Search For:

Displaying 1-50 out of 265 total
An Orthogonal Projection Approach for Blind Beamforming in Multipath CDMA Channels
Found in: Communication Networks and Services Research, Annual Conference on
By Jianshu Chen, Jian Wang, Pengyu Zhang, Jian Yuan, Xiuming Shan
Issue Date:May 2008
pp. 496-503
In this paper, we propose a blind beamforming technique for multipath CDMA channels, which requires prior knowledge of only the spreading code and the timing of the desired user. An orthogonal projection approach is used to isolate the interference and est...
A Synthesis Evaluation for Highway Pavement
Found in: Information Science and Engineering, International Conference on
By Jian-lin Zhang, Ya-jian Wang
Issue Date:December 2009
pp. 4163-4166
Current industry standard
Constructing an EJB Application in a WFMS
Found in: Computer Software and Applications Conference, Annual International
By Jian-Wei Wang, Ta-Chun Lin, Huai-Jong Hsu, Feng-Jian Wang
Issue Date:August 2002
pp. 284
A workflow system provides enterprises the automatic and paperless process management. The idea of Enterprise JavaBeans (EJB) is to utilize components from various vendors to construct an application, which has the characteristics of scalability, security,...
Statistical analysis of error patterns in block ciphered crypto-system
Found in: Software Maintenance and Reengineering, European Conference on
By Qiuhua Yang, Jian Wang,Shuangqing Wei,Jian Yuan
Issue Date:August 2011
pp. 841-845
In the presence of channel errors, the error pattern in decrypted plaintexts in block-ciphered systems demonstrates certain burst features. In this paper, we provide a rigorous study of error properties of block-ciphered cryptosystems operating in either E...
A Clustering Method for Web Service Discovery
Found in: Services Computing, IEEE International Conference on
By Jian-xiao Liu,Ke-qing He,Jian Wang,Da Ning
Issue Date:July 2011
pp. 729-730
With the development of web service applications, how to improve the efficiency of service discovery is an important research work in modern times. From the aspect of service function, this paper clusters web services to form service clusters based on serv...
An Extended WS-CDL Method for On-Demand Web Service Selection
Found in: Services, IEEE Congress on
By Jian-xiao Liu,Ke-qing He,Jian Wang,Zai-wen Feng,Da Ning
Issue Date:July 2011
pp. 327-330
With the development of web service applications, how to realize on-demand services selection according to user's personal requirements is a hot research work in modern times. WS-CDL (Web Services Choreography Description Language) is a W3C candidate recom...
Many Strong Limit Theorems for Non-homogeneous Markov Chains Indexed by a Non-homogeneous Tree
Found in: Education Technology and Computer Science, International Workshop on
By Jin Shaohua, Liu Huitao, Liu Jian, Wang Yongxue, Zhang Jian
Issue Date:March 2010
pp. 790-793
The strong limit theorems is one of the central questions for studying in the International Probability theory. In this paper, many strong limit theorems for non-homogeneous Markov chains indexed by a non-homogeneous tree were obtained by constructing a no...
Research of 3D Modeling of Virtual Reality for LAMOST Based on OpenGL
Found in: Education Technology and Computer Science, International Workshop on
By Dong Jian, Wang Jian, Jin Ge
Issue Date:March 2010
pp. 296-298
In order to improve the observation efficiency of the Large Sky Area Multi-Object Fiber Spectroscopic Survey Telescope (LAMOST) and facilitate the operation, Virtual Reality (VR) technology is used to realize the graphic control interface of LAMOST. It is ...
One New BRAS Model Based on Trusted Network
Found in: Electronic Commerce and Security, International Symposium
By Jian Wang, Jian Gu, Fang Mei, Zhe Zhang, Yanheng Liu
Issue Date:August 2008
pp. 398-401
The Trusted Network Connect (TNC) is based on the double concepts of integrity and identity. The Policy Enforcement Point (PEP) in TNC architecture is deeply studied and powerful Broadband Remote Access Server (BRAS) is also applied into the architecture. ...
Block Sampling Algorithm of Image Encryption Based on Chaotic Scrambling
Found in: Computational Intelligence and Security Workshops, International Conference on
By Ren Hong-e, Zhang Jian, Wang Xing-jian, Shang Zhen-wei
Issue Date:December 2007
pp. 773-776
Base on the randomicity and initial value sensitivity of Lu chaotic sequence, dividing the original image into blocks, carrying out the gray scrambling and location scrambling on each team of the pixel points, making their location and grey distribute even...
