Search For:

Displaying 1-50 out of 169 total
A Sequential Monte Carlo Approach to Anomaly Detection in Tracking Visual Events
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Peng Cui, Li-Feng Sun, Zhi-Qiang Liu, Shi-Qiang Yang
Issue Date:June 2007
pp. 1-8
In this paper we propose a technique to detect anomalies in individual and interactive event sequences. We categorize anomalies into two classes: abnormal event, and abnormal context, and model them in the Sequential Monte Carlo framework which is extended...
 
The program understanding problem: analysis and a heuristic approach
Found in: Software Engineering, International Conference on
By S. Woods, Qiang Yang
Issue Date:March 1996
pp. 6
Program understanding is the process of making sense of a complex source code. This process has been considered as computationally difficult and conceptually complex. So far no formal complexity results have been presented, and conceptual models differ fro...
 
Cost-Sensitive-Data Preprocessing for Mining Customer Relationship Management Databases
Found in: IEEE Intelligent Systems
By Junfeng Pan, Qiang Yang, Yiming Yang, Lei Li, Frances Tianyi Li, George Wenmin Li
Issue Date:January 2007
pp. 46-51
Telecommunications companies and financial institutions are facing increasing competition. A staged preprocessing framework for cost-sensitive-data processing can help these companies identify customers who might switch to a competitor (or churn). The fram...
 
Guest Editors' Introduction: Special Section on Intelligent Data Preparation
Found in: IEEE Transactions on Knowledge and Data Engineering
By Chengqi Zhang, Qiang Yang, Bing Liu
Issue Date:September 2005
pp. 1163,1164,1165
No summary available.
   
Guest Editors' Introduction to the Special Issue: Machine Learning for Bioinformatics-Part 1
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Charles X. Ling, William Stafford Noble, Qiang Yang
Issue Date:April 2005
pp. 81-82
No summary available.
 
Guest Editors' Introduction: Information Enhancement for Data Mining
Found in: IEEE Intelligent Systems
By Shichao Zhang, Chengqi Zhang, Qiang Yang
Issue Date:March 2004
pp. 12-13
No summary available.
 
Applying Plan Recognition Algorithms To Program Understanding
Found in: Knowledge-Based Software Engineering Conference
By Alex Quilici, Qiang Yang, Steven Woods
Issue Date:September 1996
pp. 96
Program understanding is often viewed as the task of extracting plans and design goals from program source. As such, it is natural to try to apply standard AI plan recognition techniques to the program understanding problem. Yet program understanding resea...
 
HapBoost: A Fast Approach to Boosting Haplotype Association Analyses in Genome-Wide Association Studies
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Xiang Wan, Can Yang, Qiang Yang, Hongyu Zhao, Weichuan Yu
Issue Date:January 2013
pp. 207-212
Genome-wide association study (GWAS) has been successful in identifying genetic variants that are associated with complex human diseases. In GWAS, multilocus association analyses through linkage disequilibrium (LD), named haplotype-based analyses, may have...
 
Segmentation of Spectrum Map for HFSWR Based on Feature Extraction
Found in: Image and Signal Processing, Congress on
By Yang Li, Ning Zhang, Qiang Yang
Issue Date:May 2008
pp. 189-193
When targets fall in different types of clutter and noise background in High Frequency Surface Wave Radar (HFSWR), uniform detection algorithms always result in poor detection and tracking performances. To solve the problem, two methods are proposed in thi...
 
Transfer Learning with Graph Co-Regularization
Found in: IEEE Transactions on Knowledge and Data Engineering
By Mingsheng Long, Jianmin Wang, Guiguang Ding, Dou Shen, Qiang Yang
Issue Date:July 2014
pp. 1-1
Transfer learning is established as an effective technology to leverage rich labeled data from some source domain to build an accurate classifier for the target domain. The basic assumption is that the input domains may share certain knowledge structure, w...
 
Bird Flu Outbreak Prediction via Satellite Tracking
Found in: IEEE Intelligent Systems
By Yuanchun Zhou,Mingjie Tang,Weike Pan,Jinyan Li,Weihang Wang,Jing Shao,Liang Wu,Jianhui Li,Qiang Yang,Baoping Yan
Issue Date:July 2014
pp. 10-17
Advanced satellite tracking technologies have collected huge amounts of wild bird migration data. Biologists use these data to understand dynamic migration patterns, study correlations between habitats, and predict global spreading trends of avian influenz...
 
