Search For:

Displaying 1-41 out of 41 total
Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices
Found in: IEEE Transactions on Mobile Computing
By Yong Li,Pan Hui,Depeng Jin,Li Su,Lieguang Zeng
Issue Date:February 2014
pp. 377-391
As malware attacks become more frequently in mobile networks, deploying an efficient defense system to protect against infection and to help the infected nodes to recover is important to prevent serious spreading and outbreaks. The technical challenges are...
 
Optimal vehicles and coding decision for mobile data sharing in Vehicular Delay Tolerant Networks
Found in: 2012 20th IEEE International Conference on Network Protocols (ICNP)
By Wenyu Ren,Yong Li,Depeng Jin,Li Su,Lieguang Zeng
Issue Date:October 2012
pp. 1-2
Vehicular Delay Tolerant Networks (VDTN) are used to distribute a large amount of mobile data by high-capacity device-to-device communication. Given a number of available vehicles in VDTN, the current vehicular data sharing models always utilize all of the...
 
A QoS Approach for Detecting and Managing a Fault Alarm Storm
Found in: Cyber-Enabled Distributed Computing and Knowledge Discovery, International Conference on
By Jian Yang,Li Li,Su-Bin Shen,Charlie Chen-Yui Yang
Issue Date:October 2011
pp. 123-129
When a large communication network encounters abnormal situations, such as multiple cable cuts or a failure of interface protocol leading to large numbers of propagating alarms may potentially cause many symptom events in multiple network domains. As a res...
 
TUNIE: A virtualized platform for network experiment on programmable infrastructure
Found in: Network Protocols, IEEE International Conference on
By Yong Li,Li Su,Depeng Jin,Lieguang Zeng
Issue Date:October 2011
pp. 125-126
We present TUNIE, a network platform for rapid concurrent experiment of network innovation on virtualized programmable infrastructure. TUNIE integrates both software-and hardware-based router virtualization technologies to provide a flexible approach to co...
 
Game-Based Trust Establishment for Mobile Ad Hoc Networks
Found in: Communications and Mobile Computing, International Conference on
By Xin Jiang, Chuang Lin, Hao Yin, Zhen Chen, Li Su
Issue Date:January 2009
pp. 475-479
MANET, within which nodes can move arbitrarily, is a self-organized network without fixed infrastructure. However, due to the lack of infrastructure, limited resources and vulnerability of wireless links, security in mobile ad hoc networks is considered to...
 
Preliminary Study on Knowledge Activity Element of the Team Face to Face Communication
Found in: Intelligent System Design and Engineering Application, International Conference on
By Li Su,Shuping Yi
Issue Date:January 2012
pp. 464-471
Knowledge work efficiency is becoming a serious worldwide problem, and more attention should be paid to improve the team knowledge work efficiency. Face to face communication is important link of the team knowledge work. Use for reference on
 
Bridging the gap between objective score and subjective preference in video quality assessment
Found in: Multimedia and Expo, IEEE International Conference on
By Qianqian Xu, Zhipeng Wu, Li Su, Lei Qin, Shuqiang Jiang, Qingming Huang
Issue Date:July 2010
pp. 908-913
Nowadays, the issue of objective video quality assessment has been extensively studied. However, the human visual system (HVS) is the ultimate receiver for videos thus leading to a gap between objective scores calculated by computers and subjective prefere...
 
Design Trade-Offs in Packetizing Mechanism for Network-on-Chip
Found in: International Conference on the Digital Society
By Shijun Lin, Li Su, Haibo Su, Depeng Jin, Lieguang Zeng
Issue Date:February 2009
pp. 316-321
Network-on-Chip (NoC) design methodology is considered as an important trend for large System-on-Chip design because of the bandwidth and power constraints in traditional synchronous bus architecture. In the design of packet-based NoC, packetizing mechanis...
 
