Search For:

Displaying 1-50 out of 87 total
Detection of Overlapped Quadrangles in Plane Geometric Figures
Found in: 2013 12th International Conference on Document Analysis and Recognition (ICDAR)
By Keqiang Li,Xiaoqing Lu,Haibin Ling,Lu Liu,Tianxiao Feng,Zhi Tang
Issue Date:August 2013
pp. 260-264
Digital plane geometric figures (PGFs) are important resources of digital education, especially in mathematical pedagogy. The related applications, such as recognition and retrieval system on geometric figure images, have not been fully exploited. Special ...
 
Implementation and Evaluation of Network Interface and Message Passing Services for TianHe-1A Supercomputer
Found in: High-Performance Interconnects, Symposium on
By Min Xie,Yutong Lu,Lu Liu,Hongjia Cao,Xuejun Yang
Issue Date:August 2011
pp. 78-86
TianHe-1A, a large scale supercomputer features hybrid multi-core CPU and GPU computing, utilizes a proprietary high-bandwidth, low-latency interconnect fabric to achieve the optimized balance of computation and communication capabilities. In this paper, w...
 
Mining Condensed and Lossless Association Rules by Pruning Redundancy
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Lu Liu, Yin Chen, Siqing Shan, Lu Yin
Issue Date:October 2008
pp. 591-595
There are excessive and disordered rules generated by traditional approaches of association rule mining, many of which are redundant, so that they are difficult for users to understand and make use of. Han et al pointed out the bottleneck of association ru...
 
Research on the Capability Factors for China Foreign Trade-based Logistics Companies Strategic Transformation in Global Financial Crisis Time
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Liu Wei-hua, Liu Chun-ling, Wang Lu, Liu Yan-ping
Issue Date:November 2010
pp. 116-121
The literature of financial crisis and China Foreign Trade-based logistics companies’ (CFTLCs) strategic transformation was reviewed, the importance of the capability factors for CFTLCs was put forward. Then, a survey was conducted with Likert scale method...
 
Taking the Business Intelligence to the Clouds
Found in: 2012 IEEE 14th Int'l Conf. on High Performance Computing and Communication (HPCC) & 2012 IEEE 9th Int'l Conf. on Embedded Software and Systems (ICESS)
By Hussain Al-Aqrabi,Lu Liu,Richard Hill,Nick Antonopoulos
Issue Date:June 2012
pp. 953-958
Cloud computing is gradually gaining popularity among businesses due to its distinct advantages over self-hosted IT infrastructures. The software-as-a-service providers are serving as the primary interfacing to the business users community. However, the st...
 
Tianhe-1A Interconnect and Message-Passing Services
Found in: IEEE Micro
By Min Xie, Yutong Lu, Kefei Wang, Lu Liu, Hongjia Cao, Xuejun Yang
Issue Date:January 2012
pp. 8-20
The petascale supercomputer Tianhe-1A, which features hybrid multicore CPU and GPU computing, achieves an optimized balance of computation and communication capabilities through a proprietary high-bandwidth, low-latency interconnect fabric. The authors' me...
 
An Improved Top-Down Data Mining Algorithm for Long Frequents
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Gang Fang, Yu-Lu Liu, Jiang Xiong, Hong Ying
Issue Date:November 2009
pp. 312-316
In this paper, in order to improve the method of computing support of candidate frequent itemsets, in order to reduce the times of scanning database when computing support, and in order to fast search long frequent itemsets, aiming to top-down search strat...
 
Extracting Sent Message Formats from Executables Using Backward Slicing
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Min Liu,Chunfu Jia,Lu Liu,Zhi Wang
Issue Date:September 2013
pp. 377-384
Network communication protocol reverse-engineering is important for malicious software analysis. Security analysts need to rewrite messages sent and received by malicious software according to the protocol to control the malware's malicious behaviors. To e...
 
Extracting Sent Message Formats from Executables Using Backward Slicing
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Min Liu,Chunfu Jia,Lu Liu,Zhi Wang
Issue Date:September 2013
pp. 377-384
Network communication protocol reverse-engineering is important for malicious software analysis. Security analysts need to rewrite messages sent and received by malicious software according to the protocol to control the malware's malicious behaviors. To e...
 
An Analysis of Peer to Peer Protocols for Massively Multiplayer Online Games
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Andrew Jones,Lu Liu,Nick Antonopoulos,Weining Liu
Issue Date:June 2012
pp. 1994-1999
In this paper three current massively multiplayer online game peer to peer protocols are simulated and analysed. The results of the simulations suggest that improvement is still needed in order to lower the bandwidth usage of the protocols. Areas for impro...
 
