Search For:

Displaying 1-39 out of 39 total
A Unified Approach to Streamline Selection and Viewpoint Selection for 3D Flow Visualization
Found in: IEEE Transactions on Visualization and Computer Graphics
By Jun Tao, Jun Ma, Chaoli Wang, Ching-Kuang Shene
Issue Date:March 2013
pp. 393-406
We treat streamline selection and viewpoint selection as symmetric problems which are formulated into a unified information-theoretic framework. This is achieved by building two interrelated information channels between a pool of candidate streamlines and ...
 
Characterizing Intra-Die Spatial Correlation Using Spectral Density Method
Found in: Quality Electronic Design, International Symposium on
By Qiang Fu, Wai-Shing Luk, Jun Tao, Changhao Yan, Xuan Zeng
Issue Date:March 2008
pp. 718-723
A spectral domain method for intra-die spatial correlation function extraction is presented. Based on theoretical analysis of random field, the spectral density, as the spectral domain counterpart of correlation function, is employed to estimate the parame...
 
FlowString: Partial Streamline Matching Using Shape Invariant Similarity Measure for Exploratory Flow Visualization
Found in: 2014 IEEE Pacific Visualization Symposium (PacificVis)
By Jun Tao, Chaoli Wang, Ching Kuang Shene
Issue Date:March 2014
pp. 9-16
Measuring the similarity of integral curves is fundamental to many important flow data analysis and visualization tasks such as feature detection, pattern querying, streamline clustering and hierarchical exploration. In this paper, we introduce FlowString,...
 
Integrated Pedestrian and Direction Classification Using a Random Decision Forest
Found in: 2013 IEEE International Conference on Computer Vision Workshops (ICCVW)
By Junli Tao,Reinhard Klette
Issue Date:December 2013
pp. 230-237
For analysing the behaviour of pedestrians in a scene, it is common practice that pedestrian localization, classification, and tracking are conducted consecutively. The direction of a pedestrian, being part of the pose, implies the future path. This paper ...
 
Research on Cooperative Task Allocation for Multiple UCAVs Based on Modified Co-evolutionary Genetic Algorithm
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Mingren Xu,Shewei Wang,Jun Tao,Guowei Liang
Issue Date:June 2013
pp. 125-128
Uninhabited combat aerial vehicles (UCAVs) task allocation problem is one of the most important issues in UCAV research. This paper refers to an extension of the mixed-integer linear programming (MILP) task allocation model. Through analyzing the model cha...
 
Research on Human Capital in Knowledge-Intensive Business Services
Found in: 2012 International Conference on Management of e-Commerce and e-Government (ICMeCG)
By Jun Tao
Issue Date:October 2012
pp. 238-241
Knowledge-intensive business services are the main participants in the knowledge-based economy. Knowledge creation, spread and accumulation are strategic methods for KIBS to remain competitive. For KIBS, the achievement of its value is based on activities ...
 
Knowledge Innovation System and Customer Impact of Knowledge-Intensive Business Services
Found in: 2012 International Conference on Management of e-Commerce and e-Government (ICMeCG)
By Jun Tao
Issue Date:October 2012
pp. 242-245
Following the development of economy, the service industry has already exceeded the manufacturing industry and has been one country's leading industry. Providing knowledge is the service way of Knowledge-Intensive business services (KIBS). KIBS are the imp...
 
Cooperative Agent-Based QoS Framework for Heterogeneous Networks
Found in: Information Technology, Computer Engineering and Management Sciences, International Conference of
By Feng Ding,Shuai Zhang,Heng Wang,Huang Songhua,Jun Tao
Issue Date:September 2011
pp. 214-217
With the fast development of network technology and expansion of the network scale, the heterogeneity of Internet makes the Quality of Service (QoS) guarantee techniques even more challenging. In this paper the state-of-the-art of QoS guarantee techniques ...
 
An Experimental Research on the Trepanning Moulds with Frame Electrode of Small Copper Tube by EDM
Found in: Digital Manufacturing and Automation, International Conference on
By Shenglin Xu,Zhaoshu Liang,Jun Tao,Junjie Yang,Xi Yan
Issue Date:August 2011
pp. 181-184
The structure and dimensions of frame electrodes of small copper tube used in the experiment are described in detail, the experimental conditions and methods are presented briefly. The direction's influence of spraying fluid from small hole of tube electro...
 
IDSV: Intrusion Detection Algorithm Based on Statistics Variance Method in User Transmission Behavior
Found in: Computational and Information Sciences, International Conference on
By Jun Tao, Hui Lin, Chunlin Liu
Issue Date:December 2010
pp. 1182-1185
With the growing diverse demands for Internet applications, network security issues become more acute. To address the appropriate network security from network intrusion detection event has become an important research in network security. In this paper, u...
 
