Search For:

Displaying 1-50 out of 4,151 total
Dremel: interactive analysis of web-scale datasets
Found in: Communications of the ACM
By Andrey Gubarev, Geoffrey Romer, Geoffrey Romer, Jing Jing Long, Jing Jing Long, Matt Tolton, Matt Tolton, Sergey Melnik, Sergey Melnik, Shiva Shivakumar, Shiva Shivakumar, Theo Vassilakis, Theo Vassilakis
Issue Date:June 2011
pp. 114-123
Dremel is a scalable, interactive ad hoc query system for analysis of read-only nested data. By combining multilevel execution trees and columnar data layout, it is capable of running aggregation queries over trillion-row tables in seconds. The system scal...
Research on Speciation and Bioavailability of Arsenic in Soil
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Wang Jin-cui, Sun Ji-chao, Jing Ji-hong, Zhang Yu-xi, Liu Jing-tao, Zhang Ying, Chen Xi, Xiang Xiao-ping, Huang Guan-xing, Zhang Yuan-jing
Issue Date:February 2011
pp. 2486-2489
Progresses in the study of speciation and biological uptake of arsenic in soil are introduced. The researches on bioavailability of arsenic are summarized, and the main factors which affect arsenic bioavailability are emphatically discussed. Relationship b...
Bertrand Game Model for the Port Logistics Alliance
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Liang Jing, Lu Jing, Li Jing
Issue Date:November 2010
pp. 218-221
There has been a furious price competition among port logistics enterprises in order to secure the cargo zealously. Therefore, how to prevent destructive price competition from draining all of the profits as well as which strategy should be applied have be...
Enhancing DoDAF with a HCPN Executable Model to Support Validation
Found in: Computational Intelligence and Design, International Symposium on
By Feng Ni, Ming-Zhe Wang, Jing-Jing Liao, Jing-Dan Zhou
Issue Date:December 2009
pp. 283-287
Department of Defense Architecture Framework (DoDAF) as a common integrated system architecture specification has already gained the widespread acceptance in the world. However, the limitations of its static descriptive form render it unable to support the...
Exploring the basic laws of acupoints of ischemie cerebrovascular disease in acupuncture treatment through text mining
Found in: 2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
By Miao Jiang,Zhong-di Liu,Jing Sun,Hong-ming Ma,Na Qi,Hong-tao Guo,Guang Zheng,Ning Zhao,Su-yun Wang,Jing-rong Zhang,Rong-fen Dong,Ai-ping Lv,Miao Jiang,Yao-xian Wang
Issue Date:December 2013
pp. 90-95
It is well known that acupuncture treatment has an effect on patients with ischemie cerebrovascular disease. This study was aimed to summarize the basic laws of acupoints of ischemie cerebrovascular disease in acupuncture treatment using text mining techni...
The Static Analysis of Wearable Lower Extremity Exoskeleton Based on ANSYS Workbench
Found in: 2013 Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)
By Mei-Cheng Li,Li-Rong Wang,Dai-Min Chen,Jing-Jing Tao,Dong Chen
Issue Date:December 2013
pp. 510-514
The new type wearable lower extremity exoskeleton was designed using anthropomorphic mechanical, according to the human walking postures, the static analysis was does on the exoskeleton under different postures, and the stress values was obtained. So the o...
The space-time-frequency characterization simulation and analysis for 3-D MIMO channel model
Found in: 2013 8th International Conference on Communications and Networking in China (CHINACOM)
By Jing yue Zhang, Xiao rong Jing, Yan li Liu
Issue Date:August 2013
pp. 229-234
Based on the WINNER-CDL channel model, the space-time-frequency characteristics of the 3D MIMO channels are studied and simulated in this paper. The closed from expressions of the space-time correlation and frequency correlation of the 3D MIMO channel as t...
