Search For:

Displaying 1-50 out of 55 total
Energy Utilization Analysis and Energy-Saving Measures of Alumina Evaporation Process
Found in: Intelligent System Design and Engineering Application, International Conference on
By Jian-zhi Zhang,Xiao-qi Peng,Shi-min Li,Yan-po Song,Yan-peng Wu
Issue Date:January 2012
pp. 1036-1039
An economic and practical measure is put forward to realize energy saving and consumption lowering for alumina evaporation process in this paper. Firstly, based on the energy analysis, investigate the system, unit or equipment which has high energy consump...
 
Model Checking Probabilistic and Stochastic Extensions of the π-Calculus
Found in: IEEE Transactions on Software Engineering
By Gethin Norman, Catuscia Palamidessi, David Parker, Peng Wu
Issue Date:March 2009
pp. 209-223
We present an implementation of model checking for probabilistic and stochastic extensions of the π-calculus, a process algebra which supports modelling of concurrency and mobility. Formal verification techniques for such extensions have clear applications...
 
An Empirical Study On the Vectorization of Multimedia Applications for Multimedia Extensions
Found in: Parallel and Distributed Processing Symposium, International
By Gang Ren, Peng Wu, David Padua
Issue Date:April 2005
pp. 89b
Multimedia extensions (MME) are architectural extensions to general-purpose processors to boost the performance of multimedia workloads. Today, in-line assembly code, intrinsic functions and library routines are the most common means to program these exten...
 
Tunnel-Based IPv6 Transition
Found in: IEEE Internet Computing
By Yong Cui,Jiang Dong,Peng Wu,Jianping Wu,Chris Metz,Yiu L. Lee,Alain Durand
Issue Date:March 2013
pp. 62-68
IPv6 transition presents many challenges to the Internet community, and various solutions have been proposed, including dual stack, tunneling, and translation. Tunneling supports "like-to-like" IP connectivity across an "unlike" network...
 
A Reputation-Based Trust Model for P2P Systems
Found in: Computational Intelligence and Security, International Conference on
By Peng Wu, Guoxin Wu
Issue Date:December 2009
pp. 352-356
One of the fundamental challenges for Peer to Peer (P2P) systems is the ability to manage risks involved in interacting and collaborating with prior unknown and potentially malicious parties. Reputation-based trust management systems have proven to be esse...
 
Low Power Design of a Grating Detection System Chip
Found in: Computer Science and Information Engineering, World Congress on
By Li-gang Hou, Xiao-hong Peng, Wu-chen Wu
Issue Date:April 2009
pp. 550-554
This paper forwards a low power design of a grating detection system chip (GDC) on length and angle precision measurement. Traditional grating detection methods are complex, costly, and suffer big power consumption for the complex divide circuit scheme and...
 
Reputation Mechanism in Peer-to-Peer Network
Found in: Information Science and Engineering, International Conference on
By Peng Wu, Guoxin Wu
Issue Date:December 2009
pp. 1793-1796
Peer-to-Peer (P2P) technology has been widely used in file-sharing, distributed computing, e-market and information management. However, one of the critical challenges for P2P systems is the ability to manage risks involved in interacting and collaborating...
 
MPI-Based Heterogeneous Cluster Construction Technology
Found in: 2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science
By Yucheng Guo,Dongxu Hu,Peng Wu
Issue Date:October 2012
pp. 120-124
Nowadays, the applications of MPI-based clusters are used widely, such as the damage prediction of nuclear explosion and gene decryption. However, the usages of MPIbased heterogeneous cluster are nearly reported in contrast to the MPI-based homogeneous clu...
 
Photobook creation and social sharing on facebook
Found in: Multimedia and Expo, IEEE International Conference on
By Peng Wu,Eamonn O'Brien-Strain,Brian Messenlehner,Dan Tretter
Issue Date:July 2011
pp. 1-4
Photobook is a popular form adopted by consumers to organize photos with text into pages for memory preserving. In this paper, a photobook creation and social sharing application developed on facebook platform is presented with the focus on the following p...
 
