Search For:

Displaying 1-50 out of 167 total
A Regularized Multiple Criteria Linear Program for Classification
Found in: Data Mining Workshops, International Conference on
By Yong Shi, Yingjie Tian, Xiaojun Chen, Peng Zhang
Issue Date:October 2007
pp. 253-258
Although multiple criteria mathematical programs (MCMP), as alternative methods of classification, have been used in various real-life data mining problems, its mathematical structure of solvability are still challenge- able. This paper proposes a regulari...
 
Long-Distance Oil/Gas Pipeline Failure Rate Prediction Based on Fuzzy Neural Network Model
Found in: Computer Science and Information Engineering, World Congress on
By Xing-yu Peng, Peng Zhang, Li-qiong Chen
Issue Date:April 2009
pp. 651-655
With an aging underground long-distance oil/gas pipeline, ever-encroaching population and increasing oil price, the burden on pipeline agencies to efficiently prioritize and maintain the rapidly deteriorating underground utilities is increasing. Failure ra...
 
Adaptive Shared-Filter Ordering for Efficient Multimedia Stream Monitoring
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Jun Li,Peng Wang,Peng Zhang,Jianlong Tan
Issue Date:November 2011
pp. 760-763
Multimedia stream monitoring refers to removing unwanted and malicious records from multimedia streams. In this application, a large number of filtering queries are registered on time-critical multimedia streams. Each filtering query contains multiple meta...
 
The Study of Interfacing Wireless Sensor Networks to Grid Computing Based on Web Service
Found in: Education Technology and Computer Science, International Workshop on
By Peng Zhang, Ming Chen, Peng-ju He
Issue Date:March 2010
pp. 439-442
The Grid computing is transforming the physical world into a computing platform. Sensor networks combining physical sensing capabilities such as temperature, light with networking and computation capabilities are becoming ubiquitous. The sensor networks sy...
 
A Study on Identifying Essential Hyperplanes for Constructing a Multiclass Classification Model
Found in: Networked Computing and Advanced Information Management, International Conference on
By Sung-Hyuk Park, Soon-Young Huh, Peng Zhang, Yong Shi
Issue Date:August 2009
pp. 1798-1804
The multiclass classification problem has been applied to build a decision function to separate a set of data points into multiple classes. To solve this problem, a number of methods have been developed by extending binary classifications to multiclass cla...
 
EBAT: Energy Balanced Adaptive Transmission Algorithm for Sensor Networks
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Yu-ting Sun, Wei-qin Lv, Li-peng Zhang, Peng Zhou
Issue Date:October 2008
pp. 565-574
Abstract—In wireless sensor networks, balanced energy dissipation is crucial to achieving satisfactory network lifetime. Since all data packets usually have to be forwarded to the base station via multi-hop routing, the traffic pattern is highly non-unifor...
 
Learning Optimal Filter Representation for Texture Classification
Found in: Pattern Recognition, International Conference on
By Peng Zhang, Jing Peng, Bill Buckles
Issue Date:August 2006
pp. 1138-1141
Crucial to texture classification are texture features and classifiers that operate on the features. There are several approaches to computing texture features. Of particular interest is multichannel filtering because of its simplicity. Multichannel filter...
 
Discriminant Analysis: A Least Squares Approximation View
Found in: Computer Vision and Pattern Recognition Workshop
By Peng Zhang, Jing Peng, Nobert Riedel
Issue Date:June 2005
pp. 46
<p>Linear discriminant analysis (LDA) is a very important approach to selecting features in classification such as facial recognition. However it suffers from the small sample size (SSS) problem where LDA cannot be solved numerically. The SSS problem...
 
SVM vs Regularized Least Squares Classification
Found in: Pattern Recognition, International Conference on
By Peng Zhang, Jing Peng
Issue Date:August 2004
pp. 176-179
Support vector machines (SVMs) and regularized least squares (RLS) are two recent promising techniques for classification. SVMs implement the structure risk minimization principle and use the kernel trick to extend it to the non-linear case. On the other h...
 
Efficient Regularized Least Squares Classification
Found in: Computer Vision and Pattern Recognition Workshop
By Peng Zhang, Jing Peng
Issue Date:July 2004
pp. 98
Kernel-based regularized least squares (RLS) algorithms are a promising technique for classification. RLS minimizes a regularized functional directly in a reproducing kernel Hilbert space defined by a kernel. In contrast, support vector machines (SVMs) imp...
 