Hierarchical Cluster-Based Irregular Topology Customization for Networks-on-Chip
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Shijun Lin, Li Su, Haibo Su, Depeng Jin, Lieguang Zeng
Issue Date:December 2008
pp. 373-377
In this paper, a hierarchical cluster-based irregular topology customization method is proposed for Networks-on-Chip (NoC). This method contains three steps: 1) partitioning IPs into many hierarchical clusters; 2) generating a core network; 3) deleting red...
 
Empirical Study on the Performance of EPC Contractor Management Module: A Chinese Case
Found in: International Conference on E-Business and E-Government
By Zhang Jing-xiao,Bai Li,Su Chuanchuan
Issue Date:May 2010
pp. 5157-5163
The home-and-abroad literature review shows that calculating the performance coefficients between EPC Program and its management module has not been found from the EPC contractor’s viewpoint. It is emphasized that management is the main source of benefit, ...
 
Institutional Investors Holdings on Earnings Management Market Reaction Intensity Affect Study
Found in: 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)
By Ding Fang Fei,Li Su,Hou Ning Ning
Issue Date:January 2013
pp. 639-642
Individual investors are often difficult to recognize the earnings management behavior from accounting data. Institutional investors as investment experts, if they have the ability to recognize earning management and put it into the market price mechanism ...
 
Motion Based Perceptual Distortion and Rate Optimization for Video Coding
Found in: 2012 IEEE International Conference on Multimedia and Expo (ICME)
By Xi Wang,Li Su,Qingming Huang,Chunxi Liu,Ling-Yu Duan
Issue Date:July 2012
pp. 1061-1066
Most conventional distortion metrics regard a video frame as a static image, and seldom exploit using the motion information of video frames in succession. Moreover, these methods usually calculate the visual distortion based on the independent spatial pix...
 
Spatiotemporal Searchlight Representational Similarity Analysis in EMEG Source Space
Found in: 2012 2nd International Workshop on Pattern Recognition in NeuroImaging (PRNI)
By Li Su,Elisabeth Fonteneau,William Marslen-Wilson,Nikolaus Kriegeskorte
Issue Date:July 2012
pp. 97-100
Time resolved imaging techniques, such as MEG and EEG, are unique in their ability to reveal the rich dynamic spatiotemporal patterning of neural activities. Here we propose a technique based on spatiotemporal searchlight Representational Similarity Analys...
 
Study on the Effect of ER-alpha 36 siRNA on the Growth of ER Negative Breast Cancer Cells
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Min Zhang,Shuang Gao,Dong-Yang Li,Su Luo
Issue Date:May 2012
pp. 1750-1752
Objective: To investigate the effect of ER-a36 siRNA on the growth of ER-breast cancer cell. Methods: The inhibitive effects of ER-a36 siRNA with various concentration on ER negative breast cancer cell at 24 h and 48 h were determined with MTT, the changes...
 
Edge-Markovian dynamic graph based information dissemination model for mobile social networks
Found in: Proceedings of The ACM CoNEXT Student Workshop (CoNEXT '11 Student)
By Li Qiu, Li Su, Pan Hui, Yong Li
Issue Date:December 2011
pp. 1-2
In this poster, we apply Edge-Markovian Dynamic Graphs to present an analysis framework to evaluate the average delay for the information dissemination in Mobile Social Networks. It is the first model to give a detailed expression of average information di...
     
News video story sentiment classification and ranking
Found in: Multimedia and Expo, IEEE International Conference on
By Chunxi Liu, Li Su, Qingming Huang, Shuqiang Jiang
Issue Date:July 2011
pp. 1-6
In this paper, we present a novel approach for news video story sentiment analysis. Two research challenges are addressed: news video story sentiment classification and ranking. For classification, a graph based semi-supervised learning approach is utilize...
 