SMS Spam Detection Using Noncontent Features
Found in: IEEE Intelligent Systems
By Qian Xu,Evan Wei Xiang,Qiang Yang,Jiachun Du,Jieping Zhong
Issue Date:November 2012
pp. 44-51
Short Message Service text messages are indispensable, but they face a serious problem from spamming. This service-side solution uses graph data mining to distinguish spammers from nonspammers and detect spam without checking a message's contents.
 
Where Is the User in Multimedia Retrieval?
Found in: IEEE MultiMedia
By Marcel Worring,Paul Sajda,Simone Santini,David A. Shamma,Alan F. Smeaton,Qiang Yang
Issue Date:October 2012
pp. 6-10
What started as a field with an emphasis on optimally serving users' interactive information needs has now become dominated by methods that focus on improving the mean average precision (MAP) of a clearly defined task disconnected from its application. Wit...
 
Mining Significant Places from Cell ID Trajectories: A Geo-grid Based Approach
Found in: 2012 13th IEEE International Conference on Mobile Data Management (MDM)
By Tengfei Bao,Huanhuan Cao,Qiang Yang,Enhong Chen,Jilei Tian
Issue Date:July 2012
pp. 288-293
Mining the frequently visited places of single mobile users, i.e., significant places, is crucial for supporting personalized location-based services. Most of existing works for significance place mining have a need to take advantage the GPS trajectories o...
 
A Demonstration of Mining Significant Places from Cell ID Trajectories through a Geo-grid Based Approach
Found in: 2012 13th IEEE International Conference on Mobile Data Management (MDM)
By Tengfei Bao,Huanhuan Cao,Qiang Yang,Enhong Chen,Jilei Tian
Issue Date:July 2012
pp. 328-331
Mining the frequently visited places of single mobile users, i.e., significant places, is crucial for supporting personalized location-based services. Most of existing works for significance place mining have a need to take advantage the GPS trajectories o...
 
Characterizing Inverse Time Dependency in Multi-class Learning
Found in: Data Mining, IEEE International Conference on
By Danqi Chen,Weizhu Chen,Qiang Yang
Issue Date:December 2011
pp. 1020-1025
The training time of most learning algorithms increases as the size of training data increases. Yet, recent advances in linear binary SVM and LR challenge this commonsense by proposing an inverse dependency property, where the training time decreases as th...
 
Fast Catamaran Seakeeping Amelioration Using T-foils and Interceptors
Found in: Intelligent Networks and Intelligent Systems, International Workshop on
By Zhiqun Guo,Zhuang Lin,Qiang Yang,Xiaowen Li
Issue Date:November 2011
pp. 145-148
Fast catamaran holds excellent performance because of its high transverse stability, large deck, economy of fuel consumption and high speed. However, the high-speed craft can easily make
 
An Improved Real Time AR Method for the Surface Vessel Motion Prediction
Found in: Intelligent Networks and Intelligent Systems, International Workshop on
By Zhuang Lin,Qiang Yang,Zhiqun Guo,Xiaowen Li
Issue Date:November 2011
pp. 49-52
It is significant and valuable to improve the time length and accuracy of ships' motion prediction for the efficiency, comfort and security of marine operation. Autoregressive time series analysis method (AR) is the mainstream currently and the effectivene...
 
Tracking Mobile Users in Wireless Networks via Semi-Supervised Colocalization
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Jeffrey Junfeng Pan,Sinno Jialin Pan,Jie Yin,Lionel M. Ni,Qiang Yang
Issue Date:March 2012
pp. 587-600
Recent years have witnessed the growing popularity of sensor and sensor-network technologies, supporting important practical applications. One of the fundamental issues is how to accurately locate a user with few labeled data in a wireless sensor network, ...
 
Application of Improved Apriori Algorithm on Educational Information
Found in: Genetic and Evolutionary Computing, International Conference on
By Qiang Yang,Yanhong Hu
Issue Date:September 2011
pp. 330-332
Based on the Apriori algorithm analysis and research, this paper points out the main problems on the application, and puts forward the improved algorithm. Finally, This algorithm was used to the data education mining, Through the application of the algorit...
 
Empirical Analysis of the Influence of TNC's R&D Investment on the Innovation Capacity of Regions in China Based on Cointegration Test
Found in: Business Computing and Global Informatization, International Conference on
By Li Xiaodi, Liu Qiang, Yang Qingming
Issue Date:July 2011
pp. 615-618
The paper first carries out statistical analysis of the data of transnational corporations' R&D investment and technological innovation capacity in various regions of China from 1997 to 2008, then tests the cointegration relationship between transnational ...
 