Dimensionality Reduction Using Kernel Pooled Local Discriminant Information
Found in: Data Mining, IEEE International Conference on
By Peng Zhang, Jing Peng, Carlotta Domeniconi
Issue Date:November 2003
pp. 701
We study the use of kernel subspace methods for learning low-dimensional representations for classification. We propose a kernel pooled local discriminant subspace method and compare it against several competing techniques: generalized Fisher discriminant ...
 
Kernel Pooled Local Subspaces for Classification
Found in: Computer Vision and Pattern Recognition Workshop
By Peng Zhang, Jing Peng, Carlotta Domeniconi
Issue Date:June 2003
pp. 63
We study the use of kernel subspace methods for learning low-dimensional representations for classification. We propose a kernel pooled local discriminant subspace method and compare it against several competing techniques: Principal Component Analysis (PC...
 
A New Research Field: Intelligent Knowledge Management
Found in: Business Intelligence and Financial Engineering, International Conference on
By Lingling Zhang, Jun Li, Aihua Li, Peng Zhang, Guangli Nie, Yong Shi
Issue Date:July 2009
pp. 450-454
Knowledge or hidden patterns discovered by data mining from large-scale databases has great novelty, which is often unable to be gained from the experts. Given large-scale databases, this paper proposes foundations of intelligent knowledge management. It e...
 
Composite Solid Plane to Simulate the Frequency Response of Pavement
Found in: 2012 Third International Conference on Digital Manufacturing and Automation (ICDMA)
By Li Jianbo,Cao Peng,Zhang Chao
Issue Date:July 2012
pp. 285-288
The pavement will afford the dynamic vehicle loading during using period, so it is necessary to analyze the dynamic response of pavement in order to predict pavement durable function. the most important part of pavement dynamic analysis is frequency and sp...
 
A New Weighted Ensemble Model for Detecting DoS Attack Streams
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Jinghua Yan, Xiaochun Yun, Peng Zhang, Jianlong Tan, Li Guo
Issue Date:September 2010
pp. 227-230
Recently, DoS (Denial of Service) detection has become more and more important in web security. In this paper, we argue that DoS attack can be taken as continuous data streams, and thus can be detected by using stream data mining methods. More specifically...
 
Select Objective Functions for Multiple Criteria Programming Classification
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Peng Zhang, Yingjie Tian, Zhiwang Zhang, Aihua Li, Xingquan Zhu
Issue Date:December 2008
pp. 420-423
Existing supervised learning models are generally built upon the basis of only one single objective function, through the minimizing of the square-loss (neural networks) or the minimizing of the information entropy (decision tree). Due to the inherent comp...
 
Transfer Knowledge via Relational K-Means Method
Found in: Business Intelligence and Financial Engineering, International Conference on
By Peng Zhang, Lingling Zhang, Guangli Nie, Yuejin Zhang, Yong Shi
Issue Date:July 2009
pp. 656-659
Recent years have witnessed a large body of research works on mining knowledge from large volume of data to support decision making, where a primary assumption is that the training and test examples come from a same domain (i.e., the target domain). Howeve...
 
Similarity Search in Time Series Database Based on SOFM Neural Network
Found in: International Conference on Natural Computation
By Peng Zhang, Xue-ren Li, Jun Du, Zong-lin Zhang, Jian-ye Zhang
Issue Date:August 2007
pp. 715-718
A novel algorithm for the similarity search in time series database is proposed. Considering the neural network?s poor capability when handling with time change process sequence, the original data is mapped into the feature pattern space by means of Discre...
 
E-Tree: An Efficient Indexing Structure for Ensemble Models on Data Streams
Found in: IEEE Transactions on Knowledge and Data Engineering
By Peng Zhang,Chuan Zhou,Peng Wang,Byron Gao,Xingquan Zhu,Li Guo
Issue Date:March 2014
pp. 1
Ensemble learning is a common tool for data stream classification, mainly because of its inherent advantages of handling large volumes of stream data and concept drifting. Previous studies, to date, have been primarily focused on building accurate ensemble...
 
E-Tree: An Efficient Indexing Structure for Ensemble Models on Data Streams
Found in: IEEE Transactions on Knowledge and Data Engineering
By Peng Zhang,Chuan Zhou,Peng Wang,Byron J. Gao,Xingquan Zhu,Li Guo
Issue Date:February 2014
pp. 1
Ensemble learning has become a common tool for data stream classification, being able to handle large volumes of stream data and concept drifting. Previous studies focus on building accurate ensemble models from stream data. However, a linear scan of a lar...
 