A trace-based Java JIT compiler retrofitted from a method-based compiler
Found in: Code Generation and Optimization, IEEE/ACM International Symposium on
By Hiroshi Inoue, Hiroshige Hayashizaki, Peng Wu, Toshio Nakatani
Issue Date:April 2011
pp. 246-256
This paper describes our trace-based JIT compiler (trace-JIT) for Java developed from a production-quality method-based JIT compiler (method-JIT). We first describe the design and implementation of our trace-JIT with emphasis on how we retrofitted a method...
 
Researches on Semantic Annotation and Retrieval of 3D Models Based on User Feedback
Found in: Semantics, Knowledge and Grid, International Conference on
By Tianyang Lu, Shaobin Huang, Peng Wu, Yeran Jia
Issue Date:November 2010
pp. 211-218
As an important part of multimedia retrieval, researches on 3D model retrieval concentrate on the shape-based retrieval method. It is a promising way to improve retrieval performance by adopting semantic information. At present, semantics of an object is u...
 
Research on PDA-based Distributed Field Data Acquisition Method
Found in: Networking and Distributed Computing, International Conference on
By Peng Wu, Xiaomei Yi, Jian Li, Xuequn Wang
Issue Date:October 2010
pp. 317-320
This paper proposes distributed data acquisition system based on Personal Digital Assistant that can process data by calling the Web Service. The system implements distributed data processing by calling the Web Service. Lots of experiments are conducted on...
 
Higher Order Spectra Denoising Method of Phase Matching Noise Estimation
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Jie Liu, Peng Wu
Issue Date:September 2010
pp. 811-814
Most denoising method can deal with Gaussian noise or some kind of colored noise. This paper presents a new method of higher order spectral denoising on phase matching noise estimation. The method can remove not only the Gaussian noise but also Non-Gaussia...
 
A Ultra Low Supply Voltage Bandgap Reference Based on Substrate Bias
Found in: Electrical and Control Engineering, International Conference on
By Yang Peng, Wu Xiaobo, Ye Zhihao, Sun Yueming
Issue Date:June 2010
pp. 3245-3248
A CMOS bandgap reference (BGR) capable of operating at supply voltage of 0.9V was proposed in this paper. To guarantee its normal operation at ultra low supply voltage, the substrate bias techniques is used to reduce the threshold voltage. Meanwhile, an am...
 
Experiences of using a dependence profiler to assist parallelization for multi-cores
Found in: Parallel and Distributed Processing Workshops and PhD Forum, 2011 IEEE International Symposium on
By Dibyendu Das, Peng Wu
Issue Date:April 2010
pp. 1-8
In this work we show how to use a data-dependence profiling tool called DProf, which can be utilized to assist parallelization for multi-core systems. DProf is based on an optimizing compiler and uses reference runs to emit information on runtime dependenc...
 
Research of Image Detection Based on Improved AdaBoost Algorithm
Found in: Machine Vision and Human-machine Interface, International Conference on
By Peng Wu, Shenming Qu
Issue Date:April 2010
pp. 113-115
In order to prevent more effectively the occurrence of the distortion of target weights’ distribution and further reduce system errors, a comprehensive improvement has been conducted on the algorithm’s weight updating and weight normalization to avoid the ...
 
General worm propagation model forwireless ad hoc networks
Found in: Computer Science and Information Technology, International Conference on
By Chen Junhua,Wei Shengjun,Peng Wu
Issue Date:August 2009
pp. 468-473
The popularity of wireless communication networks makes them an attractive target to the creators of worms and other malicious code. Indeed, recently a number of worms designed specifically to spread via these wireless networks have emerged. Based on the e...
 
