Search For:

Displaying 1-47 out of 47 total
Peak Temperature Minimization for Embedded Systems with DVS Transition Overhead Consideration
Found in: 2012 IEEE 14th Int'l Conf. on High Performance Computing and Communication (HPCC) & 2012 IEEE 9th Int'l Conf. on Embedded Software and Systems (ICESS)
By Meikang Qiu,Jianwei Niu,Fei Pan,Yu Chen,Yongxin Zhu
Issue Date:June 2012
pp. 477-484
Peak temperature is a critical issue in chip multiprocessor (CMP) architecture design. Dynamic Voltage Scaling (DVS) is used nowadays to reduce power consumption and peak temperature. However, traditional DVS in literature usually fails to take into consid...
 
Poster Abstract: Mobile Application Partitioning for Improving Energy Efficient
Found in: Cyber-Physical Systems, IEEE/ACM International Conference on
By Jianwei Niu,Yuhang Gao,Ruifang Niu
Issue Date:April 2012
pp. 233
For resource-constraint devices, it is possible to save energy of mobile devices by offloading its computation to a remote server. Traditionally, the application partitioning is the key element of computation offloading. However, making a good partitioning...
 
An Empirical Study of a Chinese Online Social Network--Renren
Found in: Computer
By Jianwei Niu,Jing Peng,Lei Shu,Chao Tong,Wanjiun Liao
Issue Date:September 2013
pp. 78-84
Deeper knowledge of social networks' structure and temporal evolution enhances data mining for both research and education purposes. An empirical analysis of a Chinese social network, Renren, shows that it follows an exponentially truncated power law in de...
 
CPS Track Report
Found in: 2013 IEEE 22nd International Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises (WETICE)
By Zhangbing Zhou,Walid Gaaloul,Jianwei Niu
Issue Date:June 2013
pp. 200-201
Cyber Physical Society (CPS) is regarded as a future interconnection environment. It connects nature, cyber space and society under certain rules. In this track report we present our vision about how to achieve CPS through combining the best practices deve...
 
How Online Social Network Affects Offline Events: A Case Study on Douban
Found in: 2012 IEEE 9th Int'l Conference on Ubiquitous Intelligence & Computing / 9th Int'l Conference on Autonomic & Trusted Computing (UIC/ATC)
By Junwei Han,Jianwei Niu,Alvin Chin,Wei Wang,Chao Tong,Xia Wang
Issue Date:September 2012
pp. 752-757
Social networking sites (SNS) such as Facebook and Twitter are becoming popular forms for finding, promoting and attending offline events and activities. Much work has looked into characterizing these social networks and their user behavior. With the emerg...
 
Efficient Searching Mechanism for Trust-Aware Recommender Systems Based on Scale-Freeness of Trust Networks
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Weiwei Yuan,Donghai Guan,Lei Shu,Jianwei Niu
Issue Date:June 2012
pp. 1819-1823
One fundamental requirement of the trust-aware recommender system (TARS) is to efficiently find as many recommenders as possible for the active users. Existing approaches of TARS choose to search the entire trust network, which have very high computational...
 
Message Dissemination in Delay-Tolerant Networks with Probabilistic Encounters
Found in: 2012 IEEE 21st International Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises (WETICE)
By Jianwei Niu,Yazhi Liu,Lei Shu
Issue Date:June 2012
pp. 330-335
For some applications of Delay-Tolerant Networks (DTNs), such as publish/subscribe systems, messages do not have explicit destination addresses. In those cases, message routing is driven by message content instead of by destination addresses. In this paper...
 
GitBAC: Flexible access control for non-modular concerns
Found in: Automated Software Engineering, International Conference on
By Mark Robinson, Jianwei Niu,Macneil Shonle
Issue Date:November 2011
pp. 500-503
Today's techniques for controlling access to software artifacts are limited to restricting access to whole files and directories. But when a company's access control policy does not match a project's existing physical modularization, these techniques requi...
 
An AP handover scheme using vehicular Wi-Fi connectivity
Found in: Software Maintenance and Reengineering, European Conference on
By Jianwei Niu, Bin Dai, Guoping Du, Chao Tong
Issue Date:August 2011
pp. 453-458
With the rapid development of Wi-Fi technology and the dramatic increase in Wi-Fi coverage, it has become much easier to transfer data using roadside AP (Access Point). Previous research proves the feasibility of using vehicular Wi-Fi infrastructure to del...
 