A Bicriteria Approximation Algorithm for Generalized k-Multicut in Trees
Found in: Computational Sciences and Optimization, International Joint Conference on
By Peng Zhang, Daming Zhu, Junfeng Luan
Issue Date:April 2009
pp. 699-702
Given a tree $T=(V, E)$ with costs defined on edges, a positive integer $k$, and $l$ terminal sets $\{S_1, S_2, \dots, S_l\}$ with every $S_i \subseteq V$, the generalized $k$-Multicut in trees problem ($k$-GMC(T)) asks to find an edge subset in $E$ at the...
 
Simulation and Experimental Studies on Similar Material of Rockmass
Found in: Modelling, Simulation and Optimization, International Workshop on
By Chang-long Wang, Yan-ming Qi, Kun-peng Zhang
Issue Date:December 2008
pp. 355-359
Model experimental basis is similar theory, that is similar to model and prototype, model can reflect situation of the prototype. Based on similar theory, adopting similar similar material of cement-gypsum to make model, its Brittle is close to rock, elast...
 
The Comparative Study on Utility Maximizing of the Portfolio Selection Model
Found in: Modelling, Simulation and Optimization, International Workshop on
By Ye-ping Chu, Peng Zhang
Issue Date:December 2008
pp. 42-46
This thesis considers the expected rate of return and risk (variance) comprehensively, proposes the optimal utility maximizing portfolio selection model with different lending and borrowing rate of risk-free asset. It has significance in theory and practic...
 
Multiple-Criteria Linear Programming for VIP E-Mail Behavior Analysis
Found in: Data Mining Workshops, International Conference on
By Peng Zhang, Jingran Dai
Issue Date:October 2007
pp. 289-296
Excessive lose of customer account is becoming a major headache for VIP E-Mail hosting companies. Analysis of features of easily lost customers and finding the appropriate measures to sustain them has become pressing needs for these companies. As a promisi...
 
Discriminant Analysis: A Unified Approach
Found in: Data Mining, IEEE International Conference on
By Peng Zhang, Norbert Riedel
Issue Date:November 2005
pp. 514-521
Linear discriminant analysis (LDA) as a dimension reduction method is widely used in data mining and machine learning. It however suffers from the small sample size (SSS) problem when data dimensionality is greater than the sample size. Many modified metho...
 
Formal Analysis for Cipher Chip's Security against Template Attack
Found in: Information Science and Engineering, International Conference on
By Gaoming Deng, Peng Zhang, Qiang Zhao, Kaiyan Chen
Issue Date:December 2009
pp. 1741-1744
In order to evaluate the security of cipher chips against template attack, the adversary's ability is defined combing the notion of equivalence relations and partitions after analyzing the character of key space partition in template matching phase, The di...
 
EM Frequency Domain Correlation Analysis on Cipher Chips
Found in: Information Science and Engineering, International Conference on
By Peng Zhang, Gaoming Deng, Qiang Zhao, Kaiyan Chen
Issue Date:December 2009
pp. 1729-1732
Inserting random time delay into cipher device's running process is a general countermeasure against time domain correlation side channel attacks. In which way the interesting intermediate operations will occur at different time in different runs of the ci...
 
Reliability Analysis of Interdependent Networks Using Percolation Theory
Found in: 2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)
By Qiong Zhang,Daqing Li,Rui Kang,Enrico Zio,Peng Zhang
Issue Date:December 2013
pp. 626-629
Many complex systems have functional interdependency between each other and can be modeled as interdependent networks. The failure of a small fraction of nodes in interdependent networks may lead to catastrophic cascading failures across network borders. S...
 
The Method of the Channel Test and Modeling About VHF/UHF Band
Found in: Computer Science and Electronics Engineering, International Conference on
By Lei Chen,Xue-ping Zhang,Zhen-hua Wang,Yuan-fu Lin,Lei Wang,You-Peng Zhang
Issue Date:March 2012
pp. 141-143
This article mainly from the start of the radio signal propagation characteristics, and connecting with the reality, according to the actual situation of some aera, the three typical environment of the topography for signal channel test and modeling is cho...
 
Study on the Calculation Method of Time Parameters in Grey Network Planning
Found in: Future Information Technology and Management Engineering, International Seminar on
By Wen-Qing Meng, Ya-Peng Zhang, Yan-Jie Zhang
Issue Date:December 2009
pp. 432-435
In grey network planning, the parameters of duration are expressed as interval grey numbers. When the time parameters were calculated according to grey number operational laws, grey degree of the results is expanded unnecessarily and sometimes the lower bo...
 
