Search For:

Displaying 1-50 out of 204 total
Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Jian Li,Yun Li,Jian Ren,Jie Wu
Issue Date:May 2014
pp. 1223-1232
Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmet...
 
Research on Computer Control Technique of Spindle Drive for Uniform Velocity Winding
Found in: Information Technology and Computer Science, International Conference on
By Zhang Xu, Wei Jian, Li Beizhi, Wei Jian, Lu Wenhua, Zhao Ming
Issue Date:July 2009
pp. 229-232
Through analyzing the principle of spindle drive of high speed winding machine for synthetic filament, on the basis of actual apparent density, a kind of control model, control algorithm and its implementation scheme to realize spindle drive for uniform ve...
 
A Decision Support System for Supply Chain Management Based on PSO and GIS
Found in: Computer-Aided Software Engineering, International Workshop on
By Jian-Jun Lei, Jian Li
Issue Date:July 2009
pp. 58-61
A decision support system to solve the multi-depot vehicle routing problems with fixed distribution of vehicles (MDVRPFD) is introduced. In the system, the data of the customers, the suppliers, and the topologies of the roads are stored and managed by the ...
 
Resource Planning and Scheduling of Payload for Satellite with a Discrete Binary Version of Differential Evolution
Found in: Computer-Aided Software Engineering, International Workshop on
By Jian Li
Issue Date:July 2009
pp. 62-65
The resource planning and scheduling technology of payload is to arrange the works states of various payloads to carry out missions by optimizing the scheme of the resources. Based on the analysis of the satellite’s functions and the payload’s resource con...
 
An Algorithm To Determine Mutually Exclusive Operations In Behavioral Descriptions
Found in: Design, Automation and Test in Europe Conference and Exhibition
By Jian Li, Rajesh K. Gupta
Issue Date:February 1998
pp. 457
Scheduling and binding are two major tasks in architectural synthesis from behavioral descriptions. The information about the mutually exclusive pairs of operations is very useful in reducing both the total delay of the schedule and the resource usage in t...
 
The Application of Dimensionless Analysis to Evaluation of Factors Affecting Water-Inrush from Coal Floor
Found in: Information Science and Engineering, International Conference on
By Jiu-chuan Wei, Zhong-jian Li, Jian-bing Guo, Hui-yong Yin, Long-qing Shi, Yun-zhang Guan
Issue Date:December 2009
pp. 5185-5188
Dimensionless analysis was applied to correctly evaluate the order of the factors affecting water -inrush from coal floor. In the evaluation of water -inrush from coal floor, many factors need to be considered. Thus, to correctly evaluate the order of the ...
 
Scalable Proximity-Aware Cache Replication in Chip Multiprocessors
Found in: Parallel Architectures and Compilation Techniques, International Conference on
By Chongmin Li,Haixia Wang,Yibo Xue,Dongsheng Wang,Jian Li
Issue Date:October 2011
pp. 191-192
We propose Proximity-Aware cache Replication (PAR), an LLC replication technique that elegantly integrates an intelligent cache replication placement mechanism and a hierarchical directory-based coherence protocol into one cost-effective and scalable desig...
 
End-to-End Delay Analysis in Wireless Network Coding: A Network Calculus-Based Approach
Found in: Distributed Computing Systems, International Conference on
By Huanzhong Li, Xue Liu, Wenbo He, Jian Li, Wenhua Dou
Issue Date:June 2011
pp. 47-56
Network coding provides a powerful mechanism for improving performance of wireless networks. In this paper, we present an analytical approach for end-to-end delay analysis in wireless networks that employ inter-session coding. Prior work on performance ana...
 
A Cost Benefit Analysis of a Fuel Switching Project in a Chinese City: A Case Study
Found in: Challenges in Environmental Science and Computer Engineering
By Jian Li, Tie-song Li, De-you Ren, Wen-jing Wang, Lin Chen
Issue Date:March 2010
pp. 151-154
As one of the top five most seriously polluted cities by acid rain in the southwest of China, Nanchong was selected as one of 18 pilot cities of China for Clear Energy Action (CEA) by the United Nations Development Program (UNDP) and China National Science...
 
