Search For:

Displaying 1-38 out of 38 total
Exploring Word Similarity to Improve Chinese Personal Name Disambiguation
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Xia Yang,Peng Jin,Wei Xiang
Issue Date:August 2011
pp. 197-200
This paper presents an approach to the Chinese Personal Name Disambiguation (PND). The key to clustering is the similarity measure of context, which depends on the features selection and representation and calculation method. First HIT Tongyici Cilin (Exte...
 
Computing Teichm├╝ller Shape Space
Found in: IEEE Transactions on Visualization and Computer Graphics
By Miao Jin, Wei Zeng, Feng Luo, Xianfeng Gu
Issue Date:May 2009
pp. 504-517
Shape indexing, classification, and retrieval are fundamental problems in computer graphics. This work introduces a novel method for surface indexing and classification based on Teichmuller theory. The Teichmuller space for surfaces with the same topology ...
 
Timeline Editing of Objects in Video
Found in: IEEE Transactions on Visualization and Computer Graphics
By Shao-Ping Lu, Song-Hai Zhang, Jin Wei, Shi-Min Hu,R. R. Martin
Issue Date:July 2013
pp. 1218-1227
We present a video editing technique based on changing the timelines of individual objects in video, which leaves them in their original places but puts them at different times. This allows the production of object-level slow motion effects, fast motion ef...
 
HOMS: An Internet Media Distribution System Based on Overlay Multicast
Found in: Innovations in Bio-inspired Computing and Applications, International Conference on
By Shan Jin,Wei-Xiong Chen
Issue Date:December 2011
pp. 133-136
A novel Internet media distribution system based on overlay multicast was studied and implemented. In the system, the nodes build the multicast route with a tree-first strategy and maintain the topology with an active strategy. In order to run the routing ...
 
LTS: Discriminative subgraph mining by learning from search history
Found in: Data Engineering, International Conference on
By Ning Jin,Wei Wang
Issue Date:April 2011
pp. 207-218
Discriminative subgraphs can be used to characterize complex graphs, construct graph classifiers and generate graph indices. The search space for discriminative subgraphs is usually prohibitively large. Most measurements of interestingness of discriminativ...
 
An Effective Particle Swarm Optimization Algorithm with Social Weight in Solving Economic Dispatch Problem Considering Network Losses
Found in: 2012 Third Global Congress on Intelligent Systems (GCIS)
By Jinglei Guo,Cong Jin,Wei Liu,Wei Zhou
Issue Date:November 2012
pp. 80-83
This paper proposes an effective particle swarm optimization algorithm with social weight (ESWPSO) to solve economic dispatch problem in power system. Many nonlinear characteristics of cost function and operational constraints are all considered for practi...
 
The Application of Unsupervised Clustering in Radar Signal Preselection Based on DOA Parameters
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Xiang-Peng Zhu, Ming Jin, Wei-Qiang Qian, Shuai Liu, Yu-Mei Wei
Issue Date:September 2010
pp. 956-959
With the deterioration of electronic environment, using signals DOA (direction of arrival) parameters has great significance to preselect multiple radar pulses. Cluster analysis as an important means of data classification, is gradually applied to radar si...
 
ASTVA: Traffic Validation Architecture Based on Autonomous Systems
Found in: Frontier of Computer Science and Technology, Japan-China Joint Workshop on
By Honghao Zhang, Guang Jin, Wei Wei, Fei Zhang, Huizhan Zhang, Zhijun Xie
Issue Date:December 2009
pp. 661-665
DoS attacks bring serious threats to the Internet and the Capabilities technique is promising to defend against DoS attacks. In this paper, we firstly make profound researches on shortcomings and inadequacies of TVA (Traffic Validation Architecture), a typ...
 
Comments on
Found in: IEEE Transactions on Computers
By Liang Ye-Wei, Jin Wei
Issue Date:October 1986
pp. 930-931
This correspondence shows two counter examples which contradict the Theorems 4 and 5 in [1].
   
Similarity query processing for probabilistic sets
Found in: 2013 IEEE International Conference on Data Engineering (ICDE 2013)
By Ming Gao,Cheqing Jin,Wei Wang,Xuemin Lin,Aoying Zhou
Issue Date:April 2013
pp. 913-924
Evaluating similarity between sets is a fundamental task in computer science. However, there are many applications in which elements in a set may be uncertain due to various reasons. Existing work on modeling such probabilistic sets and computing their sim...
 
