Search For:

Displaying 1-50 out of 378 total
Human GITRLaa50-177 Expressed in Bac-to-Bac Baculovirus Expression System
Found in: BioMedical Engineering and Informatics, International Conference on
By Li Tang, Sheng-Jun Wang, Chao-Ming Mao, Jun Chen, Zheng-Jun Hu, Jun-Feng Bao, Qi-Xiang Shao, Hua-Xi Xu
Issue Date:May 2008
pp. 910-914
Glucocorticoid induced tumor necrosis factor receptor ligand (GITRL) is a type II transmembrane protein with homology to TNF receptor superfamily members, and its human receptor (hGITR), an ortholog of the recently discovered murine glucocorticoid-induced ...
 
Symbolic Computation and Construction of Soliton-Like Solutions to (3+1)-Dimensional Potential-YTSF Equation
Found in: Computational and Information Sciences, International Conference on
By Jun-jun Wang, Jun-min Wang
Issue Date:December 2010
pp. 5-8
In this paper,the auxiliary equation method is implemented to get the exact solutions of the (3+1)-dimensional potential-YTSF equation. And some soliton-likes solutions are successfully obtained with the aid of symbolic computation.
 
Dynamic Hierarchical Distributed Intrusion Detection System Based on Multi-Agent System
Found in: Web Intelligence and Intelligent Agent Technology, International Conference on
By Jun Wu, Chong-jun Wang, Jun Wang, Shi-fu Chen
Issue Date:December 2006
pp. 89-93
At present, distributed intrusion detection systems are taking on more and more characteristic of distributing and intelligence. Multi-agent system (MAS), which shows its intelligence by the interaction of a group of intelligent agents, is a popular tool f...
 
A Solving Algorithm for Target Assignment Optimization Model Based on SA
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Jun Wang, Yong-wen Zhu
Issue Date:October 2010
pp. 489-493
A simulated annealing (SA) based algorithm is developed for the Target Assignment Problem (TAP) in Air Defense (AD) Command and Control (C2) System of Surface to Air Missile (SAM) tactical unit. The accomplishment process of Target Assignment (TA) task is ...
 
A Comparison of Iterative Repair Strategies for Earth Observing Satellites Imaging Scheduling
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Guo Yu-hua, Jing Ning, Li Jun, Wang Jun
Issue Date:August 2008
pp. 93-98
Earth Observing Satellites imaging scheduling problem needs to assign time slot of the participated satellites to the tasks, the object of which is to maximize the total evaluation of the assigned tasks without constraint violation, thus is an oversubscrib...
 
Exploring Centrality-Lethality Rule from Evolution Constraint on Essential Hub and Nonessential Hub in Yeast Protein-Protein Interaction Network
Found in: Computational Intelligence and Security, International Conference on
By Dong Yun-yuan,Yang Jun,Liu Qi-jun,Wang Yong-xian,Wang Zheng-hua
Issue Date:December 2011
pp. 63-65
In the analysis of Protein-Protein Interaction (PPI) network, one intriguing problem is the reason for centrality-lethality rule. To discover the relationship between topological properties and functional features of proteins in PPI network, we classified ...
 
Research on On-line Measurement and Prediction for Vehicle Motion State
Found in: Digital Manufacturing and Automation, International Conference on
By Liu Jun, Wang Sumei, Pan Ke, Xie Jun, Wang Yun, Zhang Tao
Issue Date:December 2010
pp. 247-250
The research on on-line measurement and prediction technology for vehicle motion state is developed in view of shortage that the existing active safety warning systems, which focus on monitoring and warning, lack prediction process for vehicle motion state...
 
A Factor-Based Model for Context-Sensitive Skill Rating Systems
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Lei Zhang, Jun Wu, Zhong-Cun Wang, Chong-Jun Wang
Issue Date:October 2010
pp. 249-255
Estimating agent’s skill ratings from team competition results has many applications in the real world. Existing models assume skills are the same for all contexts. However, skills are context-sensitive in a variety of cases. In this paper, we present a Fa...
 