Constructing a BPM Environment with BPMN
Found in: Future Trends of Distributed Computing Systems, IEEE International Workshop
By Ching-Hong Tsai, How-Jen Luo, Feng-Jian Wang
Issue Date:March 2007
pp. 164-172
Workflow at its simplest is the movement of documents or tasks through a work process with automation for achieving certain goals. Many efforts have been spent by both industry and academia in attempting to define a common representation of a business proc...
Solenoid Actuator-based Novel Type of Micropump
Found in: Robotics and Biomimetics, IEEE International Conference on
By Shuxiang Guo, Jian Wang, Qinxue Pan, Jian Guo
Issue Date:December 2006
pp. 1281-1286
In the medical field and in biotechnology, a new type of micropump that can supply micro liquid flow has urgently been demanded. It is our purpose to develop a novel type of micropump that has the characteristics of flexibility, driven by a low voltage, go...
Using a Hierarchical Thesaurus for Classifying and Searching Software Libraries
Found in: Computer Software and Applications Conference, Annual International
By Hsian-Chou Liao, Ming-Feng Chen, Feng-Jian Wang, Jian-Cheng Dai
Issue Date:August 1997
pp. 210
Software reuse is an effective way to improve software productivity and quality. Software libraries are getting bigger, while most of them, such as those of object-oriented languages, use a simple but somewhat ineffective classification method. These libra...
A Lightweight Video Encryption Algorithm for Wireless Application
Found in: Embedded Computing, IEEE International Symposium on
By Wang Li-feng, Niu Jian-wei, Ma Jian, Wang Wen-dong, Xiao Chen
Issue Date:October 2008
pp. 94-97
Protecting the confidentiality and integrity of video information is one of the crucial security elements for many wireless video applications. Taking limited power, processor resource and bandwidth of mobile device into account, a lightweight luminance tr...
A Goals-Driven Customizing Approach of Web Service-Based Software
Found in: Software Engineering, World Congress on
By Shouxin Wang, Li Zhang, Chong Wang, Jian Wang, Keqing He
Issue Date:May 2009
pp. 29-35
In Service-Oriented Computing (SOC), personalized requirements from diverse user present challenges to develop software with lower cost and high degree of satisfaction. Due to the popularity and fundamentality of Web services (WS), WS-based software is bor...
A Delegation Framework for Access Control in WfMS Based on Tasks and Roles
Found in: Future Trends of Distributed Computing Systems, IEEE International Workshop
By Pu Jian, Hwai-jung Hsu, Feng-jian Wang
Issue Date:October 2008
pp. 165-171
Access control is important for protecting the information integrities in WfMS's. Compared to conventional access control models such as discretionary, mandatory, and role-based access control models, an access-control model based on both tasks and roles m...
Using MPMR to Support Developing Web Service Applications for Enterprises
Found in: Interoperability for Enterprise Software and Applications China, International Conference on
By Chong Wang, Keqing He, Jian Wang, Yangfan He
Issue Date:April 2009
pp. 336-342
As a temporary alliance of enterprises, a virtual enterprise(VE) is tended to share skills and integrate business processes from different firms for customized business requirements. Since it is hard for end-users to combine heterogeneous business processe...
Dynamic activities on an agent-based workflow management system
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Jian-Wei Wang, Chi-Cheng Li, Feng-Jian Wang
Issue Date:January 2005
pp. 122-vii
Summary form only given. Workflow management systems (WfMSs) are usually designed to run with the workflow (process) definitions and artifact definitions from repository. The static characteristics for process definitions might reduce the practicability of...
Variable Window for Outlier Detection and Impulsive Noise Recognition in Range Images
Found in: 2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)
By Jian Wang,Lin Mei,Yi Li,Jian-Ye Li,Kun Zhao,Yuan Yao
Issue Date:May 2014
pp. 857-864
To improve comprehensive performance of denoising range images, an impulsive noise (IN) denoising method with variable windows is proposed in this paper. Founded on several discriminant criteria, the principles of dropout IN detection and outlier IN detect...
Fog Effects Modeling and Removal for Real-Time Vision Applications
Found in: 2012 Fourth International Symposium on Information Science and Engineering (ISISE)
By Jian Wang,Bao-Jun Qi,Tao Wu,Xiao-Jun Liu
Issue Date:December 2012
pp. 149-155
Multiple light scattering, leading to blurring or loss of spatial resolution in dense fog regions, is not considered by previous imaging models. To better understand weather effects on vision and improve present defogging methods, this paper describes a ne...
