Search For:

Displaying 1-40 out of 40 total
Surface-Related Multiples Prediction Based on Wave Equation
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Shi Ying,Liu Shi-zhu,Li Ying
Issue Date:June 2013
pp. 45-48
Multiples prediction and adaptive subtraction are two important aspects for surface-related multiples suppression method based on wave-equation. In this paper, only the prediction part is discussed. GPU (graphic processing unit) with parallel computation a...
A Quantum TITO Diversity Transmission Scheme with Quantum Teleportation of Non-maximally Entangled Bell State
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Jinjing Shi,Ronghua Shi,Ying Guo,Moon Ho Lee
Issue Date:June 2012
pp. 1038-1041
A quantum TITO (Two-Input-Two-Output) diversity transmission scheme for the entangled-state message is proposed by generalizing the wireless transmission technique to the quantum field. The TITO quantum teleportation can be implemented with non-maximally e...
Multiparty Quantum Group Signature Scheme with Quantum Parallel Computation
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Ronghua Shi,Jinjing Shi,Ying Guo,Moon Ho Lee
Issue Date:November 2011
pp. 905-910
A novel (n, n) scheme of multiparty quantum group signature of classical or quantum message is proposed based on the discrete quantum Fourier transform. The generation and verification of the signature can be processed only if all the n participants work i...
A Knowledge Management Platform for Optimization-based Data Mining
Found in: Data Mining Workshops, International Conference on
By Xingsen Li, Yong Shi, Ying Liu, Jun Li, Aihua Li
Issue Date:December 2006
pp. 833-837
Multiple criteria linear programming (MCLP) approach to data mining has been used in many fields. But users need to understand well with math and technology in its working process. This prevents it from wide applications. Studied on standards of data minin...
Study on the Technique and Error Analysis of Nonlinear Combining Forecasts Based Fuzzy System
Found in: Electronic Computer Technology, International Conference on
By Shi-ying Shi
Issue Date:February 2009
pp. 385-387
A combination forecasting method based on fuzzy logical system is presented in this paper. The main idea of this method is that the nonlinear combination forecasting function Ф(x) can be simulated by Takgi Sugeon fuzzy model. Not only the difficulty of con...
Agent Based Mediation Architecture for Federated Digital Library Services
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Xue-lin Shi, Ying Zhao, Xiangjun Dong
Issue Date:December 2007
pp. 375-381
Federated digital libraries are composed of autonomous, possibly heterogeneous information services distributed across the Internet. Interoperation between diverse information services is one of the main challenges faced by FDLs. In this paper we describe ...
SE4SC: A Specific Search Engine for Software Components
Found in: Computer and Information Technology, International Conference on
By Hao Chen, Shi Ying, Jin Liu, Wei Wang
Issue Date:September 2004
pp. 863-868
Currently Component-based software engineering is increasingly being adopted for software development. This approach relies on using reusable components as the building blocks for constructing software systems. As the growth in the popularity of Internet, ...
Coalitional Game for Community-Based Autonomous Web Services Cooperation
Found in: IEEE Transactions on Services Computing
By An Liu,Qing Li,Liusheng Huang,Shi Ying,Mingjun Xiao
Issue Date:July 2013
pp. 387-399
Web services (WSs) can cooperate with each other to provide more valuable WSs. Current approaches for WS cooperation have typically assumed that WSs are always willing to participate in some form of cooperation, and have undermined the fact that WSs are au...
Denoise Investigation on Prestack Reverse time Migration Based on GPU/CPU Collaborative Parallel Accelerating Computation
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Shi Ying,Tian Dong-sheng,Ke Xuan
Issue Date:June 2013
pp. 30-33
Based on two-way wave equation, prestack reverse time migration (RTM) overcomes dip limitation, and can image complicated geological body with high precision. However, since the massy storage, large amount of computation, low frequency noise, the industria...
Research and Implementation of Nuclear Power Overhaul Schedule Automatic Control Platform Based on WebService
Found in: Innovations in Bio-inspired Computing and Applications, International Conference on
By Zi-Nian Shi,Ying Peng
Issue Date:December 2011
pp. 145-148
With the continuously development of nuclear power enterprise information, various application system of coupling degree become more and more high. On the analysis of traditional application integration technology, research and implement a integrated frame...
