Search For:

Displaying 1-30 out of 30 total
Empirical Study on the Evolution of PlanetLab
Found in: International Conference on Networking
By Li Tang, Yin Chen, Fei Li, Hui Zhang, Jun Li
Issue Date:April 2007
pp. 64
PlanetLab is a globally distributed overlay platform that has been increasingly used by researchers to deploy and assess planetary-scale network services. This paper analyzes some particular advantages of PlanetLab, and then investigates its evolution proc...
 
End-to-End Delay Behavior in the Internet
Found in: Modeling, Analysis, and Simulation of Computer Systems, International Symposium on
By Li Tang, Hui Zhang, Jun Li, Yanda Li
Issue Date:September 2006
pp. 373-382
While delay-critical applications typified by online multimedia communication are growing rapidly, the end-to-end (E2E) delay behavior in the Internet remains poorly understood. This paper proposes a stochastic process model, in which E2E delay alternation...
 
Heuristic Relay Node Selection Algorithm for One-Hop Overlay Routing
Found in: Distributed Computing Systems Workshops, International Conference on
By Yin Chen, Li Tang, Jun Li
Issue Date:June 2008
pp. 465-470
This paper reviews the characteristics of overlay networks and defines effective relay nodes that can improve the performance of interactive real-time applications. A heuristic relay node selection algorithm for overlay routing is proposed. The algorithm c...
 
On the Feasibility of Enhancing Interactivity for Real-time Communications using Overlay Routing
Found in: Networking and Services, International conference on
By Li Tang, Zhijie Sun, Zhen Chen, Jun Li
Issue Date:June 2007
pp. 95
As real-time communications are developing rapidly on the Internet, overlay routing has been widely proposed as an easily deployable way to meet their stringent requirements of end-to-end (E2E) performance and interactivity. Contrasting to that much previo...
 
Towards a Fully Distributed P2P Web Search Engine
Found in: Future Trends of Distributed Computing Systems, IEEE International Workshop
By Jin Zhou, Kai Li, Li Tang
Issue Date:May 2004
pp. 332-338
Most centralized web search engines currently become harder to catch up with the growing step of people?s information need. Here, we present a fully distributed, collaborative peer-to-peer web search engine named Coopeer. The goal of the work is to complem...
 
The Impacting Factors Discussions on the Thermal Environment and Energy Consumption of the Subway Tunnel and the Station Units
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Wang Lihui, Qu Jiahuan, Song Jie, Li Zhiling, Du Xiaoming, Shen Li, Tang Daofa
Issue Date:January 2011
pp. 831-834
With SES simulation, based on the reduced scale model experiment, the influencing significance degree of the vehicle length, the train speed and the blocking ratio of the tunnel and the train are analyzed In the orthogonal test, the research objects aim at...
 
Analysis of Parallel Computing Environment Overhead of OpenMP for Loop with Multi-core Processors
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Wan-Qing Li, Tang Ying, Yunfa Li, Zhang Wei, Jangcong Feng, Zhang Jilin
Issue Date:December 2010
pp. 514-517
This paper analyze the parallel computing environment overhead of OpenMP for loop with multi-core processors including the case of data-race. The different solutions of data-race are discussed in present paper, such as critical pragma, atomic pragma and re...
 
A New Accelerated Algorithm of Image Style Study
Found in: Multimedia Information Networking and Security, International Conference on
By Li Tang, JinYi Chang, Jian Li, RongWei Yu
Issue Date:November 2009
pp. 244-248
The image analogy is a classical technique used in the style learning and Multimedia data mining. To regrettable the IA method can not be suitable to any pair of images. This article prime task has four aspects: 1 Proposed one kind of new image similarity ...
 
A Mixed Shared and Multi Paths Protection Scheme with SRLG Constraints
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Zong-Li Tang, Xing-Ming Li
Issue Date:August 2007
pp. 60-65
The dynamic traffic assignment problem in WDM mesh network and traps avoidance problem under shared risk link group (SRLG) constraints were studied. A protection scheme entitled Mixed Shared Multi-Paths Protection (MSMPP) was proposed. MSMPP can not only e...
 
Characterizing the L1 Data Cache's Vulnerability to Transient Errors in Chip-Multiprocessors
Found in: VLSI, IEEE Computer Society Annual Symposium on
By Li Tang, Shuai Wang, Jie Hu, Xiaobo Sharon Hu
Issue Date:July 2011
pp. 266-271
With continuous technology scaling, current and next generation microprocessors are becoming more vulnerable to transient errors such as soft errors induced by energetic particle strikes. While mainstream microprocessors are employing multi-/many-core arch...
 
