Search For:

Displaying 1-50 out of 97 total
An Interactive Mathematics Education Platform Based on Topic-Based Deep Search
Found in: Education Technology and Computer Science, International Workshop on
By Li Yang, Mo Qian, Wang Fang
Issue Date:March 2010
pp. 163-169
This paper presents a framework of a platform for interactive mathematics education. This platform mainly integrates three technologies: topic-based search engine, Deep Web information integration and Wiki. Mathematics information is gathered by topic robo...
Security Challenges for the Public Cloud
Found in: IEEE Internet Computing
By Kui Ren,Cong Wang,Qian Wang
Issue Date:January 2012
pp. 69-73
Cloud computing represents today's most exciting computing paradigm shift in information technology. However, security and privacy are perceived as primary obstacles to its wide adoption. Here, the authors outline several critical security challenges and m...
Towards Secure and Effective Utilization over Encrypted Cloud Data
Found in: Distributed Computing Systems Workshops, International Conference on
By Cong Wang, Qian Wang, Kui Ren
Issue Date:June 2011
pp. 282-286
Cloud computing enables an economic paradigm of data service outsourcing, where individuals and enterprise customers can avoid committing large capital outlays in the purchase and management of both software and hardware and the operational overhead therei...
Efficient Countermeasures against Fault Attacks for 3DES Crypto Engine in Bank IC Card
Found in: 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
By Qian Wang,Liji Wu,Xiangmin Zhang,Xiangyu Li,Jun Guo
Issue Date:December 2013
pp. 729-733
As bank IC cards with chips are widely used nowadays, the security of them becomes increasingly important. Fault attack, which aims to inject fault into the chip during the calculation, is a serious threat to the information security of the chip. Thus cons...
Anti-jamming communication in cognitive radio networks with unknown channel statistics
Found in: Network Protocols, IEEE International Conference on
By Qian Wang,Kui Ren,Peng Ning
Issue Date:October 2011
pp. 393-402
Recently, many opportunistic spectrum sensing and access protocols have been proposed for cognitive radio networks (CRNs). For achieving optimized spectrum usage, existing solutions model the spectrum sensing and access problem as a partially observed Mark...
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
Found in: IEEE Transactions on Parallel and Distributed Systems
By Cong Wang,Kui Ren,Jia Wang,Qian Wang
Issue Date:June 2013
pp. 1172-1181
Cloud computing economically enables customers with limited computational resources to outsource large-scale computations to the cloud. However, how to protect customers' confidential data involved in the computations then becomes a major security concern....
Research on Parameterization and Modularization Design Technology of Crawler Crane and CelerityDesign Platform Development
Found in: Software Engineering, World Congress on
By Xu-Yang Cao, Shun-De Gao, Qian Wang, Jian-Song Wang, Xin Wang
Issue Date:May 2009
pp. 342-347
Taking crawler crane as subject investigated, this paper presents the integration of modularizing and parameterizing design technology, by which crawler crane is parameterized and disassembled into several modules. Several modules build up a design element...
Data Center Power Cost Optimization via Workload Modulation
Found in: 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing (UCC)
By Cheng Wang,Bhuvan Urgaonkar,Qian Wang,George Kesidis,Anand Sivasubramaniam
Issue Date:December 2013
pp. 260-263
We formulate optimization problems to study how data centers might modulate their power demands for cost-effective operation taking into account various complexities exhibited by real-world electricity pricing schemes. For computational tractability reason...
Privacy-Preserving Public Auditing for Secure Cloud Storage
Found in: IEEE Transactions on Computers
By Cong Wang,Sherman S.M. Chow,Qian Wang,Kui Ren,Wenjing Lou
Issue Date:February 2013
pp. 362-375
Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that...
Optical Fiber Temperature Sensing System Design Based on the Spectral Detection Principle
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Wang Hao,Zhao Qian,Wang Yutian
Issue Date:October 2011
pp. 43-45
The development of optical fiber temperature sensor in recent years, promoting the development of temperature measurement on line. For example, temperature monitoring in the high-voltage power system equipment to monitor the operational status of their sec...
Research of County-level Food Production Efficiency by DEA Model and GIS Technologies
Found in: Internet Computing and Information Services, International Conference on
By Liping Wang,Qian Wang,Jie Zhao,Yinkang Zhou
Issue Date:September 2011
pp. 249-252
By linking DEA model to GIS technologies, this paper makes an empirical analysis about food production efficiency of 138 counties in Hebei Province from three aspects: total factor efficiency, technical efficiency and technological progress efficiency. The...
