Search For:

Displaying 1-50 out of 115 total
Modeling and Simulation of an Adaptive Neuro-Fuzzy Inference System (ANFIS) for Mobile Learning
Found in: IEEE Transactions on Learning Technologies
By Ahmed Al-Hmouz, Jun Shen,R. Al-Hmouz, Jun Yan
Issue Date:July 2012
pp. 226-237
With recent advances in mobile learning (m-learning), it is becoming possible for learning activities to occur everywhere. The learner model presented in our earlier work was partitioned into smaller elements in the form of learner profiles, which collecti...
 
Analyzing Fault-Impact Region of Composite Service for Supporting Fault Handling Process
Found in: Services Computing, IEEE International Conference on
By Azlan Ismail,Jun Yan,Jun Shen
Issue Date:July 2011
pp. 290-297
A fault situation occurs to a service needs to be well analyzed and handled in order to ensure the reliability of composite service. The analysis can be driven by understanding the impact caused by the faulty service on the other services as well as the en...
 
Modeling Mobile Learning System Using ANFIS
Found in: Advanced Learning Technologies, IEEE International Conference on
By Ahmed Al-Hmouz,Jun Shen,Jun Yan,Rami Al-Hmouz
Issue Date:July 2011
pp. 378-380
Personalisation is becoming more important in the area of mobile learning. Learner model is logically partitioned into smaller elements or classes in the form of learner profiles, which can represent the entire learning process. Machine learning techniques...
 
Dynamic Service Selection for Service Composition with Time Constraints
Found in: Software Engineering Conference, Australian
By Azlan Ismail, Jun Yan, Jun Shen
Issue Date:April 2009
pp. 183-190
Service selection is a kind of planning approach that evaluates and selects from multiple services to form a composite plan. In service selection, we found one additional issue that has not been investigated yet namely time constraints consistency among co...
 
A Practical Geographic Ontology for Spatial Web Services
Found in: Services Computing, IEEE International Conference on
By Shuai Yuan, Jun Shen, Jun Yan
Issue Date:July 2008
pp. 579-580
The application of ontology in Web services context for dynamic discovery, autonomous composition, invocation and monitoring has been deemed as very promising in semantic Web based enterprise application integration and m-commerce. There are many initiativ...
 
SwinDeW-S: Extending P2P Workflow Systems for Adaptive Composite Web Services
Found in: Software Engineering Conference, Australian
By Jun Shen, Jun Yan, Yun Yang
Issue Date:April 2006
pp. 61-69
SwinDeW, an innovative decentralised workflow management system, has established an underlying framework for peer-to-peer (p2p) based business process coordination environments. SwinDeW-S extends SwinDeW to support adaptive composite service orchestration ...
 
Multiple clustered instance learning for histopathology cancer image classification, segmentation and clustering
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Yan Xu, Jun-Yan Zhu,E. Chang, Zhuowen Tu
Issue Date:June 2012
pp. 964-971
Cancer tissues in histopathology images exhibit abnormal patterns; it is of great clinical importance to label a histopathology image as having cancerous regions or not and perform the corresponding image segmentation. However, the detailed annotation of c...
 
Cross Domain Random Walk for Query Intent Pattern Mining from Search Engine Log
Found in: Data Mining, IEEE International Conference on
By Siyu Gu,Jun Yan,Lei Ji,Shuicheng Yan,Junshi Huang,Ning Liu,Ying Chen,Zheng Chen
Issue Date:December 2011
pp. 221-230
Understanding search intents of users through their condensed short queries has attracted much attention both in academia and industry. The search intents of users are generally assumed to be associated with various query patterns, such as
 
A Novel Contrast Co-learning Framework for Generating High Quality Training Data
Found in: Data Mining, IEEE International Conference on
By Zeyu Zheng, Jun Yan, Shuicheng Yan, Ning Liu, Zheng Chen, Ming Zhang
Issue Date:December 2010
pp. 649-658
The good performances of most classical learning algorithms are generally founded on high quality training data, which are clean and unbiased. The availability of such data is however becoming much harder than ever in many real world problems due to the di...
 
Trace-Oriented Feature Analysis for Large-Scale Text Data Dimension Reduction
Found in: IEEE Transactions on Knowledge and Data Engineering
By Jun Yan, Ning Liu, Shuicheng Yan, Qiang Yang, Weiguo (Patrick) Fan, Wei Wei, Zheng Chen
Issue Date:July 2011
pp. 1103-1117
Dimension reduction for large-scale text data is attracting much attention nowadays due to the rapid growth of the World Wide Web. We can categorize those popular dimension reduction algorithms into two groups: feature extraction and feature selection algo...
 
