Search For:

Displaying 1-50 out of 115 total
Road Region Detection in Video System
Found in: Intelligent Systems, WRI Global Congress on
By Chi Jian-nan, Zhou Nan-nan, Zhang peng-yi, Zheng si-yi
Issue Date:May 2009
pp. 500-507
In this paper, image multi-scale edge detection based on anti-symmetrical wavelet is given detailed in theory. Namely convolution operation property which anti-symmetrical wavelet transform bears is deduced, and function of which anti-symmetrical biorthogo...
 
Breaking the top-k barrier of hidden web databases?
Found in: 2013 IEEE International Conference on Data Engineering (ICDE 2013)
By Saravanan Thirumuruganathan,Nan Zhang,Gautam Das
Issue Date:April 2013
pp. 1045-1056
A large number of web databases are only accessible through proprietary form-like interfaces which require users to query the system by entering desired values for a few attributes. A key restriction enforced by such an interface is the top-k output constr...
 
Message from the workshop chairs
Found in: A World of Wireless, Mobile and Multimedia Networks, International Symposium on
By Sajal K. Das,Guevara Noubir,Refik Molva,Gene Tsudik, Nan Zhang
Issue Date:June 2011
pp. 1-4
As the organizing committee, it is our pleasure to present the proceedings of the 2nd IEEE International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN), held on June 20, 2011, in Lucca, Italy. The goal of this one-day workshop, organiz...
   
Privacy-Preserving OLAP: An Information-Theoretic Approach
Found in: IEEE Transactions on Knowledge and Data Engineering
By Nan Zhang, Wei Zhao
Publication Date: December 2010
pp. N/A
We address issues related to the protection of private information in Online Analytical Processing (OLAP) systems, where a major privacy concern is the adversarial inference of private information from OLAP query answers. Most previous work on privacy-pres...
 
Volumetric Modeling in Laser BPH Therapy Simulation
Found in: IEEE Transactions on Visualization and Computer Graphics
By Nan Zhang, Xiangmin Zhou, Yunhe Shen, Robert Sweet
Issue Date:November 2010
pp. 1405-1412
In this paper, we introduce a novel application of volume modeling techniques on laser Benign Prostatic Hyperplasia (BPH) therapy simulation. The core technique in our system is an algorithm for simulating the tissue vaporization process by laser heating. ...
 
Software Managed Instruction Scratchpad Memory Optimization in Stream Architecture Based on Hot Code Analysis of Kernels
Found in: Digital Systems Design, Euromicro Symposium on
By He Yi, Ren Ju, Wen Mei, Yang Qianming, Wu Nan, Zhang Chunyuan
Issue Date:September 2010
pp. 823-830
Stream processors, such as Imagine, GPGPUs, FT64 and MASA, typically uses software managed scratchpad instruction memory which improves performance and significantly reduces energy consumption. In this paper, we build a kernel-storage model to analyze the ...
 
Security Mechanism to Protect the Integrity of Web Documents
Found in: Management of e-Commerce and e-Government, International Conference on
By Jianhua Zhang, Nan Zhang, Xianze Yang, Chunyan Yan
Issue Date:October 2008
pp. 395-398
Web documents which stored in many existed web servers include web pages and many resource files such as audios, videos, photos, etc. They are easy to be modified or replaced without necessary secure mechanism. The paper emphasized on the research and impl...
 
An Improved Information Fusion Algorithm Based on SVM
Found in: Computational Intelligence and Security Workshops, International Conference on
By Jun Ma, Jianpei Zhang, Jing Yang, Nan Zhang
Issue Date:December 2007
pp. 397-400
The support vector machine (SVM) is an algorithm based on structure risk minimizing principle and has high generalization ability. The model offers a kind of effective way for the information fusion problem of little sample, non-linear and high dimension. ...
 
A Genetic Algorithm Based on Immune and Chaos
Found in: International Conference on Natural Computation
By Jianhua Zhang, Xiaojie Liu, Tao Li, Nan Zhang, Nian Liu, Chun Xu
Issue Date:August 2007
pp. 239-243
An immune chaos genetic algorithm is presented to keep population's diversity, avoid local optimum and improve performance of genetic algorithm. Immune selection is used to adjust antibody's density, and the advantage of individuals is exerted by introduci...
 