Toward Secure and Dependable Storage Services in Cloud Computing
Found in: IEEE Transactions on Services Computing
By Cong Wang,Qian Wang,Kui Ren,Ning Cao,Wenjing Lou
Issue Date:January 2012
pp. 220-232
Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physic...
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
Found in: IEEE Transactions on Parallel and Distributed Systems
By Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li
Issue Date:May 2011
pp. 847-859
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Thi...
The DEA Analysis of Power Grids Construction of the Socio-economic Impact
Found in: Electrical and Control Engineering, International Conference on
By Jingmin Wang, Qian Wang
Issue Date:June 2010
pp. 4395-4398
Construction of power grids has a significant impact on the socio-economic development, grid construction and socio-economic constraints. Analyze the relationship between construction of power grids and socio-economic impact, this paper uses Data Envelopme...
Empirical Studies of Influential Factors on Overseas Acquisition: From Home Country perspective
Found in: Business and Information Management, International Seminar on
By Qian Wang, Ying-chun Wang
Issue Date:December 2008
pp. 299-303
The opening up policy of China has been turned from only attracting overseas capital to encouraging Chinese enterprises to “going aboard” ,This paper comprehensively applies S.hymer’s monopoly advantage theory, Johnson’s core capital theory and Dunning’s e...
The Research about Chinese Corporations' Performance Transition from Overseas Technology-Acquiring M&As
Found in: Risk Management & Engineering Management, 2008 International Conference on
By Qian Wang, Ying-chun Wang, Qi Feng
Issue Date:November 2008
pp. 582-587
This article comparatively analyzes performance transition in two years that attributes to overseas technology-acquiring M&As carried out by listed companies in Shanghai and Shenzhen Stock Exchanges during 2000 to 2005. The result indicates, in the two...
A Vector-Based Trust Model for P2P E-commerce
Found in: International Conference on Natural Computation
By Qian Wang, Lifang Wang
Issue Date:October 2008
pp. 117-123
Many current P2P trust models are not suitable for P2P e-commerce because the characteristics of P2P e-commerce are not taken into account. In addition, the simple representation of trust cannot be used to accurately gain assess to other peers in the e-com...
SVM Based Prediction of Spontaneous Combustion in Coal Seam
Found in: Computational Intelligence and Design, International Symposium on
By Meng Qian, Wang Hongquan, Wang Yongsheng, Zhou Yan
Issue Date:October 2008
pp. 254-257
Spontaneous Combustion in Coal Seam (SCCS) is seriously threatening coal mine safety. A novel approach to predict SCCS by using Support Vector Machine (SVM) is present. The SVM is based on statistical learing theory with a simple structure and good generat...
Optimization of Production of PLA Microbubble Ultrasound Contrast Agents for Hydroxycamptothecin Delivery
Found in: BioMedical Engineering and Informatics, International Conference on
By Jie Pan, Zhenqing Hou, Peijuan Zhu, Yange Wang, Qian Wang, Qiqing Zhang
Issue Date:May 2008
pp. 400-406
In this paper, ultrasound contrast agents based on a high molecular polymer-poly lactic acid (PLA) and loaded with Hydroxycamptothecin (HCPT) were prepared by combining ultrasound methodand a Shirasu Porous Glass (SPG) membrane emulsification technique. A ...
Study on integrated automation system of traction substation for express railway lines
Found in: Autonomous Decentralized System, International Workshop on
By Gao Shibin, Chen Xiaochuan, Wang Qian, Wang Ren, Chen Weirong, Xiong Liebin
Issue Date:November 2002
pp. 239-245
The structure and function of integrated automation system of traction substation for express electric railway lines developed by our university are discussed in this paper. The paper mainly describes the function installation of monitoring and communicati...
Null Dereference Detection via a Backward Analysis
Found in: 2013 20th Asia-Pacific Software Engineering Conference (APSEC)
By Qian Wang,Dahai Jin,Yunzhan Gong
Issue Date:December 2013
pp. 553-558
Null dereferences are commonly occurring bugs in programming languages such as C. In this paper, we present a novel approach that performs a backward dataflow analysis to detect null-dereference bugs. The technical innovation of our approach is that owing ...