An improved real-time compressive tracking method
Found in: Proceedings of the Fifth International Conference on Internet Multimedia Computing and Service (ICIMCS '13)
By Bangjun Lei, Fangmin Dong, Guangzhu Xu, Jing Jing, Yan He
Issue Date:August 2013
pp. 380-385
Robust object tracking is very challenging due to object pose variation, illumination changing and occlusion etc.. Tracking Methods based on dimensionality reducing by applying random projection can extract target features efficiently and greatly improve t...
Using appearance re-matching to improve real-time compressive tracking
Found in: Proceedings of the Fifth International Conference on Internet Multimedia Computing and Service (ICIMCS '13)
By Bangjun Lei, Fangmin Dong, Guangzhu Xu, Jing Jing, Yan He
Issue Date:August 2013
pp. 28-33
A small number of randomly generated linear measurements can preserve most of the salient information of one compressible image according to compress sensing theory. Using these measurements as features can greatly improve the speed of detection based trac...
Designing Template-Free Predictor for Targeting Protein-Ligand Binding Sites with Classifier Ensemble and Spatial Clustering
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Dong-Jun Yu, Jun Hu, Jing Yang, Hong-Bin Shen, Jinhui Tang, Jing-Yu Yang
Issue Date:July 2013
pp. 994-1008
Accurately identifying the protein-ligand binding sites or pockets is of significant importance for both protein function analysis and drug design. Although much progress has been made, challenges remain, especially when the 3D structures of target protein...
A Generic Framework for Application Configuration Discovery with Pluggable Knowledge
Found in: 2013 IEEE 6th International Conference on Cloud Computing (CLOUD)
By Fan Jing Meng, Xuejun Zhuo, Bo Yang, Jing Min Xu, Pu Jin,Ajay Apte,Joe Wigglesworth
Issue Date:June 2013
pp. 236-243
Discovering application configurations and dependencies in the existing runtime environment is a critical prerequisite to the success of cloud migration, which attracts many attentions from both researchers and commercial vendors. However, the high complex...
CASME database: A dataset of spontaneous micro-expressions collected from neutralized faces
Found in: 2013 10th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2013)
By Wen-Jing Yan,Qi Wu, Yong-Jin Liu, Su-Jing Wang,Xiaolan Fu
Issue Date:April 2013
pp. 1-7
Micro-expressions are facial expressions which are fleeting and reveal genuine emotions that people try to conceal. These are important clues for detecting lies and dangerous behaviors and therefore have potential applications in various fields such as the...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
Found in: IEEE Transactions on Mobile Computing
By Xin Ming Zhang, En Bo Wang, Jing Jing Xia, Dan Keun Sung
Issue Date:March 2013
pp. 424-433
Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a...
Relational contract, government support and stable collaboration: an empirical research on district medical collaboration platform in China
Found in: Proceedings of the 13th Annual International Conference on Digital Government Research (dg.o '12)
By Jing You, Jing Zhang
Issue Date:June 2012
pp. 206-215
Relational contract is often regarded as compliments to economic contract. It provides support for collaboration stability. In some public service projects where strict economic contracts among partners are missing, it is necessary to find out the key cont...
Analysis of Microelements on Liver Jury in Mice Induced by Formaldehyde
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Jing-hong Yu,Jing Zhang,Huan Li,Wei-qi Sun
Issue Date:May 2012
pp. 1213-1216
To study the effects of formaldehyde on the level of microelements in mouse liver and blood and explore the microelements as biomarker in jury induced by formaldehyde. Methods The mice were divided in control, low (1/40LD50) , moderate (1/20LD50) and high ...
Preparation and Radical Scavenging Activity of Nano-Fuller-Serine
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Jing Zhang,Yuan Li,Jing Li,Yadong Zhang,Junwei Duan
Issue Date:May 2012
pp. 417-420
The fuller-serine was synthesized and then dissolved in the organic solvent and then the nanoparticle aqueous suspension of fuller-serine was prepared. The nanoparticle sizes and Zeta-potentials were obtained by TEM and a Zeta-patential instrument, respect...