Corporate Governance and Coporate Performance of High-Tech Small and Medium-Sized Enterprises: Based on Analysis of the Small and Medium-sized Listed Enterprises Empirical Data
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By ZhenYi Wang, Li Su, Ying Tang
Issue Date:November 2010
pp. 378-383
It has caused a wider concern that what kind of influence dose corporate governance as an enterprise system arrangement have on the performance of small and medium-sized enterprise. This paper takes 106 high-tech small and medium-sized enterprises listed C...
 
A Novel RSU-Based Message Authentication Scheme for VANET
Found in: Systems and Networks Communication, International Conference on
By Wu Hsin-Te, Wei-Shuo Li, Su Tung-Shih, Wen-Shyong Hsiehz
Issue Date:August 2010
pp. 111-116
Message authentication, to ensure the receiving message is true and coming from the claimed source, is a key issue in vehicular ad hoc network (VANET) because the message may be life-critical, traffic information, or emergence message transmitted by the st...
 
An Adiabatic Single-Phase MTCMOS Scheme for Leakage Reduction in Nano-Scale CMOS Processes
Found in: Electrical and Control Engineering, International Conference on
By Li Su, Jianping Hu
Issue Date:June 2010
pp. 3271-3274
With the rapid scaling down of CMOS manufacturing technology, the reduction in leakage consumption has become an important concern in low power and high performance applications for nano-scale CMOS processes. This paper presents a MTCMOS (multi-threshold C...
 
Power Spectral Density Comparison for the Clipped OFDM-Type Signals
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Teng Li, Su Hu, Gang Wu, Liang Yan, Yun Luo
Issue Date:April 2010
pp. 269-272
In this paper, we give an expression of power spectral density (PSD) of all orthogonal frequency division multiplex (OFDM)-type signals. According to the analysis results, the different PSDs are compared between the original classic OFDM signals and the or...
 
Rapid Human-Eye Detection Based on an Integrated Method
Found in: Communications and Mobile Computing, International Conference on
By Liu Xia, Dong Yongqing, Li Su, Huang Chao
Issue Date:April 2010
pp. 3-7
Considering the defects of traditional methods of human-eye detection, such as time-consuming and poor accuracy, etc, a fast and accurate human-eye-detection algorithm has been proposed. First, locating the facial part in the whole image with the Adaboost ...
 
An Investigation for Leakage Reduction of Dual Transmission Gate Adiabatic Logic Circuits with Power-Gating Schemes in Scaled CMOS Processes
Found in: Innovative Computing and Communication and Asia-Pacific Conference on Information Technology and Ocean Engineering, International Conference on
By Li Su, Weiqiang Zhang, Lifang Ye, Xuhua Shi, Jianping Hu
Issue Date:January 2010
pp. 290-293
With rapid technology scaling, the proportion of the static power catches up with dynamic power gradually. To decrease leakage power is becoming more and more important in low-power design. This paper investigates leakage reduction of adiabatic circuits us...
 
Computer Simulation of Grout Flowing in Intermittent Fractured Network
Found in: Intelligent Computation Technology and Automation, International Conference on
By Shuan-cheng Gu, Pei-li Su
Issue Date:October 2009
pp. 15-18
In order to make the grout spreading in coal and rock fractured network more direct-viewing, the parallel plate model is used to analyze grout flowing in a fracture primarily, then the grouting pressure drawdown formula in a single fracture is established....
 
A RMT and PCA-Based Method of Monitoring the Large-Scale Traffic Pattern
Found in: Asia International Conference on Modelling & Simulation
By Jia Liu,Depeng Jin,Jian Yuan,Wenzhu Zhang,Li Su,Lieguang Zeng
Issue Date:May 2009
pp. 698-703
Mechanisms to extract the characteristics of network traffic play a significant role in the traffic monitoring, offering helpful information for network management and control. In this paper, a method based on Random Matrix Theory (RMT) and Principal Compo...
 
