Search For:

Displaying 1-36 out of 36 total
Research on PKI-like Protocol for the Internet of Things
Found in: 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)
By Zhihua Li,Xi Yin,Zhenmin Geng,Haitao Zhang,Pengfei Li,Ya Sun,Huawei Zhang,Lin Li
Issue Date:January 2013
pp. 915-918
Through analyzing the essence of the IoT and the hiberarchy architecture in it, some security risks, security request and security ways for the risks are discussed. The possible technique at each layer and its advantage or disadvantage is studied respectiv...
 
Research on Small Unmanned Four-rotor Control Based on AIC
Found in: Digital Manufacturing and Automation, International Conference on
By Jin-song Li,Xi Cao,Yan Guo-zheng,Li-bo Song
Issue Date:August 2011
pp. 1011-1014
Taking the small unmanned four-rotor as a research object, the dynamic model of the small four-rotor was built according to Newton-Euler formaLism. Adaptive Inverse Control (AIC) Theory was used in the control of the small unmanned four-rotor for the first...
 
QoS-Driven Service Composition with Multiple Flow Structures
Found in: Services Computing, IEEE International Conference on
By Wen-jun Li,Xi Li,Xiao-jun Liang,Xiao-cong Zhou
Issue Date:July 2011
pp. 362-369
With the increasing number of functionally similar services deployed over the Internet, QoS (Quality of Service) plays a more and more important role on deciding which component services should be selected to satisfy the quality requirements for a composit...
 
Identity Based Group Key Management Scheme for Ad Hoc Groups
Found in: Multimedia Information Networking and Security, International Conference on
By Zhiyuan Liu, Li Li, Xi-cai Cheng
Issue Date:November 2009
pp. 425-429
Many wireless ad-hoc applications for military battlefield and emergency situations depend upon secure group communications. But group key management for ad-hoc networks meets a great challenge because of mobility, limited power, unreliable multi-hop commu...
 
A novel spectrum handoff management scheme based on SVM in cognitive radio networks
Found in: Software Maintenance and Reengineering, European Conference on
By Jinghua Guo, Hong Ji, Yi Li, Xi Li
Issue Date:August 2011
pp. 645-649
Cognitive radio networks bring spectrum access opportunities to SUs(Second Users) when primary users would not use this spectrum so as to enhance the resource utilization. The SUs have to change spectrum channel no matter when and where the PU(Primary User...
 
Hovering Control of Unmanned Small Size Helicopter Based on Adaptive Inverse Control Theory
Found in: Digital Manufacturing and Automation, International Conference on
By Jin-song Li, Xi Cao, Guo-zheng Yan, Li-bo Song
Issue Date:December 2010
pp. 805-811
Adaptive inverse control (AIC) theory is introduced to inhibit interferences such as side wind during hovering control for small-sized unmanned helicopter. Based on this theory, an AIC control block diagram is improved to accommodate with the characteristi...
 
Ammunition Target Matching Based on Rough Set and Weighted TOPSIS
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Li-xin Wang,Wen-sheng Li,Xi-sheng Jia,Hai-kuan Wang
Issue Date:October 2011
pp. 19-22
In order to select proper ammunition to attack a certain target, we proposed a new method for ammunition target matching sequencing based on rough set and weighted TOPSIS. After depicting the mechanism of ammunition damage and target anti-damage, the autho...
 
FreeRider: Non-local Adaptive Network-on-Chip Routing with Packet-CarriedPropagation of Congestion Information
Found in: IEEE Transactions on Parallel and Distributed Systems
By Shaoli Liu,Tianshi Chen,Ling Li,Xi Li,Mingzhe Zhang,Chao Wang,Haibo Meng,Xuehai Zhou,Yunji Chen
Issue Date:August 2014
pp. 1
Non-local adaptive routing techniques, which utilize statuses of both local and distant links to make routing decisions, have recently been shown to be effective solutions for promoting the performance of Network-on-Chip (NoC). The essence of non-local ada...
 