An Immune Evolutionary Algorithm Based on Chaos Mutation
Found in: Intelligent Systems Design and Applications, International Conference on
By Jianhua Zhang, Tao Li, Nan Zhang, Diangang Wang, Sunjun Liu
Issue Date:October 2006
pp. 925-929
A chaos immune evolutionary algorithm is presented to keep population's diversity, avoid local optimization and improve performance of evolutionary algorithm. To overcome redundancies, over-spread character of chaos sequence was used. To enlarge searching ...
 
A Developing Sensory Mapping for Robots
Found in: Development and Learning, International Conference on
By Nan Zhang, John Weng, Zhenyou Zhang
Issue Date:June 2002
pp. 13
A sensory mapping method, called
 
On Skyline Groups
Found in: IEEE Transactions on Knowledge and Data Engineering
By Nan Zhang, Chengkai Li,Naeemul Hassan,Sundaresan Rajasekaran,Gautam Das
Issue Date:April 2014
pp. 942-956
We formulate and investigate the novel problem of finding the skyline k-tuple groups from an n-tuple data set-i.e., groups of k tuples which are not dominated by any other group of equal size, based on aggregate-based group dominance relationship. The majo...
 
On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures
Found in: IEEE Transactions on Parallel and Distributed Systems
By Qingyu Yang,Jie Yang,Wei Yu,Dou An,Nan Zhang,Wei Zhao
Issue Date:March 2014
pp. 717-729
It is critical for a power system to estimate its operation state based on meter measurements in the field and the configuration of power grid networks. Recent studies show that the adversary can bypass the existing bad data detection schemes, posing dange...
 
Research on and Economic Explanation for LV Competition Model Among E-Business Platforms in the Two-Sided Market Perspective
Found in: 2013 International Conference on Information Technology and Applications (ITA)
By Qiongwei Ye,Xin Qiang,Guangxing Song,Nan Zhang
Issue Date:November 2013
pp. 318-323
As a newly emerged commercial model, E-Business develops rapidly since 1990s. However, with the rapid development of these E-Business (Electronic Business) platform enterprises, competitions among them are increasingly intensified. Therefore, it is extreme...
 
Protocol Formats Reverse Engineering Based on Association Rules in Wireless Environment
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Yong Wang, Nan Zhang, Yan-mei Wu, Bin-bin Su, Yong-jian Liao
Issue Date:July 2013
pp. 134-141
With the wide deployment of wireless networks, attackers may exploit Wi-Fi network vulnerabilities to transfer data secretly, or covert communication channels to spread malicious codes. The protocol formats reverse engineering technique can be used to dete...
 
Faster random walks by rewiring online social networks on-the-fly
Found in: 2013 IEEE International Conference on Data Engineering (ICDE 2013)
By Zhuojie Zhou,Nan Zhang,Zhiguo Gong,Gautam Das
Issue Date:April 2013
pp. 769-780
Many online social networks feature restrictive web interfaces which only allow the query of a user's local neighborhood through the interface. To enable analytics over such an online social network through its restrictive web interface, many recent effort...
 
Just-in-Time Analytics on Large File Systems
Found in: IEEE Transactions on Computers
By H. Howie Huang,Nan Zhang,Wei Wang,Gautam Das,Alexander S. Szalay
Issue Date:November 2012
pp. 1651-1664
As file systems reach the petabytes scale, users and administrators are increasingly interested in acquiring high-level analytical information for file management and analysis. Two particularly important tasks are the processing of aggregate and top-k quer...
 
Variation of Soil Organic Carbon Stock under Land Use and Land Cover Changes in Farming-Pastoral Ecotone over the Past Century in Zhenlai, China
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Jie Tang,Nan Zhang,Zhaoyang Li,Bo Yang
Issue Date:May 2012
pp. 1885-1888
The impact of land use and land cover changes (LUCC) on global carbon cycle raises more and more serious concerns. Various methods were assessed to determine the influence of LUCC on soil organic carbon (SOC). However, the regional patterns and causes of t...
 
CLOUD SHREDDER: Removing the Laptop On-road Data Disclosure Threat in the Cloud Computing Era
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Nan Zhang,Jiwu Jing,Peng Liu
Issue Date:November 2011
pp. 1592-1599
Data Disclosure due to laptop loss, especially in travel, is a top threat to businesses, governments, and non-profit organizations. An effective protection against this threat should guarantee the data confidentiality, even if the adversary has physically ...
 