Multi-relational Topic Model for Social Recommendation
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Lei Zhang, Jun Wu, Zhong-Cun Wang, Chong-Jun Wang
Issue Date:October 2010
pp. 349-350
Various attribute and relation information is used in social recommendation systems. However, previous approaches fail to use them in a unified way. In this paper, we propose a unified framework for social recommendation. Entities like users and items are ...
 
TeraScaler ELB-an Algorithm of Prediction-Based Elastic Load Balancing Resource Management in Cloud Computing
Found in: 2013 Workshops of International Conference on Advanced Information Networking and Applications (WAINA)
By He-Sheng Wu,Chong-Jun Wang,Jun-Yuan Xie
Issue Date:March 2013
pp. 649-654
Load balancing is the core of virtual resource management and scheduling in cloud computing. For network applications, the cost of user would be greatly saved if load balancer could dynamically adjust cluster resources in accordance with the current applie...
 
Symbolic Dynamics Analysis of Pathological Signals
Found in: Complexity and Data Mining, International Workshop on
By Jun Wang,Jun Wu
Issue Date:September 2011
pp. 129-132
Paper uses symbolic dynamics to study heartbeat time series from the normal subjects, patients with congestive heart failure and cardiac arrest patients. The results show that entropy value of normal people's heart beat signals is the maximum. Information ...
 
An Inframarginal Analysis Based Resource Allocation Method in Volunteer Computing
Found in: International Symposium on Distributed Computing and Applications to Business, Engineering and Science
By Liu Jun, Wang En Ze, Qiao Jian Zhong, Lin Shu Kuan, Liu Jun, Qiao Jian Zhong
Issue Date:August 2010
pp. 27-31
The key of volunteer computing is to fully utilize computing resources. However, the efficiency of volunteer computing can always be affected by volatility of available nodes and uncertainty of network environment. In order to enhance resource allocation e...
 
3D Simulation for Vehicle Maneuvering along Path Accurately
Found in: MEMS, NANO, and Smart Systems, International Conference on
By Yue Zhang, Jun Wang, Huifang Lv, Fan Jiang, Gang Chen
Issue Date:December 2009
pp. 149-153
Aiming at the simulation problem of vehicle maneuvering along path accurately, simulation framework including motion control module, viewpoint control module, collision detection module, path-maneuver module and special effect module is firstly presented a...
 
Cluster Ensemble Based on Particle Swarm Optimization
Found in: Intelligent Systems, WRI Global Congress on
By Li-ying Yang, Jun-ying Zhang, Wen-jun Wang
Issue Date:May 2009
pp. 519-523
Motivated by the success of ensemble methods in supervised learning problem, cluster ensembles have started to gain an increasing interest. Since the absence of labeled training data, cluster ensemble is a more challenging task than multiple classifiers sy...
 
A System Platform Design of Travelling Wave Dielectrophoresis Microchip Based on SOPC
Found in: Computer Science and Software Engineering, International Conference on
By Honghua Liao,Jun Yu,Jun Wang,Jianjun Chen,Honghua Liao,Yu Liao,Jinqiao Yi
Issue Date:December 2008
pp. 66-69
This paper presents a control and acquisition platform design method of travelling wave dielectrophoresis microchip based on SOPC technique. The Direct Digital Frequency Synthesis (DDS) modeling is built by using the Digital Signal Processing (DSP) develop...
 
A Control and Acquisition System Design of Low-voltage Electrophoresis MicroChip Based on SOPC and DDS
Found in: Embedded Software and Systems, Second International Conference on
By Honghua Liao, Jun Yu, Jun Wang, Jianjun Chen, Yu Liao, Jinqiao Yi
Issue Date:July 2008
pp. 251-257
This paper presents a method to control and acquire the conductivity signal of low-voltage capillary electrophoresis microchip based on SOPC and DDS techniques. The soft-core processor with RISC framework, NIOS II, acts as the core component. Under the con...
 
