Search For:

Displaying 1-44 out of 44 total
Hardware-Assisted Application Integrity Monitor
Found in: Hawaii International Conference on System Sciences
By Jiang Wang,Kun Sun,Angelos Stavrou
Issue Date:January 2012
pp. 5375-5383
Existing hardware-assisted methods monitor the integrity of hyper visors and operating systems, which are critical to system integrity. This protection is possible because of ``non-volatile'' data structures present in the machine's physical memory. In con...
   
Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics
Found in: Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on
By Jiang Wang,Fengwei Zhang,Kun Sun,Angelos Stavrou
Issue Date:May 2011
pp. 1-5
Being able to inspect and analyze the operational state of commodity machines is crucial for modern digital forensics. Indeed, volatile system state including memory data and CPU registers contain information that cannot be directly inferred or reconstruct...
 
A Solution on the Enterprise Knowledge Management with Complexity
Found in: Intelligence Information Processing and Trusted Computing, International Symposium on
By Min Wang, Jiang Wang, Yanzhao Li
Issue Date:October 2010
pp. 431-434
From the point of the complexity of knowledge, based on the complex adaptive system theory, combined with computer science and artificial intelligence theories, the author analyzes the complexity of enterprise knowledge management and provides a solution t...
 
Learning Actionlet Ensemble for 3D Human Action Recognition
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Jiang Wang,Zicheng Liu,Ying Wu,Junsong Yuan
Issue Date:May 2014
pp. 1-1
Human action recognition is an important yet challenging task. Human actions usually involve human-object interactions, highly articulated motions, high intra-class variations, and complicated temporal structures. The recently developed commodity depth sen...
 
Learning Maximum Margin Temporal Warping for Action Recognition
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Jiang Wang,Ying Wu
Issue Date:December 2013
pp. 2688-2695
Temporal misalignment and duration variation in video actions largely influence the performance of action recognition, but it is very difficult to specify effective temporal alignment on action sequences. To address this challenge, this paper proposes a no...
 
Multi-objective Optimization Evolutionary Algorithm Based on Point-to-Weight Method
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Xueqiang Li,Jiang Wang,Jing Xiao,Xiaoling Zhang
Issue Date:September 2013
pp. 191-196
Selecting points using min-max strategy can guarantee uniformity of Pareto. But shortcomings are missing effective solutions and poor solutions being selected. By the analysis of choosing points with the min-max strategy and reasonable fitness metric, we p...
 
Multi-objective Optimization Evolutionary Algorithm Based on Point-to-Weight Method
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Xueqiang Li,Jiang Wang,Jing Xiao,Xiaoling Zhang
Issue Date:September 2013
pp. 191-196
Selecting points using min-max strategy can guarantee uniformity of Pareto. But shortcomings are missing effective solutions and poor solutions being selected. By the analysis of choosing points with the min-max strategy and reasonable fitness metric, we p...
 
Automatic Evaluation of Domain-Specific Ontology Based on Ontology Co-relation Network
Found in: 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)
By Qi Yu,Cao Jiang,Wang Jianxin
Issue Date:January 2013
pp. 317-322
Ontology evaluation is a key challenge in the field of ontology development and reuse. Current methods of evaluation sometimes can not cover the users' requirements because they are based on isolated ontology. This paper proposes that the evaluation can be...
 
Multi-mode screensaver for embedded system based on μC/OS-II
Found in: 2012 IEEE International Conference on Granular Computing (GrC-2012)
By Jia Yin Xue,Ming Jiang Wang,Lei Chen
Issue Date:August 2012
pp. 775-778
A multi-mode screensaver for embedded system is designed to realize autonomous power management and improve utilization of system resource. Application of a three-mode screensaver, including Black Screen (Mode_B), Photo Slide (Mode_P) and Clock Display (Mo...
 