The CAF-DFRFT-KT Algorithm for High-Speed Target Detection in Passive Radar
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Lei Liu,Ran Tao,Nan Zhang
Issue Date:October 2011
pp. 748-751
The cross-ambiguity algorithm has been extensively used to detect targets in passive radar. However, this algorithm is affected by range migration and Doppler frequency migration when detecting high-speed and accelerating targets. In this paper, an effecti...
 
A Novel Parallel Scan for Multicore Processors and Its Application in Sparse Matrix-Vector Multiplication
Found in: IEEE Transactions on Parallel and Distributed Systems
By Nan Zhang
Issue Date:March 2012
pp. 397-404
We present a novel parallel algorithm for computing the scan operations on x86 multicore processors. The existing best known parallel scan for the same platform requires the number of processors to be a power of two. But this constraint is removed from our...
 
Task-Technology Fit in Mobile Work: Exploring the Links between Task Attributes and Technology Characteristics
Found in: Mobile Business, International Conference on
By Nan Zhang,Xunhua Guo,Fang Wang,Guoqing Chen,Qiang Wei
Issue Date:June 2011
pp. 268-274
Based on reviewing the extensive research on the task-technology fit (TTF) theory, we suggest a more natural perspective which focuses on the relations between task attributes and technology characteristics, instead of human perception about the abstract c...
 
Verification of Hardware Designs: A Case Study
Found in: Computers, Networks, Systems and Industrial Engineering, ACIS/JNU International Conference on
By Nan Zhang, Zhenhua Duan
Issue Date:May 2011
pp. 198-203
As size and complexity have increased, formal verification of hardware designs is a challenge to us. This paper presents a case study for verification of a full adder design using the axiom system of Propositional Projection Temporal Logic (PPTL). The pape...
 
The Digital Marauder's Map: A WiFi Forensic Positioning Tool
Found in: IEEE Transactions on Mobile Computing
By Xinwen Fu,Nan Zhang,Aniket Pingley,Wei Yu,Jie Wang,Wei Zhao
Issue Date:March 2012
pp. 377-389
No summary available.
 
CFD Modeling of Built Air Environment in Historic Settlements: Village Microclimate
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Li Tang, Marialena Nikolopoulou, Fu-yun Zhao, Nan Zhang
Issue Date:February 2011
pp. 1086-1092
Historic settlements have adapted to the local climate and geographical environment accommodating residents over the years. Rich and precious scientific design concepts, including the site selection, the layout, and the building materials, should be invest...
 
Preserving Relation Privacy in Online Social Network Data
Found in: IEEE Internet Computing
By Na Li, Nan Zhang, Sajal K. Das
Issue Date:May 2011
pp. 35-42
<p>Online social networks routinely publish data of interest to third parties, but in so doing often reveal relationships, such as a friendship or contractual association, that an attacker can exploit. This systematic look at existing privacy-preserv...
 
Discrete Flatness for Non Linear Systems FDI
Found in: Broadband, Wireless Computing, Communication and Applications, International Conference on
By Nan Zhang, Andrei Doncescu, Felix Mora-Camino
Issue Date:November 2010
pp. 488-494
This Fault detection is essential for the survivability of many systems. Since many systems present highly nonlinear dynamics, the applicability of general fault detection techniques designed mainly for linear systems is very questionable. The purpose of t...
 
Research on the Business Model of Equipment Manufacturing Industry of Yunnan Province in Open Innovation Environment
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Xing Ke, Nan Zhang
Issue Date:November 2010
pp. 426-430
In today's competitive environment which has highly uncertainty with rapid technological development,
 
Generalized Relation Based Knowledge Discovery in Interval-valued Information Systems
Found in: Granular Computing, IEEE International Conference on
By Duoqian Miao, Wei Yang, Nan Zhang
Issue Date:August 2010
pp. 743-748
A novel generalized relation is proposed in this paper to discover the knowledge of an interval-valued information system more objective based on the concept of interaction rates, which are the length of the intersection between two objects divided by the ...
 
Time-Bounded Essential Localization for Wireless Sensor Networks
Found in: Networking, Architecture, and Storage, International Conference on
By Wei Cheng, Nan Zhang, Min Song, Dechang Chen, Xicheng Lu, Zexin Lu
Issue Date:July 2010
pp. 3-12
In many practical applications of wireless sensor networks, it is crucial to accomplish the localization of sensors within a given time bound. We find that the traditional definition of relative localization is inappropriate for evaluating its actual overh...
 