Research of Software Reliability Based on Synthetic Architecture
Found in: Computational Intelligence and Security, International Conference on
By Jun Wang, Jun Liu, Weiru Chen
Issue Date:December 2007
pp. 785-788
In this paper we introduce some typical architecture-based software reliability model for software architecture reliability estimation, and modify model of software reliability estimation so that to improve precision of estimating software architecture rel...
 
A Modeling of Software Architecture Reliability
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Jun Wang, Weiru Chen, Jun Liu
Issue Date:September 2007
pp. 983-986
This paper introduces software architecture reliability estimation and some typical software reliability model based architecture. We modify model of software reliability estimation so that to improve precision of estimating software architecture reliabili...
 
Study on Group Decision Making of Intelligent Traffic Control System
Found in: Innovative Computing ,Information and Control, International Conference on
By Yin Zhu, Jun Ma, Junli Wang, Xuejun Niu
Issue Date:September 2007
pp. 618
This paper introduces a group decision making of intelligent traffic control system based on multi-agent technique, in order to meet the urban traffic management actual demands of China. The model is designed to realize that several urban traffic managers ...
 
Developing a Decision Support Model for Information Systems Outsourcing
Found in: Innovative Computing ,Information and Control, International Conference on
By Jian-Jun Wang, Hui-Fen Li, Xin-Jun Diao, De-Li Yang
Issue Date:September 2007
pp. 533
Information systems (IS) outsourcing is a complicated system decision problem that is often faced by the decision makers involved in the planning process. There is a few of literature that addresses the IS outsourcing decision making process in a quantitat...
 
Illumination Invariant Face Recognition Based on Neural Network Ensemble
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Wu-Jun Li, Chong-Jun Wang, Dian-Xiang Xu, Shi-Fu Chen
Issue Date:November 2004
pp. 486-490
An illumination invariant face recognition method based on neural network ensemble architecture is proposed. Given a face image with an arbitrary illumination direction, it can complete recognition in a uniform way with high performance without knowing or ...
 
Joint-aware manipulation of deformable models
Found in: ACM Transactions on Graphics (TOG)
By Baining Guo, Falai Chen, Jun Wang, KangKang Yin, Kun Zhou, Michiel van de Panne, Weiwei Xu, Baining Guo, Falai Chen, Jun Wang, KangKang Yin, Kun Zhou, Michiel van de Panne, Weiwei Xu, Baining Guo, Falai Chen, Jun Wang, KangKang Yin, Kun Zhou, Michiel van de Panne, Weiwei Xu, Baining Guo, Falai Chen, Jun Wang, KangKang Yin, Kun Zhou, Michiel van de Panne, Weiwei Xu
Issue Date:July 2009
pp. 1-2
Complex mesh models of man-made objects often consist of multiple components connected by various types of joints. We propose a joint-aware deformation framework that supports the direct manipulation of an arbitrary mix of rigid and deformable components. ...
     
Intelligent Load Balancing Strategies for Complex Distributed Simulation Applications
Found in: Computational Intelligence and Security, International Conference on
By Jun Wang, Jian-wen Chen, Yong-liang Wang, Di Zheng
Issue Date:December 2009
pp. 182-186
With the rapid development of computer simulation technology, the Radar simulation applications scale up increasingly. More and more Radar simulation applications adopt distributed structure to improve system performance and availability. Hence, how to enh...
 
Research for a Dynamic Recurrent Fuzzy Wavelet Network
Found in: Intelligent Systems Design and Applications, International Conference on
By Zhigang Wang, Hong Peng, Jun Wang
Issue Date:October 2006
pp. 914-918
This paper proposes a dynamic recurrent fuzzy wavelet network (DRFWN) for identified nonlinear dynamic systems. Temporary relations are embedded in the network by adding feedback connections in the second layer of the fuzzy wavelet network. In addition, th...
 