Synthesizing Novel Dimension Reduction Algorithms in Matrix Trace Oriented Optimization Framework
Found in: Data Mining, IEEE International Conference on
By Jun Yan, Ning Liu, Shuicheng Yan, Qiang Yang, Zheng Chen
Issue Date:December 2009
pp. 598-606
Dimension Reduction (DR) algorithms are generally categorized into feature extraction and feature selection algorithms. In the past, few works have been done to contrast and unify the two algorithm categories. In this work, we introduce a matrix trace orie...
 
Unified Solution to Nonnegative Data Factorization Problems
Found in: Data Mining, IEEE International Conference on
By Xiaobai Liu, Shuicheng Yan, Jun Yan, Hai Jin
Issue Date:December 2009
pp. 307-316
In this paper, we restudy the non-convex data factorization problems (regularized or not, unsupervised or supervised), where the optimization is confined in the \emph{nonnegative} orthant, and provide a \emph{unified} convergency provable solution based on...
 
Learning the Latent Semantic Space for Ranking in Text Retrieval
Found in: Data Mining, IEEE International Conference on
By Jun Yan, Shuicheng Yan, Ning Liu, Zheng Chen
Issue Date:December 2008
pp. 1115-1120
Subspace learning techniques for text analysis, such as Latent Semantic Indexing (LSI), have been widely studied in the past decade. However, to our best knowledge, no previous study has leveraged the rank information for subspace learning in ranking tasks...
 
TransRank: A Novel Algorithm for Transfer of Rank Learning
Found in: Data Mining Workshops, International Conference on
By Depin Chen, Jun Yan, Gang Wang, Yan Xiong, Weiguo Fan, Zheng Chen
Issue Date:December 2008
pp. 106-115
Recently, learning to rank technique has attracted much attention. However, the lack of labeled training data seriously limits its application in real-world tasks. In this paper, we propose to break this bottleneck by considering the cross-domain “transfer...
 
Web Query Prediction by Unifying Model
Found in: Data Mining Workshops, International Conference on
By Ning Liu, Jun Yan, Shuicheng Yan, Weiguo Fan, Zheng Chen
Issue Date:December 2008
pp. 436-441
Recently, many commercial products, such as Google Trends and Yahoo! Buzz, are released to monitor the past search engine query frequency trend. However, little research has been devoted for predicting the upcoming query trend, which is of great importance...
 
Local Word Bag Model for Text Categorization
Found in: Data Mining, IEEE International Conference on
By Wen Pu, Ning Liu, Shuicheng Yan, Jun Yan, Kunqing Xie, Zheng Chen
Issue Date:October 2007
pp. 625-630
Many text processing applications adopted the Bag of Words (BOW) model representation of documents, in which each document is represented as a vector of weighted terms or n-grams, and then cosine distance between two vectors is used as the similarity measu...
 
An Enhancement Dynamic Contract Net Protocol
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Zhao-Wen Wei, Jun-Yan Yan, Yun-Peng Ou
Issue Date:August 2007
pp. 475-480
In the paper, we do some enhancement based on DCNP. In the EDCNP, we improved the credibility update rules and lead credibility range[min, max] and the volatilization into the algorithm. In this way we can reduce the amount of calculating and improve the s...
 
A Novel Scalable Algorithm for Supervised Subspace Learning
Found in: Data Mining, IEEE International Conference on
By Jun Yan, Ning Liu, Benyu Zhang, Qiang Yang, Shuicheng Yan, Zheng Chen
Issue Date:December 2006
pp. 721-730
Subspace learning approaches aim to discover important statistical distribution on lower dimensions for high dimensional data. Methods such as Principal Component Analysis (PCA) do not make use of the class information, and Linear Discriminant Analysis (LD...
 
Effective and Efficient Dimensionality Reduction for Large-Scale and Streaming Data Preprocessing
Found in: IEEE Transactions on Knowledge and Data Engineering
By Jun Yan, Benyu Zhang, Ning Liu, Shuicheng Yan, Qiansheng Cheng, Weiguo Fan, Qiang Yang, Wensi Xi, Zheng Chen
Issue Date:March 2006
pp. 320-333
Dimensionality reduction is an essential data preprocessing technique for large-scale and streaming data classification tasks. It can be used to improve both the efficiency and the effectiveness of classifiers. Traditional dimensionality reduction approach...
 
