Search For:

Displaying 1-50 out of 135 total
A Model-Based Fuzz Framework to the Security Testing of TCG Software Stack Implementations
Found in: Multimedia Information Networking and Security, International Conference on
By Yang Yang, Huanguo Zhang, Mi Pan, Jian Yang, Fan He, Zhide Li
Issue Date:November 2009
pp. 149-152
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally fuzz testing tools use random inputs and watch the resulting values. In this paper, we present a model-based fuzz framework for systematic automated test...
 
Research of Congestion in Ad Hoc Networks Based on Cross-Layer Cooperative Processing
Found in: 2012 IEEE 12th International Conference on Computer and Information Technology (CIT)
By Chun-Sheng Cui,Yong-Jian Yang,Xiang Li
Issue Date:October 2012
pp. 610-614
Specific to the frequent congestion problems for Ad-Hoc Networks, using the idea of cross-layer design, combined with the principle of node cooperation, integrating the directed graph theory in the local route selection, presents a mechanism of pseudo dire...
 
Provisioning Web Services from Resource Constrained Mobile Devices
Found in: Cloud Computing, IEEE International Conference on
By Mahbub Hassan, Weiliang Zhao, Jian Yang
Issue Date:July 2010
pp. 490-497
The increasing processing power, storage and support of multiple network interfaces are promising the mobile devices to host services and participate in service discovery network. A few efforts have been taken to facilitate provisioning mobile Web services...
 
QoS Analysis and Service Selection for Composite Services
Found in: Services Computing, IEEE International Conference on
By Huiyuan Zheng, Jian Yang, Weiliang Zhao
Issue Date:July 2010
pp. 122-129
A composite service can be constructed with the arbitrary combination of sequential, parallel, loop, and conditional structures. In this paper, we propose a general solution to calculate the QoS for composite services with complex structures. We also show ...
 
Understand Collaborative Authorization Policies: Models and Specifications
Found in: Cloud Computing, IEEE International Conference on
By Daisy Daiqin He, Jian Yang
Issue Date:September 2009
pp. 206-213
Modern distributed systems require collaborations between individual organizations. The collaborations consist of complex relationships and interactions among distinct administrative domains. Different forms of collaboration can be implemented. As a result...
 
QoS Analysis for Web Service Composition
Found in: Services Computing, IEEE International Conference on
By Huiyuan Zheng, Weiliang Zhao, Jian Yang, Athman Bouguettaya
Issue Date:September 2009
pp. 235-242
The quality of service (QoS) is a major concern in the design and management of Web service composition. Existing methods for QoS calculation either do not take the probability of path execution into consideration when QoSs are provided for different execu...
 
Relation Based Service Networks for Reliable Service Selection
Found in: E-Commerce Technology, IEEE International Conference on
By Yi Wang, Jian Yang
Issue Date:July 2009
pp. 209-214
With the steady growth of web services in recent years, service users are confronted with great difficulties in selecting suitable services from substantial functionally similar services in the complex service provisioning environment. Contradictions and i...
 
Contract-First Design Techniques for Building Enterprise Web Services
Found in: Web Services, IEEE International Conference on
By Youliang Zhong, Jian Yang
Issue Date:July 2009
pp. 591-598
Based on real development experience, the paper presents a collection of design techniques for building enterprise web services. By applying the techniques to web services development, not only the development increases reusability and productivity, but al...
 
Process-Oriented Enterprise Mashups
Found in: Grid and Pervasive Computing Conference, Workshops at the
By Paul de Vrieze, Lai Xu, Athman Bouguettaya, Jian Yang, Jinjun Chen
Issue Date:May 2009
pp. 64-71
Mashups, a new web 2.0 technology provide the ability for easy creation of web-based applications by end-users. The uses of the mashups are often consumer related. In this paper we explore how mashups can be used in the enterprise area and hat the criteria...
 
Using the improved DSMC method to predict the reliability of micro-flow channels
Found in: International Conference on Nano/Micro Engineered and Molecular Systems
By Ping Tang, Jian Yang, Jianjun Ye, Jinyang Zheng, Chikong Lam, Ieong Wong, Yanbao Ma
Issue Date:January 2009
pp. 353-358
Reliability of microfluidic designs is an extremely important issue that defines the range of applicability of micro-devices. The reliability design of micro-channels presents new complications that require extensions of today's method to incorporate relia...
 