Capturing the Evolving Properties of Disconnected Mobile P2P Networks
Found in: Multimedia and Ubiquitous Engineering, International Conference on
By Qingsong Cai,Jianwei Niu,Yuhang Gao
Issue Date:June 2011
pp. 22-27
The design of message routing algorithms and its performance evaluation in disconnected mobile P2P networks are challenging issues due to its high dynamic evolving topology. To capture the evolution of the connectivity properties of such networks, a Time-E...
 
Real-Time Constrained Task Scheduling in 3D Chip Multiprocessor to Reduce Peak Temperature
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Jiayin Li, Meikang Qiu, Jianwei Niu, Tianzhou Chen, Yongxin Zhu
Issue Date:December 2010
pp. 170-176
Chip multiprocessor technique has been implemented in embedded systems due to the tremendous computation requirements. Three dimension chip multiprocessor architecture has been studied recently for integrating more functionalities and providing higher perf...
 
Message Publish/Subscribe Scheme Based on Opportunistic Networks
Found in: Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on
By Jianwei Niu, Feifei Wu, Da Huo, Kai Hu
Issue Date:October 2010
pp. 180-184
Publish/Subscribe system is an asynchronous and multi-point communication system, which decouples communication space from communication time and control flow completely. It adapts well to highly dynamic network environments and data-centric networks. This...
 
Feedback Dynamic Algorithms for Preemptable Job Scheduling in Cloud Systems
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Jiayin Li, Meikang Qiu, Jianwei Niu, Wenzhong Gao, Ziliang Zong, Xiao Qin
Issue Date:September 2010
pp. 561-564
An infrastructure-as-a-service cloud system provides computational capacities to remote users. Parallel processing in the cloud system can shorten the execution of jobs. Parallel processing requires a mechanism to scheduling the executions order as well as...
 
Impacts of Inaccurate Information on Resource Allocation for Multi-Core Embedded Systems
Found in: Computer and Information Technology, International Conference on
By Jiayin Li, Meikang Qiu, Jianwei Niu, Meiqin Liu, Bin Wang, Jingtong Hu
Issue Date:July 2010
pp. 2692-2697
Multi-core technologies are widely used in embedded systems. Stochastic resource allocation can guarantee certain quality of the services (QoS). In heterogeneous embedded system resource allocation, execution time distributions of different tasks on cores ...
 
Semantic Criteria for Choosing a Language for Big-Step Models
Found in: Requirements Engineering, IEEE International Conference on
By Shahram Esmaeilsabzali, Nancy A. Day, Joanne M. Atlee, Jianwei Niu
Issue Date:September 2009
pp. 181-190
With the popularity of model-driven methodologies, and the abundance of modelling languages, a major question for a requirements engineer is: which language is suitable for modelling a system under study? We address this question from a semantic point-of-v...
 
Formalize UML 2 Sequence Diagrams
Found in: High-Assurance Systems Engineering, IEEE International Symposium on
By Hui Shen, Aliya Virani, Jianwei Niu
Issue Date:December 2008
pp. 437-440
UML 2 sequence diagram introduced many new structured control constructs, such as CombinedFragments, to express concurrent message exchanges. These new features makes it more expressive than it in UML 1, however, the lack of formal semantics descriptions m...
 
Rate-Distortion Optimized Frame Dropping Based on Dynamic Frame Concealment
Found in: Embedded Computing, IEEE International Symposium on
By Jinfeng Zhang, Jianwei Niu, Rui He, Jianping Hu
Issue Date:October 2008
pp. 129-134
In most existing rate-distortion optimized frame dropping schemes, the concealment dependencies among frames are presumed, which artificially prioritizes frames with a fixed pattern. However, a fixed frame concealment pattern cannot always meet the actual ...
 
Adaptive Multiple-Copy Multiple-Hop Forwarding in Intermittently Connected Mobile Networks
Found in: Embedded Computing, IEEE International Symposium on
By Jianwei Niu, Hang Zhou, Linmin Sun, Yongping Xiong
Issue Date:October 2008
pp. 303-308
First we analyze the shortcomings of existing routing protocols in Intermittently Connected Mobile Networks (ICMN) such as high delivery delay, low success rate and cannot adaptive to the different network environment. With this in mind, we propose a new r...
 