A Micro Threading Based Concurrency Model for Parallel Computing
Found in: Parallel and Distributed Processing Workshops and PhD Forum, 2011 IEEE International Symposium on
By Qiang Yang,C.R. Jesshope,Jian Fu
Issue Date:May 2011
pp. 1668-1674
The continuing launch of various multi-core processors popularizes parallel computing of gaining higher performance, however, it also exerts pressures on software developers concerning how to make full use of the multiplicity of resources to get the requir...
 
Measurement-Based Composite Load Modeling with Dynamic Compensation
Found in: Asia-Pacific Power and Energy Engineering Conference
By Xing-lv Hong, Wen-bin Hao, Deng-wei Duan, Qiang Yang, Yusheng Liu
Issue Date:March 2011
pp. 1-4
NA
 
BABAC: An Access Control Framework for Network Virtualization Using User Behaviors and Attributes
Found in: IEEE-ACM International Conference on Green Computing and Communications and International Conference on Cyber, Physical and Social Computing
By Yanzhe Che, Qiang Yang, Chunming Wu, Lianhang Ma
Issue Date:December 2010
pp. 747-754
With the application of network virtualization technique, a collection of autonomous and heterogeneous virtual networks (VNs) could co-exist on an underlying shared physical substrate. In such an environment, end users and network resources are distributed...
 
Social Learning
Found in: IEEE Intelligent Systems
By Qiang Yang, Zhi-Hua Zhou, Wenji Mao, Wei Li, Nathan Nan Liu
Issue Date:July 2010
pp. 9-11
In recent years, social behavioral data have been exponentially expanding due to the tremendous success of various outlets on the social Web (aka Web 2.0) such as Facebook, Digg, Twitter, Wikipedia, and Delicious. As a result, there's a need for social lea...
 
Multitask Learning for Protein Subcellular Location Prediction
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Qian Xu, Sinno Jialin Pan, Hannah Hong Xue, Qiang Yang
Issue Date:May 2011
pp. 748-759
Protein subcellular localization is concerned with predicting the location of a protein within a cell using computational methods. The location information can indicate key functionalities of proteins. Thus, accurate prediction of subcellular localizations...
 
Trace-Oriented Feature Analysis for Large-Scale Text Data Dimension Reduction
Found in: IEEE Transactions on Knowledge and Data Engineering
By Jun Yan, Ning Liu, Shuicheng Yan, Qiang Yang, Weiguo (Patrick) Fan, Wei Wei, Zheng Chen
Issue Date:July 2011
pp. 1103-1117
Dimension reduction for large-scale text data is attracting much attention nowadays due to the rapid growth of the World Wide Web. We can categorize those popular dimension reduction algorithms into two groups: feature extraction and feature selection algo...
 
Bridging Domains Using World Wide Knowledge for Transfer Learning
Found in: IEEE Transactions on Knowledge and Data Engineering
By Evan Wei Xiang, Bin Cao, Derek Hao Hu, Qiang Yang
Issue Date:June 2010
pp. 770-783
A major problem of classification learning is the lack of ground-truth labeled data. It is usually expensive to label new data instances for training a model. To solve this problem, domain adaptation in transfer learning has been proposed to classify targe...
 
Introduction to Mobile Information Retrieval
Found in: IEEE Intelligent Systems
By Flora S. Tsai, Minoru Etoh, Xing Xie, Wang-Chien Lee, Qiang Yang
Issue Date:January 2010
pp. 11-15
<p>The new frontier of mobile information retrieval will combine context awareness and content adaptation.</p>
 
Synthesizing Novel Dimension Reduction Algorithms in Matrix Trace Oriented Optimization Framework
Found in: Data Mining, IEEE International Conference on
By Jun Yan, Ning Liu, Shuicheng Yan, Qiang Yang, Zheng Chen
Issue Date:December 2009
pp. 598-606
Dimension Reduction (DR) algorithms are generally categorized into feature extraction and feature selection algorithms. In the past, few works have been done to contrast and unify the two algorithm categories. In this work, we introduce a matrix trace orie...
 
A Survey on Transfer Learning
Found in: IEEE Transactions on Knowledge and Data Engineering
By Sinno Jialin Pan, Qiang Yang
Issue Date:October 2010
pp. 1345-1359
A major assumption in many machine learning and data mining algorithms is that the training and future data must be in the same feature space and have the same distribution. However, in many real-world applications, this assumption may not hold. For exampl...
 