Orientation-Preserving Rod Elements for Real-Time Thin-Shell Simulation
Found in: IEEE Transactions on Visualization and Computer Graphics
By Nan Zhang, Huamin Qu, Robert Sweet
Issue Date:June 2011
pp. 822-835
We propose a new computation model for simulating elastic thin shells at interactive rates. Existing graphical simulation methods are mostly based on dihedral angle energy functions, which need to compute the first order and second order partial derivative...
 
3DLoc: Three Dimensional Wireless Localization Toolkit
Found in: Distributed Computing Systems, International Conference on
By Jizhi Wang, Yinjie Chen, Xinwen Fu, Jie Wang, Wei Yu, Nan Zhang
Issue Date:June 2010
pp. 30-39
In this paper, we present 3DLoc: an integrated system of hardware and software toolkits for locating an 802.11-compliant mobile device in a three dimensional (3D) space. 3DLoc features two specialized antennas: an azimuth antenna and an elevation antenna, ...
 
Two-Sided Adoption of Mobile Marketing Platforms: Towards an Integrated Conceptual Model
Found in: Mobile Business / Global Mobility Roundtable, International Conference on
By Xunhua Guo, Yannan Zhao, Yan Jin, Nan Zhang
Issue Date:June 2010
pp. 474-480
This paper proposes an integrated conceptual model for analyzing user adoption behaviors towards mobile marketing platforms from a two-sided market perspective. Both the consumer side and the merchant side are modeled based on extending classical theories ...
 
Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures
Found in: IEEE Transactions on Computers
By Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao
Issue Date:December 2010
pp. 1655-1668
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-service (DDoS) attacks. Nonetheless, an ITM system can also become the target of...
 
H-infinity Control of Nonlinear Networked Systems
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Yang Lu, Qing Shao, Nan Zhang, Kuoxian Xiao
Issue Date:March 2010
pp. 374-377
In this paper, the H-infinity control problem is studied for nonlinear systems with random packet losses. The measurement missing probability are governed by an individual random variable satisfying a certain probabilistic distribution in the interval [0 1...
 
Privacy-Preserving OLAP: An Information-Theoretic Approach
Found in: IEEE Transactions on Knowledge and Data Engineering
By Nan Zhang, Wei Zhao
Issue Date:January 2011
pp. 122-138
We address issues related to the protection of private information in Online Analytical Processing (OLAP) systems, where a major privacy concern is the adversarial inference of private information from OLAP query answers. Most previous work on privacy-pres...
 
Authenticated Key Transport Protocol Based on a Locking-Signing Technique
Found in: Computer Science-Technology and Applications, International Forum on
By Jun Yang, Xianze Yang, Nan Zhang
Issue Date:December 2009
pp. 396-399
Key distribution is one of the fundamental issues in modern cryptography and its security is the main concern in World Wide Web-based applications. In this paper, a new type of secure key transport protocol with a no-key encryption, locking and signing tec...
 
Self-Disciplinary Worms and Countermeasures: Modeling and Analysis
Found in: IEEE Transactions on Parallel and Distributed Systems
By Wei Yu, Nan Zhang, Xinwen Fu, Wei Zhao
Issue Date:October 2010
pp. 1501-1514
In this paper, we address issues related to the modeling, analysis, and countermeasures of worm attacks on the Internet. Most previous work assumed that a worm always propagates itself at the highest possible speed. Some newly developed worms (e.g., “Atak”...
 
Shape-Based Depth Map Coding
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Nan Zhang, Siwei Ma, Wen Gao
Issue Date:September 2009
pp. 316-319
Three-dimensional Television (3DTV) system based on Depth-Image-Based Rendering(DIBR) has won popular recognition of researchers. Since the depth information is closely related with the rendering of viewed pixels, the quality of coding has a direct impact ...
 
H.264/AVC-Based Depth Map Sequence Coding Using Improved Loop-filter
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Nan Zhang, Siwei Ma
Issue Date:September 2009
pp. 312-315
Research has been widely carried out on three dimensional television(3DTV) system using Depth-Image-Based Rendering (DIBR) techniques. The depth data is a kind of important 3D data, transmitted along with 2D texture data. At present, coding of depth map se...
 
