Search For:

Displaying 1-43 out of 43 total
Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks
Found in: IEEE Internet Computing
By Danesh Irani, Steve Webb, Calton Pu, Kang Li
Issue Date:May 2011
pp. 13-19
<p>Most people have multiple accounts on different social networks. Because these networks offer various levels of privacy protection, the weakest privacy policies in the social network ecosystem determine how much personal information is disclosed o...
 
Spatiotemporal mitosis event detection in time-lapse phase contrast microscopy image sequences
Found in: Multimedia and Expo, IEEE International Conference on
By Anan Liu, Kang Li, Takeo Kanade
Issue Date:July 2010
pp. 161-166
High-throughput automated analysis of cell population behaviors in vitro is of great importance to biological research. In particular, automated quantification of cellular mitosis in time-lapse microscopy video is useful for multiple applications such as t...
 
A Link Obfuscation Service to Detect Webbots
Found in: Services Computing, IEEE International Conference on
By Douglas Brewer, Kang Li, Laksmish Ramaswamy, Calton Pu
Issue Date:July 2010
pp. 433-440
Web bot fraud activity currently accounts for a large number of web accesses. Current resistance methods such as CAPTCHA are not applicable for bot detection at the granularity of each click. In this paper, we propose a service that counters web bots which...
 
Local Angle Extraction and Noise Attenuation for Seismic Image Using Contourlet Transform
Found in: Education Technology and Training & Geoscience and Remote Sensing
By Kang Li, Jinghuai Gao, Wei Wang, Yunbo Yang
Issue Date:December 2008
pp. 349-352
We propose contourlet-based algorithms to extract local angle from seismic migrated images and attenuate seismic noise. Steerable pyramid and projection-filter-based complex wavelet transform have been used to extract seismic local angle, while curvelet tr...
 
Parallel Algorithms for Motion Panorama Construction
Found in: Parallel Processing Workshops, International Conference on
By Yong Wei, Hongyu Wang, Suchendra M. Bhandarkar, Kang Li
Issue Date:August 2006
pp. 82-92
A motion panorama is an efficient and compact representation of the underlying video. However, the motion panorama construction process is computationally intensive and hence extremely time consuming. Addressing this issue is crucial when one considers usi...
 
Online Tracking of Migrating and Proliferating Cells Imaged with Phase-Contrast Microscopy
Found in: Computer Vision and Pattern Recognition Workshop
By Kang Li, Eric D. Miller, Lee E. Weiss, Phil G. Campbell, Takeo Kanade
Issue Date:June 2006
pp. 65
Automated visual-tracking of cell population in vitro using phase-contrast time-lapse microscopy is vital for the quantitative and systematic study of cell behaviors, including spatiotemporal quantification of migration, proliferation, and apoptosis. The l...
 
Towards an Ontology Driven Spam Filter
Found in: Data Engineering Workshops, 22nd International Conference on
By Douglas Brewer, Sujeeth Thirumalai, Karthik Gomadam, Kang Li
Issue Date:April 2006
pp. 79
Email's popularity has led to the increase in unsolicited mails. Currently spam filters use the structure and syntax of email body along with training methods to classify email as spam or ham. These include techniques such as word statistics and Bayesian f...
 
BAP Sparsing: A Novel Approach to MPEG-4 Body Animation Parameter Compression
Found in: Wireless Technologies/High Speed Networks/Multimedia Communications Systems/Sensor Networks, International Conference on
By Siddhartha Chattopadhyay, Suchendra M. Bhandarkar, Kang Li
Issue Date:August 2005
pp. 104-109
The MPEG-4 standard includes support not only for natural video and audio, but also for synthetic graphics and sounds. In the MPEG-4 specifications, Body Animation Parameters (BAPs) and Body Definition Parameters (BDPs) allow virtual bodies and their anima...
 
Study on Influence Factors of Crossing Railway Tunnel Excavation
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Kang Li-Peng,Shi Cheng-Hua,Lei Ming-Feng,Peng Li-Min
Issue Date:January 2013
pp. 1340-1344
In order to discuss the excavation influencing rule of crossing railway tunnel, 3 major influence factors including rock grade, cross angle and rock pillar height were taken into account, and 100 numerical models were designed for calculating, and then, th...
 