Research of Compressed Sensing Theory in WSN Data Fusion
Found in: Computational Intelligence and Design, International Symposium on
By Li Li,Jian Li
Issue Date:October 2011
pp. 125-128
Data fusion is an important technology in WSN, But with the expansion of the scope object sensor and complexity increase, the fusion function is more and more complex, Energy consumption of the fusion operation is required more and more. Therefore, the ene...
 
Implementation of Data Transmission Between Unigraphic, WORKBENCH and ANSYS and its Example Analysis
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Qiwei He, Bing Li, John Kavulla, Jian Li, Shangping Li
Issue Date:March 2010
pp. 431-433
An introduction to the procedure, and manipulation, of data transmission, utilizing UNIGRAPHIC, WORKBENCH, and ANSYS software. Combining the advanced technological functions of each, a bulk-cement delivery tank will be used as a model to exemplify the dive...
 
Performance Enhancement and Optimized Analysis of the Worst Case End-to-End Delay for AFDX Networks
Found in: 2012 IEEE International Conference on Green Computing and Communications (GreenCom)
By Jian Li,Haibing Guan,Jianguo Yao,Guchuan Zhu,Xue Liu
Issue Date:November 2012
pp. 301-310
Avionics Full Duplex Switched Ethernet (AFDX) network is an emerging Ethernet media based technology for the next generation avionic data bus. One of the key issues in AFDX networks is to guarantee the data transmission delay and optimize the worst case en...
 
Sequential Scheduling in Space Missions
Found in: 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
By Jinjiang Xing,Yan Zhang,Jian Li,Yuncheng Feng
Issue Date:October 2012
pp. 298-303
By analyzing the defects of traditional scheduling in space missions, sequential mission scheduling architecture, SMSA, is proposed in this paper to cope with progressively increasing number of state modes of spacecrafts and space missions. The improvement...
 
DuSCA: A multi-channeling strategy for doubling communication capacity in wireless NoC
Found in: 2012 IEEE 30th International Conference on Computer Design (ICCD 2012)
By Yi Wang,Dan Zhao,Jian Li
Issue Date:September 2012
pp. 75-80
To bridge the widening gap between computation requirements and communication efficiency faced by many-core chips, Wireless Network-on-Chip (WiNoC) has been proposed by using ultra-wideband interconnect. While prior research has demonstrated the salient fe...
 
Adaptive and Scalable Optimizations for High Performance SR-IOV
Found in: 2012 IEEE International Conference on Cluster Computing (CLUSTER)
By Zhiqiang Huang,Ruhui Ma,Jian Li,Zhibo Chang,Haibing Guan
Issue Date:September 2012
pp. 459-467
High performance networking interfaces, such as 10-Gigabit Ethernet (10GE), are now widely deployed in commercial Cloud computing environments. Virtualization is a standard technique for these environments, one of whose key challenges is to achieve highly ...
 
Adjustable Credit Scheduling for High Performance Network Virtualization
Found in: 2012 IEEE International Conference on Cluster Computing (CLUSTER)
By Zhibo Chang,Jian Li,Ruhui Ma,Zhiqiang Huang,Haibing Guan
Issue Date:September 2012
pp. 337-345
Virtualization technology is now widely adopted in cloud computing to support heterogeneous and dynamic workload. The scheduler in a virtual machine monitor (VMM) plays an important role in allocating resources. However, the type of applications in virtual...
 
Power shifting in Thrifty Interconnection Network
Found in: High-Performance Computer Architecture, International Symposium on
By Jian Li, Wei Huang, Charles Lefurgy, Lixin Zhang, Wolfgang E. Denzel, Richard R. Treumann, Kun Wang
Issue Date:February 2011
pp. 156-167
This paper presents two complementary techniques to manage the power consumption of large-scale systems with a packet-switched interconnection network. First, we propose Thrifty Interconnection Network (TIN), where the network links are activated and de-ac...
 