Effects of wall temperature on the heat and mass transfer in microchannels using the DSMC method
Found in: International Conference on Nano/Micro Engineered and Molecular Systems
By Jianjun Ye, Jian Yang, Jinyang Zheng, Ping Xu, Chikong Lam, Ieong Wong, Yanbao Ma
Issue Date:January 2009
pp. 666-671
Micro-electro-mechanical systems (MEMS) and nano-electro-mechanical systems (NEMS) have become the research focuses which attract a great deal of attention in recent years. The fluidic and thermal behaviors are usually different from those of the macro dev...
 
On the Specification and Negotiation of Quality of Service for Collaborative Services
Found in: Enterprise Distributed Object Computing Conference, IEEE International
By Bart Orriens, Jian Yang
Issue Date:September 2008
pp. 316-322
The adoption of web service technologies in dynamic business applications such as on-demanding computing or highly reconfigurable virtual enterprizes advocates for methods and tools for describing and managing non-functional aspects of services, e.g., the ...
 
REFS 2008 Workshop Organization
Found in: 2008 IEEE 32nd International Computer Software and Applications Conference (COMPSAC)
By Colette Rolland,Eric Yu,Jian Yang,Lin Liu
Issue Date:July 2008
pp. 600
Provides a listing of current committee members and society officers.
   
Identify Authorization Control Requirement in Business Collaboration
Found in: Services Computing, IEEE International Conference on
By Daisy Daiqin He, Jian Yang
Issue Date:July 2008
pp. 561-562
Different types of business collaborations exist in terms of the way that the collaboration is carried out. In this paper, we will look into the characteristics of different collaborations and analyze their policy requirements accordingly. Various inconsis...
 
On the Specification of Payment Requirements for Collaborative Services
Found in: Services Computing, IEEE International Conference on
By Bart Orriens, Jian Yang
Issue Date:July 2008
pp. 137-144
Payment arrangement is one of the vital issues in a B2B setting. For example, failing to accurately specify and communicate payment details such as the method of the payment, whether payment is refundable and negotiable, and what settlement model is used, ...
 
Supporting Differentiated ServicesWith Configurable Business Processes
Found in: Web Services, IEEE International Conference on
By Aries Tao Tao, Jian Yang
Issue Date:July 2007
pp. 1088-1095
Service Oriented Computing (SOC) allows resources on a network to be made available as services. For a business service, differentiated services can be provided based on the usage context, i.e., location, age, purpose and user profiles. In differentiated s...
 
Security Policy Specification and Integration in Business Collaboration
Found in: Services Computing, IEEE International Conference on
By Daisy Daiqin He, Jian Yang
Issue Date:July 2007
pp. 20-27
Service Oriented Computing (SOC) has provided a promising architectural for business collaboration. However challenging security issues concerning business collaboration have arisen because of its dynamic and loosely coupling nature. An important problem i...
 
BTx-Net: A Token Based Dynamic Model for Supporting Consistent Collaborative Business Transactions
Found in: Services Computing, IEEE International Conference on
By Haiyang Sun, Jian Yang
Issue Date:July 2007
pp. 490-497
Business transaction is about coordinating the flow of information among organizations and linking their business processes, associated with the solutions to ensure the eventual generation of the consistent outcomes. One important issue here is how to main...
 
A Policy Driven Authorization Control Framework for Business Collaboration
Found in: Services, IEEE Congress on
By Daisy Daiqin He, Jian Yang
Issue Date:July 2007
pp. 17-24
Business collaboration is about coordinating the flow of information among organizations and linking their business processes. However unique and challenging security issues concerning business collaboration in the context of SOC have arisen because of its...
 
Business Collaboration Development: A Case Study in Capital Market
Found in: Enterprise Distributed Object Computing Conference, IEEE International
By Aries Tao Tao, Jian Yang, Hongyu Jia
Issue Date:October 2006
pp. 449-452
Nowadays in order to stay competitive, business needs to collaborate with each other to offer value added services. Collaborative business process development require loose coupling between individual business processes so that they can interoperate freely...
 