Design Methods of Multi-DSP Parallel Processing System
Found in: Computer Science and Information Engineering, World Congress on
By Wei Wu, Jun Wang, Wei Li, Wenhao Zhang
Issue Date:April 2009
pp. 458-464
In this paper, the cascaded topology of Multi-Digital Signal Processor (DSP) parallel processing system is presented, and the common architecture for multi-DSP parallel systems is summarized. In addition, according to the features of Field Programmable Gat...
 
The Innovative Study of the Theory and Application of a Kind of Management Based on Contract
Found in: Convergence Information Technology, International Conference on
By Qing-hui Cheng, Meng-jun Wang
Issue Date:November 2008
pp. 1025-1030
According to the need and development of the practice of project management the article proposes a new concept of management based on contract at first time, and sets up a conceptual model for it. What's more, it expresses??a detailed??exposition of the co...
 
Real-Time Face Recognition Using Adaptive Skin-Color Model
Found in: Information Science and Applications, International Conference on
By Chang-shuai Wang, Yeum-cheul Jeung, Lin-bo Luo, Jun Wang, Jong-wha Chong
Issue Date:April 2011
pp. 1-6
In a real-time face recognition system, complex background that occurs in an image or video can degrade the accuracy of both face detection and recognition due to the uncontrolled environment. However, few studies have been proposed to address this issue. ...
 
Experimental Study on the Performance of an Air-Fed Indirect Non-Thermal Plasma System of DBD Type
Found in: Asia-Pacific Power and Energy Engineering Conference
By Wenhe Han, Yixi Cai, Jun Wang, Jing Wang, Chuanhong Sun
Issue Date:March 2011
pp. 1-4
NA
 
SAR Imaging of Moving Targets via Compressive Sensing
Found in: Electrical and Control Engineering, International Conference on
By Jun Wang, Gang Li, Yimin Liu, Xiqin Wang
Issue Date:June 2010
pp. 1855-1858
An algorithm based on compressive sensing (CS) is proposed for synthetic aperture radar (SAR) imaging of moving targets. The received echo is decomposed into the sum of many basis sub-signals that are generated by discretizing the target spatial domain and...
 
Exploring Patient Risk Groups with Incomplete Knowledge
Found in: 2013 IEEE International Conference on Data Mining (ICDM)
By Xiang Wang,Fei Wang,Jun Wang,Buyue Qian,Jianying Hu
Issue Date:December 2013
pp. 1223-1228
Patient risk stratification, which aims to stratify a patient cohort into a set of homogeneous groups according to some risk evaluation criteria, is an important task in modern medical informatics. Good risk stratification is the key to good personalized c...
 
Study on the Deformation Features of the Controlling Crack T10 at the Back Edge of Wangxia Dangerous Rock Area in Wushan County
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Wang Hong-De,Le Qi-Lang,Gao You-Long,Xue Xing-Qiao,Jin Xiao-Hao,Wang Ai-Jun,Wang Gao-Feng
Issue Date:January 2013
pp. 1358-1363
In August 2010, serious deformation occurred in the Wangxia dangerous rock mass. It formed a large dangerous factor for the local resident and channel safety. Based on the detailed investigation of the crack, deformation history, GPS observations and crack...
 
Design of a Quadruple Precision Floating-Point Fused Multiply-Add Unit Based on 4-Way SIMD Device
Found in: 2013 IEEE 8th International Conference on Networking, Architecture, and Storage (NAS)
By He Jun,Wang Biao,Zhu Ying
Issue Date:July 2013
pp. 267-271
Aiming to decrease the hardware cost of floating-point quadruple precision fused multiply-add (QPFMA) unit, a new QPFMA unit is designed and realized based on a 4-way SIMD device, which supports 64-bit×4 floating-point double precision fused multiply-add (...
 