Correlation Coefficient of Compositional Data Based on Isometric Logratio Transformation
Found in: 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)
By Wen Long,Qian Wang
Issue Date:November 2013
pp. 66-69
Compositional data is a relatively independent field in statistical analysis. Aitchison used to introduce the additive-logratio transformation (alr) and centered logratio transformation (clr) in 1986, which are effective tools to solve the problem of compo...
Support Vector Machine Based Detection of Drowsiness Using Minimum EEG Features
Found in: 2013 International Conference on Social Computing (SocialCom)
By Shaoda Yu,Peng Li,Honghuang Lin,Ehsan Rohani,Gwan Choi,Botang Shao,Qian Wang
Issue Date:September 2013
pp. 827-835
Drowsiness presents major safety concerns for tasks that require long periods of focus and alertness. While there is a body of work on drowsiness detection using EEG signals in neuroscience and engineering, there exist unanswered questions pertaining to th...
Secure Routing Based on Network Coding in Wireless Sensor Networks
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Jing Chen, Ruiying Du, Qian Wang, Shixiong Yao
Issue Date:July 2013
pp. 58-64
As the Wireless Sensor Network(WSN) has features such as rapid deployment and self-organizing, it's broadly applied in many fields such as ecological monitoring, military reconnaissance and so on. Network coding is a potential technology to decrease the co...
Acupuncture for neck type cervical spondylosis on Heart-Gallbladder theory
Found in: 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)
By Feng Yuan,Lizhi Chen,Xiaohong Xu,Qian Wang,Wenbin Fu
Issue Date:October 2012
pp. 346-348
This article is to discuss the mechanism of acupuncture for neck type cervical spondylosis (NTCS) based on Heart-Gallbladder theory. NTCS is a clinical frequently-occurring disease, which has a trend of younger. We will explore the fundamental causes of NT...
Randomized controlled trials of abdominal acupuncture (1992–2012): An assessment of reporting quality with a CONSORT- and STRICTA-based instrument
Found in: 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)
By Shuo Jiang,Ping Zhong,Qiuping Huang,Qian Wang,Dejian Lu,Bin Huang,Wenbin Fu
Issue Date:October 2012
pp. 365-370
Objective: To assess the reporting quality of randomized controlled trials (RCTs) of abdominal acupuncture submitted from 1992 to 2012. Methods: Collect all RCTs of abdominal acupuncture from 1992 to 2012 through computer-based retrieval and manual informa...
Trade Liberalization and Technology Innovation
Found in: 2012 International Conference on Business Computing and Global Informatization (BCGIN)
By Qian Wang,Lei Zhang
Issue Date:October 2012
pp. 443-446
It has been more than 10 years since China's entry in the WTO. WTO accession has effectively stimulated the innovation and technology upgrading of China by the enlargement of trade, foreign investment and other effects. Reviewing the linkages between the e...
An Execution Environment for Robust Parallel Computing on Volunteer PC Grids
Found in: 2012 41st International Conference on Parallel Processing (ICPP)
By Hien Nguyen,Eshwar Pedamallu,Jaspal Subhlok,Edgar Gabriel,Qian Wang,Margaret S. Cheung,David Anderson
Issue Date:September 2012
pp. 158-167
A pool of distributed volunteer PCs presents an extremely hostile environment for execution of communicating parallel codes due to system and network heterogeneity, varying availability, and frequent failures. Well known methods for fault tolerance, specif...
Responses of Chlorophyll Content and Fluorescence to Water Stress in Vitex Negundo var. Heterophylla: Take Hilly area of Taihang Mountain in Henan for Example
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Yong Zhao,Na Hou,Qian Wang,Jian-Tao Yang,Xi-Tian Yang,Wei Fan
Issue Date:May 2012
pp. 1656-1659
In this study, we investigated the response of chlorophyll content and characteristics of chlorophyll fluorescence to water stress in 1-year-old Vitex negundo var. Heterophylla. The results showed that there was no significant difference between the chloro...
The Exploration of the E-Learning Standard Test System
Found in: Information Technology: New Generations, Third International Conference on
By Xinyu Zhang,Qian Wang,Yiqian Lu
Issue Date:April 2012
pp. 833-834
The paper designs and implements the E-Learning Standard Test System. It is composed of three loosely coupled components: XSD translated from the E-Learning standard, the XML parsing and validating package and the test result displaying package.