A Study of Face Motion Capture and Its Data Processing Technique Applied to the Speech Training of Hearing-impaired Children
Found in: 2012 5th International Conference on Intelligent Networks and Intelligent Systems (ICINIS)
By Shi Lijuan,An Zhiyong,Zhao Jian,Wang Lirong,Du Qinsheng
Issue Date:November 2012
pp. 306-309
In this thesis the face motion capture technique is applied to the language rehabilitation training of hearing-impaired children with a presentation accordingly of an arrangement suited for the face marking feature points of hearing-impaired children in la...
Studies of Effect of Surfactants on Properties of Slag Cement Mortar
Found in: Computing, Control and Industrial Engineering, International Conference on
By Tian Jian, Wang Jindi, Wei Tao
Issue Date:June 2010
pp. 244-248
Compared to ordinary portland cement, the impact of surface-active agents on the strength of slag cement and hydration products had been studied, and the environmental scanning electron microscope have been used to observe the micro-morphology of the serie...
Study on Strategies of Quality Monitoring in Multi-manufacturing Processes
Found in: Intelligent Computation Technology and Automation, International Conference on
By Zhou Jian, Wang Zhaowei, Liu Jian
Issue Date:May 2010
pp. 545-551
Product quality is the result of error accumulation from multi-manufacturing processes. How to establish quality monitoring strategy and implement preventive quality control is vital to product quality. In the study of quality monitoring strategy of multi-...
An Efficient Mesh Simplification Algorithm
Found in: International Conference on Internet Computing in Science and Engineering
By Hailing Wang, Guisheng Yin, Jing Zhang, Decai Wang, Jian Wang
Issue Date:December 2009
pp. 60-63
This paper presents a new mesh simplification algorithm based on edge collapse, it combines surface curvature and quadric error metric, the position of a new vertex for edge collapse depends on multiple-weighted approach. The new algorithm can improve simp...
The Review and Application of Frontier Methodology on Neo-spatial Economics
Found in: New Trends in Information and Service Science, International Conference on
By Chen Rui, Wang Jia, Wang Jian, Wang Li, Yu Ningjie, Zhang Pengyan
Issue Date:July 2009
pp. 1189-1192
Spatial economics(SE) research field is focused on the optimal resource allocation in space-time.Although the location theory has a long history,different from the research of time series, which has not been the mainstream of economics at all times.However...
Analysis of Photovoltaic Charging System Based on MPPT
Found in: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE
By Lixin Pang, Hui Wang, Yuxia Li, Jian Wang, Ziyu Wang
Issue Date:December 2008
pp. 498-501
With the daily worsening of global energy crisis and environmental pollution, characteristics of the non-pollution, non-noise and non-raw material except the sun of photovoltaic generation makes it a promising green energy. At present, the maximum output p...
Energy and Transportation: A Case Study in China
Found in: IEEE Intelligent Systems
By Rui Chen, Jian Wang
Issue Date:May 2007
pp. 10-12
The Chinese government has made a national priority of developing a sustainable, resource- and energy-efficient society. The transportation sector of the Chinese economy is a major energy consumer. A cointegration analysis of its consumption patterns revea...
Reconstructing Manifold and Non-Manifold Surfaces from Point Clouds
Found in: Visualization Conference, IEEE
By Jianning Wang, Manuel M. Oliveira, Arie E. Kaufman
Issue Date:October 2005
pp. 53
This paper presents a novel approach for surface reconstruction from point clouds. The proposed technique is general in the sense that it naturally handles both manifold and non-manifold surfaces, providing a consistent way for reconstructing closed surfac...
Dispersion Simulation and Visualization For Urban Security
Found in: Visualization Conference, IEEE
By Feng Qiu, Ye Zhao, Zhe Fan, Xiaoming Wei, Haik Lorenz, Jianning Wang, Suzanne Yoakum-Stover, Arie Kaufman, Klaus Mueller
Issue Date:October 2004
pp. 553-560
We present a system for simulating and visualizing the propagation of dispersive contaminants with an application to urban security. In particular, we simulate airborne contaminant propagation in open environments characterized by sky-scrapers and deep urb...
CA-PLAN, an Inter-Organizational Workflow Model
Found in: Future Trends of Distributed Computing Systems, IEEE International Workshop
By Shung-Bin Yan, Feng-Jian Wang
Issue Date:May 2004
pp. 154-162
<p>Workflow management systems (WfMSs) are accepted worldwide due to their ability of modeling and controlling business processes. In the past, we defined an intra-organizational workflow specification model, Process LANguage PLAN. PLAN, with the ass...
A Hole-Filling Strategy for Reconstruction of Smooth Surfaces in Range Images
Found in: Graphics, Patterns and Images, SIBGRAPI Conference on
By Jianning Wang, Manuel M. Oliveira
Issue Date:October 2003
pp. 11
Creating models of real scenes is a complex task for which the use of traditional modelling techniques is inappropriate. For this task, laser rangefinders are frequently used to sample the scene from several viewpoints, with the resulting range images inte...