Learning, Analyzing and Predicting Object Roles on Dynamic Networks
Found in: 2013 IEEE International Conference on Data Mining (ICDM)
By Kang Li,Suxin Guo,Nan Du,Jing Gao,Aidong Zhang
Issue Date:December 2013
pp. 428-437
Dynamic networks are structures with objects and links between the objects that vary in time. Temporal information in dynamic networks can be used to reveal many important phenomena such as bursts of activities in social networks and human communication pa...
 
Parameter Estimation for Perspective Projection Based on Camera Calibration in Skull-Face Overlay
Found in: 2013 International Conference on Virtual Reality and Visualization (ICVRV)
By Wuxia Jin,Guohua Geng,Kang Li,Yi Han
Issue Date:September 2013
pp. 317-320
Craniofacial superimposition is a forensic process that aims to identify a missing person from a photograph and an unknown dead's skull. One of the crucial steps is skull-face overlay in consistent with photographic space according to the face photo. Thus ...
 
3D Skull Registration Based on Registration Points Automatic Correspondence
Found in: 2013 International Conference on Virtual Reality and Visualization (ICVRV)
By Hongqiang Du,Guohua Geng,Kang Li,Yiyue He
Issue Date:September 2013
pp. 293-296
Aiming at the precise 3D skull registration, ball volume integral invariants for multi-scale constraints is introduced to realize point correspondence between registration point sets of reference skull and that of target skull, a method of 3D skull registr...
 
Strategic Interaction in k-neighborhood on the Network Formation
Found in: 2012 Third Global Congress on Intelligent Systems (GCIS)
By Kang Li,Hong-Wei Gao,Gui-Rong Wang,Chun-Rui Chen,Ping Hu,Kun Wang
Issue Date:November 2012
pp. 369-372
In the context of endogenous network formation, we study strategic interaction among players within k-neighborhood. Based on the myopic best response rule, players choose action and establish links with other players by unilaterally investing in costly pai...
 
A link prediction based unsupervised rank aggregation algorithm for informative gene selection
Found in: 2012 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
By Kang Li,Nan Du,Aidong Zhang
Issue Date:October 2012
pp. 1-6
Informative Gene Selection is the process of identifying relevant genes that are significantly and differentially expressed in biological procedures. The microarray experiments conducted for this purpose usually implement only less than a hundred of sample...
 
Microprocessor Critical Design and Optimization
Found in: International Symposium on Distributed Computing and Applications to Business, Engineering and Science
By Jiangyi Shi,Honghu Gong,Hongye Jia,Kang Li
Issue Date:October 2011
pp. 347-349
In this paper a 32-bit multithreaded RISC microprocessor is designed and optimized to perform data moving and processing in the high-performance Network Processor which is flexible to a wide variety of networking, communications, and other data-intensive p...
 
Optimization of QDR SRAM Controller in Network Processor
Found in: Computational Intelligence and Design, International Symposium on
By Kang Li,Hongye Jia,Honghu Gong,Jiangyi Shi,Peijun Ma
Issue Date:October 2011
pp. 254-257
This paper presents a new architecture of shared QDR SRAM controller in the parallel processing of network processor to make the SRAM controller suitable for higher bandwidth and higher speed network communication. With line rate close to dozens of gigabit...
 
A Model for Tree Diameter Distribution in Stands Based on Artificial Neural Network
Found in: Intelligence Information Processing and Trusted Computing, International Symposium on
By Shuo Cai, Xin-gang Kang, Li-Xin Zhang, Zhi-wen Gong, Lei Qin, Ping-teng Chen
Issue Date:October 2010
pp. 332-336
We present a model using back-forward feed propagation method for tree diameter distribution in stand based on artificial neural network with three-tier management. This model is able to describe dynamics of diameter distribution in stands with high precis...
 