Expression of Gastric Mucosa Trefoil Factor Family 2 and Epidermal Growth Factor during Healing of Experimental Gastric Ulcer in Rats
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Jing Zhang,Jing-fang Wu,Tao Fang,Yi-teng Ma
Issue Date:May 2012
pp. 1475-1478
Using a model of rat gastric ulcer to check the changes of trefoil factor family 2 (TFF2) and epidermal growth factor(EGF) in gastric mucosa during healing of experimental gastric ulcer. Rats gastric ulceration were caused by injection acetic acid to submu...
Method of a Fuzzy Cluster Analysis to Evaluate Microbial Enhanced Oil Recovery
Found in: Communication Systems and Network Technologies, International Conference on
By Yongjun Zhou,Jing Wang,Ming Li,Jing Tian,Guang Ji,Hanping Dong,Li Yu
Issue Date:May 2012
pp. 282-284
Fuzzy clustering analysis is a widely used fuzzy mathematics method ,which could be applied in various fields. Based on the fuzzy set theory, application of fuzzy clustering analysis in microbial enhanced oil recovery (MEOR) was studied. At first, strains ...
Adaptive Client-Side LUT-Based Digital Watermarking
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Chi-Man Pun,Jing-Jing Jiang,C. L. Philip Chen
Issue Date:November 2011
pp. 795-799
In this paper we proposed an adaptive secure client-side Look-Up-Table (LUT) based digital audio watermarking, which adaptively choose an optimal embedding strength for individual segment of host signal according to specific properties of each segment. It ...
System-Level Power Management for Low-Power SOC Design
Found in: International Symposium on Distributed Computing and Applications to Business, Engineering and Science
By Zhu Jing-Jing,Lu Feng
Issue Date:October 2011
pp. 412-416
From the system-level of low power consumption view, this article puts forward in software management proposal. Power management unit are introduced. Especially power states transition scheme has been worked out. And the scheme for device power management ...
Hierarchical Concept Graph Model for Measurement Signal Analysis
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Kunpeng Jing,Zhongpeng Zhang,Xin Li,Jiaping Yu,Jung Jing,Jingmin Luan,Yonghong Xu,Wenxue Hong
Issue Date:October 2011
pp. 108-113
It is crucial for an instrumentation to have an efficient method of measurement signal analysis. Especially there are multiple sensors in the instrumentation, i.e. the multi-sensor information fusion. In recent years, we intend to discover a new method of ...
A Corpus Building Method on Forensic Identification of Dialects (FIDS)
Found in: Information Technology, Computer Engineering and Management Sciences, International Conference of
By Jing-Jing Xia,Meng-Qiang Liu
Issue Date:September 2011
pp. 275-278
China is very extensive in area and is with a large population, which leads to many dialects. In such a case dialects with accents to some degree should be analyzed to ascertain speakers' identification in legal practice. Here, a corpus building method is ...
An Approach of Process Control in Software Product Line
Found in: IEEE/ACM International Conference on Green Computing and Communications
By Zhu Yun Duanmu,Jing Jing Yan,You Fu Lee
Issue Date:August 2011
pp. 139-143
Along with the development of software industry, softwares become much more professional and field-related, which were followed by the rapidly changing requirements as well as the increasing complexity of software products. In response to this trend, peopl...
A Novel Self-Synchroniztion Method for Audio Watermarking
Found in: Computer Graphics, Imaging and Visualization, International Conference on
By Chi-Man Pun,Jing-Jing Jiang
Issue Date:August 2011
pp. 114-118
In this paper, we present a Self-Synchronization algorithm for audio watermarking to against all kind of audio attacks, especially, the synchronization attacks. A region corresponding to the area around the feature point of the original audio signal was ex...
Digital Watermarking Based on Patchwork and Radial Basis Neural Network
Found in: Computational Intelligence, Communication Systems and Networks, International Conference on
By Jing-Jing Jiang,Chi-Man Pun
Issue Date:July 2011
pp. 242-246
This paper presents a patchwork method for digital watermarking based on Radial Basis Neural Network (RBNN). Two special subsets of the host signal features were selected to embed the watermark signal, adding a small constant value to one subset and subtra...
