Search For:

Displaying 1-50 out of 2,404 total
Interactive hair rendering under environment lighting
Found in: ACM Transactions on Graphics (TOG)
By Baining Guo, Kun Zhou, Tengfei Li, Wei Hua, Zhong Ren, Baining Guo, Kun Zhou, Tengfei Li, Wei Hua, Zhong Ren, Baining Guo, Kun Zhou, Tengfei Li, Wei Hua, Zhong Ren, Baining Guo, Kun Zhou, Tengfei Li, Wei Hua, Zhong Ren
Issue Date:July 2010
pp. 1-10
We present an algorithm for interactive hair rendering with both single and multiple scattering effects under complex environment lighting. The outgoing radiance due to single scattering is determined by the integral of the product of the environment light...
Noninvasive Ambulatory Monitoring of the Electric and Mechanical Function of Heart with a Multifunction Wearable Sensor
Found in: 2014 IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW)
By Xianxiang Chen,Xinyu Hu,Ren Ren,Bing Zhou,Xiao Tan,Jiabai Xie,Zhen Fang,Yangmin Qian,Huaiyong Li,Lili Tian,Shanhong Xia
Issue Date:July 2014
pp. 662-667
A multifunction wearable noninvasive ambulatory monitoring sensor based on Electrocardiogram (ECG) and Impedance Cardiography (ICG) has been designed, fabricated and tested. The electric function (with ECG) and mechanical function (with ICG) of the heart c...
Evaluation of Invisible Conveyance Ability for Logistics Enterprise Based on BP Neural Network
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Pu Zhong,Ren Wei,Ren Yuan,Wei Zhuo
Issue Date:June 2013
pp. 642-647
In this paper, the concept of invisible conveyance ability for logistics enterprise is put forward. According to the characters of road conveyance for logistics enterprise, we establish the index system of road conveyance capacity. After delimiting and ana...
Profit Aware Load Balancing for Distributed Cloud Data Centers
Found in: 2013 IEEE International Symposium on Parallel & Distributed Processing (IPDPS)
By Shuo Liu,Shaolei Ren,Gang Quan,Ming Zhao,Shangping Ren
Issue Date:May 2013
pp. 611-622
The advent of cloud systems has spurred the emergence of an impressive assortment of Internet services. Recent pressures on enhancing the profitability by curtailing surging dollar costs on energy have posed challenges to, as well as placed a new emphasis ...
Safety Problem and IT Information Resources
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Dongshan Ren,Ling Ren,Xiaoping Mao,Zhongmin Wang
Issue Date:August 2012
pp. 1346-1348
The importance and related technology of safety problem were discussed from the view of safety system engineering "Huer 3D structure". It was pointed out that information technology was very important to safety. Information resources of safety we...
Preparation of LaFeXAl12-xO19 Catalysts and Investigation on Catalytic Activity of Methane Combustion
Found in: Digital Manufacturing and Automation, International Conference on
By Xiao-guang Ren, Chao Ren
Issue Date:December 2010
pp. 106-109
In this paper, a series of catalysts LaFexAl12-xO19 were prepared by co-precipitation, in which Fe ions was the active component. The structure and properties of LaFexAl12-xO19 were investigated by using BET、XPS、XRD techniques and activities of methane cat...
A Statistical Method of Energy Consumption Based on Energy-Tree
Found in: Optoelectronics and Image Processing, International Conference on
By Ren Xiwei, Ren Gongchang, Yang Fan, Song Anling
Issue Date:November 2010
pp. 139-142
Combined with the national energy policy and the actual project requirements, the author studies a statistical method of energy consumption based on energy-tree, in order to reduce corporate energy consumption, improve enterprise efficiency and optimize en...