Creative Interaction Design Based on Human Behavior and Emotion
Found in: System Science, Engineering Design and Manufacturing Informatization, International Conference on
By Fangtian Ying, Xinrui Li, Xusheng Zhang, Jun Tao, Bing Li, Shanshan Gao, Zhengpeng Li
Issue Date:November 2010
pp. 150-152
The past years have seen the subtle changes of relationship between human and products when the technology developed and the consumer requirement increased, during which human feelings are much concerned within the design process. This paper introduces the...
 
Prison Breach: F.S.T.S.E Design Method for Toy Based on Mental and Behavioral Characteristic of Children
Found in: System Science, Engineering Design and Manufacturing Informatization, International Conference on
By Fangtian Ying, Jun Tao, Xinrui Li, Bing Li, Shanshan Gao, Zhenpeng Li
Issue Date:November 2010
pp. 121-124
This paper introduces the Prison Breach, an interactive toy prototype designed for children aged 5-8. Using the story of escape and manhunt as background, it endues two robots with the roles of a thief and a policeman. By turning discs on which there print...
 
Static Channel Assignment with the Physical Interference Model for Maximum Capacity in Multi-radio Multi-channel Wireless Mesh Networks
Found in: Grid and Cloud Computing, International Conference on
By Birui Shao, Jun Tao, Fangfang Wang
Issue Date:November 2010
pp. 338-343
In this paper, a model for the static channel assignment in multi-radio multi-channel wireless mesh networks is proposed. We describe an interference model in wireless communication environment. The degree of detail in the model determines the accuracy of ...
 
Intel LVS logic as a combinational logic paradigm in CNT technology
Found in: Nanoscale Architectures, IEEE International Symposium on
By Bao Liu, Zhen Cao, Jun Tao, Xuan Zeng, Pushan Tang, Philip H.-S. Wong
Issue Date:June 2010
pp. 77-81
In this paper, we systematically evaluate combinational logic families for CNT technology implementation for a variety of logic families, signal transition times, and transistor parameters. We compare CMOS static logic, transmission gate logic, and Intel L...
 
A Digitized Water Display System Based on RS-422 Bus
Found in: Electrical and Control Engineering, International Conference on
By Jun Tao, Zheng Geng, Qiongjian Fan
Issue Date:June 2010
pp. 39-43
We present in this paper some technical progresses in developing a novel information display mechanism called digitized water display (DWD). In sharp contrast to traditional display screens which use the brightness/color of built-in array of pixels on a fl...
 
Application on Seepage Monitoring by Multi-point Optical Fiber Grating Temperature Measurement System
Found in: Information Science and Engieering, International Symposium on
By Jun Tao, Lei Mu, Ping Du
Issue Date:December 2009
pp. 28-31
The structure of the multi-point Fiber Bragg Grating (FBG) temperature measurement system is presented in this paper. It uses the wavelength demodulation method which applies In GaAs detector array to measure the light intensity to monitor the situation of...
 
Implementation of SoC-PC Communication Interface Based on USB2.0
Found in: New Trends in Information and Service Science, International Conference on
By Jun Tao Han, Yong Guan, Zhiquan Dai
Issue Date:July 2009
pp. 831-834
USB is more used than some traditional inter-PC Bus such as PCI and ISA due to the high speed and agility and also provides properly convenient communication interface for some A/D conversion, FPGA of the external logic device. This passage uses the asynch...
 
A Research and Practice of Agile Unified Requirement Modeling
Found in: Intelligent Ubiquitous Computing and Education, International Symposium on
By Huang ShuiYuan, Duan LongZhen, Xie Jun, Tao JunCai, Chen GuiXiang
Issue Date:May 2009
pp. 180-184
To reduce the practicing defects in ration unified process, this paper introduces a new requirement modeling process, which is based on the analysis of rational unified process with the combination of agile modeling technique. Contents of this process incl...
 
An Approach to Performance Evaluation of Software Architecture
Found in: Education Technology and Computer Science, International Workshop on
By Liang Jun-Tao, Jiang Xiao-Yuan
Issue Date:March 2009
pp. 853-856
Software architecture is the bridge from requirement to realization, to determine software quality. Based on analyze the description of software architecture ,this paper derives a performance evaluation models, based on UML collaboration and sequence diagr...
 
A Software Component Classification Based on Facet and Neural Network
Found in: Intelligent Information Technology Application Workshops, International Symposium on
By Jun-Tao Liang, Xiao-Yuan Jiang
Issue Date:December 2008
pp. 1121-1123
By the component libraries scaling up and the reuse practice deepening, the efficiency management of component repository is the precondition of component reuse. It is favorable for component reuse that components are organized in library according to feli...
 