A Rule Driven Approach for Developing Adaptive Service Oriented Business Collaboration
Found in: Services Computing, IEEE International Conference on
By Bart Orriens, Jian Yang
Issue Date:September 2006
pp. 182-189
Current composite web service development and management solutions, e.g. BPEL, do not cater for flexible and adaptive business collaborations due to their pre-defined and inflexible nature that precludes them accommodating business dynamics. In this paper ...
 
Collaborative Business Transactions Management: Issues and Challenges
Found in: Web Services, IEEE International Conference on
By Yanchun Zhang, Jian Yang, Chengfei Liu
Issue Date:July 2005
pp. xxviii
No summary available.
   
Collaborative Business Transactions Management: Issues and Challenges
Found in: Services Computing, IEEE International Conference on
By Yanchun Zhang, Jian Yang, Chengfei Liu
Issue Date:July 2005
pp. xviii
<p>This tutorial seeks to discuss the key concepts in collaborative business transaction management. Its intent is to explain the concept in business transaction and how it is different from traditional database transaction and workflow transaction m...
   
ServiceCom: A Tool for Service Composition Reuse and Specialization
Found in: Web Information Systems Engineering, International Conference on
By Bart Orriëns, Jian Yang, Mike P. Papazoglou
Issue Date:December 2003
pp. 355
Web services are becoming the dominant paradigm for distributed computing and electronic business. This has raised the opportunity for service providers and application developers to create value added services by combining web services. Several web servic...
 
A Rule Based Approach to the Service Composition Life-Cycle
Found in: Web Information Systems Engineering, International Conference on
By Jian Yang, Mike P. Papazoglou, Bart Orriëns, Willem-Jan van Heuvel
Issue Date:December 2003
pp. 295
Web services are becoming the prominent paradigm for distributed computing and electronic business. This has raised the opportunity for service providers and application developers to develop value-added services by combining existing web services. However...
 
Tackling the Challenges of Service Composition in E-Marketplaces
Found in: Research Issues in Data Engineering, International Workshop on
By Jian Yang, Mike P. Papazoglou, Willem-Jan Van den Heuvel
Issue Date:February 2002
pp. 0125
The Web has becomes the means for enterprises to deliver electronic services to businesses and customers, and for service providers to discover services and build complex applications by using existing services. The number of the e-services is growing rapi...
 
Describing Capabilities of Internet Data Sources for Information Discovery and Sharing
Found in: Agile Development Conference/Australasian Database Conference
By Jian Yang, Lai Xu
Issue Date:February 2001
pp. 0021
Abstract: The Internet now makes it possible for people building complex applications by combining data and processes offered by different information systems available across the network. These data sources are normally with very diverse data structure an...
 
Advertising Services in the Internet Marketplace
Found in: Web Information Systems Engineering, International Conference on
By Jian Yang
Issue Date:June 2000
pp. 0426
The Internet now makes it possible for people building complex applications by combining data and processing offered by different information systems (services) available across the network. These services are normally with very diverse data structure and ...
 
Tackling the challenges of materialized view design in data warehousing environment
Found in: Research Issues in Data Engineering, International Workshop on
By Jian Yang, K. Karlapalem, Qing Li
Issue Date:April 1997
pp. 32
The design of materialized views in a data warehousing environment is an important problem which has been largely overlooked in the past. If one regards data warehouse queries as integrated views over the base databases, then there is a need to select a se...
 
A QoS Approach for Detecting and Managing a Fault Alarm Storm
Found in: Cyber-Enabled Distributed Computing and Knowledge Discovery, International Conference on
By Jian Yang,Li Li,Su-Bin Shen,Charlie Chen-Yui Yang
Issue Date:October 2011
pp. 123-129
When a large communication network encounters abnormal situations, such as multiple cable cuts or a failure of interface protocol leading to large numbers of propagating alarms may potentially cause many symptom events in multiple network domains. As a res...
 
Segmentation Based on Routing Image Algorithms
Found in: Image and Graphics, International Conference on
By Hongzhe Yang,Jian Yang,Yongtian Wang,Yue Liu
Issue Date:August 2011
pp. 424-428
This paper presents a novel image segmentation method in which energy function is based on global region information while not only on edge information. Image segmentation can be viewed as a routing problem. In order to obtain the optimal segmentation, the...
 