Two Methods for Constructing the Difference Set Pairs
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Jia Yan-guo, Ren Fu-zheng, Ji Yong-feng, Liu Yong-shan, Ren Jun
Issue Date:September 2010
pp. 675-678
In this paper, by using the nature of Cyclotomic class, presents two new methods for constructing Different Set Pairs. The methods are based on the Cyclotomic class, and different Cyclotomic class could construct Different Set Pairs of Different parameters...
The Application of Distributed Control System in Electrical Heaters of the Public Buildings
Found in: Intelligent Human-Machine Systems and Cybernetics, International Conference on
By Wei Wang, Jianhua Ren, Jianguo Ren
Issue Date:August 2010
pp. 46-49
To achieve energy-saving and environmental protection, electrical heaters play an important role in the heating system in some northern regions of China. To achieve the centralized controlling and meet the different requirements of every heating unit, dist...
Design and Research of Dynamic Braking Circuits in Electric Propulsion Ship
Found in: Intelligent Human-Machine Systems and Cybernetics, International Conference on
By Ren Hong-ying, Feng Hui, Sun Pei-ting, Ren Jun-jie
Issue Date:August 2010
pp. 163-165
In order to study the dynamic braking of electric propulsion ship, the pumping voltage principle of ship electric propulsion in braking process is analyzed. An energy feedback control strategy is put forward. Then, the corresponding pump voltage circuit is...
Single View Metrology Along Orthogonal Directions
Found in: Pattern Recognition, International Conference on
By Kun Peng, Lulu Hou, Ren Ren, Xianghua Ying, Hongbin Zha
Issue Date:August 2010
pp. 1658-1661
In this paper, we describe how 3D metric measurements can be determined from a single uncalibrated image, when only minimal geometric information are available in the image. The minimal information just is orthogonal vanishing points. Given such limited in...
Multiple-instance image database retrieval by spatial similarity based on Interval Neighbor Group
Found in: Proceedings of the ACM International Conference on Image and Video Retrieval (CIVR '10)
By John Y. Chiang, Shuenn-Ren Cheng, Yen-Ren Huang
Issue Date:July 2010
pp. 135-142
In this paper, a multiple-instance image retrieval system incorporating a general spatial similarity measure is proposed. A multiple-instance learning is employed to summarize the commonality of spatial features among positive and negative example images. ...
Geometric properties of multiple reflections in catadioptric camera with two planar mirrors
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Xianghua Ying, Kun Peng, Ren Ren, Hongbin Zha
Issue Date:June 2010
pp. 1126-1132
A catadioptric system consisting of a pinhole camera and two planar mirrors is deeply investigated in this paper. The two mirrors combine to form a corner and face-to-face with the pinhole. Their relative pose is unknown. An object will be reflected in the...
Analysis of Optimal Batch Transshipment Policies between Two Retailers of Electronic Products
Found in: International Conference on E-Business and E-Government
By Ren Ren,Xi Xu,Yuanyang Gao
Issue Date:May 2010
pp. 3726-3729
After investigating and analyzing the Zhongguancun electronic products market, this paper studies the optimal batch transshipment policies between two competing retailers by establishing a model. The model assumes that both retailers hold a certain quantit...
A Novel Measurement-Based Call Admission Control Algorithm for Wireless Mobility Networks under Practical Mobility Model
Found in: Communications and Mobile Computing, International Conference on
By Yuan-yuan Su, Ren-yong Wu, Ren-fa Li, Wei Duan, Jian-hui Luo
Issue Date:April 2010
pp. 364-368
Mobility model and call admission control (CAC) algorithm are important for wireless mobility networks. This paper firstly sets a practical mobility model, and then presents a novel measurement-based CAC algorithm utilizing time series analysis under the r...
RenderAnts: interactive Reyes rendering on GPUs
Found in: ACM Transactions on Graphics (TOG)
By Baining Guo, Kun Zhou, Minmin Gong, Qiming Hou, Xin Sun, Zhong Ren, Baining Guo, Kun Zhou, Minmin Gong, Qiming Hou, Xin Sun, Zhong Ren
Issue Date:December 2009
pp. 1-2
We present RenderAnts, the first system that enables interactive Reyes rendering on GPUs. Taking RenderMan scenes and shaders as input, our system first compiles RenderMan shaders to GPU shaders. Then all stages of the basic Reyes pipeline, including bound...