The Model of Access Control of E-business Website based on PMI/RBAC
Found in: Information Technology and Computer Science, International Conference on
By Peng Wu, Zhao Wang, Jiexi Wan
Issue Date:July 2009
pp. 246-249
In the e-business website which has the characters of personalization ,we need the univers al access controlstrategy to control the behavior of the user. It’s the key point to resolve the website access control that constructing the strategy which combine ...
 
Evolving Complex Network for Classification Problems
Found in: Computational Intelligence and Natural Computing, International Conference on
By Peng Wu, Yuehui Chen, Tao Xu, Haokui Tang
Issue Date:June 2009
pp. 287-290
In this paper, a new automatic method for constructing and evolving complex network is proposed. This method uses the concept of complex networks (mainly scale-free networks) and combines the essence of Immune Programming with Particle Swarm Optimization a...
 
Recognizing Intrusive Intention Based on Dynamic Bayesian Networks
Found in: Information Engineering and Electronic Commerce, International Symposium on
By Peng Wu, Yao Shuping, Chen Junhua, Wang Zhigang
Issue Date:May 2009
pp. 241-244
Knowing an attacker’s intentions can significantly improve the effectiveness of a decision-making system. However, recognition such intentions and the attacker’s intended plans for achieving them is not an easy task because there are too many uncertain and...
 
Reducing Memory Ordering Overheads in Software Transactional Memory
Found in: Code Generation and Optimization, IEEE/ACM International Symposium on
By Michael F. Spear, Maged M. Michael, Michael L. Scott, Peng Wu
Issue Date:March 2009
pp. 13-24
Most research into high-performance software transactional memory (STM) assumes that transactions will run on a processor with a relatively strict memory model, such as Total Store Ordering (TSO). To execute these algorithms correctly on processors with re...
 
Research of Personal Absorptive Capacity of Knowledge Based on Communities of Practice
Found in: Computer Science and Software Engineering, International Conference on
By Peng Wu, Yufeng Wang
Issue Date:December 2008
pp. 137-140
Personal absorptive capacity of knowledge is basic foundation for knowledge creation and transfer. The Community of Practice (CoP) is the engine of knowledge creation. In this paper, we analyzed the relationship among SECI model, Personal absorptive capaci...
 
Model checking the probabilistic pi-calculus
Found in: Quantitative Evaluation of Systems, International Conference on
By Gethin Norman, Catuscia Palamidessi, David Parker, Peng Wu
Issue Date:September 2007
pp. 169-178
We present an implementation of model checking for the probabilistic \pi-calculus, a process algebra which supports modelling of concurrency, mobility and discrete probabilistic behaviour. Formal verification techniques for this calculus have clear applica...
 
Symbolic Bisimulations for Probabilistic Systems
Found in: Quantitative Evaluation of Systems, International Conference on
By Peng Wu, Catuscia Palamidessi, Huimin Lin
Issue Date:September 2007
pp. 179-188
The paper introduces symbolic bisimulations for a simple probabilistic \pi-calculus to overcome the infinite branching problem that still exists in checking ground bisimulations between probabilistic systems. Especially the definition of weak (symbolic) bi...
 
A Novel Method to Authenticate Transitively Closed Undirected Graph
Found in: Computer and Computational Sciences, International Multi-Symposiums on
By Chunguang Ma, Peng Wu, Lingling Wang, Guoyin Zhang
Issue Date:August 2007
pp. 537-542
The transitive signature is currently the only method to sign vertices and edges of a dynamically growing, transitively closed graph. The shortcomings of transitive signatures are the large length of edge signature and the low efficiency of signing the edg...
 
Model-Based Testing of Concurrent Programs with Predicate Sequencing Constraints
Found in: Quality Software, International Conference on
By Peng Wu, Huimin Lin
Issue Date:September 2005
pp. 3-10
A predicate sequencing constraint logic(PSCL) is proposed to represent test purpose for testing of concurrent programs. The advantage of PSCL rests in its capability of expressing not only sequencing relationships among I/O events, but also data dependenci...
 