Scan-based Speed-path Debug for a Microprocessor
Found in: IEEE Design and Test of Computers
By Jing Zeng,Ruifeng Guo,Wu-Tung Cheng,Michael Mateja,Jing Wang
Publication Date: June 2011
pp. N/A
Speed-path debug is a critical step in improving clock frequency of a design to meet the performance requirement. However, speed-path debug based on functional patterns can be very expensive. In this paper, we explore speed-path debug techniques based on a...
Mid-Long Term Load Forecasting Based on Fuzzy Optimal Theory
Found in: Asia-Pacific Power and Energy Engineering Conference
By Jing Huang, Jing Ma, Xian-Yong Xiao, Mei Xu
Issue Date:March 2011
pp. 1-4
Two New Weight Initialization Strategies of LMS Adaptive Linear Equalizer in Underwater Acoustic Communication
Found in: Intelligent Systems, WRI Global Congress on
By Jing Wang, Dong Fang, Haining Huang, Jing Guan
Issue Date:December 2010
pp. 303-307
Underwater acoustic (UWA) communication is a cross subject of the communication technology and underwater acoustic signal processing technology, which is very valuable in military and civil applications. But the multipath effect of UWA channel leads to int...
Context modeling for ranking and tagging bursty features in text streams
Found in: Proceedings of the 19th ACM international conference on Information and knowledge management (CIKM '10)
By Dongdong Shan, Hongfei Yan, Jing He, Jing Jiang, Wayne Xin Zhao, Xiaoming Li
Issue Date:October 2010
pp. 1769-1772
Bursty features in text streams are very useful in many text mining applications. Most existing studies detect bursty features based purely on term frequency changes without taking into account the semantic contexts of terms, and as a result the detected b...
Mixed Experimental Methodologies to Optimize Biosurfactant Production Conditions of Pseudomonas Aeruginosa
Found in: Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, IACIS International Symposium on
By Jing Tian, Jing Wang, Yong-Jun Zhou, Han-Ping Dong, Li Yu
Issue Date:October 2010
pp. 358-361
In order to reduce production cost of Pseudomonas aeruginosa T1, which has the ability of producing the biosurfactant when using crude oil as the sole carbon source, Three experimental methodologies (Plackett-Burman design (PBD), steepest ascent design (SA...
A Hybrid Discrete Particle Swarm Optimization for Job Shop Scheduling
Found in: Computational Aspects of Social Networks, International Conference on
By Wanliang Wang, Jing Zhang, Xinli Xu, Jing Jie, Haiyan Wang
Issue Date:September 2010
pp. 303-306
The job shop scheduling problem (JSSP) is a well known NP-hard problem, and many algorithms have been presented to solve it, but the results are still unsatisfactory. In this paper, a hybrid discrete particle swarm optimization algorithm based on a two lay...
Efficient Strategies for Average Constraint-Based Sequential Pattern Mining
Found in: Multimedia Communications, International Conference on
By Jing Chen,Junzhong Gu,Jing Yang,Zhefeng Qiao
Issue Date:August 2010
pp. 254-257
Sequential pattern mining based on constraint is now an important research direction of data mining, since it can reduce the generation of useless candidates as well as make the generated patterns meet the requirements of special users. Average value const...
Neighbor Carrier Signal Strength Estimation for Carrier Aggregation in LTE-A
Found in: Information Engineering, International Conference on
By Peng Yuan, Dengkun Xiao, Jing Han, Xiaojun Jing
Issue Date:August 2010
pp. 284-287
In Advanced Long Time Evolution (LTE-A) mobile wireless communication system, the Carrier Aggregation (CA) technique feature was introduced to support large transmission bandwidth. But due to the capacity limit of UE, to measure all component carriers with...