A Large Frequency Offset Estimation Algorithm for IEEE 802.11a System
Found in: Communications and Mobile Computing, International Conference on
By Han Qingwen, Zhang Peng, Zhang Youfang
Issue Date:January 2009
pp. 316-320
According to the packet structure of IEEE Standard 802.11a and the characters of short training symbols, a new frequency offset estimation algorithm is presented. A two stages strategy based on auto-correlation algorithm is used to solve the contradiction ...
 
Cleansing Noisy Data Streams
Found in: Data Mining, IEEE International Conference on
By Xingquan Zhu, Peng Zhang, Xindong Wu, Dan He, Chengqi Zhang, Yong Shi
Issue Date:December 2008
pp. 1139-1144
In this paper, we identify a new research problem on cleansing noisy data streams which contain incorrectly labeled training examples. The objective is to accurately identify and remove mislabeled data, such that the prediction models built from the cleans...
 
Business-Oriented Virtualization of Web Services
Found in: Service-Oriented System Engineering, IEEE International Workshop on
By Yanbo Han, Peng Zhang, Wanghu Chen, Cheng Zhang, Jing Wang
Issue Date:December 2008
pp. 275-280
In addition to enabling controlled sharing and isolation, the virtualization mechanism can help to provide users a single image, and to realize a more abstract and uniform view from a set of fine-grained, heterogeneous and un-ordered instances. The paper e...
 
DEA-Based Comprehensive Evaluation of Intelligent Knowledge
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Lingling Zhang, Jie Wei, Anqiang Huang, Jun Li, Peng Zhang
Issue Date:December 2008
pp. 432-435
The paper is about how to evaluate the intelligent knowledge. We think that the criteria is not only distinguishing ability and accuracy of the algorithm, but also algorithm robustness, stability and so on. Besides positive characters listed above, a fair ...
 
Kernel-Based Nonparametric Regression Method
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Dongling Zhang, Yingjie Tian, Peng Zhang
Issue Date:December 2008
pp. 410-413
Regression is a basic statistical tool in data mining, which is to predict the relationship between a dependent variable and one or more independent variables. Parametric and nonparametric regression are two kinds of regression approach used for various pr...
 
Item-Based Top-k Influential User Discovery in Social Networks
Found in: 2013 IEEE 13th International Conference on Data Mining Workshops (ICDMW)
By Jing Guo,Peng Zhang,Chuan Zhou,Yanan Cao,Li Guo
Issue Date:December 2013
pp. 780-787
Discovering top-k influential users plays a central role in many social network applications. In this paper, we study a challenging problem of discovering item-based top-k influential users in social networks. Specifically, we present a dynamic selection a...
 
Evaluable Secure Ranked Keyword Search Scheme over Encrypted Cloud Data
Found in: 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
By Jia Zhi-Peng,Zhang Ya-Ling,Wang Shang-Ping,Sun Qin-Dong
Issue Date:December 2013
pp. 697-701
As sensitive information is centralized into the cloud, how to effectively search over encrypted data is becoming a research bottleneck of Cloud Storage Security. Based on the original solution of secure ranked keyword search over encrypted cloud data, we ...
 
UBLF: An Upper Bound Based Approach to Discover Influential Nodes in Social Networks
Found in: 2013 IEEE International Conference on Data Mining (ICDM)
By Chuan Zhou,Peng Zhang,Jing Guo,Xingquan Zhu,Li Guo
Issue Date:December 2013
pp. 907-916
Influence maximization, defined as finding a small subset of nodes that maximizes spread of influence in social networks, is NP-hard under both Linear Threshold (LT) and Independent Cascade (IC) models, where a line of greedy/heuristic algorithms have been...
 
3D-Realtime-Monitor Syestem for Lunar Rover
Found in: 2013 International Conference on Virtual Reality and Visualization (ICVRV)
By Peng Zhang,Guopeng Li,Jianjun Liu,Xin Ren,Xingye Gao
Issue Date:September 2013
pp. 265-268
The 3D-Real time-Monitor system is a real-time virtual reality system and it is consist of data sever and rendering client. As a real-time virtual reality system, 3D-Real time-Monitor is driven by the runtime telemeasuring data and it is integrated with ki...
 
Virtual Machine Placement for Improving Energy Efficiency and Network Performance in IaaS Cloud
Found in: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops (ICDCSW)
By Jiankang Dong, Hongbo Wang, Xing Jin, Yangyang Li, Peng Zhang, Shiduan Cheng
Issue Date:July 2013
pp. 238-243
Under the premise of ensuring application performance, how to place virtual machines (VMs) on physical machines (PMs) to improve resource utilization and reduce energy consumption is one of the major concerns for cloud providers in IaaS cloud. The existing...
 