A Novel Security Scheme for Video Conference System with Wireless Terminals
Found in: Embedded Computing, IEEE International Symposium on
By Chen Xiao, Shilong Ma, Jianwei Niu, Lifeng Wang, Baosong Shan, Tan Chen
Issue Date:October 2008
pp. 101-106
Transmission security of media data in video conference system has been a challenging task, since those data are high volume and latency sensitive. Partial encryption and other media encryption schemes are effective approaches to encrypt those data. Howeve...
 
Clouding Algorithm: A Novel Multi-population Evolution Model and its Applying to Global Numerical Optimization
Found in: International Conference on Natural Computation
By Rui He, Guangwei Zhang, Jianwei Niu, Yu Liu, Yanni Han, Deyi Li
Issue Date:August 2007
pp. 123-128
This paper proposes a multi-population evolution model, which is distinguished from other models by declaring that the fittest individuals should produce a population with many offspring rather than only one child. Therefore, special attention is spent upo...
 
P2P-Leveraged Mobile Live Streaming
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Jinfeng Zhang, Jianwei Niu, Rui He, Jianping Hu, Sun Limin
Issue Date:May 2007
pp. 195-200
Providing high rate streaming service over cellular data networks is a challenging work. In this paper, a mobile streaming broadcast system, called P2P-leveraged mobile live streaming system (P2PMLS), is proposed. In P2PMLS, the multiple network interfaces...
 
Engineering Trust Management into Software Models
Found in: Modeling in Software Engineering, International Workshop on
By Mark Reith, Jianwei Niu, William H. Winsborough
Issue Date:May 2007
pp. 9
Security in software is often considered a nonfunctional requirement because it is often interpreted as an emergent feature of the system. Too often it is introduced as a last-minute requirement over an otherwise completed product rather than properly inte...
 
A Robust Error Concealment Algorithm in Wireless Networks
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Jianwei Niu, Congying Wei, Rui He, Jian Ma
Issue Date:May 2007
pp. 386-389
Compressed video sequences are very vulnerable to channel disturbances when transmitted through the burst-packet-loss wireless channels. Transmission errors not only corrupt the current frame, but may also propagate to succeeding frames. We find that a num...
 
Adaptive Video Streaming over P2P Multi-Hop Path
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Jinfeng Zhang, Jianwei Niu, Rui He, Jian Ma
Issue Date:May 2007
pp. 160-165
The P2P streaming system must have the adaptation ability to the heterogeneity of the peer nodes and networks. An adaptive scheme on video streaming over multi-hop path in P2P networks is proposed. The streaming server probes the network parameters in the ...
 
Apply Model Checking to Security Analysis in Trust Management
Found in: Data Engineering Workshops, 22nd International Conference on
By Mark Reith, Jianwei Niu, William H. Winsborough
Issue Date:April 2007
pp. 734-743
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to control. A resource owner that delegates some authority is naturally concerned not ...
 
Towards A Subjective Trust Model with Uncertainty for Open Network
Found in: Grid and Cooperative Computing Workshops, International Conference on
By Jianwei Niu, Zhe Chen, Guangwei Zhang
Issue Date:October 2006
pp. 102-019
Peer-to-Peer eCommerce communities are commonly perceived as an environment offering both opportunities and threats. One way to minimize threats in such an open community is to use reputations to help evaluating the trustworthiness and predicting the futur...
 
A Novel Approach to Evaluate Trustworthiness and Uncertainty of Trust Relationships in Peer-to-Peer Computing
Found in: Computer and Information Technology, International Conference on
By Rui He, Jianwei Niu, Kai Hu
Issue Date:September 2005
pp. 382-388
<p>In peer-to-peer computing, traditional security mechanisms that are based on pre-registration are hardly useful because users are dynamic and can not be pre-defined. Hence trust models were introduced into peer-to-peer systems. In this paper, a no...
 
Mapping Template Semantics to SMV
Found in: Automated Software Engineering, International Conference on
By Yun Lu, Joanne M. Atlee, Nancy A. Day, Jianwei Niu
Issue Date:September 2004
pp. 320-325
We show how to create a semantics-based, parameterized translator from model-based notations to SMV, using template semantics. Our translator takes as input a specification and a set of user-provided parameters that encode the specification?s semantics; it...
 