Mining Ratio Rules Via Principal Sparse Non-Negative Matrix Factorization
Found in: Data Mining, IEEE International Conference on
By Chenyong Hu, Benyu Zhang, Shuicheng Yan, Qiang Yang, Jun Yan, Zheng Chen, Wei-Ying Ma
Issue Date:November 2004
pp. 407-410
Association rules are traditionally designed to capture statistical relationship among itemsets in a given database. To additionally capture the quantitative association knowledge, F.Korn et al recently proposed a paradigm named Ratio Rules for quantifiabl...
 
Time-Predictable L2 Cache Design for High-Performance Real-Time Systems
Found in: Real-Time Computing Systems and Applications, International Workshop on
By Jun Yan, Wei Zhang
Issue Date:August 2010
pp. 357-366
Unified L2 caches can lead to runtime interferences between instructions and data, making it very hard, if not impossible, to perform timing analysis for real-time systems. This paper proposes a priority cache to achieve both time predictability and high p...
 
Research on Dynamic Simulation of Remotely-Operated Weapon Stations Servo Control System
Found in: Intelligent Computation Technology and Automation, International Conference on
By Bao-quan Mao, Jun-yan Zhao, Zhen-hui Xu, Li Xu
Issue Date:May 2010
pp. 1150-1153
The structure composition of the Machine Gun Remotely-Operated Weapon Stations servo control system was analyzed, and servo system was simplified and model was assumed. The virtual prototype model was set up by means of ADAMS software package, and servo sy...
 
Study on the Deformation and Safety in the Process of Shallow Buried Tunnel Construction
Found in: Engineering Computation, International Conference on
By Jian-Hua Hu, Xi-Jun Yan, Ke-Ping Zhou, Li-Hong He
Issue Date:May 2009
pp. 123-126
The surrounding soil mass were disturbed by the construction of urban shallow buried tunnel, and the ground traffic and architectures were also influenced. Thus, research on the stratum deformation regularity of tunnel has a great positive significance. Ta...
 
Research on Oil Ferrography Analysis Fault Diagnosis of Diesel Engine Based on BP Neural Network
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Bin Zhang, Jun Yan, Hongliang Liu
Issue Date:December 2008
pp. 519-524
The principle of attrition pattern recognition was discussed based on the research of the engine's characteristic of wear particle and fault mechanism, establish the relationship between the wear particle and attrition pattern, the paper give a new method ...
 
WCET Analysis for Multi-Core Processors with Shared L2 Instruction Caches
Found in: Real-Time and Embedded Technology and Applications Symposium, IEEE
By Jun Yan, Wei Zhang
Issue Date:April 2008
pp. 80-89
Multi-core chips have been increasingly adopted by microprocessor industry. For real-time systems to safely harness the potential of multi-core computing, designers must be able to accurately obtain the worst-case execution time (WCET) of applications runn...
 
A co-learning framework for learning user search intents from rule-generated training data
Found in: Proceeding of the 33rd international ACM SIGIR conference on Research and development in information retrieval (SIGIR '10)
By Jun Yan, Li Jiang, Shuicheng Yan, Yan Li, Zeyu Zheng, Zheng Chen
Issue Date:July 2010
pp. 895-896
Learning to understand user search intents from their online behaviors is crucial for both Web search and online advertising. However, it is a challenging task to collect and label a sufficient amount of high quality training data for various user intents ...
     
Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yihai Zhu,Jun Yan,Yan Sun,Haibo He
Issue Date:March 2014
pp. 1
Security issues related to power grid networks have attracted the attention of researchers in many fields. Recently, a new network model that combines complex network theories with power flow models was proposed. This model, referred to as the extended mod...
 
Cascade: A Test Generation Tool for Combinatorial Testing
Found in: 2013 IEEE 6th International Conference On Software Testing, Verification and Validation Workshops (ICSTW)
By Yong Zhao,Zhiqiang Zhang,Jun Yan,Jian Zhang
Issue Date:March 2013
pp. 267-270
Combinatorial Testing (CT) is a black-box testing technique, which is used to test parameterized systems. Real applications often have some special testing requirements, especially parameter constraints. Our experimental results show that existing CT test ...
 
A Decentralized Service Discovery Approach on Peer-to-Peer Networks
Found in: IEEE Transactions on Services Computing
By Qiang He,Jun Yan,Yun Yang,Ryszard Kowalczyk,Hai Jin
Issue Date:January 2013
pp. 64-75
Service-Oriented Computing (SOC) is emerging as a paradigm for developing distributed applications. A critical issue of utilizing SOC is to have a scalable, reliable, and robust service discovery mechanism. However, traditional service discovery methods us...
 