An Optimized GP-GPU Warp Scheduling Algorithm for Sparse Matrix-Vector Multiplication
Found in: 2013 IEEE 8th International Conference on Networking, Architecture, and Storage (NAS)
By Lifeng Liu,Meilin Liu,Chong-Jun Wang
Issue Date:July 2013
pp. 222-231
GP-GPUs have been used as the platform for many applications due to their powerful computation ability and massively parallel features. In this paper, we first investigate the CSR sparse matrix format, the performance of existing optimized SpMV (Sparse mat...
 
Supporting HPC Analytics Applications with Access Patterns Using Data Restructuring and Data-Centric Scheduling Techniques in MapReduce
Found in: IEEE Transactions on Parallel and Distributed Systems
By Saba Sehrish,Grant Mackey,Pengju Shang,Jun Wang,John Bent
Issue Date:January 2013
pp. 158-169
Current High Performance Computing (HPC) applications have seen an explosive growth in the size of data in recent years. Many application scientists have initiated efforts to integrate data-intensive computing into computational-intensive HPC facilities, p...
 
Evaluation of Quality Measure Factors for the Middleware Based Context-Aware Applications
Found in: Computer and Information Science, ACIS International Conference on
By Di Zheng,Jun Wang,Ben Kerong
Issue Date:June 2012
pp. 403-408
With the rapid development of the information technology, it is inevitable that the distributed mobile computing will evolve to the pervasive computing gradually whose final goal is fusing the information space composed of computers with the physical space...
 
Dynamic Modeling of Pressure Pipelines and Signal Reconstruction
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Yang Jun,Wang Yufang,Li Cheng
Issue Date:October 2011
pp. 78-81
In order to improve the dynamic pressure measurement's accuracy with pressure pipelines, the dynamic modeling of equal diameter pressure pipelines and signal reconstruction were studied. Through the theoretic analysis, dynamic calibration with SPG and para...
 
TRAID: Exploiting Temporal Redundancy and Spatial Redundancy to Boost Transaction Processing Systems Performance
Found in: IEEE Transactions on Computers
By Pengju Shang,Saba Sehrish,Jun Wang
Issue Date:April 2012
pp. 517-529
In the past few years, more storage system applications have employed transaction processing techniques to ensure data integrity and consistency. Logging is one of the key requirements to ensure transaction Atomicity, Consistency, Isolation, Durability (AC...
 
LED Lighting Control System Based on the Zigbee Wireless Network
Found in: Digital Manufacturing and Automation, International Conference on
By Yin Jun, Wang Wei
Issue Date:December 2010
pp. 892-895
A method of LED intelligent lighting control based on Zigbee wireless communication technology is introduced in this paper, and the specific design scheme is presented. The system can achieve normal PWM dimming, timing dimming, self-adaptive dimming and ot...
 
An Inframarginal Analysis Based Resource Allocation Method in Distributed Computing
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Liu Jun, Wang En Ze, Qiao Jian Zhong, Lin Shu Kuan
Issue Date:September 2010
pp. 220-223
the key of distributed computing is to fully utilize computing resources. However, the efficiency of distributed computing can always be affected by volatility of available nodes and uncertainty of network environment. In order to enhance resource allocati...
 
Neurodynamic optimization and its applications for winners-take-all
Found in: Computer Science and Information Technology, International Conference on
By Jun Wang
Issue Date:August 2009
pp. 21
Optimization problems arise in a wide variety of scientific and engineering applications. It is computationally challenging when optimization procedures have to be performed in real time to optimize the performance of dynamical systems. For such applicatio...
 
Research on 3D Equipment Operation Simulation Training System
Found in: Information Management and Engineering, International Conference on
By Yue Zhang, Jun Wang, Huifang Lv, Fan Jiang, Gang Chen
Issue Date:April 2009
pp. 564-568
3D equipment operation simulation training system (3D-EOSTS) for solving difficult training problem is presented. System building based on 3D modeling can greatly improve the efficiency for the troop’s daily training.
 