TCP performance enhancement for mobile broadband interactive satellite communication system: A cross-layer approach
Found in: 2013 8th International Conference on Communications and Networking in China (CHINACOM)
By Gang Liu, Hong Ji, Yi Li, Xi Li
Issue Date:August 2013
pp. 822-827
Mobile broadband interactive satellite communication system is of great interest in both research and development field. However, the conventional strict layered protocol stack architecture and the standard TCP version perform poorly over satellite link. I...
   
Modeling and analysis of dynamic spectrum allocation in high-speed railways
Found in: Software Maintenance and Reengineering, European Conference on
By Liang Chen, Hong Ji, Yi Li, Xi Li
Issue Date:August 2011
pp. 1191-1195
Chinese Train Control System (CTCS) is based on mobile communication, which the key problem is how to support reliability and security of control information transmission to improve track utilization and enhance train safety. In this paper, we firstly prop...
 
A Distributed Workflow Management System Model and Its Scheduling Algorithm
Found in: Frontier of Computer Science and Technology, Japan-China Joint Workshop on
By Ding Changsong, Hu Zhoujun, Hu Zhigang, Li Xi
Issue Date:December 2008
pp. 51-58
Workflow management system model and workflow task scheduling algorithm are the critical research areas in combination of workflow and grid techniques. On the basis of active network, a distributed, scalable workflow management system model which can adapt...
 
A Hybrid Adaptive Evolutionary Algorithm for Constrained Optimization
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Xiang Li, Xi-Ming Liang
Issue Date:November 2007
pp. 338-341
In this paper a hybrid adaptive genetic algorithm is proposed for solving constrained optimization problems. Genetic algorithm proposed here combines adaptive penalty method and smoothing technique in order to make the algorithm not needing parameters tuni...
 
Forgery Attack on Two ID-Based Proxy Signature Schemes from Bilinear Pairings
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Chang-Ji Wang,Yuan Li,Xi-Lei Xu
Issue Date:September 2013
pp. 231-235
Since Mambo et al. introduced the concept of proxy signature in 1996, many proxy signature schemes have been proposed. Recently, Wang et al. and Zhao et al. proposed an ID-based proxy signature scheme and an ID-based anonymous proxy signature scheme, respe...
 
Forgery Attack on Two ID-Based Proxy Signature Schemes from Bilinear Pairings
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Chang-Ji Wang,Yuan Li,Xi-Lei Xu
Issue Date:September 2013
pp. 231-235
Since Mambo et al. introduced the concept of proxy signature in 1996, many proxy signature schemes have been proposed. Recently, Wang et al. and Zhao et al. proposed an ID-based proxy signature scheme and an ID-based anonymous proxy signature scheme, respe...
 
Adaptive Site Selection and Task Scheduling for Grid Workflow
Found in: Network Computing and Information Security, International Conference on
By Li Xi, Hu Zhigang, Yan Chaokun
Issue Date:May 2011
pp. 337-341
The availability and performance of Grid sites change dynamically, which makes it be a great challenge to design a good site selection and task scheduling mechanism for Grid workflows. A multi-stage Grid site evaluation and selection mechanism, involving s...
 
Prediction-Based Activation in WSN Tracking
Found in: Mobile Ad-hoc and Sensor Networks, International Conference on
By Jianghai Li, Xi Chen, Qing-Shan Jia, Xiaohong Guan
Issue Date:December 2010
pp. 97-102
In Wireless Sensor Network (WSN) based tracking, the random factors in the target’s movement and the sensors’ measurement together with the limited sensing ability will cause target loss. Therefore, target loss probability is important for the WSN design a...
 
Schedulability Analysis for MultiCore Global Scheduling with Model Checking
Found in: Microprocessor Test and Verification, International Workshop on
By Wei Sheng, Yanyan Gao, Li Xi, Xuehai Zhou
Issue Date:December 2010
pp. 21-26
With the development of multicore systems, multicore real time scheduling is becoming a hot topic in time-critical systems. Cache warm-up overheads introduced by task migration between two cores can result in missed deadlines for tight realtime schedules. ...
 