Empirical Analysis on Co-movement of Stock Price of Gold Mine Enterprises and the International Gold Price
Found in: Electrical and Control Engineering, International Conference on
By Jing Wang, Lili Kou, Xuexi Hou, Jing Wang, Zongfang Zhou
Issue Date:June 2010
pp. 896-899
Based on the present analytical method of Econometrics, this article conducts an empirical research on the co-movement of stock price of gold mine enterprises and the international gold price. By analyzing the daily datum from January 2th 2004 to October20...
The Analysis and Comparison of Tracking Error between SSE-50 ETF and SSE-180 ETF
Found in: Electrical and Control Engineering, International Conference on
By Jing Wang, Jie Kang, Jing Wang, Zongfang Zhou
Issue Date:June 2010
pp. 2253-2256
The SSE-50 ETF and SSE-180 ETF are extremely familiar no matter in the index-establishing or the characteristics of index, so this thesis selects the SSE-50 ETF and SSE-180 ETF as the research objects, then analysis the tracking errors of SSE-50 ETF and SS...
A CAPTCHA Implementation Based on Moving Objects Recognition Problem
Found in: International Conference on E-Business and E-Government
By Jing-Song Cui,Jing-Ting Mei,Wu-Zhou Zhang,Xia Wang,Da Zhang
Issue Date:May 2010
pp. 1277-1280
Nowadays, malicious computer programs have attempted to attack websites, greatly affecting their availability and security. CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart) mechanism is an effectual method in solving this...
Combined Technologies in Analysis of Overlapping Cells
Found in: International Conference on E-Business and E-Government
By Ding Jie,Lu Jing-feng,Yang Jing-yu
Issue Date:May 2010
pp. 1608-1612
Time-lapse microscopy imaging serves as an important method to measure the cycle progression of individual cells in a large population. The lacking of automatic systems that can deal with large volume of time-lapse optical microscopy imaging is a bottlenec...
Implementation of JXTA-based P2P System Access from Web Service
Found in: Power Electronics and Design, Asia-Pacific Conference on
By Jing Mei Li, Nan Ding, Jing Li, Peng Fei Yang, Guo Fang Yang, Hai Yang Guan, Sheng Nan Jin, Chao Yu Wang, Jun Feng Wang
Issue Date:May 2010
pp. 23-26
An heterogeneous distributed system using middleware to finish the visit to each other between P2P and Web Service system is brought forward, and the safety and veracity of visit the service must be ensured. The blue print of middleware is to adding the fu...
Research on a Novel Experimental Teaching and Practice System for the ES Course
Found in: Education Technology and Computer Science, International Workshop on
By Yin-ling Nie, Bao-wei Zhang, Jing-hong Duan, Jing Si, Lei Wang
Issue Date:March 2010
pp. 798-801
The development of embedded systems (namely ES, for the short) is a technique with emphasis on practice training, therefore, it is very significant of setting up a good experimental teaching system and a scientific practice environment for the course of em...
The Shape Optimization of Concrete Gravity Dam Based on GA-APDL
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Song-Hui Li, Liu Jing, Qiu-Jing Zhou
Issue Date:March 2010
pp. 982-985
The investment and size of Hydraulic structures is usually huge and its working conditions are complex. If the optimization techniques are applied, the project investment can be effective economized, the period can be shorted. Thus the Economic and social ...
Research on Site Selection of Logistics Park Based on Fuzzy Comprehensive Evaluation Method
Found in: Computer Engineering and Applications, International Conference on
By Wen Jing-jing
Issue Date:March 2010
pp. 44-47
Site selection of logistics park is a crucial tache in the logistics park planning. Scientific methods should be adopted and various factors should be considered comprehensively for the reasonable and scientific construction site selection. According to ch...
A Path-Oriented Timing-Aware Diagnosis Methodology of At-Speed Transition Tests
Found in: Microprocessor Test and Verification, International Workshop on
By Jing Zeng, Jing Wang, Michael Mateja
Issue Date:December 2009
pp. 49-54
Speed path identification is an indispensable step for pushing the design timing wall. We propose a new at-speed diagnosis methodology. Key characteristics of the methodology are (a) path-oriented diagnosis, (b) failing frequency guided, and (d) identified...