Fisheye Video Correction
Found in: IEEE Transactions on Visualization and Computer Graphics
By Jin Wei,Chen-Feng Li,Shi-Min Hu,Ralph R. Martin,Chiew-Lan Tai
Issue Date:October 2012
pp. 1771-1783
Various types of video can be captured with fisheye lenses; their wide field of view is particularly suited to surveillance video. However, fisheye lenses introduce distortion, and this changes as objects in the scene move, making fisheye video difficult t...
 
Application and improvement discussion about Apriori algorithm of association rules mining in cases mining of influenza treated by contemporary famous old Chinese medicine
Found in: 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)
By Yuntao Liu,Qing Liu,Danwen Zheng,Qingping Deng,Zhanpeng Tan,Xiaoyang Jin,Wei Huang,Yaling Lei,Yi Luo,Jian Yin
Issue Date:October 2012
pp. 316-322
Objective: To investigate and discuss the application and improvement about Apriori algorithm of association rules mining (ARM) in cases mining of influenza treated by contemporary famous old Chinese medicine. Methods: We analyzed the basic principles, pro...
 
A Content-Based Publish/Subscribe System for Efficient Event Notification over Vehicular Ad Hoc Networks
Found in: 2012 IEEE 9th Int'l Conference on Ubiquitous Intelligence & Computing / 9th Int'l Conference on Autonomic & Trusted Computing (UIC/ATC)
By Fusang Zhang,Beihong Jin,Wei Zhuo,Zhaoyang Wang,Lifeng Zhang
Issue Date:September 2012
pp. 64-71
Pub/Sub systems over VANETs can be employed to disseminate information in terms of events to vehicle users who desire the information. This paper describes the design, implementation, and evaluation of APUS, a content-based Pub/Sub system for VANETs. APUS ...
 
ERP Load Balancing Scheme Based on Process Scheduling
Found in: Computing, Measurement, Control and Sensor Network, International Conference on
By Shan Jin,Wei Ju
Issue Date:July 2012
pp. 380-383
The ERP load balancing problem was studied, and a distributed dynamic scheme named ELBS (ERP Load Balancing Scheme) based on the process scheduling was proposed. By classifying all nodes involved in the system into several different types, the scheme formu...
 
An Affective Learning Interface with an Interactive Animated Agent
Found in: Digital Game and Intelligent Toy Enhanced Learning, IEEE International Workshop on
By Ching-Ju Chao,Hao-Chiang Koong Lin,Jin-Wei Lin,Yu-Chuan Tseng
Issue Date:March 2012
pp. 221-225
Affective tutoring system (ATS) utilizes emotion recognition techniques to enhance the affective interface of an intelligent tutoring system (ITS). The aim of this study is to improve interest in learning by recognizing the emotional states of students dur...
 
A Measure Method for Network Invulnerability Based on Improved Albert Algorithm
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By He Shaojun,Cao Jin,He Wei,Liu Qingfang
Issue Date:October 2011
pp. 812-815
Based on BA model, this paper constructs a simulative Internet which has 400 nodes, and proposes random strategy, degree distribution strategy, betweenness strategy and circle betweenness strategy to simulate random failure and intentional attack that netw...
 
A Novel Regression Method Research Based on Covering Algorithm
Found in: Intelligence Information Processing and Trusted Computing, International Symposium on
By Cheng-Gang He, Yan-Ping Zhang, Hui Sun, Jin-Wei Gen
Issue Date:October 2010
pp. 41-44
The Covering algorithm is proposed by Professor ZhangLing and ZhangBo in the 20th century, which simulates the structure of human learning, building a Constructive Neural Network Learning Model. Covering algorithm has been widely used to solve massive data...
 
Solving the Employment Problems in China Construction Industry: Localization, IT Service, Minimum Wage Limit
Found in: International Conference on E-Business and E-Government
By Zhang Jing-xiao,Long Xiao-hua,Jin Wei-xing
Issue Date:May 2010
pp. 642-645
Chinese construction industry has faced many dilemma, to some degree, this dilemma has been a stumbling block under the certain time background of China. This paper pays attention to the inner-produced mechanism of employment problems in China construction...
 
A Non-linear Finite Element Analysis of Car Engine Mounting System Rubber Components
Found in: Computational Intelligence and Design, International Symposium on
By Qiang Zhang, Xiaoxiong Jin, Wei Peng
Issue Date:December 2009
pp. 132-135
Taking a certain car engine mounting system rubber components as the research object, the nonlinear finite element software ABAQUS was used to analyze it. The basic theory of a hyper-elastic material constitutive was introduced; the method for non-linear F...
 