Robust sparse coding for face recognition
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Meng Yang, Lei Zhang, Jian Yang,D. Zhang
Issue Date:June 2011
pp. 625-632
Recently the sparse representation (or coding) based classification (SRC) has been successfully used in face recognition. In SRC, the testing image is represented as a sparse linear combination of the training samples, and the representation fidelity is me...
 
Research on Digital Phase-Locked Loop about K/Ka-Band High Precision Receiver
Found in: 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010)
By Yang Jian, Yang Yikang, Liang Lin Fang, Liu Lei
Issue Date:October 2010
pp. 185-188
A dual one-way ranging system (DOWR) can provide very high precision ranging between two carrier phase transceiver-receiver systems. In microwave ranging system, the accuracy of inter-satellite ranging is mainly limited by the stability of the oscillator a...
 
Dynamics Simulation Study of One-Blade Cutting Sugarcane Process
Found in: Electrical and Control Engineering, International Conference on
By Wang Yang, Jian Yang, Yiqi Huang
Issue Date:June 2010
pp. 5186-5190
By using explicit dynamic simulation software ANSYS / LS-DYNA, the sugarcane-cutter system dynamics simulation model has been established. The precision of the simulation model was verified by physical experiment. The dynamics simulation of one-blade cutti...
 
Learning the Similarity Preserving Principal Curves
Found in: Intelligent Systems, WRI Global Congress on
By Mingming Sun, Jian Yang, Chuancai Liu, Jingyu Yang
Issue Date:May 2009
pp. 451-455
The theory of Similarity Preserving Principal Curves(also called Principal Curves with Feature Continuity) has been studied. In this paper, we proposed a practical learning algorithm for learning the Similarity Preserving Principal Curves for a general dat...
 
Towards Unconditional Anonymity: Privacy Enforcement Model in Web Services
Found in: Services Part II, IEEE Congress on
By Yong Yang, Jian Yang
Issue Date:September 2008
pp. 26-33
Privacy in web services is of great importance and a critical requirement for any business and non-business environments. The growth of web services has been accompanied by sharing more and more user personal information with web service providers between ...
 
Minimal local reconstruction error measure based discriminant feature extraction and classification
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Jian Yang, Zhen Lou, Zhong Jin, Jing-yu Yang
Issue Date:June 2008
pp. 1-6
This paper introduces the minimal local reconstruction error (MLRE) as a similarity measure and presents a MLRE-based classier. From the geometric meaning of the minimal local reconstruction error, we derive that the MLRE-based classifier is a generalizati...
 
Effective classification image space which can solve small sample size problem
Found in: Pattern Recognition, International Conference on
By Yu-jie Zheng, Jing-yu Yang, Jian Yang, Xiao-jun Wu
Issue Date:August 2006
pp. 861-864
Linear Discriminant Analysis (LDA) is one of the most popular methods in feature extraction and dimension reduction. However, in many real applications, particularly in image recognition applications such as face recognition, conventional LDA algorithm wil...
 
A Complete and Rapid Feature Extraction Method for Face Recognition
Found in: Pattern Recognition, International Conference on
By Yu-jie Zheng, Jing-yu Yang, Jian Yang, Xiao-jun Wu, Dong-jun Yu
Issue Date:August 2006
pp. 469-472
Feature extraction is one of the key steps in face recognition. In this paper, common vector is used to extract features from null space of within-class scatter matrix, which is independent of the sample index in the same class and accelerates the speed of...
 
Unsupervised Discriminant Projection Analysis for Feature Extr
Found in: Pattern Recognition, International Conference on
By Jian Yang, David Zhang, Zhong Jin, Jing-yu Yang
Issue Date:August 2006
pp. 904-907
This paper develops an unsupervised discriminant projection (UDP) technique for feature extraction. UDP takes the local and non-local information into account, seeking to find a projection that maximizes the non-local scatter and minimizes the local scatte...
 
Is ICA Significantly Better than PCA for Face Recognition?
Found in: Computer Vision, IEEE International Conference on
By Jian Yang, David Zhang, Jing-yu Yang
Issue Date:October 2005
pp. 198-203
The standard PCA was always used as baseline algorithm to evaluate ICA-based face recognition systems in the previous research. In this paper, we examine the two architectures of ICA for image representation and find that ICA Architecture I involves a PCA ...
 
