for understanding the behaviors of complex systems. Central to this approach is the idea that system-level behavior emerges from interaction among individual elements. This paper proposes a network emergent...
Layer Key Management Scheme on Wireless Sensor Networks
Found in: Information Assurance and Security, International Symposium on
By Qingqi Pei, Lei Wang, Hao Yin, Liaojun Pang, Hong Tang
Issue Date:August 2009
pp. 427-431
Wireless sensor networks are open architectures, so any potential threat can easily intercept, wiretap and counterfeit the information. Therefore, the safety of WSN is very important. Since any single key system cannot guarantee the security of the wireles...
Sliding Mode Control Design of Cleaning Robot's Mobile Manipulator Used in Large Condenser Based on Neural Networks
Found in: Computer-Aided Software Engineering, International Workshop on
By Hong Tang, Qing-xuan Yang
Issue Date:July 2009
pp. 446-449
Sliding mode control (SMC) of cleaning robot's mobile manipulator based on neural networks which have nonlinear approximation ability is put forward in this article. The controller reduces inherent chattering phenomenon sharply when the uncertainties and e...
Knowledge Management System of Intercity Emergency Decision Making
Found in: Software Engineering, World Congress on
By Hong Tang, Lindu Zhao
Issue Date:May 2009
pp. 365-369
In order to effectively increase the ability of the city's emergency decision-making and reduce the threat of unexpected incidents, by introducing the knowledge management theory, and systematically analyzing the classification and function of knowledge in...
Molecular Response to Ultrashort Laser Pulses
Found in: Computing in Science and Engineering
By Hong Tang, Yusheng Dou, Mingze Bai
Issue Date:May 2009
pp. 47-53
Experimental methods and static quantum calculations can't always give the most realistic picture of the reaction dynamics that laser pulse irradiation induces. Semiclassical dynamics simulations offer an alternative.
MP-MAODV: A MAODV-Based Multipath Routing Algorithm
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Hong Tang, Fei Xue, Peng Huang
Issue Date:October 2008
pp. 296-301
The MAODV (Multicast Ad hoc On-demand Vector) routing protocol shows a smooth performance in light load ad hoc networks. However, as the network loads increase, the Quality of service (QoS) will be degraded quickly. A MAODV-based multipath routing algorith...
A Parallel Algorithm for Simulating Photochemical Reaction
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Hongjian Li, Hong Tang, Shixin Sun, Yusheng Dou
Issue Date:October 2008
pp. 258-262
We propose a parallel algorithm for parallel computation in photochemical reactions simulations. The proposed method is a modified version of the force matrix decomposition algorithm. The modification is based on the Bulk Synchronous Parallel architecture ...
Traflow: Design and Complementation of a Real Time Traffic Measurement System in High-Speed Networks
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Chuan Xu, Hong Tang, Guofeng Zhao
Issue Date:October 2008
pp. 341-344
High-speed network traffic measurement system has a broad background and significance, design and development environment to a high-speed network measurement system become one of the hot network technology. In this paper the design and implementation of a ...
An MAODV-Based Energy Saving Multicast Routing Algorithm
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Guo-feng Zhao, Wei Yang, Hong Tang, Yan-bing Liu
Issue Date:October 2008
pp. 247-250
The wireless Ad Hoc networks (WANET) is an open system that is constituted by fix or mobile nodes. In WANET, each node can be a router or a host. Considering that most nodes may use battery as its energy, it is necessary to improve on energy-saving method....
A New Secure E-mail Scheme Based on Elliptic Curve Cryptography Combined Public Key
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Yi Zhang, Tianxi Cui, Hong Tang
Issue Date:October 2008
pp. 336-340
A new secure e-mail system based on Elliptic Curve Cryptography Combined Public Key Algorithm is proposed to provide security e-mail services more efficiently and easily. Compared with other secure e-mail protocol such as PGP and S/MIME, it needn't set up ...