Memory Latency Reduction via Thread Throttling
Found in: Microarchitecture, IEEE/ACM International Symposium on
By Hsiang-Yun Cheng, Chung-Hsiang Lin, Jian Li, Chia-Lin Yang
Issue Date:December 2010
pp. 53-64
Memory Wall is a well-known obstacle to processor performance improvement. The popularity of multi-core architecture will further exaggerate the problem since the memory resource is shared by all cores. Interferences among requests from different cores may...
 
Adaptive Critic Based Control of Aircraft with Atmospheric Disturbance
Found in: Computer Modeling and Simulation, International Conference on
By Jianguo Yao, Xiaoping Zhu, Jian Li, Fei Hu
Issue Date:January 2010
pp. 428-432
The design of fight control is full of challenges because of the complex model and the complicated fight entironment. The traditional control methods no longer ensure the demand in the many fight modes. Recently, advanced control methods attract more and m...
 
Adaptive Volterra Predistorters for Compensation of Non-linear Effects with Memory in OFDM Transmitters
Found in: Communication Networks and Services Research, Annual Conference on
By Jian Li, Jacek Ilow
Issue Date:May 2006
pp. 100-103
This paper proposes an adaptive extension of a Least Squares Volterra predistorter to compensate for the nonlinearity of the high power amplifier (HPA) with memory effects in orthogonal frequency division multiplexing (OFDM) systems at the transmitter side...
 
DLB: A Novel Real-time QoS Control Mechanism for Multimedia Transmission
Found in: Advanced Information Networking and Applications, International Conference on
By Jian Li, YeQiong Song
Issue Date:April 2006
pp. 185-190
This paper presents a new QoS guarantee scheme called R-(m,k)-firm (Relaxed-(m,k)-firm) which provides the guarantee on transmission delay o f at least m out of any k consecutive packets (m \lt e). It has several advantages: ( I ) during network congestion...
 
Approximating Spanning Trees with Inner Nodes Cost
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Rudolf Fleischer, Qi Ge, Jian Li, Shijun Tian, Haitao Wang
Issue Date:December 2005
pp. 660-664
We consider the practical NP-complete problem of finding a minimum weight spanning tree with both edge weights and inner nodes weights. We present two polynomial time algorithms with approximation factors of 2.35 ? ln n and 2Hn, respectively, where n is th...
 
A Least-Squares Volterra Predistorter for Compensation of Non-Linear Effects with Memory in OFDM Transmitters
Found in: Communication Networks and Services Research, Annual Conference on
By Jian Li, Jacek Ilow
Issue Date:May 2005
pp. 197-202
<p>This paper proposes a general solution to compensate for the nonlinearity of a high power amplifier (HPA) with memory effects in orthogonal frequency division multiplexing (OFDM) communication systems at the transmitter side. Mean square error (MS...
 
Moisture Migration Tests on Unsaturated Expansive Clays in Hefei
Found in: 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)
By Wang Ming-Wu,Ge Song,Li Jian,Li Shu-Ting
Issue Date:January 2013
pp. 698-701
Expansive clay in semiarid area behaves features of typical unsaturated soil, which is sensitive to climate and moisture, appears multi-fissures, deterioration of mechanical performances with the change of moisture. Consequently, to ensure the rational des...
 
Moisture Migration Tests on Unsaturated Expansive Clays in Hefei
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Wang Ming-Wu,Ge Song,Li Jian,Li Shu-Ting
Issue Date:January 2013
pp. 963-967
Expansive clay in semiarid area behaves features of typical unsaturated soil, which is sensitive to climate and moisture, appears multi-fissures, deterioration of mechanical performances with the change of moisture. Consequently, to ensure the rational des...
 