Iterative Metamorphic Testing
Found in: Computer Software and Applications Conference, Annual International
By Peng Wu
Issue Date:July 2005
pp. 19-24
An enhanced version of metamorphic testing, namely n-iterative metamorphic testing, is proposed to systematically exploit more information out of metamorphic tests by applying metamorphic relations in a chain style. A contrastive case study, conducted with...
 
Efficient SIMD Code Generation for Runtime Alignment and Length Conversion
Found in: Code Generation and Optimization, IEEE/ACM International Symposium on
By Peng Wu, Alexandre E. Eichenberger, Amy Wang
Issue Date:March 2005
pp. 153-164
When generating codes for today's multimedia extensions, one of the major challenges is to deal with memory alignment issues. While hand programming still yields best performing SIMD codes, it is both time consuming and error prone. Compiler technology has...
 
Three-axis NC Cutter Path Generation for Subdivision Surface
Found in: Geometric Modeling and Processing
By Peng Wu, Hiromasa Suzuki, Joe Kuragano, Kiwamu Kase
Issue Date:April 2004
pp. 349
In this paper we propose methodologies and algorithms of NC cutter path generation for subdivision surfaces. We select Loop surface as the subdivision surface. A path plan including rough cut and finish-cut is developed based on LoD (Level of Detail) prope...
 
A Steady Source Model for VBR Video Conferences
Found in: Information Technology: Coding and Computing, International Conference on
By Lu Yan-ling, Wan Peng, Wu Wei-ling
Issue Date:April 2003
pp. 268
In this paper, we proposed a new approach to model video traffic H.263 encoded. By introducing marginal matching technique and a variable of uniform distribution in different manners, we get two modified models, called MMB-DAR(1)(Marginal Matching Based-DA...
 
Containers on the Parallelization of General-Purpose Java Programs
Found in: Parallel Architectures and Compilation Techniques, International Conference on
By Peng Wu, David Padua
Issue Date:October 1999
pp. 84
Automatic parallelization of general-purpose programs is still not possible in general in the presence of irregular data structures and complex control-flows. One promising strategy is tread-level data speculation (TLDS). Although TLDS alleviates the need ...
 
Software transactional memory: why is it only a research toy?
Found in: Communications of the ACM
By Calin Cascaval, Colin Blundell, Harold W. Cain, Maged Michael, Peng Wu, Siddhartha Chatterjee, Stefanie Chiras, Calin Cascaval, Colin Blundell, Harold W. Cain, Maged Michael, Peng Wu, Siddhartha Chatterjee, Stefanie Chiras
Issue Date:November 2008
pp. 40-46
The promise of STM may likely be undermined by its overheads and workload applicabilities.
     
Software Support and Evaluation of Hardware Transaction Memory on Blue Gene/Q
Found in: IEEE Transactions on Computers
By Amy Wang,Matthew Gaudet,Peng Wu,Martin Ohmacht,Jose Nelson Amaral,Christopher Barton,Raul Silvera,Maged M. Michael
Issue Date:September 2013
pp. 1
This paper describes an end-to-end system implementation of a transactional memory (TM) programming model on top of the hardware transactional memory (HTM) of the Blue Gene/Q machine. The TM programming model supports most C/C++ programming constructs usin...
 
Study on Treatment of Mine Water and Its Cost Analysis
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Qi Peng, Wu Haixia, Zhang Yaowen
Issue Date:February 2011
pp. 2225-2228
During the process of coal production, mine water pollution is serious. It will become a threat to ecological environment in coal mining area if this kind of water is drained away to the nature directly. Take Jialong coal mine as an example, we analyzed ma...
 
Smart Embed Tension Tensor Based on Internet
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Peng Wu, Aixia Wang, Jingjiao Li
Issue Date:November 2007
pp. 225-228
Sensor system is required for synthesis precision, stabilization and highly responding speed. The traditional sensor systems are not suitable for the requirement. We designed the smart sensor system which can communicate with Internet and detect tensile fo...
 