All-frequency rendering of dynamic, spatially-varying reflectance
Found in: ACM Transactions on Graphics (TOG)
By Baining Guo, Jiaping Wang, John Snyder, Minmin Gong, Peiran Ren, Baining Guo, Jiaping Wang, John Snyder, Minmin Gong, Peiran Ren
Issue Date:December 2009
pp. 1-2
We describe a technique for real-time rendering of dynamic, spatially-varying BRDFs in static scenes with all-frequency shadows from environmental and point lights. The 6D SVBRDF is represented with a general microfacet model and spherical lobes fit to its...
Anomaly Detection Using Improved Hierarchy Clustering
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Liang Hu, Weiwu Ren, Fei Ren
Issue Date:November 2009
pp. 319-323
Most anomaly detection methods can not be fit for the changing and complex network. High noise and updating normality profiles not in time will lead to high false alarm rate. In this paper, a new anomaly detection algorithm using improved hierarchy cluster...
H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks
Found in: Information Assurance and Security, International Symposium on
By Wei Ren, Yi Ren, Hui Zhang
Issue Date:August 2009
pp. 450-453
In unattended wireless sensor networks, data are stored locally and retrieved on demand. To efficiently transmit the collector’s retrieval results, data are aggregated along being forwarded. The data confidentiality and integrity should be protected at the...
TBRA: A scalable routing algorithm in highly mobile large scale pure ad hoc wireless mesh networks
Found in: Computer Science and Information Technology, International Conference on
By Wei Ren, Yi Ren, Hui Zhang
Issue Date:August 2009
pp. 495-499
In highly mobile pure ad-hoc wireless mesh networks, fast rerouting within low routing discovery delay is a mandatory requirement for routing algorithm to support interactive applications such as VoIP. Also, the communication overhead should be thwarted wh...
Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Wei Ren, Yi Ren, Hui Zhang
Issue Date:August 2009
pp. 340-347
In In-networking storage Wireless Sensor Networks, sensed data are stored locally for a long term and retrieved on-demand instead of real-time. To maximize data survival, the sensed data are normally distributively stored at multiple nearby nodes. It arise...
Fast Secure Routing for Highly Mobile Large-Scale Ad-Hoc Vehicular Networks
Found in: Information Processing, Asia-Pacific Conference on
By Wei Ren, Yi Ren, Hui Zhang
Issue Date:July 2009
pp. 566-569
In highly mobile large-scale vehicular ad-hoc networks, routing protocols must be fast and efficient in terms of low routing discovery delay and communication overhead to support the applications such as car talk. Such requirement becomes more difficult to...
HybridS: A Scheme for Secure Distributed Data Storage in WSNs
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Wei Ren, Yi Ren, Hui Zhang
Issue Date:December 2008
pp. 318-323
In unattended Wireless Sensor Networks (WSNs), data is stored locally or at designated nodes upon sensing, and users can access it on demand. This paradigm can improve energy efficiency by making use of the upcoming cheap and large flash memory, as well as...
A New Classification Method of High Spatial Resolution Remote Sensing Image
Found in: Computer Science and Software Engineering, International Conference on
By Ren Guangbo, Zheng Rong-er, Ren Guangbo, Zhang Jie, Ma Yi, Cui Tingwei
Issue Date:December 2008
pp. 1073-1076
Along with the spatial resolution of remote sensing images getting higher and higher, the complex structure in the simple objects becomes obvious, which makes the classification algorithms based on pixels begin losing their advantages. The huge number of c...