Puffer Characteristic Calculation of a Circuit Breaker Using Fluorocarbon Gas Mixture as an Arc Quenching Medium
Found in: Electrical and Control Engineering, International Conference on
By Kang Li, Weijun Xing, Guoqiang Zhang, Wenhao Niu, Xin Wang
Issue Date:June 2010
pp. 3994-3997
because of its high dielectric strength, good partial discharge capability, low global warming potential (GWP), none ozone depletion potential (ODP) and nontoxicity, fluorocarbon gas is possible substitute for SF6, and can be used hopefully in electrical e...
 
Speed Up Statistical Spam Filter by Approximation
Found in: IEEE Transactions on Computers
By Zhenyu Zhong, Kang Li
Issue Date:January 2011
pp. 120-134
Statistical-based Bayesian filters have become a popular and important defense against spam. However, despite their effectiveness, their greater processing overhead can prevent them from scaling well for enterprise level mail servers. For example, the dict...
 
Large Online Social Footprints--An Emerging Threat
Found in: Computational Science and Engineering, IEEE International Conference on
By Danesh Irani, Steve Webb, Kang Li, Calton Pu
Issue Date:August 2009
pp. 271-276
We study large online social footprints by collecting data on 13,990 active users. After parsing data from 10 of the 15 most popular social networking sites, we find that a user with one social network reveals an average of 4.3 personal information fields....
 
T-S Fuzzy Control of Uncertain Nonlinear Networked Control Systems
Found in: Advanced Computer Control, International Conference on
By Weihua Deng, Minrui Fei, Kang Li
Issue Date:January 2009
pp. 36-40
This paper investigates the stabilization of nonlinear networked control systems (NCSs) subject to two types of uncertainties. Firstly, the nonlinear NCS is modeled as a continuous-time Takagi-Sugeno (T-S) fuzzy system, and network-induced delays are repre...
 
Study of Multi-target Tracking and Data Association Based on Sequential Monte Carlo Algorithm
Found in: Future BioMedical Information Engineering, International Seminar on
By Fan Lin-bo, Kang Li, Wu Ying-cheng, Zhao Ming
Issue Date:December 2008
pp. 134-139
A new method based on sequential monte carlo algorithm is proposed for tracking multi-target and data association in non-linear system. The algorithm partitions the problem of multi-target tracking into two problems: single target tracking and data associa...
 
Particle Swarm Optimization for Calibrating Stream Water Quality Model
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Ke Wang, Xiaodong Wang, Jinshan Wang, Ganyun Lv, Minlan Jiang, Chuanhui Kang, Li Shen
Issue Date:December 2008
pp. 682-686
Parameter estimation of water quality model is generally obtained through the comparison of measured histories and model predictions of water bodies. In this paper, we present a new calibration tool of solving the parameter estimation problem by using part...
 
Adaptive Shrinkage for Image Denoising Based on Contourlet Transform
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Kang Li, Jinghuai Gao, Wei Wang
Issue Date:December 2008
pp. 995-999
We propose a new local adaptive shrinkage denoising approach based on the neighborhood characteristics of contourlet coefficients. Classical contourlet shrinkage denoising methods process the contourlet coefficients with a fixed threshold in each subband, ...
 
Structure-Adaptive Anisotropic Filter with Local Structure Tensors
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Wei Wang, Jinghuai Gao, Kang Li
Issue Date:December 2008
pp. 1005-1010
We propose a new structure-adaptive anisotropic filtering scheme based on the local structure tensor. We utilize the local structure tensor to measure image local anisotropic features and estimate the orientation of image structures, and these informations...
 
Image Denoising Based on Contourlet-Domain HMT Models Using Cycle Spinning
Found in: Computer Science and Software Engineering, International Conference on
By Kang Li, Wei Wang, Jinghuai Gao
Issue Date:December 2008
pp. 162-165
We propose a new method for image denoising based on contourlet-domain hidden Markov tree (CHMT) models, which have been recently introduced. CHMT models achieve superior denoising results over wavelet-domain HMT (WHMT) models in terms of visual quality. B...
 