SmartShuffle: Managing Online Virtual Machine Shuffle in Virtualized Data Centers
Found in: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops (ICDCSW)
By Peng Zhang, Hongbo Wang, Junbo Li, Jiankang Dong, Yangyang Li, Shiduan Cheng
Issue Date:July 2013
pp. 113-118
Virtual machine (VM) live migration provides spatial flexibility by rearranging VM placement (i.e., VM shuffle) in several scenarios, including server consolidation, power consumption saving, fault tolerance, QoS management and network congestion resolving...
 
Unwanted Content Control via Trust Management in Pervasive Social Networking
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Zheng Yan,Raimo Kantola, Gaowa Shi, Peng Zhang
Issue Date:July 2013
pp. 202-209
MANET has a good prospect of becoming a practical platform of social networking and computing to support instant social activities and communications, now named pervasive social networking (PSN). However, at the same time as mobile users expect useful and ...
 
A Research Model for Trustworthy Pervasive Social Networking
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Zheng Yan, Peng Zhang,Valtteri Niemi,Raimo Kantola
Issue Date:July 2013
pp. 1522-1527
Social networking has extended its popularity from the Internet to the mobile domain. Nowadays, mobile Internet can work together with self-organized ad hoc networks to offer advanced pervasive social networking (PSN) at any time and in any place. Trust pl...
 
A New Interest-Sensitive and Network-Sensitive Method for User Recommendation
Found in: 2013 IEEE 8th International Conference on Networking, Architecture, and Storage (NAS)
By Yanmin Shang,Peng Zhang,Yanan Cao
Issue Date:July 2013
pp. 242-246
With the rapid proliferation of diverse online social network sites, user recommendation has been received unprecedented attention. At present, the methods for user recommendation are mainly divided into two categories: recommending a new friend for a targ...
 
Reliability-Aware Energy Efficiency in Web Service Provision and Placement
Found in: 2013 IEEE International Conference on Web Services (ICWS)
By Ying Chen,Peng Zhang,Xiangzhen Kong,Chuang Lin
Issue Date:June 2013
pp. 411-418
Reliability is a critical concern in the provision and placement of web services. A breakdown of service would seriously reduce customers' satisfaction, and thus harm the revenue of service providers. To maintain a high reliability, the common approach is ...
 
User-Centric Organization of Search Results
Found in: IEEE Internet Computing
By Byron J. Gao,David Buttler,David C. Anastasiu,Shuaiqiang Wang,Peng Zhang,Joey Jan
Issue Date:May 2013
pp. 52-59
The authors investigated the use of microblogs&#x2014;or weibos&#x2014;and related censorship practices using 111 million microblogs collected between 1 January and 30 June 2012. Using a matched case-control study design helped researchers determin...
 
Energy-Saving Virtual Machine Placement in Cloud Data Centers
Found in: 2013 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)
By Jiankang Dong,Xing Jin,Hongbo Wang,Yangyang Li,Peng Zhang,Shiduan Cheng
Issue Date:May 2013
pp. 618-624
In cloud data centers, different mapping relationships between virtual machines (VMs) and physical machines (PMs) cause different resource utilization, therefore, how to place VMs on PMs to improve resource utilization and reduce energy consumption is one ...
 
Design and Analysis of Pipelined Broadcast Algorithms for the All-Port Interlaced Bypass Torus Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Peng Zhang,Yuefan Deng
Issue Date:December 2012
pp. 2245-2253
Broadcast algorithms for the interlaced bypass torus networks (iBT networks) are introduced to balance the all-port bandwidth efficiency and to avoid congestion in multidimensional cases. With these algorithms, we numerically analyze the dependencies of th...
 
Cost Optimization of Cloud-Based Data Integration System
Found in: 2012 9th Web Information Systems and Applications Conference (WISA)
By Peng Zhang,Yanbo Han,Zhuofeng Zhao,Guiling Wang
Issue Date:November 2012
pp. 183-188
Cloud computing provides virtualized, dynamically-scalable computing power. At the same time, reduction of cost is also considered as an important advantage of cloud computing. Data integration can notably benefit from cloud computing because integrating d...
 
An approach of secure and fashionable recognition for pervasive face-to-face social communications
Found in: 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
By Zheng Yan,Yu Chen,Peng Zhang
Issue Date:October 2012
pp. 853-860
Pervasive social communications are instant social activities through communications based on mobile elements, e.g., via mobile ad hoc networks. Meanwhile, fashionable technology is becoming a trend in Human-Computer Interaction (HCI) design. It extends th...
 
 1  2 Next >>