A Software Component Classification Based on Facet and Neural Network
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Liang Jun-Tao, Jiang Xiao-Yuan
Issue Date:December 2008
pp. 906-908
By the component libraries scaling up and the reuse practice deepening, the efficiency management of component repository is the precondition of component reuse. It is favorable for component reuse that components are organized in library according to feli...
 
Maximizing Universal Streaming Rate in Peer-to-Peer Streaming Networks
Found in: Grid and Cloud Computing, International Conference on
By Jiagao Wu, Jun Tao, Zhiqiang Zou
Issue Date:October 2008
pp. 392-397
Although a large number of different proposals have emerged in recent years, a fundamental problem of P2P streaming networks concerned about is to establish an optimal routing structure with achieving certain optimization metric. In this paper, we focus on...
 
Adaptive Stochastic Collocation Method (ASCM) for Parameterized Statistical Timing Analysis with Quadratic Delay Model
Found in: Quality Electronic Design, International Symposium on
By Yi Wang, Xuan Zeng, Jun Tao, Hengliang Zhu, Xu Luo, Changhao Yan, Wei Cai
Issue Date:March 2008
pp. 62-67
In this paper, we propose an Adaptive Stochastic Collocation Method for block-based Statistical Static Timing Analysis (SSTA). A novel adaptive method is proposed to perform SSTA with delays of gates and interconnects modeled by quadratic polynomials based...
 
Level Set Method for License Plate Localization Technology
Found in: Computational Intelligence and Security, International Conference on
By Yuwang Yang, Jun Tao, Jingyu Yang
Issue Date:December 2007
pp. 347-350
Level set method is being applied actively in image field due to its mathematical perfection and maturity. In this paper, based on Mumford-Shah model with Level Set method, the finite difference and third order TVD (total variation diminishing) Runge-Kutta...
 
Knowledge Elicitation and Acquisition for Simulation Validation
Found in: Computational Intelligence and Security Workshops, International Conference on
By Jun-Tao Wang, Fei-Yan Min
Issue Date:December 2007
pp. 85-88
The validation of simulation relies heavily on the opinions of domain experts, and it makes the validation task exhaustive and time-consuming. The knowledge- based methods can be applied for these problems. One of the main issues around this method is the ...
 
Stochastic Sparse-grid Collocation Algorithm (SSCA) for Periodic Steady-State Analysis of Nonlinear System with Process Variations
Found in: Asia and South Pacific Design Automation Conference
By Jun Tao, Xuan Zeng, Wei Cai, Yangfeng Su, Dian Zhou, Charles Chiang
Issue Date:January 2007
pp. 474-479
In this paper, Stochastic Collocation Algorithm combined with Sparse Grid technique (SSCA) is proposed to deal with the periodic steady-state analysis for nonlinear systems with process variations. Compared to the existing approaches, SSCA has several cons...
 
A New Pricing Approach for Service Network Using Explicit Congestion Notification
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Jun Tao, Dian-Xun Shuai
Issue Date:December 2006
pp. 585-588
Advances in technology have greatly increased the demand for a single integrated service network that can provide multiple service classes for different user requirements. Currently, the predominant form of Internet retail pricing is flat-rate pricing whic...
 
Analog Circuit Behavioral Modeling via Wavelet Collocation Method with Auto-Companding
Found in: Asia and South Pacific Design Automation Conference
By Jian Wang, Jun Tao, Xuan Zeng, Charles Chiang, Dian Zhou
Issue Date:January 2004
pp. 45-50
In this paper, we propose an auto-companding technique for the analog behavioral modeling via wavelet collocation method. The companding function is automatically constructed according to the singularities of the input-output function of the circuit block....
 
RSAvisual: a visualization tool for the RSA cipher
Found in: Proceedings of the 45th ACM technical symposium on Computer science education (SIGCSE '14)
By Chaoli Wang, Ching-Kuang Shene, Jean Mayo, Jun Ma, Jun Tao, Melissa Keranen
Issue Date:March 2014
pp. 635-640
This paper describes a visualization tool RSAvisual that helps students learn and instructors teach the RSA cipher. This tool permits the user to visualize the steps of the RSA cipher, do encryption and decryption, learn simple factorization algorithms, an...
     
A Deformation Framework for Focus+Context Flow Visualization
Found in: IEEE Transactions on Visualization and Computer Graphics
By Jun Tao, Chaoli Wang, Ching-Kuang Shene, Seung Hyun Kim
Issue Date:January 2014
pp. 42-55
Striking a careful balance among coverage, occlusion, and complexity is a resounding theme in the visual understanding of large and complex three-dimensional flow fields. In this paper, we present a novel deformation framework for focus+context streamline ...
 