A General Model Checking Method of Electronic Transaction Protocols Using Colored Petri Nets
Found in: Hybrid Intelligent Systems, International Conference on
By Meng Xu, Guiping Su, Jin Wei
Issue Date:August 2009
pp. 298-303
As a special kind of security protocol, E-Commerce protocols have been analyzed with many formal methods in recent years. However, there is no general specification and verification model checking method to be applied effectively to the four special proper...
 
A Directed Labeled Graph Frequent Pattern Mining Algorithm Based on Minimum Code
Found in: Multimedia and Ubiquitous Engineering, International Conference on
By Yuhua Li, Quan Lin, Gang Zhong, Dongsheng Duan, Yanan Jin, Wei Bi
Issue Date:June 2009
pp. 353-359
Most of existing frequent subgraph mining algorithms are used to deal with undirected unlabeled marked graph. A few of them aim at directed graph or labeled graph. But in the real world ,a lot of connections have direction and label,so directed labeled gra...
 
An Integrated Model to Analyze Cryptographic Protocols with Colored Petri Nets
Found in: High-Assurance Systems Engineering, IEEE International Symposium on
By Jin Wei, Guiping Su, Meng Xu
Issue Date:December 2008
pp. 457-460
Nowadays, DoS-resistant property has become more and more valuable for designing a cryptographic protocol. In this paper, we concentrate on the suitability of applying CPN Tools to merging Devel-Yao model into Meadows' cost-based framework in the formal an...
 
Optimization for Urban Traffic Assignment by Congestion Toll Levied on Regional Expressway
Found in: Power Electronics and Intelligent Transportation System, Workshop on
By Meng-Meng Zhang, Jinli Wei
Issue Date:August 2008
pp. 472-475
The objective of this paper is to study the toll standard of regional expressway network so as to optimizing traffic assignment and consequently reducing the holistic cost of the network. Based on Wardrop's principles and expense analyses, a function calle...
 
Application-Oriented Flow Control for Wireless Sensor Networks
Found in: Networking and Services, International conference on
By Jiong Jin, Wei-Hua Wang, Marimuthu Palaniswami
Issue Date:June 2007
pp. 71
This paper addresses flow control and resource allocation problem for heterogeneous wireless sensor networks which consist of diverse sensor types and applications. The performance of these applications, either elastic data collecting or real-time monitori...
 
A Link Layer Assisted Fast Handoff Scheme Using the Alternative Path Approach
Found in: Advanced Information Networking and Applications, International Conference on
By Chung-Ming Huang, Meng-Shu Chiang, Jin-Wei Lin
Issue Date:April 2006
pp. 485-490
Mobile IP is a popular referenced mobile wireless protocol that provides the rules for mobile node to roam between networks. Although many researches have been proposed for mobile IP related development, the disruption network supporting time called handof...
 
EFFICIENT THERMAL SIMULATION FOR RUN-TIME TEMPERATURE TRACKING AND MANAGEMENT
Found in: Computer Design, International Conference on
By Hang Li, Pu Liu, Zhenyu Qi, Lingling Jin, Wei Wu, Sheldon X.-D. Tan, Jun Yang
Issue Date:October 2005
pp. 130-136
<p>As power density increases exponentially, run-time regulation of operating temperature by dynamic thermal management becomes imperative. This paper proposes a novel approach to real-time thermal estimation at chip level for efficient dynamic therm...
 
Can Memory-Less Network Adapters Benefit Next-Generation InfiniBand Systems?
Found in: High-Performance Interconnects, Symposium on
By Sayantan Sur, Abhinav Vishnu, Hyun-Wook Jin, Wei Huang, Dhabaleswar K. Panda
Issue Date:August 2005
pp. 45-50
InfiniBand is emerging as a high-performance interconnect. It is gaining popularity because of its high performance and open standard. Recently, PCI-Express, which is the third generation high-performance I/O bus used to interconnect peripheral devices, ha...
 
Fast thermal simulation for architecture level dynamic thermal management
Found in: Computer-Aided Design, International Conference on
By Pu Liu, Zhenyu Qi, Hang Li, Lingling Jin, Wei Wu, S.X.-D. Tan, Jun Yang
Issue Date:May 2005
pp. 639-644
As power density increases exponentially, runtime regulation of operating temperature by dynamic thermal managements becomes necessary. This paper proposes a novel approach to the thermal analysis at chip architecture level for efficient dynamic thermal ma...
 