Single-Phase Adiabatic Tree Multipliers with Modified Booth Algorithm
Found in: Computer Science and Information Engineering, World Congress on
By Weiqiang Zhang, Li Su, Xiaoyan Luo, Jinghong Fu, Jianping Hu
Issue Date:April 2009
pp. 402-407
This paper presents an adiabatic tree multiplier based on modified Booth algorithm, which operates in a single-phase power-clock. All circuits are realized using improved CAL (Clocked Adiabatic Logic) circuits with TSMC 0.18um CMOS process. The proposed si...
 
Fuzzy Control for Automatic Steering and Line Tracking of Agricultural Robot
Found in: Computer Science and Software Engineering, International Conference on
By Zhou Jianjun, Zhang Man, Liu Gang, Li Su
Issue Date:December 2008
pp. 1094-1097
In order to realize automatic navigation for agricultural robot, a fuzzy control method for automatic steering and a method for line tracking are conveyed in the article. The principal for fuzzy control steering and the construction of fuzzy controller are...
 
Branch and Bound Algorithm for the Order Optimization of Parallel Activities in Project Scheduling
Found in: Risk Management & Engineering Management, 2008 International Conference on
By Xing-mei Li, Su-fang Zhang
Issue Date:November 2008
pp. 126-131
In order to solve the problem of four parallel activities being adjusted to an order chain of three activities and a parallel activity in deterministic activity-on-arc networks of the CPM type, a new theorem and the comparative method of special order chai...
 
Dual-Channel Access Mechanism for Cost-Effective NoC Design
Found in: Networks-on-Chip, International Symposium on
By Shijun Lin, Li Su, Depeng Jin, Lieguang Zeng
Issue Date:April 2008
pp. 217-218
In this paper, we propose dual-channel access mechanism to design cost-effective NoC based on 2D-mesh topology. Compared with traditional single-channel access mechanism, our scheme greatly increases the throughput and cuts down the average latency with re...
 
A Power-Aware Multicast Routing Protocol forMobile Ad Hoc Networks with Mobility Prediction
Found in: Local Computer Networks, Annual IEEE Conference on
By Nen-Chung Wang, Yu-Li Su
Issue Date:November 2005
pp. 408-417
<p>A mobile ad hoc network (MANET) is a dynamically reconfigurable wireless network that does not have a fixed infrastructure. Due to the high mobility of nodes, the network topology of MANETs changes very fast, making it more difficult to find the r...
 
LRRP Speech Webs
Found in: Communication Networks and Services Research, Annual Conference on
By Richard Frost, Nabil Abdullah, Kunal Bhatia, Sanjay Chitte, Fadi Hanna, Maxim Roy, Yue Shi, Li Su
Issue Date:May 2004
pp. 91-98
This paper describes a new architecture for accessing hyperlinked speech-accessible knowledge sources that are distributed over the Internet. It differs from the use of speech interfaces to conventional web html pages; from conventional telephone access to...
 
Two-Dimensional Extensions of Cascade Correlation Networks
Found in: High-Performance Computing in the Asia-Pacific Region, International Conference on
By Li Su, Sheng-Uei Guan
Issue Date:May 2000
pp. 138
Dynamic neural network algorithms are used for automatic network design in order to avoid time-consuming search for finding an appropriate network topology with trial and error methods. Cascade Correlation Network is one of the constructive methods to buil...
 
OpenRAN: a software-defined ran architecture via virtualization
Found in: Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM (SIGCOMM '13)
By Depeng Jin, Li Su, Lieguang Zeng, Mao Yang, Shaowu Ma, Yong Li
Issue Date:August 2013
pp. 549-550
With the rapid growth of the demands for mobile data, wireless network faces several challenges, such as lack of efficient interconnection among heterogeneous wireless networks, and shortage of customized QoS guarantees between services. The fundamental re...
     