Gear Fault Diagnosis with Neural Network Based on Niche Genetic Algorithm
Found in: Machine Vision and Human-machine Interface, International Conference on
By Jia-li Tang, Qiu-ru Cai, Yi-jun Liu
Issue Date:April 2010
pp. 596-599
Because of the complexity of gear working condition, there are non-linear relationship between characteristic parameters and fault types. This paper proposes to apply the artificial neural network theory and the genetic algorithm to solve the difficulties ...
 
Mechanical fault diagnose of diesel engine based on bispectrum and Support Vector Machines
Found in: Computer Science and Information Technology, International Conference on
By Yunkui Xiao, Jianmin Mei, Ruili Zeng, Huimin Zhao, Li Tang, Huafei Huang
Issue Date:August 2009
pp. 425-429
The vibrant signal of diesel engine is analyzed by the method of bispectrum, and bispectral feature planes are searched along diagonal and parallel lines of diagonal at certain step in the bispectral modulus field, and the mean breadth value in bispectral ...
 
A Method for Path Planning of Hydraulic Manipulator
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Zheng Yang, Jianzhong Shang, Nan Cong, Li Tang, Keshan Liang, Biao Wang, Mingkang Gou
Issue Date:April 2009
pp. 8-12
A method for path planning of hydraulic manipulator is put forward. First, a collision-free path is planned based on the CS (Configuration Space) modeling of nDOFs manipulator. Then the collision-free path is optimized via parabolic transition & linear...
 
A Next-Gen Network Switch Software Automation Upgrade Method Based on a Two-step Inference Expert System
Found in: Information Management and Engineering, International Conference on
By Li Tang, Po Yan, Zhicai Liu, Jinmin Chen
Issue Date:April 2009
pp. 161-165
This paper presents an automatic software upgrade method for an next-generation network (NGN) switch instead of the manual software upgrade. An expert system is designed for the automation upgrade, and a two-step inference is adopted in its inference engin...
 
A Quick Modeling Approach in Model Checking
Found in: 2013 Seventh International Conference on Internet Computing for Engineering and Science (ICICSE 2013)
By Li Tang, Gang Ma
Issue Date:September 2013
pp. 89-94
Model checking is an effective approach of verifying large and concurrent systems. Models have a direct impact on efficiency in model checking. Therefore, research on system modeling has always been one of the hot issues. Knowledge base system today occupi...
 
GPU acceleration of Data Assembly in Finite Element Methods and its energy implications
Found in: 2013 IEEE 24th International Conference on Application-specific Systems, Architectures and Processors (ASAP)
By Li Tang,X. Sharon Hu,Danny Z. Chen,Michael Niemier,Richard F. Barrett,Simon D. Hammond,Genie Hsieh
Issue Date:June 2013
pp. 321-328
The Finite Element Method (FEM) is a numerical technique widely used in finding approximate solutions for many scientific and engineering problems. The Data Assembly (DA) stage in FEM can take up to 50% of the total FEM execution time. Accelerating DA with...
 
The Calibration Algorithm of Energy Detection and Site Meter
Found in: Digital Manufacturing and Automation, International Conference on
By Qiong Chen,Li Tang,Cheng Chen
Issue Date:August 2011
pp. 1225-1227
This chapter proposes a kind of caLibration algorithm to capture the number of pulses which aims to the caLibration of the meter field so as to achieve the accurate detection of power. In order to avoid the leakage of spectrum, it samples three-phase AC sy...
 
Analysis on Liquid-Tanker Vehicle Liquid and Solid Coupling Collision Simulation
Found in: Digital Manufacturing and Automation, International Conference on
By Li Tang,Jingtao Yue
Issue Date:August 2011
pp. 196-198
Based on the 3-D model and MSC dytran Liquid and soLid coupLing simulation method, this paper analysis the instantaneous colLision between Liquid and soLid when the vehicle is in the Limit working condition, so to predigest the process of design and improv...
 
Robust Multiscale Stereo Matching from Fundus Images with Radiometric Differences
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Li Tang,Mona K. Garvin,Kyungmoo Lee,Wallace L.M. Alward,Young H. Kwon,Michael D. Abràmoff
Issue Date:November 2011
pp. 2245-2258
A robust multiscale stereo matching algorithm is proposed to find reliable correspondences between low contrast and weakly textured retinal image pairs with radiometric differences. Existing algorithms designed to deal with piecewise planar surfaces with d...
 
CFD Modeling of Built Air Environment in Historic Settlements: Village Microclimate
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Li Tang, Marialena Nikolopoulou, Fu-yun Zhao, Nan Zhang
Issue Date:February 2011
pp. 1086-1092
Historic settlements have adapted to the local climate and geographical environment accommodating residents over the years. Rich and precious scientific design concepts, including the site selection, the layout, and the building materials, should be invest...
 