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
Found in: IEEE Transactions on Parallel and Distributed Systems
By Jinguang Han,Willy Susilo,Yi Mu,Jun Yan
Issue Date:November 2012
pp. 2150-2162
Decentralized attribute-based encryption (ABE) is a variant of a multiauthority ABE scheme where each authority can issue secret keys to the user independently without any cooperation and a central authority. This is in contrast to the previous constructio...
 
An Effective Classification Method for BCI Based on Optimized SVM by GA
Found in: 2012 Third Global Congress on Intelligent Systems (GCIS)
By Xue Rong,Jun Yan,Hongxiang Guo,Beibei Yu
Issue Date:November 2012
pp. 3-6
This paper proposed an effective method for EEG data classification in a Brain-Computer Interfacing system. We use Principal Component Analysis for feature extracting, then use an optimized Support Vector Machine for classification. The SVM's parameters ar...
 
A Path-oriented Approach to Generating Executable Test Sequences for Extended Finite State Machines
Found in: 2012 Sixth International Symposium on Theoretical Aspects of Software Engineering (TASE)
By Tianyong Wu,Jun Yan,Jian Zhang
Issue Date:July 2012
pp. 267-270
The Extended Finite State Machine (EFSM) is a commonly used model for specifying software systems. A test sequence for an EFSM is a sequence composed of values of input variables, which can make the EFSM "execute" along a complete path from entry...
 
Unsupervised object class discovery via saliency-guided multiple class learning
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Jun-Yan Zhu, Jiajun Wu, Yichen Wei,Eric Chang, Zhuowen Tu
Issue Date:June 2012
pp. 3218-3225
Discovering object classes from images in a fully unsupervised way is an intrinsically ambiguous task; saliency detection approaches however ease the burden on unsupervised learning. We develop an algorithm for simultaneously localizing objects and discove...
 
Privacy-Preserved Access Control for Cloud Computing
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Miao Zhou,Yi Mu,Willy Susilo,Man Ho Au,Jun Yan
Issue Date:November 2011
pp. 83-90
The problem of access control on outsourced data to
 
Constructing a Cloud-Centric Service Assurance Platform for Computing as a Service
Found in: Cyber-Enabled Distributed Computing and Knowledge Discovery, International Conference on
By Jun-Yan Hu,Chun-Hung Wu,Chia-Chen Chu,Kuan-Hsiung Liang,Hey-Chyi Young,Yung-Yi Hsu,Chung-Hua Hu,Huan-Guo Lin
Issue Date:October 2011
pp. 139-145
As the cloud market is growing fast and more and more enterprises are moving their services to the cloud, assurance of cloud service quality becomes one of the key success factors of cloud business. Due to the dynamic nature of the cloud, it's more complic...
 
Web Service Selection Based on Similarity Evaluation
Found in: Services Computing, IEEE International Conference on
By Hao Gao,Jun Yan,Yi Mu
Issue Date:July 2011
pp. 322-329
Non-functional property is of paramount importance for Web services to function. However, service selection with consideration of Quality of Service is a challenge. This paper presents an approach to service selection by measuring the similarity between th...
 
A Rapid Method to Evaluate Triangular Patterns in Ultra-Low Permeability Fault-Block Oilfields
Found in: Asia-Pacific Power and Energy Engineering Conference
By Ya-dong Qi, Qun Lei, Zheng-ming Yang, Rong-ze Yu, Jun Yan, Ying Luo, Peng Yang
Issue Date:March 2011
pp. 1-4
NA
 
The Environmental Protection Methods for Vacuum Preloading Project
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Jun Yan, Xiaolei Zhang, Pengtao Wang, Xianbo Yang
Issue Date:February 2011
pp. 2289-2292
Vacuum preloading is one of the effective technologies for consolidating soft foundation. The consolidation mechanism of vacuum preloading is explained. Meanwhile, the computing methods of vacuum preloading are classified, the advantages and disadvantages ...
 
The Countermeasures for Fluvial Environmental Abnormal Variation
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Jun Yan, Xiaolei Zhang, Xiuyu Zhang, Xianbo Yang
Issue Date:February 2011
pp. 1858-1861
Unreasonable activities of mankind in water resources exploitation have deteriorated the natural environment, intensifying the conflicts between human beings and the nature. Environment and natural disasters have brought forward rigorous challenge on the s...
 
The Main Problems and Measures for the Utilization of Urban Rain-Flood
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Jun Yan, Changyou Jiang
Issue Date:February 2011
pp. 2331-2334
The acceleration of urbanization is making the problem of environment pollution and the resources deficient more and more serious, while the drought and water shortage, flood disaster, etc., baffle the urbanization in turn. By summing-up the status of the ...
 