Factors Affecting Privacy Disclosure on Social Network Sites: An Integrated Model
Found in: Multimedia Information Networking and Security, International Conference on
By Xuefeng Li, Xi Chen
Issue Date:November 2010
pp. 315-319
Users’ privacy disclosure behaviors on social network sites (SNSs) have great effects on sound development of websites and harmonious internet. For stealing and abusing privacy information on web enhance people’s privacy concern, users refuse to submit nec...
 
Surface Matching by Using the Simple Strategy in the Application of Automotive Styling
Found in: Information Science and Management Engineering, International Conference of
By Qiang Li, Xi Wang, Nan Qi, Yanping Tang, R.M. Newman
Issue Date:August 2010
pp. 253-256
A reverse transformation method based on the projective area overlapping has been presented for the surface matching in the application of automotive styling from 2-D to 3-D. The matching criteria and the objective function have also been discussed and use...
 
Research on Spatial Data Interoperability in Spatial DATA Grid Environment
Found in: Computational Sciences and Optimization, International Joint Conference on
By Qidong Yin, Qi Li, Xi Wu
Issue Date:May 2010
pp. 351-353
Aiming in the data interoperation such as access and sharing of heterogeneous spatial data in distributed system, grid technology was brought into spatial information service, and a complete architecture of spatial data interoperability in Grid environment...
 
Parametric Design Based on Building Information Modeling for Sustainable Buildings
Found in: Challenges in Environmental Science and Computer Engineering
By Jialiang Wang, Jing Li, Xi Chen
Issue Date:March 2010
pp. 236-239
The kinetic expression of building has been the sublime pursuit of contemporary architectural design in recent years, but the kinetic components of building also may further the building energy efficiency. This article suggested kinetic envelopes respondin...
 
Quantity Modeling and Application of Multivariable Correlation Analysis
Found in: Convergence Information Technology, International Conference on
By Cai Guoqiang, Jia Limin, Yang Jianwei, Liu Haibo, Li Xi
Issue Date:November 2009
pp. 1670-1673
Abstract-This study focuses on quantitative correlation problem of four Railway Parcel traffic parameters: Number of Initial trains (NIT), GDP of cities, Number of Parcel Traffic Agencies (NPTA) and Number of Parcel traffic Nodes (NPTN). It can be seen as ...
 
Using Diversity as an Additional-objective in Dynamic Multi-objective Optimization Algorithms
Found in: Electronic Commerce and Security, International Symposium
By Hao Chen, Ming Li, Xi Chen
Issue Date:May 2009
pp. 484-487
This paper investigates the use of additional-objective for solving multi-objective optimization problems in dynamic environment. A number of authors proposed the use of additional-objective for maintaining diversity in static single-objective optimization...
 
Secure Anonymous Donation Protocol
Found in: Computer Science and Information Engineering, World Congress on
By Li Xi
Issue Date:April 2009
pp. 106-110
Donations are the main fund sources of election candidate, non-government organization, non-profit organization and charity etc. As the development of Internet, more and more donations are made online. At present, most online donations  are made  b...
 
Unspecific Event Detection in Wireless Sensor Networks
Found in: Communication Software and Networks, International Conference on
By Chongming Zhang, Chunmei Wang, Dazhi Li, Xi Zhou, Chuanshan Gao
Issue Date:February 2009
pp. 243-246
Event detection has always been an important application in the practical deployment of Wireless Sensor Networks (WSNs). Although threshold based event detection method works well in some cases when significant characteristics exist for specific event, it ...
 
A Novel Shot Edge Detection Algorithm based on Chi-square Histogram and Macro-block Statistics
Found in: Information Science and Engieering, International Symposium on
By Xinghao Jiang, Tanfeng Sun, Jianhua Li, Xi Chen
Issue Date:December 2008
pp. 604-607
A rapid approach to shot boundary detection was introduced, which was based on the DC histogram Chi-square test and macroblock type statistics in one frame of MPEG-2 video sequence. Some information about DC histogram differences between I-frames was extra...
 
The Solutions of Matrix Equations (AX = B, XC = D) with a Submatrix Constraint
Found in: International Conference on Natural Computation
By Fan-Liang Li, Xi-Yan Hu, Lei Zhang
Issue Date:October 2008
pp. 381-383
In this paper, the solvability conditions and the general solution of matrix equations (AX=B,XC=D) with a submatrix constraint are obtained by using the SVD(singular value decomposition) of matrix. In addition, the expression of the optimal approximation s...
 