M2cloud: software defined multi-site data center network control framework for multi-tenant
Found in: Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM (SIGCOMM '13)
By Depeng Jin, Li Su, Lieguang Zeng, Yong Li, Zhongjin Liu
Issue Date:August 2013
pp. 517-518
A significant concern for cloud operators is to provide global network performance isolation for concurrent tenants. To address this, we propose M2cloud, a software defined framework providing scalable network control for multi-site data centers (DCs). M2c...
     
Institutional Investors Heterogeneity, Future Earnings and the Informativeness of Stock Prices
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Ding Fangfei,Hou Ningning,Li Su
Issue Date:January 2013
pp. 887-890
This paper test the effects of different institutional investors on the extent to which stock prices reflect future earnings. The study find that the extent to which stock prices reflects future earnings increases with the institutional ownership. but furt...
 
Revealing contact interval patterns in large scale urban vehicular ad hoc networks
Found in: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication (SIGCOMM '12)
By Depeng Jin, Li Su, Lieguang Zeng, Pan Hui, Yong Li
Issue Date:August 2012
pp. 299-300
Contact interval between moving vehicles is one of the key metrics in vehicular ad hoc networks (VANETs), which is important to routing schemes and network capacity. In this work, by carrying out an extensive experiment involving tens of thousands of opera...
     
Grainflow: a per-bit customizable scheme for data plane innovation on programmable hardware
Found in: Proceedings of The ACM CoNEXT Student Workshop (CoNEXT '11 Student)
By Depeng Jin, Li Su, Lieguang Zeng, Yong Li, Zhongjin Liu
Issue Date:December 2011
pp. 1-2
In this paper, we introduce Grainflow, a scheme for flexibly deploying custom protocols at wire-speed. Grainflow is designed based on programmable hardware along with configuring software. Grainflow allows operation on every bit of header to be customized....
     
Research for Collaborative Knowledge Management Based on Semantic Wiki Technology
Found in: Education Technology and Computer Science, International Workshop on
By Wang Junjie, Mo Qian, Mei Dongxia, Li Su
Issue Date:March 2010
pp. 464-467
Wiki is the typical application of social computing. In this paper, the author first analyzed the traditional Wiki; then in order to resolve the Wiki’s problem of poor knowledge structure and reuse, the author introduced an idea which stated that the Wiki ...
 
Modeling and Simulation of Market Dynamics for Successive Generation of Flash Memory
Found in: Convergence Information Technology, International Conference on
By Yiming Li,Su-Yun Chiang
Issue Date:November 2007
pp. 1668-1673
Impressive growth of the information products market has been sustained by the availability of successful semiconductor non-volatile memory technologies. The key driver is right the flash memory for the mass storage application in portable electronic syste...
 
Multi-scale dissemination of time series data
Found in: Proceedings of the 25th International Conference on Scientific and Statistical Database Management (SSDBM)
By Li Su, Qingsong Guo, Yongluan Zhou
Issue Date:July 2013
pp. 1-12
In this paper, we consider the problem of continuous dissemination of time series data, such as sensor measurements, to a large number of subscribers. These subscribers fall into multiple subscription levels, where each subscription level is specified by t...
     
Grand challenge: MapReduce-style processing of fast sensor data
Found in: Proceedings of the 7th ACM international conference on Distributed event-based systems (DEBS '13)
By Kasper Grud Skat Madsen, Li Su, Yongluan Zhou
Issue Date:June 2013
pp. 313-318
MapReduce is a popular scalable processing framework for large-scale data. In this paper, we first briefly present our efforts on rectifying the traditional batch-oriented MapReduce framework for low-latency data stream processing. We investigated how to u...
     
Study on Grouts Flow in Rock Fracture and Numerical Simulation of Fracture Propagation
Found in: Information and Computing Science, International Conference on
By Shuang-cheng Gu, Pei-li Su
Issue Date:May 2009
pp. 370-373
In this study, the solution for grouting pressure decay along the fracture with parallel walls of the Bingham grouts flow is analyzed. Also, by applying stress intensity factor, the fracture propagation under the grouting pressure is simulated through seco...
 
 1