A dependability analysis of hardware-assisted polling integrity checking systems
Found in: 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Jiang Wang, Kun Sun,Angelos Stavrou
Issue Date:June 2012
pp. 1-12
Due to performance constraints, host intrusion detection defenses depend on event and polling-based tamper-proof mechanisms to detect security breaches. These defenses monitor the state of critical software components in an attempt to discover any deviatio...
   
Decomposing and regularizing sparse/non-sparse components for motion field estimation
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Zhuoyuan Chen, Jiang Wang, Ying Wu
Issue Date:June 2012
pp. 1776-1783
Regularizing motion field is critical to achieve accurate estimation of the motion field. As the motion field may include discontinuity (e.g., at the motion boundaries), traditional smoothness regularization may not work well. Among many approaches to hand...
 
Mining actionlet ensemble for action recognition with depth cameras
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Jiang Wang, Zicheng Liu, Ying Wu, Junsong Yuan
Issue Date:June 2012
pp. 1290-1297
Human action recognition is an important yet challenging task. The recently developed commodity depth sensors open up new possibilities of dealing with this problem but also present some unique challenges. The depth maps captured by the depth cameras are v...
 
Robust Adaptive Fuzzy Tracking Control of Stochastic Neuron Systems
Found in: Intelligent System Design and Engineering Application, International Conference on
By Huiyan Li,Jiang Wang,Qitao Jin,Bin Deng,Xile Wei,Yanqiu Che
Issue Date:January 2012
pp. 497-500
Nerve cells communicate by generating and transmitting action potentials. Annihilation of neural oscillation by functional electrical stimulation is a promising treatment modality in neural diseases. In this paper, a robust adaptive fuzzy tracking control ...
 
Complex Human-System Systems Design for C2
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Xu-Hui Luo,Jiang Wang,Meng Qian,Zhong Liu,Wei-Ming Zhang,Cheng Zhu
Issue Date:December 2011
pp. 1031-1038
Human-System systems design is a critical part of Command and Control (C2) design, in order to improve the whole effectiveness of C2 design, the human beings and systems must be in harmony in the human-in-loop systems, which can be referred to as Cyber-phy...
 
Action recognition with multiscale spatio-temporal contexts
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Jiang Wang, Zhuoyuan Chen, Ying Wu
Issue Date:June 2011
pp. 3185-3192
The popular bag of words approach for action recognition is based on the classifying quantized local features density. This approach focuses excessively on the local features but discards all information about the interactions among them. Local features th...
 
Chaos Synchronization of Coupled FitzHugh-Nagumo Neurons Via Adaptive Sliding Mode Control
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Yan-Qiu Che, Shi-Gang Cui, Jiang Wang, Bin Deng, Xi-Le Wei
Issue Date:January 2011
pp. 684-687
In this paper, an adaptive neural network (NN) sliding mode controller is proposed to realize the chaos synchronization of two gap junction coupled FitzHugh-Nagumo (FHN) neurons under external electrical stimulation. The controller consists of two simple r...
 
Topology Estimation of Uncertain General Complex Dynamical Networks from Noisy Time Series
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Yan-Qiu Che, Jiang Wang, Shi-Gang Cui, Li Zhao, Bin Deng, Xi-Le Wei
Issue Date:January 2011
pp. 1031-1034
This paper addresses the problem of simultaneous estimation of the topological structure and unknown parameters of uncertain general complex networks from noisy time series. Usually the complex networks consist of known node models with some unknown parame...
 
A Constructive Algorithm for Training Neural Network Ensemble
Found in: Intelligent Systems, WRI Global Congress on
By Jianming Dong, Qifan Yang, Jueliang Hu, Yiwei Jiang, Wang Li
Issue Date:December 2010
pp. 129-132
Neural network ensemble is a learning paradigm where many neural networks are used together to solve a particular problem. This paper presents a new method to construct a neural network ensemble (NNE) based on Correlation, Interaction Validation and Entrop...
 