Using Density-Based Incremental Clustering for Anomaly Detection
Found in: Computer Science and Software Engineering, International Conference on
By Fei Ren, Liang Hu, Hao Liang, Xiaobo Liu, Weiwu Ren
Issue Date:December 2008
pp. 986-989
This paper proposed a new anomaly detection algorithm that can update normal profile of system usage pattern dynamically. The feature used to model system’s usage pattern was program behavior. When system usage pattern changed, new program behaviors will b...
Single Document Summarization Based on Local Topic Identification and Word Frequency
Found in: Mexican International Conference on Artificial Intelligence
By Zhi Teng, Ye Liu, Fuji Ren, Seiji Tsuchiya, Fuji Ren
Issue Date:October 2008
pp. 37-41
In this task, an approach for single document summaries based on local topic identification and word frequency is proposed. In recent years, there has been increased interest in automatic summarization. The physical features are often used and have been su...
Optimized User Revocation for Group Signature Based Privacy-Aware PKI
Found in: Distributed Computing Systems Workshops, International Conference on
By Wei Ren, Kui Ren, Wenjing Lou
Issue Date:June 2008
pp. 388-393
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is important for many applications. The applicability of privacy-aware PKI highly relies on the performance of user revocation. The requireme...
A Web Intelligent System based on Measuring the Effects of Bother
Found in: Web Intelligence, IEEE / WIC / ACM International Conference on
By Yonglin Ren, Mian Qin, Weilin Ren
Issue Date:November 2007
pp. 715-718
The influence of bother measures the extent to which a user would be bothered or annoyed by any interaction with the agent, especially when the user interacts over the Internet. This paper discusses the model of bother cost and its application in web servi...
Proactive Health Care Underpinned by Embedded and Mobile Technologies
Found in: Computer and Information Science, ACIS International Conference on
By Hwang-Cheng Wang, Jia-Chi Lin, Shiang-Ren Yang, Ping Chang, Jun-Yan Chen, Yu-Ren Guo
Issue Date:July 2005
pp. 453-460
This paper describes the use of embedded information and mobile communication technologies to tackle one impending global concern, namely, the aging and health care problem. As the population ages, chronic diseases also become rampant, leading to mounting ...
Enhancement to RED Algorithm
Found in: Networks, IEEE International Conference on
By Ren Fengyuan, Ren Yong, Shan Xiuming
Issue Date:October 2001
pp. 14
RED (Random Early Detection) has gained rather more attention as AQM (Active Queue Management) recommendation algorithm. The instability and difficulty in tuning control parameter settings are two great obstacles. In this study, we first identify several d...
Analysis and Improvement of the EFCI Algorithm
Found in: Computers and Communications, IEEE Symposium on
By Ren Fengyuan, Ren Yong, Shan Xiuming, Wang Fubao
Issue Date:July 2001
pp. 0255
Abstract: ATM networks oriented connections provide pure QoS (Quality of Service) for diversified services through a series of traffic management mechanisms, the ABR (Available Bit Rate) flow control is especially important among these approaches. In the b...
Golden Mandarin (III)-a user-adaptive prosodic-segment-based Mandarin dictation machine for Chinese language with very large vocabulary
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Ren-Yuan Lyu, Lee-Feng Chien, Shiao-Hong Hwang, Hung-Yun Hsieh, Rung-Chiuan Yang, Bo-Ren Bai, Jia-Chi Weng, Yen-Ju Yang, Shi-Wei Lin, Keh-Jiann Chen, Chiu-Yu Tseng, Lin-Shan Lee
Issue Date:May 1995
pp. 57-60
This paper presents a prototype prosodic-segment-based Mandarin dictation machine for the Chinese language with very large vocabulary. It accepts utterances continuous within a prosodic segment which is composed of one or a few word(s). It also possesses v...
A Multiple Case Study on Post-Merger IT Integration with IT Culture Conflict Perspective
Found in: Hawaii International Conference on System Sciences
By Ren-Der Chao, Fu-Ren Lin
Issue Date:January 2009
pp. 1-10
This paper analyzes the culture conflicts of merged IT departments in two banks in Taiwan. The integration of divergent cultures is crucial to maintain the performance of a merged organization. We examine issues in post-merger IT integration of two Taiwan'...