Privacy-Aware Collaborative Spam Filtering
Found in: IEEE Transactions on Parallel and Distributed Systems
By Kang Li, Zhenyu Zhong, Lakshmish Ramaswamy
Issue Date:May 2009
pp. 725-739
While the concept of collaboration provides a natural defense against massive spam e-mails directed at large numbers of recipients, designing effective collaborative anti-spam systems raises several important research challenges. First and foremost, since ...
 
Human Motion Capture Data Compression by Model-Based Indexing: A Power Aware Approach
Found in: IEEE Transactions on Visualization and Computer Graphics
By Siddhartha Chattopadhyay, Suchendra M. Bhandarkar, Kang Li
Issue Date:January 2007
pp. 5-14
<p><b>Abstract</b>—Human Motion Capture (MoCap) data can be used for animation of virtual human-like characters in distributed virtual reality applications and networked games. MoCap data compressed using the standard MPEG-4 encoding pipe...
 
Laparoscopic Robot Design and Kinematic Validation
Found in: Robotics and Biomimetics, IEEE International Conference on
By YiLi Fu, Bo Pan, Kang Li, Shuguo Wang
Issue Date:December 2006
pp. 1426-1431
This paper presents a new laparoscopic robot for helping surgeon in minimally invasive surgery. Its links and joints designed as individual components are easy detached and maintained. In order to demonstrate the robot suitability to develop the task it ha...
 
Client-Centered, Energy-Efficient Wireless Communication on IEEE 802.11b Networks
Found in: IEEE Transactions on Mobile Computing
By Haijin Yan, Scott A. Watterson, David K. Lowenthal, Kang Li, Rupa Krishnan, Larry L. Peterson
Issue Date:November 2006
pp. 1575-1590
In mobile devices, the wireless network interface card (WNIC) consumes a significant portion of overall system energy. One way to reduce energy consumed by a device is to transition its WNIC to a lower-power sleep mode when data is not being received or tr...
 
Detailed Comparisons of Program, Erase and Data Retention Characteristics between P+- and N+-Poly SONOS NAND Flash Memory
Found in: Memory Technology, Design and Testin, IEEE International Workshop on
By Victor Chao-Wei Kuo, Chih-Ming Chao, Chih-Kai Kang, Li-Wei Liu, Tzung-Bin Huang, Liang-Tai Kuo, Shi-Hsien Chen, Houng-Chi Wei, Hann-Ping Hwang, Saysamone Pittikoun
Issue Date:August 2006
pp. 77-79
<p>In this paper, one of the future nonvolatile memory candidates, SONOS with p+-poly gate, has been fully characterized in cell program/erase operation and data retention performance. Novel source-side injection programming and F-N erase schemes hav...
 
Globally Optimal Segmentation of Interacting Surfaces with Geometric Constraints
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Kang Li, Xiaodong Wu, Danny Z. Chen, Milan Sonka
Issue Date:July 2004
pp. 394-399
Efficient detection of globally optimal surfaces representing object boundaries in volumetric datasets is important and remains challenging in many medical image analysis applications. We have developed an optimal surface detection method that is capable o...
 
A Digital Watermarking Algorithm Based on Image Segmentation and DFT
Found in: Information Science and Engineering, International Conference on
By Xiao Jun Kang, Li Jun Dong, Yun Wang
Issue Date:December 2009
pp. 1511-1514
This paper presents a watermarking algorithm based on image segmentation, in order to improve the security of the watermark, take the DFT algorithm to deal with the watermark process, also analyze the robustness of the algorithm we taken though the experim...
 
Affective state recognition from EEG with deep belief networks
Found in: 2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
By Kang Li,Xiaoyi Li,Yuan Zhang,Aidong Zhang
Issue Date:December 2013
pp. 305-310
With the ultimate intent of improving the quality of life, identification of human's affective states on the collected electroencephalogram (EEG) has attracted lots of attention recently. In this domain, the existing methods usually use only a few labeled ...
   
Prediction of Human Activity by Discovering Temporal Sequence Patterns
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Kang Li,Yun Fu
Issue Date:August 2014
pp. 1644-1657
Early prediction of ongoing human activity has become more valuable in a large variety of time-critical applications. To build an effective representation for prediction, human activities can be characterized by a complex temporal composition of constituen...
 