Numerical Simulation and Experimental Investigation of Steam Separators
Found in: Intelligent Computation Technology and Automation, International Conference on
By Xiao Li-chun, Ding Zhi-jiang, Li Qiang, Yang Jing-fei, Shen Ya-qin
Issue Date:October 2009
pp. 132-135
Based on computational fluid dynamics method of two-phase flow, Separation efficiency of steam separator used for steam-water separating in power plant is presented. A mathematical model is established for simulating the flow field of gas flow channels in ...
 
Communication infrastructures to facilitate regional voltage control of active radial distribution networks
Found in: Circuits and Systems, Midwest Symposium on
By Qiang Yang, Javier A. Barria, Carlos A. Hernandez Aramburo
Issue Date:August 2009
pp. 284-287
The increasing penetration of distributed generators into passive medium voltage (MV) power distribution networks could bring enormous challenges in network management. An ongoing UK EPSRC research project, AuRA-NMS (autonomous regional active network mana...
 
HIPS: A calibration-less hybrid indoor positioning system using heterogeneous sensors
Found in: Pervasive Computing and Communications, IEEE International Conference on
By Vincent W. Zheng, Junhui Zhao, Yongcai Wang, Qiang Yang
Issue Date:March 2009
pp. 1-6
Positioning is a crucial task in pervasive computing, aimed at estimating the user's positions to provide location-based services. In this paper, we study an interesting problem: when we wish to obtain hybrid positioning granularities in an office environm...
 
LoSeCo: Location-based search computing for pervasive device augmentation
Found in: Pervasive Computing and Communications, IEEE International Conference on
By Yiqiang Chen, Zhuo Sun, Juan Qi, Derek Hao Hu, Qiang Yang
Issue Date:March 2009
pp. 1-6
Understanding human intention and performing different activities automatically is one of the key problems in pervasive computing. In this paper, a new location-based search computing framework (LoSeCo) is proposed to allow one's pervasive device to augmen...
 
The Schema and Implementation of a Model Machine Based on DFA Theorem
Found in: Education Technology and Computer Science, International Workshop on
By Yi Xiaolin, Peng Yifan, Song Qiang, Yang Feng, Li Xiaoyan
Issue Date:March 2009
pp. 1038-1041
Based on Deterministic Finite Automaton (DFA) and combinational logic circuits, an implementation of a model machine using Verilog HDL and top-down method is proposed. This paper describes how to design each of its parts with the schema of DFA in Verilog H...
 
The Comparative Research on Image Segmentation Algorithms
Found in: Education Technology and Computer Science, International Workshop on
By Wen-Xiong Kang, Qing-Qiang Yang, Run-Peng Liang
Issue Date:March 2009
pp. 703-707
As the premise of feature extraction and pattern recognition, image segmentation is one of the fundamental approaches of digital image processing. This paper enumerates and reviews main image segmentation algorithms, then presents basic evaluation methods ...
 
Learning with Positive and Unlabeled Examples Using Topic-Sensitive PLSA
Found in: IEEE Transactions on Knowledge and Data Engineering
By Ke Zhou, Gui-Rong Xue, Qiang Yang, Yong Yu
Issue Date:January 2010
pp. 46-58
It is often difficult and time-consuming to provide a large amount of positive and negative examples for training a classification system in many applications such as information retrieval. Instead, users often find it easier to indicate just a few positiv...
 
TOFA: Trace Oriented Feature Analysis in Text Categorization
Found in: Data Mining, IEEE International Conference on
By Jun Yan, Ning Liu, Qiang Yang, Weiguo Fan, Zheng Chen
Issue Date:December 2008
pp. 668-677
Dimension reduction for large-scale text data is attracting much attention lately due to the rapid growth of World Wide Web. We can consider dimension reduction algorithms in two categories: feature extraction and feature selection. An important problem re...
 
One-Class Collaborative Filtering
Found in: Data Mining, IEEE International Conference on
By Rong Pan, Yunhong Zhou, Bin Cao, Nathan N. Liu, Rajan Lukose, Martin Scholz, Qiang Yang
Issue Date:December 2008
pp. 502-511
Many applications of collaborative filtering (CF), such as news item recommendation and bookmark recommendation, are most naturally thought of as one-class collaborative filtering (OCCF) problems. In these problems, the training data usually consist simply...
 