A Novel Fuzzy Histogram Based Estimation of Distribution Algorithm for Global Numerical Optimization
Found in: Soft Computing and Pattern Recognition, International Conference of
By Weili Liu, Jing-hui Zhong, Wei-Gang Wu, Jing Xiao, Jun Zhang
Issue Date:December 2009
pp. 94-99
Applying Estimation of Distribution Algorithms (EDAs) to solve continuous problems is a significant and challenging task in the field of evolutionary computation. So far, various continuous EDAs have been developed based on different probability models. In...
Research on Isolated Word Speech Recognition Based on Biomimetic Pattern Recognition
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Bin Lu, Jing-jing Xu
Issue Date:November 2009
pp. 436-439
In this paper, the theories of biomimetic pattern recognition and high-dimension space covering are applied into the isolated word speech recognition. And, based on Hopfield network and RBF network, a new type of neural network model is constructed to real...
Research on Rural Spatial Distribution in China Based on Urban-Rural Integrated Planning Management
Found in: Convergence Information Technology, International Conference on
By Tao Yu, Jing-xiang Zhang, Li-jing Sun, Wen-yun Huang
Issue Date:November 2009
pp. 296-299
Along with the rapid development of urbanization and industrialization in China, the vast rural areas in China, especially in developed regions, is confronted with new development bottleneck and confusion. Under such circumstance, universal attention has b...
The Research of Group Key Distribution Scheme in TNC
Found in: Multimedia Information Networking and Security, International Conference on
By Miao Zhang, Guo-ai Xu, Jing-jing Fang
Issue Date:November 2009
pp. 346-350
We analyze the problem of Trusted Network Connection (TNC) and descript Direct Anonymous Attestation protocol (DAA). A new key distribution scheme based on host integrity and identity is taken out for identity verify, host integrity checking and group key ...
A CAPTCHA Implementation Based on 3D Animation
Found in: Multimedia Information Networking and Security, International Conference on
By Jing-Song Cui, Jing-Ting Mei, Xia Wang, Da Zhang, Wu-Zhou Zhang
Issue Date:November 2009
pp. 179-182
In order to distinguish between human users and computer programs, CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart) mechanism is widely applied in websites such as accounts application website. While the major implementat...
Quantum-Inspired Genetic Evolutionary Algorithm for Course Timetabling
Found in: Genetic and Evolutionary Computing, International Conference on
By Yu Zheng, Jing-fa Liu, Wue-hua Geng, Jing-yu Yang
Issue Date:October 2009
pp. 750-753
The course timetabling problem (CTP), as a typical combinatorial optimization problem (COP), has been proved to be NP-Complete. Due to its complexity, the general genetic algorithm converges slowly and easily converges to local optima. A novel quantum-insp...
A Time-and-Times-Limited Strong Direct Anonymous Attestation Scheme
Found in: Business Intelligence and Financial Engineering, International Conference on
By Yue Chen, Hong-hu Zhen, Jing Cao, Jing Shao
Issue Date:July 2009
pp. 468-471
Direct Anonymous Attestation (DAA) has been adopted in Trusted Platform Module v 1.2 (TPM v1.2) Specification, described by Trusted Computing Group (TCG). It intends to solve the trusted platform attestation and the platform privacy protection. In DAA, the...
Aged Leachate Treatment by Sequencing Aged Refuse Bioreactors
Found in: Environmental Science and Information Application Technology, International Conference on
By Yingjie Sun, Jing Liu, Jing Song, Youcai Zhao
Issue Date:July 2009
pp. 222-227
In this study, the aged refuse excavated from a 10-year old closed landfill compartment at Shanghai Laogang Refuse Landfill was used as the substrate in a sequencing aged refuse bioreactor process for treatment of aged landfill leachate which sampled from ...
 1  2 Next >>