Local decomposition for rare class analysis
Found in: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '07)
By Hui Xiong, Jian Chen, Junjie Wu, Peng Wu
Issue Date:August 2007
pp. 814-823
Given its importance, the problem of predicting rare classes in large-scale multi-labeled data sets has attracted great attentions in the literature. However, the rare-class problem remains a critical challenge, because there is no natural way developed fo...
     
Optimizing R VM: Allocation Removal and Path Length Reduction via Interpreter-level Specialization
Found in: Proceedings of Annual IEEE/ACM International Symposium on Code Generation and Optimization (CGO '14)
By David Padua, Haichuan Wang, Peng Wu
Issue Date:February 2014
pp. 295-305
The performance of R, a popular data analysis language, was never properly understood. Some claimed their R codes ran as efficiently as any native code, others quoted orders of magnitude slowdown of R codes with respect to equivalent C implementations. We ...
     
Simple, portable and fast SIMD intrinsic programming: generic simd library
Found in: Proceedings of the 2014 Workshop on Programming models for SIMD/Vector processing (WPMVP '14)
By Haichuan Wang, Ilie Gabriel Tanase, José E. Moreira, Mauricio J. Serrano, Peng Wu
Issue Date:February 2014
pp. 9-16
Using SIMD (Single Instruction Multiple Data) is a cost-effective way to explore data parallelism on modern processors. Most processor vendors today provide SIMD engines, such as Altivec/VSX for POWER, SSE/AVX for Intel processors, and NEON for ARM. While ...
     
Optimizing IBM algorithmics' mark-to-future aggregation engine for real-time counterparty credit risk scoring
Found in: Proceedings of the 6th Workshop on High Performance Computational Finance (WHPCF '13)
By Barnaby Dalton, Bob Blainey, James Sedgwick, Lior Velichover, Neil Bartlett, Yaoqing Gao, Amy Wang, Danny Gupta, Fahham Khan, Jan Treibig, Louis Ly, Peng Wu
Issue Date:November 2013
pp. 1-8
The concept of default and its associated painful repercussions have been a particular area of focus for financial institutions, especially after the 2007/2008 global financial crisis. Counterparty credit risk (CCR), i.e. risk associated with a counterpart...
     
Cloud based multimedia analytic platform
Found in: Proceedings of the 21st ACM international conference on Multimedia (MM '13)
By Peng Wu, Qian Lin, Rares Vernica
Issue Date:October 2013
pp. 429-430
Multimedia Analytic Platform is a cloud based service to expose state-of-the-art multimedia technologies for mobile and web application development. As a product-quality service platform, it offers comprehensive API documentation, code example, service des...
     
Access to multimodal articles for individuals with sight impairments
Found in: ACM Transactions on Interactive Intelligent Systems (TiiS)
By Charles Greenbacker, Daniel Chester, David Oliver, Edward Schwartz, Kathleen Mccoy, Peng Wu, Priscilla Moraes, Sandra Carberry, Seniz Demir, Stephanie Elzer Schwartz
Issue Date:December 2012
pp. 1-49
Although intelligent interactive systems have been the focus of many research efforts, very few have addressed systems for individuals with disabilities. This article presents our methodology for an intelligent interactive system that provides individuals ...
     
On the benefits and pitfalls of extending a statically typed language JIT compiler for dynamic scripting languages
Found in: Proceedings of the ACM international conference on Object oriented programming systems languages and applications (OOPSLA '12)
By David Edelsohn, Jose Castanos, Kazuaki Ishizaki, Peng Wu, Priya Nagpurkar, Takeshi Ogasawara, Toshio Nakatani
Issue Date:October 2012
pp. 195-212
Whenever the need to compile a new dynamically typed language arises, an appealing option is to repurpose an existing statically typed language Just-In-Time (JIT) compiler (repurposed JIT compiler). Existing repurposed JIT compilers (RJIT compilers), howev...
     