Design and Implement Augmented Reality for Supporting Driving Visual Guidance
Found in: Innovations in Bio-inspired Computing and Applications, International Conference on
By Jyh-Horng Lin,Cheng-Min Lin,Chyi-Ren Dow,Cheng-Qian Wang
Issue Date:December 2011
pp. 316-319
It is an important issue that let drivers obtain driving information easily. There are many advanced electronic devices used for driving safety assistance. During driving a car, the driver receives the information passed by these systems. But with more fun...
Animating the Approach of Deriving Operational Semantics from Algebraic Semantics for Web Services
Found in: High-Assurance Systems Engineering, IEEE International Symposium on
By Qian Wang,Huibiao Zhu
Issue Date:November 2011
pp. 57-62
Web services have became more and more important in these years, and BPEL4WS (BPEL) is a de facto standard for the web service composition and orchestration. It contains several distinct features, including the scope-based compensation and fault handling m...
Threshold Selection Using Maximum Autocorrelation Principle
Found in: Management of e-Commerce and e-Government, International Conference on
By Qian Wang
Issue Date:November 2011
pp. 281-284
The threshold selection method for image segmentation presented here is based on maximum autocorrelation principle. The optimal threshold value is determined by maximizing the autocorrelation measure. The predominance of our method is using both gray simil...
Intelligent Scheduling Algorithm and Application in Modernizing Manufacturing Services
Found in: Services Computing, IEEE International Conference on
By Yaojun Chen,Liang-Jie Zhang,Qian Wang
Issue Date:July 2011
pp. 568-575
Abstract-An intelligent scheduling algorithm based on multiagents and genetic algorithm is proposed to overcome flexible job-shop automation and optimization problems in manufacturing industry. The algorithm is made of a management-agent, a scheduling-agen...
Measuring the Financial Integration of East Asia - Viewpoint from the Risk Sharing
Found in: Business Computing and Global Informatization, International Conference on
By Qian Wang
Issue Date:July 2011
pp. 223-226
Financial integration offers the opportunity for domestic agents to share idiosyncratic risks from their home country by holding foreign assets. With the development of E-finance, it becomes much easier to purchase and hold foreign financial assest to faci...
Formal Approaches to Wireless Sensor Networks
Found in: Secure Software Integration and Reliability Improvement Companion, IEEE International Conference on
By Si Liu, Xiaofeng Wu, Qin Li, Huibiao Zhu, Qian Wang
Issue Date:June 2011
pp. 11-18
Wireless sensor networking, as a burgeoning technology, supports the monitoring of physical environments and control of sensor data, and has been widely applied in many fields. Due to its unique features, a number of formal theories, as well as verificatio...
CoQMTU: A Higher-Order Type Theory with a Predicative Hierarchy of Universes Parametrized by a Decidable First-Order Theory
Found in: Logic in Computer Science, Symposium on
By Bruno Barras, Jean-Pierre Jouannaud, Pierre-Yves Strub, Qian Wang
Issue Date:June 2011
pp. 143-151
We study a complex type theory, a Calculus of Inductive Constructions with a predicative hierarchy of universes and a first-order theory T built in its conversion relation. The theory T is specified abstractly, by a set of constructors, a set of defined sy...
A Robust Communication Framework for Parallel Execution on Volunteer PC Grids
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Eshwar Rohit, Hien Nguyen, Nagarajan Kanna, Jaspal Subhlok, Edgar Gabriel, Qian Wang, Margaret S. Cheung, David Anderson
Issue Date:May 2011
pp. 134-143
Volunteer PC grids represent massive computation capacity at a low cost, but are challenging to employ for parallel computing because of variable and unpredictable performance and availability. A communicating parallel program must employ explicit redundan...
A User Equilibrium Model Based on Cumulative Prospect Theory for Degradable Transport Network
Found in: Computational Sciences and Optimization, International Joint Conference on
By Qian Wang, Wei Xu
Issue Date:April 2011
pp. 1078-1082
This paper establishes a user equilibrium model based on cumulative prospect theory (CPT) for degradable transport network and shows the existence of the equilibrium solution. By encapsulating endogenous reference points into the CPT-based user equilibrium...