An Investigation of the Effect of Cloud Computing on Network Management
Found in: 2012 IEEE 14th Int'l Conf. on High Performance Computing and Communication (HPCC) & 2012 IEEE 9th Int'l Conf. on Embedded Software and Systems (ICESS)
By John Panneerselvam,Lu Liu,Richard Hill,Yongzhao Zhan,Weining Liu
Issue Date:June 2012
pp. 1794-1799
Cloud computing is one of the fascinating advancements in the computing technology. With its fashionable features, cloud deployment is well spread in a wide range of applications. Managing the cloud environment is a complex process because of the virtual n...
 
Assessment and Evaluation of Internet-Based Virtual Computing Infrastructure
Found in: Object-Oriented Real-Time Distributed Computing, IEEE International Symposium on
By James Hardy,Lu Liu,Nick Antonopoulos,Weining Liu,Lei Cui,Jianxin Li
Issue Date:April 2012
pp. 39-46
Virtualisation is a prevalent technology in current computing. Among the many aspects of virtualisation, it can be employed to reduce hardware costs by server consolidation, implement
 
Dot-base62x: A Compact Textual Representation of IPv6 Address for Clouds
Found in: Utility and Cloud Computing, IEEE Internatonal Conference on
By Zhenxing Liu,Lu Liu,James Hardy,Ashiq Anjum,Richard Hill,Nick Antonopoulos
Issue Date:December 2011
pp. 427-432
Cloud computing has dramatically reshaped the whole IT industry in recent years. With the transition from IPv4 to IPv6, services running in Cloud computing will face problems associated with IPv6 addressing: the notation is too long (39 bytes), there are t...
 
A 5-80MHz CMOS Gm-C Low-Pass Filter with On-Chip Automatic Tuning
Found in: Digital Manufacturing and Automation, International Conference on
By Yi Ding,Lintao Liu,Ruzhang Li,Xin Zhang,Lu Liu
Issue Date:August 2011
pp. 1-4
A fifth-order CMOS Gm-C Chebyshev low-pass filter with a tunable cutoff frequency of 5-80 MHz is presented. A phase-locked loop (PLL) frequency synthesizer control system automatically references the frequency response of the filter to an external fixed cl...
 
A hash-based secure interface on plain connection
Found in: Software Maintenance and Reengineering, European Conference on
By Zhenxing Liu,Harjinder S. Lallie, Lu Liu, Yongzhao Zhan, Kaigui Wu
Issue Date:August 2011
pp. 1236-1239
This paper proposes a hash-based secure interface between two nodes on the Internet, especial between two interfaces or two web pages. Digital signatures and public-private keys are traditionally used to provide integrity and authentication. This paper pro...
 
A Novel Algorithm for Ultrasonic Stereovision Data Enhancement
Found in: Intelligent Systems Design and Applications, International Conference on
By Liu Lu, Liu Wanyu
Issue Date:November 2008
pp. 414-419
The three-dimensional (3-D) ultrasound stereo visualization technique has a broad promising future for its ability superior to traditional two-dimensional (2-D) ultrasound image, and it helps to understand the complex structures of tissues as well as to me...
 
A Method of Pulmonary Nodules Detection with Support Vector Machines
Found in: Intelligent Systems Design and Applications, International Conference on
By Liu Lu, Liu Wanyu
Issue Date:November 2008
pp. 32-35
Lung cancer is one of the deadly and most common diseases in the world. Many methods have been proposed to avoid radiologists fail to diagnose small pulmonary nodules. Recently, support vector machines (SVMs) had received an increasing attention for patter...
 
Airport Internal Safety Risk Assessment using Fuzzy Hierarchy Process Approach
Found in: Computational Intelligence and Design, International Symposium on
By Zhenwu Zhao, Lu Liu, Fang Liu
Issue Date:October 2008
pp. 170-173
This paper offers an assessment of airport internal safety risk. It deals with general concept of risk and safety, describes the main causes of airport risk. A model based on fuzzy simulation technique and hierarchical structure analysis is developed to ev...
 
Selecting books: a performance-based study
Found in: Digital Libraries, Joint Conference on
By Lu Liu, Ying-Hsang Liu, Nina Wacholder
Issue Date:June 2006
pp. 337-337
Our research compares the impact of paper vs. electronic presentation of text on the book selection process. Our focus is on the stage of book selection in which users study the content of a book to decide whether it will be useful for their intended purpo...
 