Characteristics and Evaluation for Nitrogen Pollution in Water and Surface Sediments of Xixi Wetland
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Shan Jian-Li,Wei-Qin Zhu,Min Pan,Ze-Ming Zhou,Shu-Ying Li
Issue Date:January 2013
pp. 419-423
In this paper, it was investigated and evaluated about characteristics of nitrogen pollution for 11 sampling water or surface sediments (0~10cm) in Hang Zhou Xixi Wetland, and correlation analysis was conducted amongst nitrogen indexes for water and that f...
 
Chaos Synchronization of Coupled Ring and Linear Arrays System Using Adaptive Control
Found in: Chaos-Fractals Theories and Applications, International Workshop on
By Li-Ming Wang,Xiao-Jian Li
Issue Date:October 2011
pp. 342-346
Dynamic behaviors of coupled ring and linear arrays system with nonidentical and autonomous chaotic oscillators are studied numerically. It is found that nonidentical oscillators in bidirectionally coupled ring are successfully synchronized when adaptive u...
 
The Security Routing Based on Convergence Detected about Route in DHT
Found in: Network Computing and Information Security, International Conference on
By Feng Wang, Ya Li, Xiao Jian Li
Issue Date:May 2011
pp. 321-325
In order to reduce the harm of malicious nodes to the DHT network, the paper makes analysis about the DHT routing algorithm, we get the iteration function of routing on DHT. Through the analysis on iterative routing functions, we summarize the common featu...
 
Exergy Analysis for LNG Refrigeration Cycle
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Lin Ri-yi, Yu Xichong, Li Jian, Li Yuxing, Wang Wuchang
Issue Date:February 2011
pp. 211-214
The compression process of LNG accounts for a large part of the total energy which the huge LNG liquefaction ship consumes, and the account is increasing constantly, with the continuous development and application of natural gas. In order to improve energy...
 
Improve the Throughput of AODV Based on Network Coding Ideas
Found in: Information Engineering, International Conference on
By Yang Tao, Yong Li, Jian Li, Hong-cheng Huang
Issue Date:August 2010
pp. 280-283
Network coding (NC) has a broad application prospects in wireless Ad hoc networks. Firstly, this paper introduces the development process about network coding in wireless network environment as well as the advantages and disadvantages. Secondly, reviewing ...
 
The Autonomic Model in Remote Sensing Data Processing System
Found in: International Symposium on Distributed Computing and Applications to Business, Engineering and Science
By Li Ziyang, Hu Jian, Li Chuanrong, Tang Lingli
Issue Date:August 2010
pp. 278-280
The remote sensing data processing system is a typical distributed computing system, which concerns the parallel computing, spatial database, image processing and a series of computer technology. With remote sensing technology and the level of the continuo...
 
Design of Real-time Measuring and Displaying System for Liquid Metal Magnetohydrodynamic Generation Test Facility
Found in: Electrical and Control Engineering, International Conference on
By Yuyu Xu, Ran Li, Yan Peng, Lingzhi Zhao, Ciwen Sha, Baolin Liu, Jian Li, Wende Wei
Issue Date:June 2010
pp. 5839-5842
A real-time measuring and displaying system for liquid metal magnetohydrodynamic (LMMHD) generation test facility is designed in this paper. The system is mainly compos of measuring instruments, transmission device and industrial PC, which realizes measure...
 
Implementation of CAE Simulation Platform for Lightweight Automobile Body Design
Found in: Service-Oriented System Engineering, IEEE International Workshop on
By Jian Li, Liming Fu, Siqun Ma, Xuefei Huang, Xianjie Li
Issue Date:June 2010
pp. 260-263
The urgent issues for automobile companies today are how to reduce the time and cost required for developing a new car. CAE has been regarded as an efficient way to solve these issues, and as a numerical experiment to replace prototypes and experiments. In...
 
