Search For:

Displaying 1-50 out of 65 total
Real Time Environment Map Interpolation
Found in: Image and Graphics, International Conference on
By Wenle Wang, Lifeng Wang, Stephen Lin, Jianmin Wang, Baining Guo
Issue Date:December 2004
pp. 382-389
Environment mapping, or reflection mapping, has been widely used in the game and movie industries to give objects a realistic illumination atmosphere. For moving objects, direct frame-by-frame calculation of environment maps and correspondence-based interp...
 
A Unified Framework for Answering k Closest Pairs Queries and Variants
Found in: IEEE Transactions on Knowledge and Data Engineering
By Muhammad Aamir Cheema,Xuemin Lin,Haixun Wang,Jianmin Wang,Wenjie Zhang
Issue Date:November 2014
pp. 2610-2624
Given a scoring function that computes the score of a pair of objects, a top-
 
SPARK2: Top-k Keyword Query in Relational Databases
Found in: IEEE Transactions on Knowledge and Data Engineering
By Yi Luo, Wei Wang, Xuemin Lin, Xiaofang Zhou, Jianmin Wang, Kequi Li
Issue Date:December 2011
pp. 1763-1780
With the increasing amount of text data stored in relational databases, there is a demand for RDBMS to support keyword queries over text data. As a search result is often assembled from multiple relational tables, traditional IR-style ranking and query eva...
 
Querying Process Models Based on the Temporal Relations between Tasks
Found in: Enterprise Distributed Object Computing Conference Workshops, IEEE International
By Liang Song,Jianmin Wang,Lijie Wen,Wenxing Wang,Shijie Tan,Hui Kong
Issue Date:September 2011
pp. 213-222
As business process management technology matures, organisations accumulate hundreds, even thousands of models whose management poses real challenges. One of these challenges concerns model retrieval where support should be provided for the formulation and...
 
A unified approach for computing top-k pairs in multidimensional space
Found in: Data Engineering, International Conference on
By Muhammad Aamir Cheema,Xuemin Lin,Haixun Wang,Jianmin Wang,Wenjie Zhang
Issue Date:April 2011
pp. 1031-1042
Top-k pairs queries have many real applications. k closest pairs queries, k furthest pairs queries and their bichromatic variants are some of the examples of the top-k pairs queries that rank the pairs on distance functions. While these queries have receiv...
 
LyDAR: A LYrics Density based Approach to non-homogeneous music Resizing
Found in: Multimedia and Expo, IEEE International Conference on
By Zhang Liu, Chaokun Wang, Lu Guo, Yiyuan Bai, Jianmin Wang
Issue Date:July 2010
pp. 310-315
In many scenarios, such as TV/radio advertising production, animation production, and presentation, music pieces are constrained in the metric of time. For example, an editor wants to use a 320s song to fit a 280s animation or to accompany a 265s radio adv...
 
A Watermark-Aware Trusted Running Environment for Software Clouds
Found in: ChinaGrid, Annual Conference
By Junning Fu, Chaokun Wang, Zhiwei Yu, Jianmin Wang, Jia-Guang Sun
Issue Date:July 2010
pp. 144-151
A software cloud is ready-made for software delivery or Software as a Service (SaaS). As it becomes more and more popular, security problems of software running in the cloud also become an important issue. The threats, such as destroying system softwares a...
 
A Security Model for VoIP Steganography
Found in: Multimedia Information Networking and Security, International Conference on
By Zhiwei Yu, Clark Thomborson, Chaokun Wang, Junning Fu, Jianmin Wang
Issue Date:November 2009
pp. 35-40
In 2005, an extensive taxonomy of threats for VoIP was published by a prominent industry group. Strangely, this taxonomy does not identify stegocommunication as a threat, even though many steganographic channels have been identified in VoIP protocols. To a...
 
TiCom: A Time-Compensation Based Review Ranking Algorithm for Mobile Clients
Found in: Computing, Communication, Control and Management, ISECS International Colloquium on
By Wei Zheng, Chaokun Wang, Dapeng Zhao, Shengfei Shi, Jianmin Wang
Issue Date:August 2008
pp. 667-671
Mobile environment has been one of focuses of computing, communication and management. Mobile review ranking problem, for the first time, is brought out in this paper. Also, a novel ranking algorithm, TiCom, is proposed for mobile review ranking. TiCom is ...
 