Construction and Application of Linux Virtual Server Cluster for Scientific Computing
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Hong Tang, Rui She, Chen He, Yusheng Dou
Issue Date:October 2008
pp. 287-289
In this paper, we describe a cluster server, Linux Virtual Server cluster, formed by various inexpensive personal computers for scientific computing. This cluster has many favorable features, including lower cost, load balancing, and dynamic scalability. A...
Parallel Computing in Semiclassical Dynamics Simulation of Photochemical Reactions
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Yusheng Dou, Mingze Bai, Hongjian Li, Hong Tang
Issue Date:October 2008
pp. 267-272
The application of the semiclassical dynamics simulation on a parallel computer has been found to be a challenge. The most time consumable computations in this large scale simulation package are the calculations of the Hamiltonian matrix elements, determin...
Study on Fuzzy AHP Group Decision-Making Method Based on Set-Valued Statistics
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Hong Tang, Jie Zhang
Issue Date:August 2007
pp. 689-693
With respect to fuzzy AHP group decision-making problem in which the result is fuzzy number, a new method of fuzzy AHP is presented based on set-valued statistics. Firstly the definition of uniformly interval number judgment matrix is given; secondly inter...
A Self-Organizing Storage Cluster for Parallel Data-Intensive Applications
Found in: SC Conference
By Hong Tang, Aziz Gulbeden, Jingyu Zhou, William Strathearn, Tao Yang, Lingkun Chu
Issue Date:November 2004
pp. 52
Cluster-based storage systems are popular for data-intensive applications and it is desirable yet challenging to provide incremental expansion and high availability while achieving scalability and strong consistency. This paper presents the design and impl...
An Efficient Data Location Protocol for Self.organizing Storage Clusters
Found in: SC Conference
By Hong Tang, Tao Yang
Issue Date:November 2003
pp. 53
Component additions and failures are common for large-scale storage clusters in production environments. To improve availability and manageability, we investigate and compare data location schemes for a large self-organizing storage cluster that can quickl...
Adaptive Two-level Thread Management for Fast MPI Execution on Shared Memory Machines
Found in: SC Conference
By Kai Shen, Hong Tang, Tao Yang
Issue Date:November 1999
pp. 49
This paper addresses performance portability of MPI code on multiprogrammed shared memory machines. Conventional MPI implementations map each MPI node to an OS process, which suffers severe performance degradation in multiprogrammed environments. Our previ...
Identifying Modules Which Do Not Propagate Errors
Found in: Application-Specific Software Engineering and Technology, IEEE Workshop on
By Taghi M. Khoshgoftaar, Edward B. Allen, Wai Hong Tang, Christoph C. Michael, Jeffrey M. Voas
Issue Date:March 1999
pp. 185
Our goal is to identify software modules that have some locations which do not propagate errors induced by a suite of test cases. This paper focuses on whether or not data state errors can propagate from a location in the code to the outputs or observable ...
Adaptive Prefetching and Storage Reorganization In A Log-Structured Storage System
Found in: IEEE Transactions on Knowledge and Data Engineering
By Chye Lin Chee, Hongjun Lu, Hong Tang, C.v. Ramamoorthy
Issue Date:September 1998
pp. 824-838
<p><b>Abstract</b>—We present a storage management system that has the ability to adapt to the data access characteristics of the application that uses it based on collection and analysis of runtime statistics. This feature is especially ...
Digital signal processing aids cholesterol plaque detection
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By M. Savic, M. Chugani, K. Peabody, A. Husain, Ming-Hong Tang, Z. Macek
Issue Date:May 1995
pp. 1173-1176
We describe four new methods for detection of cholesterol plaque deposits inside arteries, using digital signal processing. These methods have been tested on a number of patients. The results obtained are presented and discussed. An ultrasonic beam is dire...