TSC Characteristics of Aged ZnO Varistors under Different Applied Voltage Ratios
Found in: Asia-Pacific Power and Energy Engineering Conference
By Hang Cui, Qian Wang, Youping Tu
Issue Date:March 2011
pp. 1-4
The Influence of Acoustic Velocity on the Space Charge Measurement by Pulsed Electro-Acoustic
Found in: Asia-Pacific Power and Energy Engineering Conference
By Zongxin Zhang, Youping Tu, Qian Wang
Issue Date:March 2011
pp. 1-4
Simulation of Hydrogen Production from Biomass Catalytic Gasification
Found in: Digital Manufacturing and Automation, International Conference on
By Shan Cheng, Qian Wang, Hengsong Ji
Issue Date:December 2010
pp. 370-374
In this study, biomass catalytic gasification process for producing H2-rich gas was presented. The process consists of mainly two fluidized beds—a gasifier and a CaO regenerator. The objective of this research is to develop a computer model of biomass cata...
A Kind of UCAV Attack Decision Arithmetic Based on Entropy of Avail Value
Found in: Computational and Information Sciences, International Conference on
By Deyun Zhou, Zhaoqiang Li, Qian Wang
Issue Date:December 2010
pp. 1107-1109
The UCAV auto attack has become a hot research topic. The attack decision is an important part of it, which not only consider the threaten degree of the target but also consider the attack degree. Attack decision include threaten evaluate and attack evalua...
Legendre Wavelets Method for Nonlinear Fractional Differences Equation
Found in: Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, IACIS International Symposium on
By Fengbo Hou, Yongbing Wu, Yiming Chen, Qian Wang
Issue Date:October 2010
pp. 53-56
In this paper we consider a kind of polynomials-Legendre polynomials then we get Legendre wavelet. Legendre wavelet operational matrix of the fractional integration is derived and combined the property of operational matrix to solve nonlinear fractional di...
ABSORB: Atlas building by Self-Organized Registration and Bundling
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Hongjun Jia, Guorong Wu, Qian Wang, Dinggang Shen
Issue Date:June 2010
pp. 2785-2790
A novel groupwise registration framework, called Atlas Building by Self-Organized Registration and Bundling (ABSORB), is proposed in this paper. In this framework, the global structure of relative subject image distribution is preserved during the registra...
Research on an Improved Model and Method of Calculating Total Transfer Capability
Found in: Electrical and Control Engineering, International Conference on
By Qian Wang, Li-zi Zhang
Issue Date:June 2010
pp. 4073-4076
As a market signal concerned by all parties, transmission capacity has an important economic value in the competitive electricity market. Because of the present model and method's shortage of calculating Total Transfer Capabiliy (TTC) based on Optimal Powe...
Reliability-Based Marginal Cost Pricing with Stochastic Demand
Found in: Computational Sciences and Optimization, International Joint Conference on
By Wei Xu, Qian Wang
Issue Date:May 2010
pp. 504-507
The paper explores the marginal cost pricing (MCP) issues in a traffic network with stochastic demand. It has been known that the naïve method by simply replacing the link flow and link travel time in the original MCP with their expected values is not work...
Visualization Test for Spray Development Process in Diesel Engine
Found in: Intelligent Computation Technology and Automation, International Conference on
By Wenhua Yuan, Zhixia He, Qian Wang
Issue Date:May 2010
pp. 1144-1146
With the spray combustion visualization test unit, researches have been made on the spray development process under different injection pressures with STD nozzles, VOC nozzles and IMPROVED nozzles of diesel engines. The result shows that with the rise of i...
Using FCM for Color Texture Segmentation Based Multirscale Image Fusion
Found in: e-Education, e-Business, e-Management and e-Learning, International Conference on
By Zhi-Kai Huang, Pei-Wu Li, Sheng-Qian Wang, Ling-Ying Hou
Issue Date:January 2010
pp. 84-87
The paper presents color texture segmentation using FCM for color texture segmentation based multi-resolution image fusion. First, a color texture images are decomposed of multi-resolution representation by wavelet transform, adaptive fusion weight value o...
Logical Optimization in Lessening Excessive Turnover of GridFTP Network Transmission by DPSS
Found in: Intelligent Computation Technology and Automation, International Conference on
By Xinhuan Feng, Qilong Jia, Qian Wang, Yang Shi, Ningjiu Tang
Issue Date:October 2009
pp. 190-193
As known GRIDFTP has a lot of advantages over the FTP, however, its performance are not satisfactory in many characteristics, thus we designed a new type of model, particularly for excess data processing, and we got related researches which are used to ver...
 1  2 Next >>