Quantum Path Integral Inspired Query Sequence Suggestion for User Search Task Simplification
Found in: Data Mining Workshops, International Conference on
By Baojun Yue, Jun Yan, Heng Liang, Ning Liu, Lei Ji, Fengshan Bai, Zheng Chen
Issue Date:December 2010
pp. 647-654
Query suggestion algorithms, which aim to suggest a set of similar but independent queries to users, have been widely studied to simplify user searches. However, in many cases, the users will accomplish their search tasks through a sequence of search behav...
 
Combinatorial Testing with Shielding Parameters
Found in: Asia-Pacific Software Engineering Conference
By Baiqiang Chen, Jun Yan, Jian Zhang
Issue Date:December 2010
pp. 280-289
Combinatorial testing is an important approach to detecting interaction errors for a system with several parameters. Existing research in this area assumes that all parameters of the system under test are always effective. However, in many realistic applic...
 
A Network-aware Virtual Machine Placement and Migration Approach in Cloud Computing
Found in: Grid and Cloud Computing, International Conference on
By Jing Tai Piao, Jun Yan
Issue Date:November 2010
pp. 87-92
Cloud computing represents a major step up in computing whereby shared computation resources are provided on demand. In such a scenario, applications and data thereof can be hosted by various networked virtual machines (VMs). As applications, especially da...
 
Dynamic Trust Model for Federated Identity Management
Found in: Network and System Security, International Conference on
By Hao Gao, Jun Yan, Yi Mu
Issue Date:September 2010
pp. 55-61
The goal of federated identity management is to allow principals, such as identities and attributes, to be shared across trust boundaries based on established policies. Since current Single Sign-On (SSO) mechanism excessively relies on the specifications o...
 
Constructing an Authentication Token to Access External Services in Service Aggregation
Found in: Services Computing, IEEE International Conference on
By Peishun Wang, Yi Mu, Willy Susilo, Jun Yan
Issue Date:July 2010
pp. 321-328
Service aggregation is becoming a cost-effective and time-efficient way for a business to develop new applications and services. While it creates tremendous opportunities in various industry sectors, its cross-organization nature raises serious challenges ...
 
Obtaining Enterprise's Sustainable Competitive Advantage from eCRM
Found in: International Conference on E-Business and E-Government
By Feng Jun,Yan Yongcai
Issue Date:May 2010
pp. 3115-3118
In e-commerce era, successful strategic CRM is the basis for a sustainable and hard-to-imitate competitive advantage, however, how does electronic customer relation management (eCRM) help enterprises to obtain the competitive advantages? This paper just gi...
 
TSS: Efficient Term Set Search in Large Peer-to-Peer Textual Collections
Found in: IEEE Transactions on Computers
By Hanhua Chen, Jun Yan, Hai Jin, Yunhao Liu, Lionel M. Ni
Issue Date:July 2010
pp. 969-980
Previous multikeyword search in DHT-based P2P systems often relies on multiple single keyword search operations, suffering from unacceptable traffic cost and poor accuracy. Precomputing term-set-based index can significantly reduce the cost but needs expon...
 
Research on Network Simulation Abstract Technology Based on Simplicity Theory
Found in: Wireless Networks and Information Systems, International Conference on
By Jia Wang, Xiangzhan Yu, Jun Yan
Issue Date:December 2009
pp. 186-192
Given a large scale internet, how can we derive a representative simplifying topology model by network simulation? There are many known algorithms to compute interesting measures (scale down the number of clients, deletion methods, contraction methods, et ...
 
Accurately Estimating Worst-Case Execution Time for Multi-core Processors with Shared Direct-Mapped Instruction Caches
Found in: Real-Time Computing Systems and Applications, International Workshop on
By Wei Zhang, Jun Yan
Issue Date:August 2009
pp. 455-463
In a multi-core processor, different cores typically share the last-level cache, and threads running on different cores may interfere with each other in accessing the shared cache. Therefore, multi-core WCET (Worst-Case Execution Time) analyzer must be abl...
 
Optimization Way of Engineering Equipment Maintenance Based on Process Algebra
Found in: Services Science, Management and Engineering, IITA International Conference on
By Xiaonan Zhang, Anxin Liu, Jun Yan, Bin Liu, Hongliang Liu, Qingzheng Gao
Issue Date:July 2009
pp. 96-99
This paper presents a method of engineering equipment process optimization based on process algebra from the from the decision analysis perspective. In the new method, maintenance process described process algebra formula is presented and analyzed; then, t...
 
 1  2 Next >>