An Adaptive Anomaly Detection Based on Hierarchical Clustering
Found in: Information Science and Engineering, International Conference on
By Liang Hu, Wei-wu Ren, Fei Ren
Issue Date:December 2009
pp. 1626-1629
Traditional anomaly detection methods lack adaptive captivity in complex and heterogeneous network. Especially while facing high noise environments or the situation of updating profiles not in time, intrusion detection systems will have high false alarm ra...
User Verification Leveraging Gait Recognition For Smartphone Enabled Mobile Healthcare Systems
Found in: IEEE Transactions on Mobile Computing
By Yanzhi Ren,Yingying Chen,Mooi Choo Chuah,Jie Yang
Issue Date:February 2015
pp. 1
The rapid deployment of sensing technology in smartphones and the explosion of their usage in people’s daily lives provide users with the ability to collectively sense the world. This leads to a growing trend of mobile healthcare systems utilizing sensing ...
iVisDesigner: Expressive Interactive Design of Information Visualizations
Found in: IEEE Transactions on Visualization and Computer Graphics
By Donghao Ren,Tobias Hollerer,Xiaoru Yuan
Issue Date:February 2015
pp. 1
We present the design, implementation and evaluation of iVisDesigner, a web-based system that enables users to design information visualizations for complex datasets interactively, without the need for textual programming. Our system achieves high interact...
Distributed Fault-Tolerant Topology Control in Cooperative Wireless Ad Hoc Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Junyao Guo,Xuefeng Liu,Chunxiao Jiang,Jiannong Cao,Yong Ren
Issue Date:February 2015
pp. 1
Current researches on topology control with cooperative communication (CC) in wireless ad hoc networks have focused on network connectivity, path energy-efficiency and node transmission power reduction. However, fault-tolerance related issues have not been...
On Energy Efficiency of IEEE 802.16m Interframe Scheduling for Scalable Video Multicast
Found in: IEEE Transactions on Mobile Computing
By Chien-Chi Kao,Shun-Ren Yang,Hsin-Chen Chen
Issue Date:December 2014
pp. 1-1
IEEE 802.16m resource scheduling remains a challenging issue for video multicast. Given the OFDMA frame structure, the IEEE 802.16m scheduling task is comprised of: (1) intraframe scheduling; and (2) interframe scheduling. In the literature, while many stu...
Dynamic Scheduling and Pricing in Wireless Cloud Computing
Found in: IEEE Transactions on Mobile Computing
By Shaolei Ren,Mihaela van der Schaar
Issue Date:October 2014
pp. 1-1
In this paper, we consider a wireless cloud computing system in which the service provider operates a data center and provides cloud services to its subscribers at dynamic prices. We propose a joint optimization of scheduling and pricing decisions for dela...
Cone Tracing for Furry Object Rendering
Found in: IEEE Transactions on Visualization and Computer Graphics
By Hao Qin,Menglei Chai,Qiming Hou,Zhong Ren,Kun Zhou
Issue Date:August 2014
pp. 1-1
We present a cone-based ray tracing algorithm for high-quality rendering of furry objects with reflection, refraction and defocus effects. By aggregating many sampling rays in a pixel as a single cone, we significantly reduce the high supersampling rate re...
A Novel Approach to Trust Management in Unattended Wireless Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Yi Ren,Vladimir I. Zadorozhny,Vladimir A. Oleshchuk,Frank Y. Li
Issue Date:July 2014
pp. 1-1
Unattended Wireless Sensor Networks (UWSNs) are characterized by long periods of disconnected operation and fixed or irregular intervals between sink visits. The absence of an online trusted third party implies that existing WSN trust management schemes ar...