Fabrication of a Novel Wood-Based Composite by In-situ Polymerization of Functional Monomers
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Yongfeng Li, Yixing Liu, Jian Li, Duojun Lv, Xinzhen Fan
Issue Date:March 2010
pp. 208-211
In order to alternative the low-quality poplar wood for value-added applications, the study adopted a novel method by impregnating two functional monomers, Glycidyl Methacrylate (GMA) and Vinyl Acetate (VAc), into the porous structure of wood, and further ...
 
A New Accelerated Algorithm of Image Style Study
Found in: Multimedia Information Networking and Security, International Conference on
By Li Tang, JinYi Chang, Jian Li, RongWei Yu
Issue Date:November 2009
pp. 244-248
The image analogy is a classical technique used in the style learning and Multimedia data mining. To regrettable the IA method can not be suitable to any pair of images. This article prime task has four aspects: 1 Proposed one kind of new image similarity ...
 
On Discovering Community Trends in Social Networks
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Jian Li, William K. Cheung, Jiming Liu, C. H. Li
Issue Date:September 2009
pp. 230-237
Real-world social networks (e.g., blogosphere) often evolve over time and thus poses challenges on conventional social network analysis techniques which model the underlying networks as static graphs. In this paper, we are interested in detecting dynamic c...
 
Outage Behavior of Multi-Antenna Multi-Relay Non-Regenerative Cooperative Networks
Found in: Information Technology: New Generations, Third International Conference on
By Ning Liu, Jianhua Li, Ping Yi, Jianing Li, Yue Wu
Issue Date:April 2009
pp. 541-545
To combat the multipath fading, the array gain is introduced to the cooperative system when multiple antennas is applied at relay nodes. Two cooperative schemes, i.e., the reactive and proactive relaying schemes are studied for the non-regenerative relayin...
 
Chattering-Free Support Vector Regression Sliding Mode Control
Found in: Computational Intelligence and Security, International Conference on
By Linsheng Li, Jianning Li
Issue Date:December 2008
pp. 231-234
According to an uncertain discrete system with input saturation, a new chattering free support vector regression sliding mode control (SVR-SMC) law based on Linear Matrix Inequalities (LMIs) is presented. The output of SVR is used for replacing sign functi...
 
Chattering-Free Fuzzy Sliding Mode Control Strategy for Uncertain Discrete Systems with Input Saturation
Found in: Intelligent Systems Design and Applications, International Conference on
By Linsheng Li, Jianning Li
Issue Date:November 2008
pp. 378-382
This paper proposes a fuzzy sliding mode control (FSMC) strategy for uncertain discrete system with input saturation. The reaching law of sliding mode controller is decided by a set of fuzzy rules. An equivalent matrix is constructed for input saturation. ...
 
An Agent Bilateral Multi-issue Simultaneous Bidding Negotiation Protocol Based on Genetic Algorithm and Its Application in E-commerce
Found in: Image and Signal Processing, Congress on
By Jian Li, Li-Chang Wang, Bo Jing
Issue Date:May 2008
pp. 395-398
In agent bilateral multi-issue bidding negotiation protocol, how to make the negotiation agents gain satisfying result farthest and negotiate efficiently is a key issue. As for this problem, a genetic algorithm based on metropolis rule is present in the pr...
 
A Novel Algorithm of Covert Image Communication with Wavelet Transform and Information Fusion
Found in: Image and Graphics, International Conference on
By Peng Jian, Li-yun Su, Zheng Li, Shi-fu Tang
Issue Date:August 2007
pp. 307-312
A novel image covert communication algorithm is proposed to use discrete wavelet transform and information fusion. For the good performance of the algorithm, the security information is modulated into the fractal modulated sequences and changes into encode...
 