Piecewise C<sup>1</sup> Continuous Surface Reconstruction of Noisy Point Clouds via Local Implicit Quadric Regression
Found in: Visualization Conference, IEEE
By Hui Xie, Jianning Wang, Jing Hua, Hong Qin, Arie Kaufman
Issue Date:October 2003
pp. 13
This paper addresses the problem of surface reconstruction of highly noisy point clouds. The surfaces to be reconstructed are assumed to be 2-manifolds of piecewise C 1 continuity, with isolated small irregular regions of high curvature, sophisticated loca...
An Object-Oriented Architecture Supporting Web Application Testing
Found in: Computer Software and Applications Conference, Annual International
By Ji-Tzay Yang, Jiun-Long Huang, Feng-Jian Wang, William. C. Chu
Issue Date:October 1999
pp. 122
The development and deployment of three-tier Web-based applications are getting prevalent in the Internet and Intranet environment. Several frameworks and techniques have been proposed to ease the development of web-based application. However, few tools ar...
Research on Track Map Database for Low-Cost Train Control System
Found in: Information Science and Engineering, International Conference on
By Bai-gen Cai, Jiang Liu, Jian Wang, ShangGuan Wei
Issue Date:December 2009
pp. 2164-2167
The low-cost train control system is new trend for modern train operation and management. Based on the functional requirement of track map database, generation of track map in GIS and schematic form are mainly studied in this paper, as well as their mappin...
Sampling Traffic Analysis of Anonymous Communications in Mobile Ad Hoc Networks
Found in: 2013 Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)
By Zhi-Jian Wang,Han-Ru Pei,Yu Wang
Issue Date:December 2013
pp. 233-239
In this paper, we studied the security of anonymous communications in mobile ad hoc networks. We first proposed a statistical model for anonymous communications. By employing the principle of Bayesian inference, we were able to transform a traffic analysis...
An Efficient Mesh Simplification Method in 3D Graphic Model Rendering
Found in: 2013 Seventh International Conference on Internet Computing for Engineering and Science (ICICSE 2013)
By Wang Jian, Wang Hai-Ling, Zhou Bo, Jun Ni,
Issue Date:September 2013
pp. 55-59
This paper presents an algorithm of mesh simplification based on multi-feature metric guidance. The method preserves crucial visual features information for simplification of mesh generation with high quality. Our algorithm is an extended quadric-error met...
On-Demand Service-Oriented MDA Approach for SaaS and Enterprise Mashup Application Development
Found in: 2012 International Conference on Cloud and Service Computing (CSC)
By Xiuwei Zhang,Keqing He,Jian Wang,Jianxiao Liu,Chong Wang,Heng Lu
Issue Date:November 2012
pp. 96-103
As one of the fundamental technologies in cloud computing, services computing is playing a critical role to enable provisioning of software as a service (SaaS). However, how to effectively and efficiently develop and deploy personalized SaaS and enterprise...
Augmented reality during angiography: Integration of a virtual mirror for improved 2D/3D visualization
Found in: 2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)
By Jian Wang,Pascal Fallavollita,Lejing Wang,Matthias Kreiser,Nassir Navab
Issue Date:November 2012
pp. 257-264
Visualizing 2D and 3D anatomical information simultaneously within an X-ray image is challenging. Multiple monitors are required in the operating room to enable visualization of anatomical data by the surgeon. Consequently, this results in an interruption ...
Fast Calculation of Covariance Matrices for Arbitrary Size Cuboids
Found in: Signal-Image Technologies and Internet-Based System, International IEEE Conference on
By Jian Wang,Dongke Li,Feifei Fang,Zhiling Wang,Zonghai Chen
Issue Date:December 2011
pp. 398-402
We propose a fast calculation method to extract feature covariance matrix of cuboid of arbitrary size and arbitrary location within a given video. Every pixel in a video has several features, such as coordinates, color, gray value, gradients and orientatio...
Biodegradation of Microcystin-RR Extracted from Cyanobacterial Blooms by Sphingopyxis sp.USTB-05
Found in: Digital Manufacturing and Automation, International Conference on
By Hai Yan,Junfeng Wang,Chen Jian,Wang Yazhuo,Wei Wei
Issue Date:August 2011
pp. 267-270
The occurrence of cyanobacterial water blooms is a world wide concern in environmental health. Microcystin-RR (MC-RR) could be produced by cyanobacterial cells collected from Dianchi Lake and its content was about 0.12 mg/g in cyanobateria samples. A promi...