Online Organization of an Offline Protest: From Social to Traditional Media and Back
Found in: Hawaii International Conference on System Sciences
By Marko M. Skoric, Nathaniel D. Poor, Youqing Liao, Stanley Wei Hong Tang
Issue Date:January 2011
pp. 1-8
This paper is a qualitative examination of the participatory potential of social media, focusing on a student-organized protest against censorship in Singapore. While the debate regarding the impact of new media on politics is well-documented, few studies ...
Optimizing data aggregation for cluster-based internet services
Found in: Proceedings of the ninth ACM SIGPLAN symposium on Principles and practice of parallel programming (PPoPP '03)
By Hong Tang, Kai Shen, Lingkun Chu, Tao Yang
Issue Date:June 2003
pp. 119-130
Large-scale cluster-based Internet services often host partitioned datasets to provide incremental scalability. The aggregation of results produced from multiple partitions is a fundamental building block for the delivery of these services. This paper pres...
Optimizing threaded MPI execution on SMP clusters
Found in: Proceedings of the 15th international conference on Supercomputing (ICS '01)
By Hong Tang, Tao Yang
Issue Date:June 2001
pp. 381-392
Our previous work has shown that using threads to execute MPI programs can yield great performance gain on multiprogrammed shared-memory machines. This paper investigates the design and implementation of a thread-based MPI system on SMP clusters. Our study...
Adaptive two-level thread management for fast MPI execution on shared memory machines
Found in: Proceedings of the 1999 ACM/IEEE conference on Supercomputing (CDROM) (Supercomputing '99)
By Hong Tang, Kai Shen, Tao Yang
Issue Date:November 1999
pp. 49-es
We examine a data structure which uses flexible "adaptivity" to obtain high performance for both serial and parallel computers. The data structure is an adaptive grid which partitions a given region into regular cells. Its closest relatives are cell-based ...
Compile/run-time support for threaded MPI execution on multiprogrammed shared memory machines
Found in: Proceedings of the seventh ACM SIGPLAN symposium on Principles and practice of parallel programming (PPoPP '99)
By Hong Tang, Kai Shen, Tao Yang
Issue Date:May 1999
pp. 201-211
MPI is a message-passing standard widely used for developing high-performance parallel applications. Because of the restriction in the MPI computation model, conventional implementations on shared memory machines map each MPI node to an OS process, which s...
The design of an interactive online help desk in the Alexandria Digital Library
Found in: Proceedings of the international joint conference on Work activities coordination and collaboration (WACC '99)
By Hong Tang, Jianwen Su, Robert Prince, Yonggang Zhao
Issue Date:February 1999
pp. 201-207
In large software systems such as digital libraries, electronic commerce applications, and customer support systems, the user interface and system are often complex and difficult to navigate. It is necessary to provide users with interactive online support...
Program transformation and runtime support for threaded MPI execution on shared-memory machines
Found in: ACM Transactions on Programming Languages and Systems (TOPLAS)
By Hong Tang, Kai Shen, Tao Yang
Issue Date:January 1988
pp. 673-700
Parallel programs written in MPI have been widely used for developing high-performance applications on various platforms. Because of a restriction of the MPI computation model, conventional MPI implementations on shared-memory machines map each MPI node to...
Robustness Design Using Diagonal Loading Method in Sound System Rendered by Multiple Loudspeakers
Found in: MultiMedia and Information Technology, International Conference on
By Jiang Li-hong, Tang Yong-qing
Issue Date:April 2010
pp. 32-35
In sound system, sound images are rendered by multiple loudspeakers in front of listeners. The core of solution is to design crosstalk cancellation filter. Robustness of sound system is depended largely on Eigen-value Diffusion Coefficient (EDC) of filter ...
An Abstract Owner Resource Management Model Based on Auction Mechanism
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Yanbing LIU, Yi JIAN, Hong TANG
Issue Date:September 2007
pp. 836-840
Grid resource management system is regarded as an important component of grid computing. In this paper, a novel abstract owner (AO) resource management model is designed and investigated. Firstly the general architecture model and AO execution mechanism ar...