APHD: End-to-End Delay Assurance in 802.11e Based MANETs
Found in: Mobile and Ubiquitous Systems, Annual International Conference on
By Jian Li, Zhi Li, P. Mohapatra
Issue Date:July 2006
pp. 1-8
In this paper we present an adaptive per hop differentiation (APHD) scheme towards achieving end-to-end delay assurance in multihop wireless networks. Our APHD scheme extends the capability of IEEE 802.11e EDCA technique into multihop environments by takin...
 
Fast Measurement of Human Face and Disposal of Measured Points
Found in: Computer and Computational Sciences, International Multi-Symposiums on
By Jian Li, Minghe Li, Ying Zheng, Jianwen Wang
Issue Date:June 2006
pp. 796-798
A fast measurement method of human face and a data disposal algorithm to filter noise in the measured points of human face are proposed in this paper. The components and working principle of the measurement system are first analyzed, which uses double CCD ...
 
A Constructing Algorithm of Concept Lattice with Attribute Generalization Based on Cloud Models
Found in: Computer and Information Technology, International Conference on
By Xie Cui-hua, Li Yun, Shen Jie, Cai Jun-jie, Luo Jian-li
Issue Date:September 2005
pp. 110-115
No summary available.
 
2D sinusoidal amplitude estimation with application to 2D system identification
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Hongbin Li, Wei Sun, P. Stoica, Jian Li
Issue Date:May 2001
pp. 1921-1924
We previously studied amplitude estimation of one-dimensional (1D) sinusoidal signals from measurements corrupted by possibly colored observation noise (see Stoica, P. et al., IEEE Trans. on Sig. Proc., vol. 48, p.338-52, 2000). We extend those results for...
 
Amplitude estimation with application to system identification
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By P. Stoica, Hongbin Li, Jian Li
Issue Date:March 1999
pp. 1777-1780
We investigate herein the problem of amplitude estimation of sinusoidal signals from observations corrupted by colored noise. A relatively large number of amplitude estimators are described which encompass least squares (LS) and weighted least squares (WLS...
 
Absolute Stability of a Class of Trilateral Haptic Systems
Found in: IEEE Transactions on Haptics
By Jian Li,Mahdi Tavakoli,Qi Huang
Issue Date:July 2014
pp. 1-1
Trilateral haptic systems can be modeled as three-port networks. We present a criterion for absolute stability of a general class of three-port networks. Traditionally, existing (i.e., Llewellyn’s) criteria have facilitated the stability analysis of bilate...
 
Understanding synergetic activities of Fuzi-Dahuang herb pairs based on network pharmacology
Found in: 2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
By Yong Tan,Cheng Lu,Miao Jiang,Li Li,Xiaojuan He,Xuejie Han,Aiping Lu,Jian Li
Issue Date:December 2013
pp. 16-21
Objectives: In order to better understand the synergetic activities of radix aconite lateralis praeparata (Fuzi)-rheum officinale (Dahuang) herb pairs. Material and methods: The target proteins of Fuzi and Dahuang were retrieved from PubChem database and w...
   
Using text mining to understand traditional Chinese medicine pathogenesis of nonalcoholic fatty liver disease
Found in: 2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
By Hui-qin Zhang,Jian Li,Guang Zheng,Miao Jiang,Li Li,Yong Tan,Ai-ping Lu
Issue Date:December 2013
pp. 311-314
Non-alcoholic fatty liver disease (NAFLD) is a kind of prevalence diseases. Traditional Chinese medicine (TCM) has better efficacy on treating NAFLD. But there are also not known about the critical pathogenesis and the corresponding biological factors. Reg...
   
Migration-Based Elastic Consolidation Scheduling in Cloud Data Center
Found in: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops (ICDCSW)
By Qingjia Huang, Sen Su, Siyuan Xu, Jian Li, Peng Xu, Kai Shuang
Issue Date:July 2013
pp. 93-97
Virtualization and cloud computing technologies now make it possible to consolidate multiple online services, which are packed in Virtual Machines (VMs), into a smaller number of physical servers. However, it is still a challenging scheduling problem for c...
 
 1  2 Next >>