The Spread of Malicious Software Research and Prevention
Found in: Education Technology and Computer Science, International Workshop on
By Yang Yue Jiang, Wang Chang Li
Issue Date:March 2010
pp. 777-780
Internet security issues increasingly prominent, the spread of malicious software and is particularly serious outbreak. Paper analyzed the malicious software brought about by the danger of malicious software, introduced the definition and classification, d...
 
An Iterative Refinement DSA Image Registration Algorithm Using Structural Image Quality Measure
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Jiang Wang, Jiangqiu Zhang
Issue Date:September 2009
pp. 973-976
This paper proposes a iterative robust algorithm for the registration of digital angiography images. The registration is iteratively refined with the extracted vessel information and the SSIM index is employed as similarity measure. The experimental result...
 
Heavyweight Semantic Inducement for Requirement Elicitation and Analysis
Found in: Semantics, Knowledge and Grid, International Conference on
By Wei Liu, Ke-Qing He, Jiang Wang, Rong Peng
Issue Date:October 2007
pp. 206-211
Requirement process for networked software is a human-web interaction. Requirement elicitation and analysis are emerging as a critical issue for supporting requirement modeling, as these are designed to satisfy diverse stakeholder service needs and evoluti...
 
Robust ISS-satisficing fuzzy control of chaotic systems
Found in: Intelligent Systems Design and Applications, International Conference on
By Jiang Wang, Xiaowei Ye, Wenjie Si
Issue Date:October 2006
pp. 293-298
In this paper, an attempt is made to create the bridge between two important design techniques, robust ISSsatisficing control design and fuzzy control design, so as to supply robust ISS-satisficing control design with more inverse optimality and fuzzy cont...
 
A Virtualization Architecture for In-Depth Kernel Isolation
Found in: Hawaii International Conference on System Sciences
By Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anup K. Ghosh
Issue Date:January 2010
pp. 1-10
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolation and management. Unfortunately, virtualization solutions incur performance o...
   
SafeFox: A Safe Lightweight Virtual Browsing Environment
Found in: Hawaii International Conference on System Sciences
By Jiang Wang, Yih Huang, Anup Ghosh
Issue Date:January 2010
pp. 1-10
The browser has become a popular attack vector for implanting code on computer operating systems. Equally critical, important sessions, such as online banking, must be protected from cross-site attacks from other concurrent sessions. In this work we descri...
   
Phase Properties of Complex Wavelet Coefficients
Found in: Innovative Computing ,Information and Control, International Conference on
By Guo-Rui Zhou, Wen-Jiang Wang, Shi-Xin Sun
Issue Date:December 2009
pp. 1373-1376
The importance of phase in signal processing has been known for a long time. This paper presents an overview to the recent advances in phase properties of CWT coefficients. Our attention is mainly put on describing phase properties based on theoretical ana...
 
A Novel Music Retrieval System with Relevance Feedback
Found in: Innovative Computing ,Information and Control, International Conference on
By Gang Chen, Tian-Jiang Wang, Perfecto Herrera
Issue Date:June 2008
pp. 158
Although various researches have been conducted in the area of content-based music retrieval, however, few works have been done using relevance feedback for improving the retrieval performance. In this paper we introduce a novel content-based music retriev...
 
HyperCheck: A Hardware-AssistedIntegrity Monitor
Found in: IEEE Transactions on Dependable and Secure Computing
By Fengwei Zhang,Jiang Wang,Kun Sun,Angelos Stavrou
Issue Date:July 2014
pp. 332-344
The advent of cloud computing and inexpensive multi-core desktop architectures has led to the widespread adoption of virtualization technologies. Furthermore, security researchers embraced virtual machine monitors (VMMs) as a new mechanism to guarantee dee...
 