Adaptive multi-level compilation in a trace-based Java JIT compiler
Found in: Proceedings of the ACM international conference on Object oriented programming systems languages and applications (OOPSLA '12)
By Hiroshi Inoue, Hiroshige Hayashizaki, Peng Wu, Toshio Nakatani
Issue Date:October 2012
pp. 179-194
This paper describes our multi-level compilation techniques implemented in a trace-based Java JIT compiler (trace-JIT). Like existing multi-level compilation for method-based compilers, we start JIT compilation with a small compilation scope and a low opti...
     
Evaluation of blue Gene/Q hardware support for transactional memories
Found in: Proceedings of the 21st international conference on Parallel architectures and compilation techniques (PACT '12)
By Amy Wang, Christopher Barton, José Nelson Amaral, Maged Michael, Martin Ohmacht, Matthew Gaudet, Peng Wu, Raul Silvera
Issue Date:September 2012
pp. 127-136
This paper describes an end-to-end system implementation of the transactional memory (TM) programming model on top of the hardware transactional memory (HTM) of the Blue Gene/Q (BG/Q) machine. The TM programming model supports most C/C++ programming constr...
     
Improving face clustering using social context
Found in: Proceedings of the international conference on Multimedia (MM '10)
By Feng Tang, Peng Wu
Issue Date:October 2010
pp. 907-910
In this paper we describe an algorithm to improve the performance of face clustering using the social relationship of people. One common challenge in face clustering techniques is that very often the faces of the same person are clustered into different fa...
     
MagicPhotobook: designer inspired, user perfected photo albums
Found in: Proceedings of the seventeen ACM international conference on Multimedia (MM '09)
By Andrew Carter, Chris Willis, Clayton Brian Atkins, Daniel Tretter, David Slatter, Hui Chao, Jun Xiao, Peng Wu, Phil Cheatle, Roland Penny, Xuemei Zhang, Yuli Gao
Issue Date:October 2009
pp. 979-980
Computer-assisted photo album creation continues to be a challenging application as it requires integrated technical solutions to many difficult problems. Effective solutions must leverage both design knowledge and image understanding algorithms to automat...
     
Close & closer: social cluster and closeness from photo collections
Found in: Proceedings of the seventeen ACM international conference on Multimedia (MM '09)
By Dan Tretter, Peng Wu
Issue Date:October 2009
pp. 709-712
We investigate the discovery of social clusters from consumer photo collections. People's participation in various social activities is the base on which social clusters are formed. The photos that record those social activities can reflect the social stru...
     
Software Transactional Memory: Why Is It Only a Research Toy?
Found in: Queue
By Calin Cascaval, Colin Blundell, Harold W. Cain, Maged Michael, Peng Wu, Siddhartha Chatterjee, Stefanie Chiras
Issue Date:September 2008
pp. 46-58
STM is sometimes touted as the way forward for developing concurrent software, but is it ready for use in real-world applications? The authors built an STM runtime system and compiler framework, the IBM STM, and compared its performance to other similar pr...
     
Optimizing data permutations for SIMD devices
Found in: Proceedings of the 2006 ACM SIGPLAN conference on Programming language design and implementation (PLDI '06)
By David Padua, Gang Ren, Peng Wu
Issue Date:June 2006
pp. 160-169
The widespread presence of SIMD devices in today's microprocessors has made compiler techniques for these devices tremendously important. One of the most important and difficult issues that must be addressed by these techniques is the generation of the dat...
     
A comparison of empirical and model-driven optimization
Found in: Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation (PLDI'03)
By David Padua, Gang Ren, Gerald DeJong, Kamen Yotov, Keshav Pingali, Maria Garzaran, Michael Cibulskis, Paul Stodghill, Peng Wu, Xiaoming Li
Issue Date:June 2003
pp. 329-338
Empirical program optimizers estimate the values of key optimization parameters by generating different program versions and running them on the actual hardware to determine which values give the best performance. In contrast, conventional compilers use mo...
     
 1  2 Next >>