Critical protein detection in dynamic PPI networks with multi-source integrated deep belief nets
Found in: 2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
By Yuan Zhang,Nan Du,Kang Li,Jinchao Feng,Kebin Jia,Aidong Zhang
Issue Date:December 2013
pp. 29-36
Critical node detection in dynamic networks is of great value in many areas, such as the evolving of friendship in social networks, the development of epidemics, molecular pathogenesis of diseases and so on. As for detecting critical nodes in dynamic Prote...
   
Client-centered multimedia content adaptation
Found in: ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
By Kang Li, Suchendra M. Bhandarkar, Suchendra M. Bhandarkar, Yong Wei, Yong Wei
Issue Date:August 2009
pp. 1-26
The design and implementation of a client-centered multimedia content adaptation system suitable for a mobile environment comprising of resource-constrained handheld devices or clients is described. The primary contributions of this work are: (1) the overa...
     
FGS-MR: MPEG4 fine grained scalable multi-resolution layered video encoding
Found in: Proceedings of the 2006 international workshop on Network and operating systems support for digital audio and video (NOSSDAV '06)
By Kang Li, Siddhartha Chattopadhyay, Suchendra M. Bhandarkar
Issue Date:November 2006
pp. 1-1
The MPEG-4 Fine Grained Scalability (FGS) profile aims at scalable video encoding, in order to ensure efficient video streaming in networks with fluctuating bandwidth. In order to allow very low bit rate streaming, the Base Layer of an FGS video is encoded...
     
Fast statistical spam filter by approximate classifications
Found in: Proceedings of the joint international conference on Measurement and modeling of computer systems (SIGMETRICS '06/Performance '06)
By Kang Li, Zhenyu Zhong
Issue Date:June 2006
pp. 1928-1929
Statistical-based Bayesian filters have become a popular and important defense against spam. However, despite their effectiveness, their greater processing overhead can prevent them from scaling well for enterprise-level mail servers. For example, the dict...
     
Efficient compression and delivery of stored motion data for avatar animation in resource constrained devices
Found in: Proceedings of the ACM symposium on Virtual reality software and technology (VRST '05)
By Kang Li, Siddhartha Chattopadhyay, Suchendra M. Bhandarkar
Issue Date:November 2005
pp. 235-243
Animation of Virtual Humans (avatars) is done typically using motion data files that are stored on a client or streaming motion data from a server. Several modern applications require avatar animation in mobile networked virtual environments comprising of ...
     
ACE: an active, client-directed method for reducing energy during web browsing
Found in: Proceedings of the 15th international workshop on Network and operating systems support for digital audio and video (NOSSDAV '05)
By David K. Lowenthal, Haijin Yan, Kang Li
Issue Date:June 2005
pp. 27-32
In mobile devices, the wireless network interface card (WNIC) consumes a significant portion of overall system energy. One way to reduce energy consumed by a device is to transition its WNIC to a lower-power sleep mode when data is not being received or tr...
     
Analysis of state exposure control to prevent cheating in online games
Found in: Proceedings of the 14th international workshop on Network and operating systems support for digital audio and video (NOSSDAV '04)
By Doug McCreary, Kang Li, Shanshan Ding, Steve Webb
Issue Date:June 2004
pp. 140-145
Cheating has become a serious threat to the online game industry. One common type of cheating is accessing game states that are not supposed to be exposed to the players. In this paper, we evaluate a few information dissemination strategies that limit the ...
     
Fuzzy Control of Air-Suction Seeding Device Based on SPCE061A
Found in: Computational Intelligence and Natural Computing, International Conference on
By Gao Lin, Wang Nai-kang, Li Wen-bin, Zhang Jun-mei
Issue Date:June 2009
pp. 350-353
In order to make sure the seeding quality of air-suction seeding device, it is very important to control the vacuum degree of sowing drum. In this paper, the structure and principles of air-suction seeding device was introduced briefly and a fuzzy control ...
 
 1