ECvisual: a visualization tool for elliptic curve based ciphers
Found in: Proceedings of the 43rd ACM technical symposium on Computer Science Education (SIGCSE '12)
By Melissa Keranen, Ching-Kuang Shene, Jean Mayo, Jun Ma, Jun Tao
Issue Date:February 2012
pp. 571-576
This paper describes a visualization tool ECvisual that helps students understand and instructors teach elliptic curve based ciphers. This tool permits the user to visualize elliptic curves over the real field and over a finite field of prime order, perfor...
     
Telepathy Lamp: Remote Affective Interaction Based on Ambient Metaphor for Emotional Caring of the Elderly
Found in: System Science, Engineering Design and Manufacturing Informatization, International Conference on
By Fangtian Ying, Bing Li, Zhenpeng Li, Xinrui Li, Jun Tao, Shanshan Gao
Issue Date:November 2010
pp. 129-132
This paper presents a remote affective interactive design: Telepathy Lamp, which focuses on the “Empty Nest” problem. It is a device for the parents and children who live far away from each other, focusing on transferring remote emotional communication bas...
 
3D trajectory estimation of simulated fruit flies
Found in: Proceedings of the 27th Conference on Image and Vision Computing New Zealand (IVCNZ '12)
By Benjamin Risse, Junli Tao, Reinhard Klette, Xiaoyi Jiang
Issue Date:November 2012
pp. 31-36
This paper addresses 3D trajectory estimation of simulated fruit flies assuming a time-synchronized and calibrated 3-camera system. Because the objects have almost the same appearance, both stereo matching and temporal tracking are challenging. In this pap...
     
Binning optimization based on SSTA for transparently-latched circuits
Found in: Proceedings of the 2009 International Conference on Computer-Aided Design (ICCAD '09)
By Hai Zhou, Jun Tao, Min Gong, Xuan Zeng
Issue Date:November 2009
pp. 328-335
With increasing process variation, binning has become an important technique to improve the values of fabricated chips, especially in high performance microprocessors where transparent latches are widely used. In this paper, we formulate and solve the binn...
     
Provably good and practically efficient algorithms for CMP dummy fill
Found in: Proceedings of the 46th Annual Design Automation Conference (DAC '09)
By Changhao Yan, Chunyang Feng, Hai Zhou, Jun Tao, Xuan Zeng
Issue Date:July 2009
pp. 539-544
To reduce chip-scale topography variation in Chemical Mechanical Polishing (CMP) process, dummy fill is widely used to improve the layout density uniformity. Previous researches formulated the dummy fill problem as a standard Linear Program (LP). However, ...
     
Timing yield driven clock skew scheduling considering non-Gaussian distributions of critical path delays
Found in: Proceedings of the 45th annual conference on Design automation (DAC '08)
By Changhao Yan, Jia Ni, Jiarong Tong, Jun Tao, Wai-Shing Luk, Wei Cai, Xuan Zeng, Yi Wang
Issue Date:June 2008
pp. 1-30
In nanometer technologies, process variations possess growing nonlinear impacts on circuit performance, which causes critical path delays of combinatorial circuits variate randomly with non-Gaussian distribution. In this paper, we propose a novel clock ske...
     
Cost Estimating of Weapons Development Based on Rough Sets and ANN Learning
Found in: Intelligent System Design and Engineering Application, International Conference on
By Xiao-yun Wu,Li-xin Xing,Hai-jun Tao,Songsheng Lu,Yun-fei Chen
Issue Date:January 2012
pp. 212-215
There are some difficulties in using Linearity Regression method to predict the cost of MLRS development under the small sample situation. On the basis of the capacity of dealing with the nonlinear of ANN and the learning capacity of Rough Sets (RS), a new...
 
Improving Prediction Accuracy of Protein-DNA Docking with GPU Computing
Found in: Bioinformatics and Biomedicine, IEEE International Conference on
By Bo Hong,Jiadong Wu,Jun-tao Guo
Issue Date:November 2011
pp. 482-487
Protein-DNA docking is a very challenging problem in bioinformatics and has important implications in a number of applications (e.g. rational drug design). This paper presents a computational approach to improve the prediction accuracy of protein-DNA docki...
 
Molecular Modeling of Full-Length OxyR from Shewanella oneidensis MR-1 and Molecular Dynamics Studies of the Activation Domain
Found in: Computational Systems Bioinformatics Conference, International IEEE Computer Society
By Jun-tao Guo, Ying Xu
Issue Date:August 2004
pp. 708-709
OxyR is a transcriptional factor, which activates transcription of antioxidant genes. In this study, we constructed a structural model for the full-length OxyR from Shewanella oneidensis MR-1 using threading and comparative modeling techniques. To further ...
   
 1