A Service-Oriented Framework for Hybrid Immersive Web Applications
Found in: Web Services, IEEE International Conference on
By Lijun Mei,Yimin Wang,Qicheng Li,Jian Wang,Ziyu Zhu
Issue Date:July 2011
pp. 556-563
Immersive Web (IW for short) applications such as Second Life and SimCity are increasingly popular among individual users and companies. However, it is difficult to build a hybrid Immersive Web application, because of the different architectures used for b...
3D Virtual Client Center and its Service Oriented Modeling
Found in: Service Sciences, International Joint Conference on
By Yi Min Wang, Lijun Mei, Qi Cheng Li, Jian Wang, Zi Yu Zhu
Issue Date:May 2011
pp. 324-328
Client centers have considerable influence to the success of a business. Companies encourage people to visit their client centers, in the hope of engaging potential clients. However, this could give rise to large financial costs. With the recent advances i...
Effect of Pretreatment on the Properties of Agricultural Waste
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Zhang Shouyu, Wang Jian, Wang Xiu-Jun, Peng Dingmao, Takayuki Takarada
Issue Date:February 2011
pp. 1173-1176
Agricultural waste disposal is becoming a problem due to its increasing production and potential pollution. As a kind of biomass, agricultural waste can be used as a sustainable and renewable source of energy. Agricultural waste disposal is of great econom...
Route Optimization Based on Genetic Algorithms of Stacker for Automated Storage and Retrieval System
Found in: Intelligent Systems, WRI Global Congress on
By Liu Jian, Wang Xin, Wang Weize, Li Changlong, Zhang Ting, Zhang Yang
Issue Date:December 2010
pp. 243-248
In this paper, an automated warehouse is taken as the object, its fixed shelf stacker selection of sub-optimal scheduling problem of operations is researched. The model of the sub-analysis is proposed a genetic algorithm fitness function, to join the task ...
Research into the Application and Character of Physical and Chemical on a New Kind of Cleaning Oxygenated Diesel Fuel
Found in: Digital Manufacturing and Automation, International Conference on
By Zhang Jian, Wang Xuanjun, Wang Wenguo, Guo Hejun
Issue Date:December 2010
pp. 168-171
A new oxygenated fuel, methyl 2-methoxy propyl carbonate, was designed according to the fuel design theory and the special burning performance of diesel engine. It can be used as an oxygenated additive in diesel, too. A single cylinder, 4-stroke, water-coo...
Antenna Selection Scheme for Application in MIMO Systems with Non-constant Envelope Mapping
Found in: Computational Science and Engineering, IEEE International Conference on
By Shu-yun Jia, Jian Wang, Jin-tao Wang, Bo Ai
Issue Date:December 2010
pp. 275-278
To reduce the cost and complexity of receiver without losing much diversity gain, we propose an antenna selection scheme for MIMO systems employing non-constant envelope mapping. By detection of the received signal and a simplified process without any know...
The Management of Engineering Equipment Based on the Virtual Reality Technology
Found in: Information Science and Management Engineering, International Conference of
By Yue-guo Shen, Xiao-qi Li, Jian Wang, Xi Wang
Issue Date:August 2010
pp. 303-306
The technology of management of engineering equipment based on the virtual reality(VR)is the necessary outcome when the information technology have developed to this day. The conception such as the definition, composition, and its characteristic are mentio...
Research on Segmentation of E-shoppers Based on Clustering
Found in: Intelligent Computation Technology and Automation, International Conference on
By Wang Chong, Liu Jian, Wang Yanqing
Issue Date:May 2010
pp. 100-103
with the rapid development of online shopping, the ability to segment e-shoppers basing on their preferences and characteristics has become a key source of competitive advantage for firms. This paper presented the realistic algorithms for clustering e-shop...
RABBIF: Remote Attestation Based on Behavior and Information Flow
Found in: Computer Engineering and Applications, International Conference on
By Jian Wang, Haihang Wang, Chengxiang Tan
Issue Date:March 2010
pp. 18-22
As an important feature, remote attestation was introduced in TCG specifications to attest whether a remote platform will behave in a particular manner for a specific purpose. However, either behavior based measurements or information flow based ones have ...
Study on the Optimal Strategies of Supply Chain to Deal with Unexpected Events
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Hesong Bai, Yufang Wang, Jian Wang
Issue Date:December 2009
pp. 504-507
Some unexpected events, such as terrorist attacks and other natural disasters and so on, which have a great influence on the supply chain. This paper constructed a optimal model to coordinate the supply chain, and come to a conclusion that
 1  2 Next >>