Prediction of Material Mechanical Properties with Support Vector Machine
Found in: Machine Vision and Human-machine Interface, International Conference on
By Jia-li Tang, Qiu-ru Cai, Yi-jun Liu
Issue Date:April 2010
pp. 592-595
Predicting model which refers to mechanical properties with material composition and techniques can be founded to reduce test times, increase efficiency and realize the optimization of process. This paper proposes to apply the Support Vector Machine to set...
 
An Algorithm of Finite State Machine Based on Inexact Inference Expert System
Found in: Computer Engineering and Applications, International Conference on
By Li Tang, Jing Fu, Jinmin Chen
Issue Date:March 2010
pp. 424-428
This paper introduces a new type of finite state machine (FSM) - The FSM based on inexact inference expert system. The paper analyzes the uncertainty of issues of the classic FSM which is major difficulties of the classic FSM, and gives an algorithm of ine...
 
A Method of Knowledge Reasoning for Threat Assessment in the Battlefield
Found in: Information Technology and Computer Science, International Conference on
By Zhi-li Tang, An Zhang
Issue Date:July 2009
pp. 32-35
Knowledge reasoning,in which knowledge acquisition and reasoning strategy are key techniques, is one of the most important methods applied to threat assessment. Based on the specialty of threat assessment in complex battlefield environment, an information ...
 
The Development of Procurement Management Information System Based on Workflow Technology
Found in: Computer Science and Information Engineering, World Congress on
By Xiaoping Qiu, Li Tang, Zhenggang He, Jianbin Chen
Issue Date:April 2009
pp. 470-474
This paper introduces the advanced technical idea of workflow technology to manage the procurement process with flexibility, which can satisfy the requirements of necessary changes rapidly for the modern enterprises. On the basis of reference model of work...
 
Human GITRLaa50-177 Expressed in Bac-to-Bac Baculovirus Expression System
Found in: BioMedical Engineering and Informatics, International Conference on
By Li Tang, Sheng-Jun Wang, Chao-Ming Mao, Jun Chen, Zheng-Jun Hu, Jun-Feng Bao, Qi-Xiang Shao, Hua-Xi Xu
Issue Date:May 2008
pp. 910-914
Glucocorticoid induced tumor necrosis factor receptor ligand (GITRL) is a type II transmembrane protein with homology to TNF receptor superfamily members, and its human receptor (hGITR), an ortholog of the recently discovered murine glucocorticoid-induced ...
 
A Comparative Study of Boosted and Adaptive Particle Filters for Affine-Invariant Target Detection and Tracking
Found in: Computer Vision and Pattern Recognition Workshop
By Guoliang Fan, Vijay Venkataraman, Li Tang, Joseph Havlicek
Issue Date:June 2006
pp. 138
This paper addresses a specific multi-aspect target detection and tracking problem where the dynamics of the target?s aspect is modeled by an affine model following a first-order Markov process. We are interested in how to achieve robust and accurate Monte...
 
FreeRank: implementing independent ranking service for multiplayer online games
Found in: Proceedings of 4th ACM SIGCOMM workshop on Network and system support for games (NetGames '05)
By Hao Wang, Jin Zhou, Jun Li, Kai Li, Li Tang, Zhizhi Zhou
Issue Date:October 2005
pp. 1-7
Ranking is necessary for multiplayer online games to provide players with self-complacence and reference for choosing game counterparts. Most existing ranking solutions are tightly coupled with game applications of client-server architectures. In this pape...
     
A Comparative Evaluation of Mobile Agent Performance for Network Management
Found in: Engineering of Computer-Based Systems, IEEE International Conference on the
By Li Tang, Bernard Pagurek
Issue Date:April 2002
pp. 0258
Despite the strategic and software engineering benefits mobile agents (MAs) brings to network management, their performance is still a controversial issue. A number of quantitative analyses and experiments on mobile agent performance have been reported in ...
 
Modeling and Solving TCP Incast Problem in Data Center Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Jiao Zhang,Fengyuan Ren,Li Tang,Chuang Lin
Issue Date:March 2014
pp. 1
TCP Incast problem attracts much attention due to the catastrophic goodput drop. In this paper, a goodput model of the problem is built to understand why goodput collapse occurs and a solution to the problem based on the theoretical analysis is proposed. W...
 
Coefficient Compensation Method for Embedded Codec
Found in: Communications and Mobile Computing, International Conference on
By Sheng-kui Dai, Jian-guo Liu, Xiu-li Tang
Issue Date:January 2009
pp. 221-224
A simple coefficient compensation method is proposed for the discarded low-bit coefficient in embedded decoding system. First, the coefficient matrix of image is extended as a
 
 1