Knowledge reduction in interval-valued information systems
Found in: Cognitive Informatics, IEEE International Conference on
By Duoqian Miao,Nan Zhang,Xiaodong Yue
Issue Date:June 2009
pp. 320-327
In this paper, the concept of α -maximal consistent blocks is proposed to formulate the new rough approximations to an arbitrary object set in interval-valued information systems. The a -maximal consistent blocks can provide the simpler discernibility matr...
 
A MCT Acceptance Model from the Cultural Perspective and Its Empirical Test in the Mobile Municipal Administrative System Application
Found in: Mobile Business, International Conference on
By Nan Zhang, Xunhua Guo, Guoqing Chen, Gang Song
Issue Date:June 2009
pp. 319-323
With the development of mobile communication technologies (MCT), non-tech factors show more significant impacts in the process of innovation diffusion and service utilization in the ubiquitous network society. To analyse the individual acceptance of mobile...
 
CAP: A Context-Aware Privacy Protection System for Location-Based Services
Found in: Distributed Computing Systems, International Conference on
By Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu, Wei Zhao
Issue Date:June 2009
pp. 49-57
We address issues related to privacy protection in location-based services (LBS). Most existing research in this field either requires a trusted third-party (anonymizer) or uses oblivious protocols that are computationally and communicationally expensive. ...
 
The Digital Marauder's Map: A New Threat to Location Privacy
Found in: Distributed Computing Systems, International Conference on
By Xinwen Fu, Nan Zhang, Aniket Pingley, Wei Yu, Jie Wang, Wei Zhao
Issue Date:June 2009
pp. 589-596
No summary available.
 
Development of Online Measuring Instrument for Water-in-Oil percentage Based on MCU
Found in: Information Technology and Applications, International Forum on
By Xie Nan, Zhang Haibo, Gao Shenyong, Ma Yan, Chen Weimin
Issue Date:May 2009
pp. 563-565
Water may access to hydraulic and lubricant system due to various reasons, so the lubricant oil in hydraulic system will be out of work for high water-in-oil percentage. Traditional measuring instruments for water-in-oil percentage have slower response-tim...
 
Design of Data Management Framework Based on Ontology in Distributed Cooperative Virtual Environment
Found in: Networking and Digital Society, International Conference on
By Liping Zheng, Yun Bao, Nan Zhang
Issue Date:May 2009
pp. 213-216
In Distributed Virtual Environment, the number of data is very large. How to effectively manage and share these data was very important. Ontology is a philosophical concept originally. It can realize knowledge sharing and reusing. According to the characte...
 
Compression-Induced Rendering Distortion Analysis for Texture/Depth Rate Allocation in 3D Video Compression
Found in: Data Compression Conference
By Yanwei Liu, Siwei Ma, Qingming Huang, Debin Zhao, Wen Gao, Nan Zhang
Issue Date:March 2009
pp. 352-361
In 3D video applications, the virtual view is generally rendered by the compressed texture and depth. The texture and depth compression with different bit-rate overheads can lead to different virtual view rendering qualities. In this paper, we analyze the ...
 
Leveraging COUNT Information in Sampling Hidden Databases
Found in: Data Engineering, International Conference on
By Arjun Dasgupta, Nan Zhang, Gautam Das
Issue Date:April 2009
pp. 329-340
A large number of online databases are hidden behind form-like interfaces which allow users to execute search queries by specifying selection conditions in the interface. Most of these interfaces return restricted answers (e.g., only top-k of the selected ...
 
Adjust ELF Format for Multi-core Architecture
Found in: Electronic Computer Technology, International Conference on
By Wei Hu, Tianzhou Chen, Nan Zhang, Jijun Ma
Issue Date:February 2009
pp. 388-391
There are two problems emerged while multi-core platform become popular in daily life, no matter for high end or low end. The first is how to fully utilize computing resource of these cores without requirement of large modifications of current software des...
 
A Mechatronic Approach for System Design with Sensor-Actuators
Found in: Education Technology and Training & Geoscience and Remote Sensing
By Jinhe Wang, Nan Zhang
Issue Date:December 2008
pp. 706-709
The mechatronic approach focuses on the use of smart sensors and actuators to improve the precise of complicated realtime control system. This paper describes the main principle of temperature control with mechatronic approach. However, a poor sensor-actua...
 
 1  2 Next >>