ATBaM: An Arnold Transform Based Method on Watermarking Relational Data
Found in: Multimedia and Ubiquitous Engineering, International Conference on
By Chaokun Wang, Jianmin Wang, Ming Zhou, Guisheng Chen, Deyi Li
Issue Date:April 2008
pp. 263-270
ATBaM, A novel numeric relational data watermarking method, is presented in this paper. ATBaM substantially improves watermark security by using image scrambling technology which could confuse the well-regulated watermarking information and diffuse errors....
 
A Novel Scheme for Watermarking Natural Language Text
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Jianlong Yang, Jianmin Wang, Chaokun Wang, Deyi Li
Issue Date:November 2007
pp. 481-484
This paper focuses on a novel scheme for watermarking natural language text. It is to use Spread Spectrum Tech- nique to spread the watermarks over the entire text via var- ious synonym substitutions. We give a feasible implemen- tation of synonym substitu...
 
Transfer Learning with Graph Co-Regularization
Found in: IEEE Transactions on Knowledge and Data Engineering
By Mingsheng Long, Jianmin Wang, Guiguang Ding, Dou Shen, Qiang Yang
Issue Date:July 2014
pp. 1-1
Transfer learning is established as an effective technology to leverage rich labeled data from some source domain to build an accurate classifier for the target domain. The basic assumption is that the input domains may share certain knowledge structure, w...
 
Computing Refined Ordering Relations with Uncertainty for Acyclic Process Models
Found in: IEEE Transactions on Services Computing
By Tao Jin,Jianmin Wang,Lijie Wen,Gen Zou
Issue Date:July 2014
pp. 415-426
Since the behavior is the essential characteristic of business process models, and ordering relations between execution of tasks can be used to describe the behavior of process models, we need to compute the ordering relations between tasks in process mode...
 
Transfer Joint Matching for Unsupervised Domain Adaptation
Found in: 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Mingsheng Long,Jianmin Wang,Guiguang Ding,Jiaguang Sun,Philip S. Yu
Issue Date:June 2014
pp. 1410-1417
Visual domain adaptation, which learns an accurate classifier for a new domain using labeled images from an old domain, has shown promising value in computer vision yet still been a challenging problem. Most prior works have explored two learning strategie...
 
Adaptation Regularization: A General Framework for Transfer Learning
Found in: IEEE Transactions on Knowledge and Data Engineering
By Mingsheng Long, Jianmin Wang, Guiguang Ding,Sinno Jialin Pan,Philip S. Yu
Issue Date:May 2014
pp. 1-1
Domain transfer learning, which learns a target classifier using labeled data from a different distribution, has shown promising value in knowledge discovery yet still been a challenging problem. Most previous works designed adaptive classifiers by explori...
 
Transfer Feature Learning with Joint Distribution Adaptation
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Mingsheng Long,Jianmin Wang,Guiguang Ding,Jiaguang Sun,Philip S. Yu
Issue Date:December 2013
pp. 2200-2207
Transfer learning is established as an effective technology in computer vision for leveraging rich labeled data in the source domain to build an accurate classifier for the target domain. However, most prior methods have not simultaneously reduced the diff...
 
Efficient Selection of Process Mining Algorithms
Found in: IEEE Transactions on Services Computing
By Jianmin Wang,Raymond K. Wong,Jianwei Ding,Qinlong Guo,Lijie Wen
Issue Date:October 2013
pp. 484-496
While many process mining algorithms have been proposed recently, there does not exist a widely accepted benchmark to evaluate and compare these process mining algorithms. As a result, it can be difficult to choose a suitable process mining algorithm for a...
 
QoS Ranking Prediction for Cloud Services
Found in: IEEE Transactions on Parallel and Distributed Systems
By Zibin Zheng,Xinmiao Wu,Yilei Zhang,Michael R. Lyu,Jianmin Wang
Issue Date:June 2013
pp. 1213-1222
Cloud computing is becoming popular. Building high-quality cloud applications is a critical research problem. QoS rankings provide valuable information for making optimal cloud service selection from a set of functionally equivalent service candidates. To ...
 
RECODS: Replica consistency-on-demand store
Found in: 2013 IEEE International Conference on Data Engineering (ICDE 2013)
By Yuqing Zhu,Philip S. Yu,Jianmin Wang
Issue Date:April 2013
pp. 1360-1363
Replication is critical to the scalability, availability and reliability of large-scale systems. The trade-off of replica consistency vs. response latency has been widely understood for large-scale stores with replication. The weak consistency guaranteed b...
 