Benchmarking the Performance of OpenStack and CloudStack
Found in: 2014 IEEE 17th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC)
By Aaron Paradowski,Lu Liu,Bo Yuan
Issue Date:June 2014
pp. 405-412
With the rapid increase of growth and development in cloud computing it is clear to see that it is becoming a common trend within the industry leading to the adoption by businesses and Information Technology (IT) users alike. Coupled with this trend comes ...
 
Application of Podcast in Teaching and Learning Oral English for Non-English Majors
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Zhao Lu,Liu Ying
Issue Date:June 2013
pp. 1935-1938
The teaching and learning of oral English is considered important but difficult to conduct. The advent and rapid development of Web 2.0 bring people new learning experiences and outcomes. This paper analyzes the current situation of teaching and learning o...
 
Business Intelligence Security on the Clouds: Challenges, Solutions and Future Directions
Found in: 2013 IEEE 7th International Symposium on Service Oriented System Engineering (SOSE)
By Hussain Al-Aqrabi,Lu Liu,Richard Hill,Zhijun Ding,Nick Antonopoulos
Issue Date:March 2013
pp. 137-144
Business intelligence (BI) is a critical software system employed by the higher management of organizations for presenting business performance reports through Online Analytical Processing (OLAP) functionalities. BI faces sophisticated security issues give...
 
Software Aging in Virtualized Environments: Detection and Prediction
Found in: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS)
By Lei Cui,Bo Li,Jianxin Li,James Hardy,Lu Liu
Issue Date:December 2012
pp. 718-719
Software aging has been cited in many scenarios including Operating System, Web Servers, Real-time Systems. However, few studies have been conducted in long running virtualized environments where more and more software is being delivered as a service. Furt...
 
A Framework for Enhanced Timeline Analysis in Digital Forensics
Found in: 2012 IEEE International Conference on Green Computing and Communications (GreenCom)
By Bartosz Inglot,Lu Liu,Nick Antonopoulos
Issue Date:November 2012
pp. 253-256
Nowadays, with the growing number of storage devices and increasing popularity of digital hand-held devices on the Internet of Things (iThings), performing a digital forensic analysis is becoming gradually more problematic especially on the future generati...
 
High Efficiency Algorithm of Correctness of Web Service Composition under Environment Constraint Based on IPN
Found in: 2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science
By Yinghua Feng,Lu Liu
Issue Date:October 2012
pp. 205-208
The correctness of the composite Web service under the environment constraint needs new model and analyze methods. First, Web services domain and Web environment domain models based on interface Petri net are proposed. Then, an efficient determining algori...
 
Enabling Green IT through Building a Virtual Desktop Infrastructure
Found in: 2012 Eighth International Conference on Semantics, Knowledge and Grids (SKG)
By Don-Anthony Dasilva,Lu Liu,Nik Bessis,Yongzhao Zhan
Issue Date:October 2012
pp. 32-38
The recent cuts being made in IT budgets across the globe can be attributed to any number of modern day crises. For instance, organizations are still recovering from the recession almost 5 years later, and IT infrastructures have been having to deal with r...
 
Message from MWNS Symposium Chairs
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Lu Liu,Lei Shu,Jianxin Li
Issue Date:June 2012
pp. xxxv
No summary available.
   
An Investigation into the Evolution of Security Usage in Home Wireless Networks
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Thomas Stimpson,Lu Liu,Yongzhao Zhan
Issue Date:June 2012
pp. 920-925
Wireless networks are an integral part of life for many residential properties. The use of laptops and smartphones has lead to a large increase in the number of wireless networks. The research within this project revealed how residential users were securin...
 
A Secure Node Localization Method Based on the Congruity of Time in Wireless Sensor Networks
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Yongzhao Zhan,Chunxia Li,Xinsheng Wang,Yuan Zhou,Lu Liu,Hussain Al-Aqrabi
Issue Date:June 2012
pp. 884-889
With the development of the theory and technology of wireless sensor networks (WSN), location-based applications, such as location-based access control, pose new challenges. In order to improve the accuracy of node localization, the energy consumption must...
 
A Multi-VC Dynamically Shared Buffer with Prefetch for Network on Chip
Found in: 2012 IEEE 7th International Conference on Networking, Architecture, and Storage (NAS)
By Heying Zhang,Kefei Wang,Yi Dai,Lu Liu
Issue Date:June 2012
pp. 320-327
In this paper, we propose a novel multi-VC dynamically shared buffer named DAMQ-PF for network on chip to decrease the memory and area requirement of statically allocating shared buffer among multiple virtual channels (VC). A small prefetch buffer is used ...
 