An advanced hybrid image codec for frame memory reduction in LCD overdrive
Found in: Computers in Education, International Conference on
By Jun Wang, Kyeongyuk Min, Jongwha Chong
Issue Date:January 2009
pp. 1-2
This paper presents an advanced hybrid image codec (AHIC) for frame memory reduction in LCD overdrive to eliminate motion blur. The AHIC can reduce frame memory to 1/6 with the PSNR of 35.268dB. It also applies a novel architecture to reduce the line buffe...
 
Study on the Intelligent Pre-Control Model of Urban Arterial
Found in: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE
By Yin Zhu, Junli Wang, Huapu Lu
Issue Date:December 2008
pp. 114-118
This paper introduces an intelligent pre- control model of urban arterial which is the key problem of the urban traffic, especially in China. This study investigates the effects of speed control on traffic flow processes and develops a pre- control strateg...
 
Traffic Accident Cause Analysis Method Based on Knowledge Acquisition Model
Found in: Knowledge Acquisition and Modeling, International Symposium on
By Yin Zhu, Junli Wang, Huapu Lu
Issue Date:December 2008
pp. 131-135
This paper presents the knowledge acquisition model of traffic accident cause analysis method from the point of structured information. Moreover, this paper introduces the modified knowledge acquisition model based on relative rough set theory, which can o...
 
Analysis and Construction of the Cluster Innovation System's Dynamical Structure Model
Found in: Computer Science and Software Engineering, International Conference on
By Ying Zheng, Xue-jun Wang, Xiao-jian Li
Issue Date:December 2008
pp. 645-648
Applying the theories of Innovation and System Dynamics, We analysis quantitatively and research the element structures, functions and dynamical mechanism of the Cluster Innovation System by means of setting up the Cluster Innovation System’s dynamical str...
 
A New Hierarchical Data Cache Architecture for iSCSI Storage Server
Found in: IEEE Transactions on Computers
By Jun Wang, Xiaoyu Yao, Christopher Mitchell, Peng Gu
Issue Date:April 2009
pp. 433-447
With the emergence of data-intensive applications, recent years have seen a fast-growing volume of I/O traffic propagated through the local I/O interconnect bus. This raises up a question for storage servers on how to resolve such a potential bottleneck. I...
 
Applications of Bloom Filters in Peer-to-peer Systems: Issues and Questions
Found in: Networking, Architecture, and Storage, International Conference on
By Hailong Cai, Ping Ge, Jun Wang
Issue Date:June 2008
pp. 97-103
Bloom filter is a widely-used data structure that concisely represents a large set of contents for approximate membership queries. Due to its good space efficiency, Bloom filter has been applied or customized in a variety of P2P system designs in the recen...
 
Energy-efficient high-performance storage system
Found in: Parallel and Distributed Processing Symposium, International
By Jun Wang
Issue Date:April 2008
pp. 1-5
This project is developing extended versions of RAIDs with low-power, and exploring novel energy-efficient disk array architectures using coding techniques for data intensive computing.
 
Extending the Security Assertion Markup Language to Support Delegation for Web Services and Grid Services
Found in: Web Services, IEEE International Conference on
By Jun Wang, David Del Vecchio, Marty Humphrey
Issue Date:July 2005
pp. 67-74
Users of Web and Grid Services often must temporarily delegate some or all of their rights to a software entity to perform actions on their behalf. The problem with the typical Grid Services approach (X.509 proxy certificates) is that commercial Web Servic...
 
Fast Pairwise Query Selection for Large-Scale Active Learning to Rank
Found in: 2013 IEEE International Conference on Data Mining (ICDM)
By Buyue Qian,Xiang Wang,Jun Wang,Hongfei Li,Nan Cao,Weifeng Zhi,Ian Davidson
Issue Date:December 2013
pp. 607-616
Pair wise learning to rank algorithms (such as Rank SVM) teach a machine how to rank objects given a collection of ordered object pairs. However, their accuracy is highly dependent on the abundance of training data. To address this limitation and reduce an...
 
 1  2 Next >>