Approaches on Getting Workflow Task Execution Number of Times
Found in: 2012 IEEE Asia-Pacific Services Computing Conference (APSCC)
By Naiqiao Du,Xiaojun Ye,Jianmin Wang
Issue Date:December 2012
pp. 83-90
Cloud computing has generated significant interest in the business processing community, where workflow process in a business context can be organized by integrating web-based services or hosted activities. The budget for capital expenses and operating exp...
 
An Approach to Evaluate the Local Completeness of an Event Log
Found in: 2012 IEEE 12th International Conference on Data Mining (ICDM)
By Hedong Yang,Lijie Wen,Jianmin Wang
Issue Date:December 2012
pp. 1164-1169
Process mining links traditional model-driven Business Process Management and data mining by means of deriving knowledge from event logs to improve operational business processes. As an impact factor of the quality of process mining results, the degree of ...
 
User-Defined Body Gestures for TV-based Applications
Found in: 2012 4th International Conference on Digital Home (ICDH)
By Huiyue Wu,Jianmin Wang
Issue Date:November 2012
pp. 415-420
Present remote controls for interactive digital television (iTV) strongly limit interaction possibilities. For example they do not support the interaction style of direct manipulation. Recent advances of the marker less motion capture technology make it po...
 
Personal User or Organizational User? Behavior on Microblog can Tell
Found in: 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
By Yuchu Zuo, Jianmin Wang, Fang You
Issue Date:August 2012
pp. 706-707
Microblog has been prevailing all over the world and there are more and more researches concentrating on uncovering the latent attributes of users. This is the first research aiming at distinguish between the organizational users and the personal users. In...
 
DiffServ Network Simulation and Performance Analysis Based on NS-2
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Wanghui Zeng,Jianmin Wang,Siping Hu
Issue Date:August 2012
pp. 1092-1095
Currently, DiffServ is still evolving, the definition of the model has not yet finalized, and DiffServ implementation of IP QoS Assurance is still at the stage of experiments and research. The biggest problem exists in DiffServ is how to provide users with...
 
On Recommendation of Process Mining Algorithms
Found in: 2012 IEEE 19th International Conference on Web Services (ICWS)
By Jianmin Wang,Raymond K. Wong,Jianwei Ding,Qinlong Guo,Lijie Wen
Issue Date:June 2012
pp. 311-318
While many process mining algorithms have been proposed recently, there does not exist a widely-accepted benchmark to evaluate and compare these process mining algorithms. As a result, it can be difficult to choose a suitable process mining algorithm for a...
 
User Modeling Driven News Filtering Algorithm for Microblog Service in China
Found in: Computer and Information Science, ACIS International Conference on
By Yuchu Zuo,Fang You,Jianmin Wang,Xihui Wu
Issue Date:June 2012
pp. 393-399
Sina microblog is an increasingly popular social network service in China. According to previous researches, microblog is considered to possess some characters of news media. However, except for the studies focusing on detecting real-time event spread arou...
 
Image Recognition Based on Optical Wavelet and Support Vector Machine
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Chun Zhan,Jianmin Wang,Zhaosong Xiong
Issue Date:November 2011
pp. 340-343
Image recognition belongs to the nonlinear classification problem, which has a certain difficulty in the process of image recognition. Image recognition based on optical wavelet and support vector machine is proposed in the paper. Optical wavelet is used t...
 
Transfer Learning via Cluster Correspondence Inference
Found in: Data Mining, IEEE International Conference on
By Mingsheng Long, Wei Cheng, Xiaoming Jin, Jianmin Wang, Dou Shen
Issue Date:December 2010
pp. 917-922
Transfer learning targets to leverage knowledge from one domain for tasks in a new domain. It finds abundant applications, such as text/sentiment classification. Many previous works are based on cluster analysis, which assume some common clusters shared by...
 
Quantity Competition under Demand Slope Uncertainty
Found in: International Conference on E-Business and E-Government
By Jin Xu,Jianmin Wang
Issue Date:May 2010
pp. 5221-5226
Consider a model where firms own the same technology in linear Cournot duopolies with differentiated products and the slope of the demand curve facing the firm is unknown, especially which contains own-price effect and cross-effect. We discuss as follows: ...
 
Comparative Study on Vibration Control of Engineering Vehicle Suspension System
Found in: Intelligent Computation Technology and Automation, International Conference on
By Sun Jianmin, Wang Yuejin, Liang Huanying
Issue Date:May 2010
pp. 989-992
The vibration of engineering vehicle during operation greatly increased driver’s labour intensity for the road condition is bad. Therefore, based on the PID control and adaptive fuzzy PID control, the paper establishes semi-active suspension model of engin...
 