Investigation of IT Security and Compliance Challenges in Security-as-a-Service for Cloud Computing
Found in: Object/Component/Service-Oriented Real-Time Distributed Computing Workshops , IEEE International Symposium on
By Hussain Al-Aqrabi,Lu Liu,Jie Xu,Richard Hill,Nick Antonopoulos,Yongzhao Zhan
Issue Date:April 2012
pp. 124-129
The key security challenges and solutions on the cloud have been investigated in this paper with the help of literature reviews and an experimental model created on OPNET that is simulated to produce useful statistics to establish the approach that the clo...
 
Performance Measurements in iVIC Virtual Machine Clones
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By James Hardy,Lu Liu,Nik Bessis,Lei Cui,Jianxin Li
Issue Date:March 2012
pp. 1258-1263
Virtualisation is a prevalent technology in current computing. Virtualisation can reduce hardware costs by server consolidation, implement
 
A Mobile Terminal Adaptive Browser
Found in: Computer Science and Electronics Engineering, International Conference on
By Yan Liang,Lu Liu
Issue Date:March 2012
pp. 133-136
With the development of 3G and smart phones, user's demands of mobile internet increase. The function of mobile browser should be more powerful. But there is limitation of mobile browser on supporting different terminals. This paper proposes a mobile termi...
 
A New Architecture Design for WCDMA and GSM Dual-mode Mobile Phones
Found in: Computer Science and Electronics Engineering, International Conference on
By Lu Liu,Yan Liang
Issue Date:March 2012
pp. 157-160
With the rapid development of mobile communication technology, the continued expansion of multimedia applications, and the multi-mode multi-band requirements of global communications, the cost and the size of mobile phone design have become an important re...
 
Evaluation of server virtualization technologies for Green IT
Found in: Service-Oriented System Engineering, IEEE International Workshop on
By Lu Liu,Osama Masfary,Jianxin Li
Issue Date:December 2011
pp. 79-84
Service oriented computing (SOC) and cloud computing paradigm has emerged as an approach which enables ubiquitous, on-demand network accesses to a shared pool of flexibly reconfigurable computing resources. The increasing trends of electrical consumption w...
 
Remote Health Monitoring System Using ZigBee Network and GPRS Transmission Technology
Found in: Computational Intelligence and Design, International Symposium on
By Hongzhou Yu,Lu Liu
Issue Date:October 2011
pp. 151-154
Remote health monitoring system is used to collect and transfer biosignal data from the patient to healthcare center. In this work, a method using the combination of ZigBee and GPRS is presented. These two wireless technologies are integrated to support co...
 
QoS-aware service composition in multi-network environment based on genetic algorithm
Found in: Software Maintenance and Reengineering, European Conference on
By Minghui Li, Kaigui Wu, Lu Liu
Issue Date:August 2011
pp. 1231-1235
QoS-aware service composition is one of the most important technologies in SOA. The aim is to compose a new service with the best QoS under the user constraints by a set of atomic services. There are a lot of researches on this topic in recent years. But m...
 
OMNeT++ and Mixim-based protocol simulator for satellite network
Found in: IEEE Aerospace Conference
By Li Xiangqun, Wang Lu, Liu Lixiang, Hu Xiaohui, Xu Fanjiang, Chen Jing
Issue Date:March 2011
pp. 1-9
In this paper, we present a novel satellite network simulation platform (SNSP) based on OMNeT++ and MiXiM for researchers to develop better protocols for satellite networks. In this platform, multi-formatted satellite orbit data are permitted as input, and...
 
Dynamic Authentication for Cross-Realm SOA-Based Business Processes
Found in: IEEE Transactions on Services Computing
By Jie Xu,Dacheng Zhang,Lu Liu,Xianxian Li
Issue Date:January 2012
pp. 20-32
Modern distributed applications are embedding an increasing degree of dynamism, from dynamic supply-chain management, enterprise federations, and virtual collaborations to dynamic resource acquisitions and service interactions across organizations. Such dy...
 
A P2P e-Commerce Reputation Model Based on Fuzzy Logic
Found in: Computer and Information Technology, International Conference on
By Ji Li, Lu Liu, Jie Xu
Issue Date:July 2010
pp. 1275-1279
Peer-to-Peer (P2P) networking is beneficial when removing a centralized server. On the other hand, new mechanisms are required to compensate for the central authority, especially for network security and dependability. In this paper, we propose a new fuzzy...
 