VCSS: An Integration Framework for Open Cloud Storage Services
Found in: 2014 IEEE World Congress on Services (SERVICES)
By Dongju Yang,Chuan Ren
Issue Date:June 2014
pp. 155-160
With the emergence of open Cloud storage services like Baidu Cloud Storage, Ali Open Storage Service and Tencent MicroCloud etc, individual applications and some enterprise storage are being increasingly deployed on Clouds. However, relying on a single Clo...
Modeling the Virtual Machine Launching Overhead under Fermicloud
Found in: 2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)
By Hao Wu,Shangping Ren,Gabriele Garzoglio,Steven Timm,Gerard Bernabeu,Seo-Young Noh
Issue Date:May 2014
pp. 374-383
Fermi Cloud is a private cloud developed by the Fermi National Accelerator Laboratory for scientific workflows. The Cloud Bursting module of the Fermi Cloud enables the Fermi Cloud, when more computational resources are needed, to automatically launch virt...
Towards Effective Bug Triage with Software Data Reduction Techniques
Found in: IEEE Transactions on Knowledge and Data Engineering
By Jifeng Xuan,He Jiang,Yan Hu,Zhilei Ren,Weiqin Zou,Zhongxuan Luo,Xindong Wu
Issue Date:May 2014
pp. 1
Software companies spend over 45 percent of cost in dealing with software bugs. An inevitable step of fixing bugs is bug triage, which aims to correctly assign a developer to a new bug. To decrease the time cost in manual work, text classification techniqu...
Optimal Threshold Policy for In-home Smart Grid with Renewable Generation Integration
Found in: IEEE Transactions on Parallel and Distributed Systems
By Gi-Ren Liu,Phone Lin,Yuguang Fang,Yi-Bing Lin
Issue Date:May 2014
pp. 1
In-home Smart Grid (SG), the integration of Renewable Power Systems (RPSs) with Conventional Power Systems (CPSs), calls for cost-effective management for the electricity usages of end users’ household appliances. In this paper, by taking the charging proc...
Quatrain: Accelerating Data Aggregation between Multiple Layers
Found in: IEEE Transactions on Computers
By Jinglei Ren,Yongwei Wu,Meiqi Zhu,Weimin Zheng
Issue Date:May 2014
pp. 1207-1219
Composition of multiple layers (or components/services) has been a dominant practice in building distributed systems, meanwhile aggregation has become a typical pattern of data flows nowadays. However, the efficiency of data aggregation is usually impaired...
Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Jian Li,Yun Li,Jian Ren,Jie Wu
Issue Date:May 2014
pp. 1223-1232
Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless sensor networks (WSNs). For this reason, many message authentication schemes have been developed, based on either symmet...
A Novel Time-Obfuscated Algorithm for Trajectory Privacy Protection
Found in: IEEE Transactions on Services Computing
By Ren-Hung Hwang,Yu-Ling Hsueh,Hao-Wei Chung
Issue Date:April 2014
pp. 126-139
Location-based services (LBS) which bring so much convenience to our daily life have been intensively studied over the years. Generally, an LBS query processing can be categorized into snapshot and continuous queries which access user location information ...
Workload Analysis, Implications, and Optimization on a Production Hadoop Cluster: A Case Study on Taobao
Found in: IEEE Transactions on Services Computing
By Zujie Ren,Jian Wan,Weisong Shi,Xianghua Xu,Min Zhou
Issue Date:April 2014
pp. 307-321
Understanding the characteristics of MapReduce workloads in a Hadoop cluster is the key to making optimal configuration decisions and improving the system efficiency and throughput. However, workload analysis on a Hadoop cluster, particularly in a large-sc...
Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Mai Abdelhakim,Leonard E. Lightfoot, Jian Ren, Tongtong Li
Issue Date:April 2014
pp. 950-959
This paper explores reliable data fusion in mobile access wireless sensor networks under Byzantine attacks. We consider the q-out-of-m rule, which is popular in distributed detection and can achieve a good tradeoff between the miss detection probability an...
 1  2 Next >>