Mining discriminative 3D Poselet for cross-view action recognition
Found in: 2014 IEEE Winter Conference on Applications of Computer Vision (WACV)
By Jiang Wang, Xiaohan Nie, Yin Xia,Ying Wu
Issue Date:March 2014
pp. 634-639
This paper presents a novel approach to cross-view action recognition. Traditional cross-view action recognition methods typically rely on local appearance/motion features. In this paper, we take advantage of the recent developments of depth cameras to bui...
   
Structured Mechanical Collage
Found in: IEEE Transactions on Visualization and Computer Graphics
By Zhe Huang,Jiang Wang,Hongbo Fu,Rynson Lau
Issue Date:February 2014
pp. 1
We present a method to build 3D structured mechanical collages consisting of numerous elements from the database given artist-designed proxy models. The construction is guided by some graphic design principles, namely unity, variety and contrast. Our resul...
 
Learning Actionlet Ensemble for 3D Human Action Recognition
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Jiang Wang,Zicheng Liu,Ying Wu,Junsong Yuan
Issue Date:October 2013
pp. 1
Human action recognition is an important yet challenging task. Human actions usually involve human-object interactions, highly articulated motions, high intra-class variations and complicated temporal structures. The recently developed commodity depth sens...
 
Visual Tracking via Locality Sensitive Histograms
Found in: 2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Shengfeng He,Qingxiong Yang,Rynson W.H. Lau,Jiang Wang,Ming-Hsuan Yang
Issue Date:June 2013
pp. 2427-2434
This paper presents a novel locality sensitive histogram algorithm for visual tracking. Unlike the conventional image histogram that counts the frequency of occurrences of each intensity value by adding ones to the corresponding bin, a locality sensitive h...
 
An Adaptive Dynamic Ant System Based on Acceleration for TSP
Found in: Computational Intelligence and Security, International Conference on
By Hong-biao Mei, Jiang Wang, Zi-hui Ren
Issue Date:December 2009
pp. 92-96
Ant System (AS) is a novel simulated evolutionary algorithm which shows many good characters, but it has some typical shortcomings, such as high time complexity, stagnation behavior. An Ant Adaptive Dynamic Ant System (ADAS) based on Acceleration is propos...
 
A real-time database architecture for motion capture data
Found in: Proceedings of the 19th ACM international conference on Multimedia (MM '11)
By Haiyu Song, Jiang Wang, Mingmin Zhang, Pengjie Wang, Rynson W.H Lau, Zhigeng Pan
Issue Date:November 2011
pp. 1337-1340
Due to the popularity of motion capture data in many applications, such as games, movies and virtual environments, huge collections of motion capture data are now available. It is becoming important to store these data in compressed form while being able t...
     
Bootstrapping active name disambiguation with crowdsourcing
Found in: Proceedings of the 22nd ACM international conference on Conference on information & knowledge management (CIKM '13)
By Ankit Agrawal, Yu Cheng, Alok Choudhary, Jiang Wang, Zhengzhang Chen
Issue Date:October 2013
pp. 1213-1216
Name disambiguation is a challenging and important problem in many domains, such as digital libraries, social media management and people search systems. Traditional methods, based on direct assignment using supervised machine learning techniques, seem to ...
     
Feedback-driven multiclass active learning for data streams
Found in: Proceedings of the 22nd ACM international conference on Conference on information & knowledge management (CIKM '13)
By Alok Choudhary, Ankit Agrawal, Yu Cheng, Jiang Wang, Lu Liu, Zhengzhang Chen
Issue Date:October 2013
pp. 1311-1320
Active learning is a promising way to efficiently build up training sets with minimal supervision. Most existing methods consider the learning problem in a pool-based setting. However, in a lot of real-world learning tasks, such as crowdsourcing, the unlab...
     
Music retrieval based on a multi-samples selection strategy for support vector machine active learning
Found in: Proceedings of the 2009 ACM symposium on Applied Computing (SAC '09)
By Gang Chen, Perfecto Herrera, Tian-Jiang Wang
Issue Date:March 2009
pp. 1-5
In active learning based music retrieval systems, providing multiple samples to the user for feedback is very necessary. In this paper, we present a new multi-samples selection strategy designed for support vector machine active learning. Aiming to reduce ...
     