KPCA Plus LDA: A Complete Kernel Fisher Discriminant Framework for Feature Extraction and Recognition
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Jian Yang, Alejandro F. Frangi, Jing-yu Yang, David Zhang, Zhong Jin
Issue Date:February 2005
pp. 230-244
This paper examines the theory of kernel Fisher discriminant analysis (KFD) in a Hilbert space and develops a two-phase KFD framework, i.e., kernel principal component analysis (KPCA) plus Fisher linear discriminant analysis (LDA). This framework provides ...
 
Two-Dimensional PCA: A New Approach to Appearance-Based Face Representation and Recognition
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Jian Yang, David Zhang, Alejandro F. Frangi, Jing-yu Yang
Issue Date:January 2004
pp. 131-137
<p><b>Abstract</b>—In this paper, a new technique coined two-dimensional principal component analysis (2DPCA) is developed for image representation. As opposed to PCA, 2DPCA is based on 2D image matrices rather than 1D vectors so the imag...
 
Robust Low-Rank Regularized Regression for Face Recognition with Occlusion
Found in: 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
By Jianjun Qian,Jian Yang,Fanglong Zhang,Zhouchen Lin
Issue Date:June 2014
pp. 21-26
Recently, regression analysis based classification methods are popular for robust face recognition. These methods use a pixel-based error model, which assumes that errors of pixels are independent. This assumption does not hold in the case of contiguous oc...
 
QoS Analysis for Web Service Compositions with Complex Structures
Found in: IEEE Transactions on Services Computing
By Huiyuan Zheng, Weiliang Zhao, Jian Yang,A. Bouguettaya
Issue Date:July 2013
pp. 373-386
Quality of service (QoS) is a major concern in the design and management of a composite service. In this paper, a systematic approach is proposed to calculate QoS for composite services with complex structures, taking into consideration of the probability ...
 
A delay prediction based content and channel aware packet scheduler for real-time video over HSDPA
Found in: 2013 IEEE 14th International Symposium on
By Rui Deng, Jian Yang, Chaoteng Liu, Guizhong Liu
Issue Date:June 2013
pp. 1-6
With the growing popularity of video applications, the provision of high-quality video transmission for multi-users over High Speed Downlink Packet Access ( HSDPA ) networks gradually becomes a research focus. In HSDPA, the downlink shared channel is share...
   
Local Tangent Distances for Classification Problems
Found in: 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)
By Jian Yang,Kexin Zhu,Ning Zhong
Issue Date:December 2012
pp. 396-401
Distance measure is quite important for pattern recognition. Utilizing invariance in image data, tangent distance is very powerful in classifying handwritten digits. For this measure a set of invariant transformations must be known a priori. But in many pr...
 
Dynamic Cluster Reconfiguration for Energy Conservation in Computation Intensive Service
Found in: IEEE Transactions on Computers
By Jian Yang,Ke Zeng,Han Hu,Hongsheng Xi
Issue Date:October 2012
pp. 1401-1416
This paper considers the problem of dynamic cluster reconfiguration for computation intensive services. In order to provide a quality-of-service in terms of overload probability, we formulate the problem of energy consumption as a constrained optimization ...
 
A novel non-contact interactive medical image viewing system
Found in: 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)
By Chen Geng,Jian Yang,Tong Li,Yongtian Wang
Issue Date:October 2012
pp. 254-259
Currently, photographic film is the most commonly used medium for viewing medical images in hospitals. However, as digitalized medical images need to be printed on photographic film first, such kind of viewing pattern has an extremely limited use A homogen...
 
Bootstrapping Trust and Reputation for Web Services
Found in: 2012 IEEE 14th International Conference on Commerce and Enterprise Computing (CEC)
By Hien Trang Nguyen,Jian Yang,Weiliang Zhao
Issue Date:September 2012
pp. 41-48
Trust and reputation of web services is usually established based on the historical information about past transactions or rating scores collected over a period of time. However, when a new web service joins a community, normally there is not much informat...
 
 1  2 Next >>