Fast Block-Based Motion Estimation Techniques in Video Compression
Found in: Image and Signal Processing, Congress on
By Zi-yin Li, Xi-yong Zou
Issue Date:May 2008
pp. 564-569
The widespread use of block-based inter-frame motion estimation for video sequence compression in both MPEG-x and H.26x series of standards is due to its effectiveness and simplicity of implementation. Nevertheless, the high computational complexity of the...
 
The Reflexive Solutions for a Pair of Simultaneous Linear Matrix Equations
Found in: International Conference on Natural Computation
By Fan-Liang Li, Xi-Yan Hu, Lei Zhang
Issue Date:August 2007
pp. 140-144
In this paper, the reflexive solutions of a pair of matrix equations (AX = B, XC = D) is discussed. By apply- ing special properties of reflexive matrices, we obtain the necessary and sufficient conditions for the existence of the solutions. We also derive...
 
Feature Abstraction of Time-Sequence Curve and Its Similarity Calculation
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Guohe Li, Xi Jiang
Issue Date:August 2007
pp. 374-378
Guohe Li Xi Jiang Department of Computer Science and Technology, China University of Petroleum(Beijing) Guohe_li@sina.com ricksmiles@sina.com Abstract Time-sequence data are visually shown in curves. A great deal of information can be derived from them, wh...
 
Octopus Architecture: A New Attempt to Achieve Reliable OS
Found in: Software Architecture, Working IEEE/IFIP Conference on
By Hang Li, Xi-Yang Liu, Ping Chen
Issue Date:November 2005
pp. 197-198
In the whole system composed by traditional OS and the applications above,the states are distributed into each layer of the system because of the hierarchy. This increases the difficulties of fault diagnosis and recovery in autonomous computing. In additio...
 
Estimation of Evaporative Fraction from Remotely Sensed in Arid/Semi-arid Regions
Found in: Networked Computing and Advanced Information Management, International Conference on
By Qin Li, Xi Chen, Frank Veroustraete, Anming Bao, Qinghan Dong, Tie Liu
Issue Date:August 2009
pp. 713-718
Evaporative Fraction is an intermediary step to assess evapotranspiration and is also a primary component in many water balance models. The paper uses the Land surface temperature and albedo to assess the space-time variability of EF. By analyzing, the res...
 
Impact of Antenna Array on Performance of Parallel Interference Cancellation for WCDMA Systems
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Cheng-hua Hu, Shao-qian Li, You-xi Tang
Issue Date:April 2009
pp. 657-661
It is recent researching hotspot to integrate multiuser detection with smart antenna for CDMA. In order to reduce the system complexity and manufacture cost, we must make a compromise between them. In this paper, the BER expressions of Rake receiver with p...
 
Fair Secure Message Exchange Protocols
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By LI Xi
Issue Date:April 2010
pp. 227-231
An ordinary fair exchange will inevitably leak something to the semi-trusted neutral party. In this paper, we present a new variety of such protocols which leak nothing, even the size of input to the semi-trusted neutral party, and prove that all languages...
 
Implementation of a semi-formal verification for embedded systems
Found in: Embedded Software and Systems, Second International Conference on
By ZHU Yun, LI Xi, ZHAO Siyang, GONG Yuchang
Issue Date:December 2005
pp. 204-210
In the era of billion-transistor design, it is critical to establish effective verification technologies from the system level, all the way down to the implementations. This paper presents a PNPM simulation based verification methodology for equivalence ch...
 
Automatic Teaching of Welding Robot for 3-Dimensional Seam Based on Ant Colony Optimization Algorithm
Found in: Intelligent Computation Technology and Automation, International Conference on
By Li He-xi, Shi Yong-hua, Wang Guo-rong, Zheng Xiao-xi
Issue Date:October 2009
pp. 398-402
The research work of this paper concentrates on 3-dimensional seam detection based on stereovision technique and the optimal control of weld torch attitude based on ant colony optimization algorithm during the automatic teaching of welding robot. A binocul...
 
 1