Finding Optimal Solution for Satisficing Non-functional Requirements via 0-1 Programming
Found in: 2013 IEEE 37th Annual Computer Software and Applications Conference (COMPSAC)
By Bin Yin,Zhi Jin,Wei Zhang,Haiyan Zhao,Bo Wei
Issue Date:July 2013
pp. 415-424
On-Functional Requirements (NFRs) are vital for the success of software systems. Generally speaking, NFRs are some implicit expectations about how well the software will work, often known as software quality. For building better software, the NFRs should b...
 
Network performance of smart mobile handhelds in a university campus WiFi network
Found in: Proceedings of the 2012 ACM conference on Internet measurement conference (IMC '12)
By Bing Wang, Kyoungwon Suh, Ruofan Jin, Wei Wei, Xian Chen
Issue Date:November 2012
pp. 315-328
Smart mobile handheld devices (MHDs) such as smartphones have been used for a wide range of applications. Despite the recent flurry of research on various aspects of smart MHDs, little is known about their network performance in WiFi networks. In this pape...
     
Gang and moniker identification by graffiti matching
Found in: Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence (MiFor '11)
By Anil K. Jain, Jung-Eun Lee, Rong Jin, Wei Tong
Issue Date:November 2011
pp. 1-6
Identifying criminal gangs and monikers is one of the most important tasks for graffiti analysis in low enforcement. In current practice, this is typically performed manually by the law enforcement officers, which is not only time-consuming but also result...
     
Graph classification based on pattern co-occurrence
Found in: Proceeding of the 18th ACM conference on Information and knowledge management (CIKM '09)
By Calvin Young, Ning Jin, Wei Wang
Issue Date:November 2009
pp. 573-582
Subgraph patterns are widely used in graph classification, but their effectiveness is often hampered by large number of patterns or lack of discrimination power among individual patterns. We introduce a novel classification method based on pattern co-occur...
     
An efficient key point quantization algorithm for large scale image retrieval
Found in: Proceedings of the First ACM workshop on Large-scale multimedia retrieval and mining (LS-MMRM '09)
By Anil K. Jain, Fengjie Li, Jung-Eun Lee, Rong Jin, Wei Tong
Issue Date:October 2009
pp. 89-96
We focus on the problem of large-scale near duplicate image retrieval. Recent studies have shown that local image features, often referred to as key points, are effective for near duplicate image retrieval. The most popular approach for key point based ima...
     
An approach to finding weak regions for wireless sensor networks with arbitrary sensing areas
Found in: Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc '08)
By GaoJun Fan, Shiyao Jin, Wei Cheng
Issue Date:May 2008
pp. 1-2
This work considers the area coverage problem in wireless sensor networks with any arbitrary sensing shape. The task is to find the weak sub-regions deteriorating the overall coverage performance. By transforming the area coverage problem to the intersecti...
     
Conformal virtual colon flattening
Found in: Proceedings of the 2006 ACM symposium on Solid and physical modeling (SPM '06)
By Arie Kaufman, Feng Qiu, Miao Jin, Wei Hong, Xianfeng Gu
Issue Date:June 2006
pp. 85-93
We present an efficient colon flattening algorithm using a conformal structure, which is angle-preserving and minimizes the global distortion. Moreover, our algorithm is general as it can handle high genus surfaces. First, the colon wall is segmented and e...
     
Honeynet based distributed adaptive network forensics and active real time investigation
Found in: Proceedings of the 2005 ACM symposium on Applied computing (SAC '05)
By Hai Jin, Wei Ren
Issue Date:March 2005
pp. 302-303
Network forensics and honeynet systems have the same features of collecting information about the computer misuses. Honeynet system can lure attackers and gain information about new types of intrusions. Network forensics system can analysis and reconstruct...
     
Position Measurement and Wireless Measurement System of Straightness Error Based on Two-Dimensional PSD
Found in: Electrical and Control Engineering, International Conference on
By Yuan Jiang, Qiu Zi-xue, Shao Jian-xin, Cao Jin-wei
Issue Date:June 2010
pp. 1490-1492
The wireless measurement system of straightness error based on two-dimensional PSD, C8051F330 and PTR4000 was designed. The principle of PSD, the signal processing circuit, and the wireless straightness error data transmission system were introduced in det...
 
A Faster SA Method TOSA for Global Placement
Found in: Electrical and Control Engineering, International Conference on
By Dong-qing Wang, Masahiko Toyonaga, Hua Hu, Jin-wei Ma, Xue-liang Fu
Issue Date:June 2010
pp. 4867-4870
In this paper, we propose a new ideas of the Simulated Annealing method to improve the execution time. SA method is an effective optimization algorithm for combinatorial problems such as a placement design for VLSI Chip, but a deficiency is the long execut...
 
 1