Realizing Network Enabled Capability Through Dependable Dynamic Systems Integration
Found in: Computer and Information Technology, International Conference on
By Duncan J. Russell, Lu Liu, Zongyang Luo, Colin C. Venters, David E. Webster, Jie Xu
Issue Date:July 2010
pp. 1269-1274
The move towards Network Enabled Capability (NEC) by the UK Ministry of Defence (MoD) is designed to achieve enhanced military effect through the networking and coherent integration of existing and future resources including sensors, weapon systems, and de...
 
Adaptive Distributed Service Discovery for Dependable Service Integration
Found in: Object/Component/Service-Oriented Real-Time Distributed Computing Workshops , IEEE International Symposium on
By Lu Liu, Jie Xu, Kaigui Wu
Issue Date:May 2010
pp. 166-175
For the provision of dependable search and rescue capability in dynamic and unpredictable disaster areas, each networked node should have ability to (1) autonomously support and co-operate with each other in a peer-to-peer (P2P) manner to quickly discover ...
 
State-Based Search Strategy in Unstructured P2P
Found in: Object-Oriented Real-Time Distributed Computing, IEEE International Symposium on
By Kaigui Wu, Changze Wu, Lu Liu, Jie Xu
Issue Date:May 2010
pp. 180-184
Efficient resource search in large-scale unstructured peer-to-peer (P2P) systems remains a fundamental challenge. In order to improve search performance, interest-based search is a good way to tackle the challenge. However, the existing interest-based sear...
 
Analysis of Resource Diffusion Characteristics in BT and eMule Based on Monitoring and Tracking
Found in: Computer Science-Technology and Applications, International Forum on
By Lei Kai, Sun Xiao, Han Lu, Liu Li, Yuan HuSheng, Sun Tao
Issue Date:December 2009
pp. 68-71
In P2P file-sharing systems, users’ file transferring and downloading behaviors are invisible and non-reproducible. In order to monitor the distribution process and diffusion characteristics in those P2P systems, we implemented a resources monitoring and t...
 
An Algorithm of Double Search Association Rules Mining Based on Digital Complementary Set
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Jiang Xiong, Gang Fang, Yu-Lu Liu
Issue Date:August 2009
pp. 39-42
In order to reduce redundant candidate itemsets and repeated computing existing in these presented double search mining algorithms, this paper proposes an algorithm of double search association rules mining based on digital complementary sets, which adopts...
 
The Effects of Asymmetric Market Information on Two-Echelon Supply Chain in Spot Market
Found in: Intelligent Human-Machine Systems and Cybernetics, International Conference on
By Limei Wang, Zhong Yao, Lu Liu
Issue Date:August 2009
pp. 316-319
This paper studies the effects of retailer’s information-superiority on participant’s profit in the existence of spot market. Two cases considered: manufacturer knows retailer’s information-superiority and manufacturer does not know retailer’s information-...
 
A Scenario-Based Architecture Evaluation Framework for Network Enabled Capability
Found in: Computer Software and Applications Conference, Annual International
By Colin C. Venters, Duncan J. Russell, Lu Liu, Zongyang Luo, David E. Webster, Jie Xu
Issue Date:July 2009
pp. 9-12
The vision of service-oriented computing is one of loosely coupled services that create agile applications to encapsulate business objectives and processes. The potential of services to form complex systems of systems, with emergent behaviour, necessitates...
 
The Vector Data Management of GIS Based on PDA
Found in: Environmental Science and Information Application Technology, International Conference on
By Lu Liu
Issue Date:July 2009
pp. 530-533
Traditionally, vector data of GIS based on PDA is managed with a traditional pyramid model to promote displaying speed. However, this pyramid model does not flexible or practical enough to solve many problems, neither the data file designing and data proce...
 
Research on System Architecture and Interfaces in Heterogeneous Network Platform
Found in: Information Processing, Asia-Pacific Conference on
By Fei Ma, Wen-an Zhou, Lu Liu, Jun-de Song
Issue Date:July 2009
pp. 481-484
The paper proposes an architecture for heterogeneous network platform based on adaptation layer according to service capability requirements and characteristics of modern service industry. In order to shield the diversity of heterogeneous networks to provi...
 
Research and Implementation of Compression Shell Unpacking Technology for PE File
Found in: Information Technology and Applications, International Forum on
By Li Lu, Liu Qiuju, Xu Tingrong
Issue Date:May 2009
pp. 438-442
Packing Portable Executable (PE) file is an effective mean to protect software, but malware authors can also use packing to conceal their malicious executable string data and code. These methods make it difficult to analyze them in detail for virus analyst...
 
 1  2 Next >>