Research on Control Strategies of Steer-by-Wire System
Found in: Intelligent Computation Technology and Automation, International Conference on
By Duan Jianmin, Wang Ran, Yu Yongchuan
Issue Date:May 2010
pp. 1122-1125
Steer-By-Wire system, in which the conventional mechanical linkages between the steering wheel and the front wheel are removed, is suited to active steering control. It can have better vehicle stability, dynamics and maneuverability, and assist the drivers...
 
Effectively Indexing the Uncertain Space
Found in: IEEE Transactions on Knowledge and Data Engineering
By Ying Zhang, Xuemin Lin, Wenjie Zhang, Jianmin Wang, Qianlu Lin
Issue Date:September 2010
pp. 1247-1261
With the rapid development of various optical, infrared, and radar sensors and GPS techniques, there are a huge amount of multidimensional uncertain data collected and accumulated everyday. Recently, considerable research efforts have been made in the fiel...
 
laUD-MS: An Extensible System for Unstructured Data Management
Found in: Conference, International Asia-Pacific Web
By Yuqing Zhu, Naiqiao Du, Hao Tian, Jianmin Wang
Issue Date:April 2010
pp. 435-440
The challenge of managing intensive unstructured data provides a good opportunity for both academy and industry in data management area. In this paper, we analyze the five basic requirements in constructing a data management system for unstructured data. W...
 
Dynamically Analyzing Time Constraints in Workflow Systems with Fixed-Date Constraint
Found in: Conference, International Asia-Pacific Web
By Rui Han, Yingbo Liu, Lijie Wen, Jianmin Wang
Issue Date:April 2010
pp. 99-105
In workflow management systems (WFMSs), time management plays an essential role in controlling the lifecycle of business processes. Especially, run-time analysis of time constraints is necessary to help process manger proactively detect possible deadline v...
 
A New Fingerprint Sequences Matching Algorithm for Content-Based Copy Detection
Found in: Information Assurance and Security, International Symposium on
By Rongxian Nie, Guiguang Ding, Jianmin Wang, Li Zhang
Issue Date:August 2009
pp. 427-430
Content-based copy detection (CBCD) is more and more important in the field of information security, assurance, copyright protection etc. The sequences matching, one of the key technologies in CBCD, is very critical for querying quickly and accurately. In ...
 
Adaptive-Push Peer-to-Peer Video Streaming System Based on Dynamic Unstructured Topology
Found in: Information Assurance and Security, International Symposium on
By Xiaodong Shen, Guiguang Ding, Yizheng Chen, Jianmin Wang
Issue Date:August 2009
pp. 697-700
This paper presents an Adaptive-Push scheme which flexibly applies push method in P2P live streaming system based on unstructured topology. In former P2P streaming systems, push method is hardly adopted in loose topology although it transmits data faster t...
 
Probability Timing Constraint WF-Nets and Their Application to Timing Schedulability Analysis of Workflow Management Systems
Found in: Computer Science and Information Engineering, World Congress on
By Rui Han, Yingbo Liu, Lijie Wen, Jianmin Wang
Issue Date:April 2009
pp. 669-673
For obtaining timely responses in workflow management systems, we must design a schedule of task executions in a timely manner with respect to imposed timing constraints. We call the procedure of verifying that a schedule satisfies the timing constraints a...
 
A Novel Digital Watermarking Method for New Viewpoint Video Based on Depth Map
Found in: Intelligent Systems Design and Applications, International Conference on
By Ning Zhu, Guiguang Ding, Jianmin Wang
Issue Date:November 2008
pp. 3-7
With the development of the theory of new viewpoint generation, a lot of methods such as GBR(Geometry-Based Rendering) and IBR (Image-Based Rending) became hot subjects. However, there isn't any watermarking method for them. In this paper, we propose first...
 
The Fuzzy Rule-Number Estimation of T-S Fuzzy Models as Universal Approximators
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Fengqiu Liu, Xiaoping Xue, Jianmin Wang
Issue Date:October 2008
pp. 462-469
In this paper, a supremum of the total numbers of fuzzy rules is obtained by employing the characteristics of the function in building a fuzzy model to approximate the function to achieve a given approximation accuracy. The basic idea is to take advantage ...
 
A New Approach to Parameters Identification of Fuzzy Regression Models
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Fengqiu Liu, Jianmin Wang, Yu Peng
Issue Date:October 2008
pp. 127-131
We present a new approach to parameters identification of the fuzzy regression model with respect to the e-insensitive estimator in this paper.The proposed method firstly employs the improved fuzzy c-mean clustering algorithm to carry out fuzzy partition o...
 