Template Semantics for Model-Based Notations
Found in: IEEE Transactions on Software Engineering
By Jianwei Niu, Joanne M. Atlee, Nancy A. Day
Issue Date:October 2003
pp. 866-882
<p><b>Abstract</b>—We propose a template-based approach to structuring the semantics of model-based specification notations. The basic computation model is a nonconcurrent, hierarchical state-transition machine (HTS), whose execution sema...
 
Understanding and Comparing Model-Based Specification Notations
Found in: Requirements Engineering, IEEE International Conference on
By Jianwei Niu, Joanne M. Atlee, Nancy A. Day
Issue Date:September 2003
pp. 188
Specifiers must be able to understand and compare the specification notations that they use. Traditional means for describing notations? semantics (e.g., operational semantics, logic, natural language) do not help users to identify the essential difference...
 
Content Encounter Probability Based Message Forwarding in Opportunistic Networks
Found in: Information Science and Engineering, International Conference on
By Yazhi Liu, Jianwei Niu, Jian Ma
Issue Date:December 2009
pp. 2589-2594
Opportunistic Network is a special kind of mobile Ad Hoc network in which communication nodes are sparsely distributed in the network area and the communicating opportunities between the nodes are created by the moving and encounter of the nodes. Achieving...
 
Energy Efficient Task Assignment with Guaranteed Probability Satisfying Timing Constraints for Embedded Systems
Found in: IEEE Transactions on Parallel and Distributed Systems
By Jianwei Niu,Chuang Liu,Yuhang Gao,Meikang Qiu
Issue Date:August 2014
pp. 2043-2052
The trade-off between system performance and energy efficiency (service time) is critical for battery-based embedded systems. Most of the previous work focuses on saving energy in a deterministic way by taking the average or worst scenario into account. Ho...
 
QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Long Cheng,Jianwei Niu,Jiannong Cao,Sajal K. Das,Yu Gu
Issue Date:July 2014
pp. 1864-1875
QoS routing is an important research issue in wireless sensor networks (WSNs), especially for mission-critical monitoring and surveillance systems which requires timely and reliable data delivery. Existing work exploits multipath routing to guarantee both ...
 
Achieving Asymmetric Sensing Coverage for Duty Cycled Wireless Sensor Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yu Gu,Long Cheng,Jianwei Niu,Tian He,David H.C. Du
Issue Date:March 2014
pp. 1
As a key approach to achieve energy efficiency in sensor networks, sensing coverage has been studied extensively in the literature. Researchers have designed many coverage protocols to provide various kinds of service guarantees on the network lifetime, co...
 
Moving Schemes for Mobile Sinks in Wireless Sensor Networks
Found in: Performance, Computing, and Communications Conference, 2002. 21st IEEE International
By Yanzhong Bi, Jianwei Niu, Limin Sun, Wei Huangfu, Yi Sun
Issue Date:April 2007
pp. 101-108
In a wireless sensor network for data-gathering applications, if all network data congregate to a stationary sink node hop by hop, the sensor nodes near the sink have to consume more energy on forwarding data for other nodes, which probably causes the earl...
 
A Novel Cloud-Based Trust Model for Pervasive Computing
Found in: Computer and Information Technology, International Conference on
By Rui He, Jianwei Niu, Man Yuan, Jianping Hu
Issue Date:September 2004
pp. 693-700
It is well known that trust relationships between entities are uncertain in pervasive computing. However, previous researchers did not attach enough importance to uncertainty in their trust models. Therefore, their models always seem arbitrary when they se...
 
Social-Loc: improving indoor localization with social sensing
Found in: Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys '13)
By Banghui Lu, Jun Sun, Long Cheng, Ting Zhu, Jianwei Niu, Junghyun Jun, Yu Gu
Issue Date:November 2013
pp. 1-14
Location-based services, such as targeted advertisement, geo-social networking and emergency services, are becoming increasingly popular for mobile applications. While GPS provides accurate outdoor locations, accurate indoor localization schemes still requ...
     