A Joint Matrix Factorization Approach to Unsupervised Action Categorization
Found in: Data Mining, IEEE International Conference on
By Peng Cui, Fei Wang, Li-Feng Sun, Shi-Qiang Yang
Issue Date:December 2008
pp. 767-772
In this paper, a novel unsupervised approach to mining categories from action video sequences is presented. This approach consists of two modules: action representation and learning model. Videos are regarded as spatially distributed dynamic pixel time ser...
 
A Trace-Driven Approach to Evaluate the Scalability of P2P-Based Video-on-Demand Service
Found in: IEEE Transactions on Parallel and Distributed Systems
By Jian-Guang Luo, Qian Zhang, Yun Tang, Shi-Qiang Yang
Issue Date:January 2009
pp. 59-70
Peer-to-Peer (P2P) networks have emerged as one of the most promising approaches to improve the scalability of Video-on-Demand (VoD) service over Internet. However, despite a number of architectures and streaming protocols have been proposed in past years,...
 
Digital Wall: A Power-efficient Solution for Location-based Data Sharing
Found in: Pervasive Computing and Communications, IEEE International Conference on
By Jeffrey Junfeng Pan, Sinno Jialin Pan, Vincent Wenchen Zheng, Qiang Yang
Issue Date:March 2008
pp. 645-650
With the proliferation of wireless and sensor techniques, data can be shared conveniently through the air. However, wireless communication is vulnerable since unauthorized machine may try to intrude a server without being physically connected. In this pape...
 
Estimating Location Using Wi-Fi
Found in: IEEE Intelligent Systems
By Qiang Yang, Sinno Jialin Pan, Vincent Wenchen Zheng
Issue Date:January 2008
pp. 8-13
This department presents the results of the first Data Mining Contest held at the 2007 International Conference on Data Mining.
 
Document Transformation for Multi-label Feature Selection in Text Categorization
Found in: Data Mining, IEEE International Conference on
By Weizhu Chen, Jun Yan, Benyu Zhang, Zheng Chen, Qiang Yang
Issue Date:October 2007
pp. 451-456
Feature selection on multi-label documents for automatic text categorization is an under-explored research area. This paper presents a systematic document transformation framework, whereby the multi-label documents are transformed into single-label documen...
 
Learning Adaptive Temporal Radio Maps for Signal-Strength-Based Location Estimation
Found in: IEEE Transactions on Mobile Computing
By Jie Yin, Qiang Yang, Lionel M. Ni
Issue Date:July 2008
pp. 869-883
In wireless networks, a client's locations can be estimated using the signals received from various signal transmitters. Static fingerprint-based techniques are commonly used for location estimation, in which a radio map is built by calibrating signal-stre...
 
Domain-Driven, Actionable Knowledge Discovery
Found in: IEEE Intelligent Systems
By Longbing Cao, Chengqi Zhang, Qiang Yang, David Bell, Michail Vlachos, Bahar Taneri, Eamonn Keogh, Philip S. Yu, Ning Zhong, Mafruz Zaman Ashrafi, David Taniar, Eugene Dubossarsky, Warwick Graco
Issue Date:July 2007
pp. 78-88, c3
Existing knowledge discovery and data mining (KDD) field seldom deliver results that businesses can act on directly. This issue, Trends &#38; Controversies presents seven short articles reporting on different aspects of domain-driven KDD, an R&#38;...
 
Reducing the Calibration Effort for Probabilistic Indoor Location Estimation
Found in: IEEE Transactions on Mobile Computing
By Xiaoyong Chai, Qiang Yang
Issue Date:June 2007
pp. 649-662
WLAN location estimation based on 802.11 signal strength is becoming increasingly prevalent in today's pervasive computing applications. Among the well-established location determination approaches, probabilistic techniques show good performance and, thus,...
 
Sensor-Based Abnormal Human-Activity Detection
Found in: IEEE Transactions on Knowledge and Data Engineering
By Jie Yin, Qiang Yang, Jeffrey Junfeng Pan
Issue Date:August 2008
pp. 1082-1090
With the availability of affordable sensors and sensor networks, sensor-based human activity recognition has attracted much attention in artificial intelligence and ubiquitous computing. In this paper, we present a novel two-phase approach for detecting ab...
 
Graph Embedding and Extensions: A General Framework for Dimensionality Reduction
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Shuicheng Yan, Dong Xu, Benyu Zhang, Hong-Jiang Zhang, Qiang Yang, Stephen Lin
Issue Date:January 2007
pp. 40-51
Over the past few decades, a large family of algorithms—supervised or unsupervised; stemming from statistics or geometry theory—has been designed to provide different solutions to the problem of dimensionality reduction. Despite the different motivations o...
 
 1  2 Next >>