A Maximum Weight Heuristic Method for Abstract State Computation
Found in: Computer Software and Applications Conference, Annual International
By Li Li, Xiaoyu Song, Ming Gu, Jianmin Wang
Issue Date:August 2008
pp. 231-234
Program verification is an important task in software engineering. Abstraction plays a critical role in verifying infinite state systems by model checking. We present a novel method to automatically compute the abstract reachable state space of programs. A...
 
Effective Predicate Abstraction for Program Verification
Found in: Theoretical Aspects of Software Engineering, Joint IEEE/IFIP Symposium on
By Li Li, Ming Gu, Xiaoyu Song, Jianmin Wang
Issue Date:June 2008
pp. 129-132
The paper presents a new approach to computing the abstract state and a maximum weight heuristic method for finding the shortest counter-example in verification of imperative programs. The strategy is incorporated in a verification system based on the coun...
 
An Automatic and Scalable Testing Tool for Workflow Systems
Found in: Grid and Pervasive Computing, International Conference on
By Lin Quan, Xiaozhu Lin, Jianmin Wang
Issue Date:May 2008
pp. 75-80
Nowadays workflow systems are widely deployed around the world, especially within large international corporations. Thus the performance evaluation of these workflow systems becomes an important topic, especially in grid environment. We have developed an a...
 
Organizational Modeling from Event logs
Found in: Grid and Cloud Computing, International Conference on
By Tao Jin, Jianmin Wang, Lijie Wen
Issue Date:August 2007
pp. 670-675
Many process mining approaches have been published, which would be helpful to process modeling, but little attempt has been made for role mining used for organizational modeling. In this paper, a method of role mining using event logs as input is introduce...
 
An InnovativeWorkflow Product Structure
Found in: Computer Software and Applications Conference, Annual International
By Haiping Zha, Lijie Wen, Jianmin Wang
Issue Date:July 2007
pp. 639-640
Inefficient development of workflow-based applications reduces the benefits from the adoption of workflow technology. In this paper, we propose a new workflow product structure, in which application data are integrated into workflow process models. The new...
 
Detecting the Theft of Natural Language Text Using Birthmark
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Jianlong Yang, Jianmin Wang, Deyi Li
Issue Date:December 2006
pp. 699-702
To detect the theft of natural language text effectively, we present a novel scheme to derive birthmark from the text. Since birthmark is a unique and native characteristic of every text, a text with the same birthmark of another can be easily suspected of...
 
A New Method of Estimating Inputs
Found in: Intelligent Systems Design and Applications, International Conference on
By Yu-quan Cui, Li-jie Ma, Jianmin Wang
Issue Date:October 2006
pp. 718-723
Data envelopment analysis (DEA) is an important way of data mining. In this paper we show that the inverse data envelopment analysis (IDEA) model can be used to estimate inputs for a decision making unit (DMU): if among a group of decision making units, we...
 
Efficient Discovery of Emerging Frequent Patterns in ArbitraryWindows on Data Streams
Found in: Data Engineering, International Conference on
By Xiaoming Jin, Xinqiang Zuo, Kwok-Yan Lam, Jianmin Wang, Jiaguang Sun
Issue Date:April 2006
pp. 113
This paper proposes an effective data mining technique for finding useful patterns in streaming sequences. At present, typical approaches to this problem are to search for patterns in a fixed-size window sliding through the stream of data being collected. ...
 
DRC: A Dependence Relationships Based Cohesion Measure for Classes
Found in: Asia-Pacific Software Engineering Conference
By Yuming Zhou, Lijie Wen, Jianmin Wang, Yujian Chen, Hongmin Lu, Baowen Xu
Issue Date:December 2003
pp. 215
In last decade, a large number of cohesion measures based on method-attribute references have been proposed. However, virtually no attention has been paid to the abstract representation that objectively depicts the relationships among the members of a clas...
 
A Strategy for Persistent Object Service under CORBA and WEB Environment
Found in: Technology of Object-Oriented Languages, International Conference on
By Dingbang Xu, Xin Han, Jianmin Wang, Yujian Chen
Issue Date:November 2000
pp. 100
With the rapid development of the Internet, the integrated applications of Web, database, CORBA and Java have offered the three-tiered client/server application models a good computing environment and implementation strategy. This paper briefly introduces ...
 
 1  2 Next >>