Dynamic switching-based reliable flooding in low-duty-cycle wireless sensor networks
Found in: Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems (SenSys '12)
By Jianwei Niu, Long Cheng, Tian He, Yu Gu
Issue Date:November 2012
pp. 351-352
Reliable flooding in wireless sensor networks (WSNs) is desirable for a broad range of applications and network operations. However, it is a challenging problem to ensure 100% flooding coverage efficiently considering the combined effects of low-duty-cycle...
     
Interactive and real-time generation of home video summaries on mobile devices
Found in: Proceedings of the 2011 international ACM workshop on Interactive multimedia on mobile and portable devices (IMMPD '11)
By Da Huo, Jianwei Niu, Jonathan Mugan, Xiao Zeng
Issue Date:November 2011
pp. 27-32
With the proliferation of mobile devices and multimedia, videos have become an indispensable part of life-logs for personal experiences. In this paper, we present a real-time and interactive application for home video summarization on mobile devices. The m...
     
Group-Centric Secure Information-Sharing Models for Isolated Groups
Found in: ACM Transactions on Information and System Security (TISSEC)
By Jianwei Niu, Ram Krishnan, Ravi Sandhu, William H. Winsborough
Issue Date:November 2011
pp. 1-29
Group-Centric Secure Information Sharing (g-SIS) envisions bringing users and objects together in a group to facilitate agile sharing of information brought in from external sources as well as creation of new information within the group. We expect g-SIS t...
     
Stroke++: a hybrid chinese input method for touch screen mobile phones
Found in: Proceedings of the 12th international conference on Human computer interaction with mobile devices and services (MobileHCI '10)
By Jianwei Niu, Kongqiao Wang, Like Zhu, Qifeng Yan, Yingfei Liu
Issue Date:September 2010
pp. 381-382
In this paper we present Stroke++, a novel hybrid Chinese input method for touch screen mobile phones that leverages hieroglyphic properties of Chinese characters to enable faster and easier input of Chinese characters on mobile phones. By using a special ...
     
Foundations for group-centric secure information sharing models
Found in: Proceedings of the 14th ACM symposium on Access control models and technologies (SACMAT '09)
By Jianwei Niu, Ram Krishnan, Ravi Sandhu, William H. Winsborough
Issue Date:June 2009
pp. 1-22
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several directions in which this theory can be extended. Traditional approach to information sh...
     
A conceptual framework for Group-Centric secure information sharing
Found in: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS '09)
By Jianwei Niu, Ram Krishnan, Ravi Sandhu, William H. Winsborough
Issue Date:March 2009
pp. 48-54
In this paper, we propose a conceptual framework for developing a family of models for Group-Centric information sharing. The traditional approach to information sharing, characterized as Dissemination-Centric in this paper, focuses on attaching attributes...
     
Toward practical analysis for trust management policy
Found in: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS '09)
By Jianwei Niu, Mark Reith, William H. Winsborough
Issue Date:March 2009
pp. 48-54
Trust management is a scalable and flexible form of access control that relies heavily on delegation techniques. While these techniques may be necessary in large or decentralized systems, stakeholders need an analysis methodology and automated tools for re...
     
Stale-safe security properties for group-based secure information sharing
Found in: Proceedings of the 6th ACM workshop on Formal methods in security engineering (FMSE '08)
By Jianwei Niu, Ram Krishnan, Ravi Sandhu, William H. Winsborough
Issue Date:October 2008
pp. 53-62
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure distributed system in which the management and representation of authorization ...
     
Role-based trust management security policy analysis and correction environment (RT-SPACE)
Found in: Companion of the 13th international conference on Software engineering (ICSE Companion '08)
By Jianwei Niu, Mark Reith, William H. Winsborough
Issue Date:May 2008
pp. 37-41
This paper presents RT-SPACE, a tool suite for authoring, verifying, and correcting RT access control policies. RT is a role-based trust management framework well suited for use in systems that must protect the interests of multiple stakeholders in a decen...
     
Composable semantics for model-based notations
Found in: Proceedings of the tenth ACM SIGSOFT symposium on Foundations of software engineering (SIGSOFT '02/FSE 10)
By Jianwei Niu, Joanne M. Atlee, Nancy A. Day
Issue Date:November 2002
pp. 149-158
We propose a unifying framework for model-based specification notations. Our framework captures the execution semantics that are common among model-based notations, and leaves the distinct elements to be defined by a set of parameters. The basic components...
     
 1