A Research on Entropy of Information Compression Operator-based Multi-stage Genetic Algorithm
Found in: Electronic Commerce and Security, International Symposium
By Wen-jie Lu, Lin-rong Pang, Hui-xin Yu, Rui-jiang Wang
Issue Date:July 2010
pp. 362-367
Genetictic Algorithm (GA) is a widely-used highefficiency random search and optimization method, which is geneticrated from evolution theory. This paper aims at overcoming the drawbacks of local convergence and not converging well to the globally-optimal s...
 
Automatic Facial Expression Recognition Based on Local Binary Patterns of Local Areas
Found in: Information Engineering, International Conference on
By Wei-feng Liu, Shu-juan Li, Yan-jiang Wang
Issue Date:July 2009
pp. 197-200
Automatic facial expression recognition is one of the great challenges in facial expression recognition field. An algrithom of automatic facial expression recognition is proposed based on Local Binary Patterns of local areas (LLBP)in this work. First, the ...
 
Stability of a Model of Nonlinear Forest Insect Pests
Found in: Information and Computing Science, International Conference on
By Ding-jiang Wang, Yu-xiang Dong
Issue Date:May 2009
pp. 134-137
Based on the classical epidemic mode, a new epidemic model of forest which integrates Monochamus Alternatus Hope with Pines was established. The expression of the critical threshold was found. It is proved that, when the critical threshold less than 1, the...
 
An Improved Alternating-Projection Demosaicing Algorithm
Found in: Computational Intelligence and Security, International Conference on
By Wei-jiang Wang, Ting-zhi Shen, Xue-mei Yan
Issue Date:December 2008
pp. 528-533
To improve PSNR performance of alternating-projection demosaicing algorithm, the estimated initialization of alternating-projection algorithm that based on pre-estimating the minimum square error is meliorated in this paper. The improved algorithm is compa...
 
Gray Correlation Analysis Method and Its Application in Drill Stem Failure in Oil and Gas Engineering
Found in: International Conference on Natural Computation
By Xueliang Bi, Tie Yan, Lei Chang, Chang-jiang Wang
Issue Date:October 2008
pp. 502-505
In oil and gas drilling engineering, drill stem failure is one of the most damaging factors. The failures of drill stem not only delay the drilling schedule and increase the drilling cost, but also bring an interruption to the drilling process. Regarding t...
 
Analytic Technique of Drillstem Failure Based on Support Vector Machine Technology and Clustering Theory
Found in: International Conference on Natural Computation
By Tie Yan, Xue-liang Bi, Chang-jiang Wang
Issue Date:August 2007
pp. 506-511
An analyzed model of drillstem failure reason has been constructed based on SVM technology and clustering analysis theory in this paper, and the optimal kernel function and several appropriate factors also have been obtained by training the sample data. Us...
 
Dynamics of a Three-Population Food Chain Model with Impulsive Effect
Found in: Information Science and Engineering, International Conference on
By Ding-jiang Wang, Yu-xiang Dong, Song-hua Yang
Issue Date:December 2009
pp. 3768-3771
In this paper, we consider a three-population food chain model which concerning about impulsive releasing predators (natural enemies) at fixed moment. By using the Floquet theory and the comparison theorem of impulsive differential equation, conditions for...
 
A Synthesizing Effect Function Approach of Fuzzy Multiple-Attribute Decision Making
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Xiao-xia Zhu, Rui-jiang Wang, Yi-hong Ru
Issue Date:August 2009
pp. 233-238
This paper focuses on fuzzy multiple-attribute decision making with weights unknown and fuzzy information. After discussing the structural feature of fuzzy information, we propose the compound quantification description mode for fuzzy information based on ...
 
 1