Research on High-Precision Survey of Supercapacitor Capacity
Found in: Computational Intelligence and Design, International Symposium on
By Jijie Shi,Ying Zhong,Xinghua Li
Issue Date:October 2011
pp. 219-222
High-precisely and quickly measuring supercapaci-tor capacitance is necessary to improve the performance and quality of super capacitors, to decrease capacitance deviation and to enhance reliability and life expectancy of groups of supercapacitor. Based on...
A General Software Defect-Proneness Prediction Framework
Found in: IEEE Transactions on Software Engineering
By Qinbao Song, Zihan Jia, Martin Shepperd, Shi Ying, Jin Liu
Issue Date:May 2011
pp. 356-370
BACKGROUND—Predicting defect-prone software components is an economically important activity and so has received a good deal of attention. However, making sense of the many, and sometimes seemingly inconsistent, results is difficult. OBJECTIVE—We propose a...
A Sequential Frame Method for Traffic Sign Detection
Found in: Information Engineering, International Conference on
By Yang Zhi-Bang, Xu Cheng, Li Shi-Ying, Zhou Xu
Issue Date:August 2010
pp. 137-140
Based on the sequential video frame, a method to detect the traffic sign was proposed. The color image was mapped from RGB to improved HSI color space first, and then converted it to binary image according the color of signs. The shape features were used t...
Evolutionary Grid Scheduling Algorithm with Predictive Resource Optimization
Found in: ChinaGrid, Annual Conference
By Xuelin Shi, Ying Zhao
Issue Date:July 2010
pp. 11-15
Optimal assigning jobs to resources is an important problem in grid computing. Now grid scheduling policies are mostly traditional heuristic algorithms for scheduling n independent tasks on m processors in early finishing time. However grids have developed...
A Reflective Requirements Specification for Requirements Evolving
Found in: Genetic and Evolutionary Computing, International Conference on
By Wen-jie Yuan, Shi Ying
Issue Date:October 2009
pp. 23-26
The classic requirement engineering provides limited technology and inefficient methods for requirements evolution, which leads to great restriction on finish the task of requirements evolution with high-efficiency and high-quality. For resolving above pro...
A Semantic Web Service Description Language
Found in: Information Engineering, International Conference on
By Luokai Hu, Shi Ying, Kai Zhao, Rui Chen
Issue Date:July 2009
pp. 449-452
Semantic Web Service technology provides a strong support for automation software development based on Web service. By analyzing the existing description models and methods of semantic Web service, a Semantic Web Service Description Model (WSDM4S) and its ...
Analysis and Numerical Simulation of a Predator-Prey Model with Beddington-DeAngelis Function Response and Diffusion
Found in: Information and Computing Science, International Conference on
By Shi-Ying Xu, Yu-Min Wei
Issue Date:May 2009
pp. 142-145
In this paper, a predator-prey model with Beddington-DeAngelis function response and diffusion is studied. Uniform persistence of the system is discussed . The sufficient condition of local asymptotic stability and global asymptotic stability of the positi...
Modeling Aspect-Oriented Software Architecture
Found in: Intelligent Information Systems, IASTED International Conference on
By Youcong Ni,Shi Ying,Linlin Zhang,Jing Wen,Peng Ye,Jiajing Zhang
Issue Date:April 2009
pp. 108-113
There are always some crosscutting behaviors and features in the software architecture model described by conventional architecture description languages. They tangle and scatter in different design elements of software architecture and thus lead to diffic...
Study on Weaving Process at Software Architectural level
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Youcong Ni, Shi Ying, Jing Wen, Linlin Zhang, Peng Ye, Jiajing Zhang
Issue Date:December 2008
pp. 1574-1577
The aspect-oriented software architectural weaving mechanism, to integrate aspectual components that encapsulate crosscutting behaviors and features into components and connectors constituting Software Architecture (SA), contributes to analyze and verify o...
Formal Interaction Specification in a Reflective Information Model
Found in: Intelligent Information Technology Application Workshops, International Symposium on
By Peng Ye, Shi Ying, Wen-Jie Yuan, Jun-Feng Yao, Ju-Bo Luo, Ming Hu
Issue Date:December 2008
pp. 1017-1020
As to a reflective information model for reusing software architecture(RIM4RSA) which is constructed and designed on the basis of architectural reflection theory, this paper proposes the way of specification by which the interaction in the RIM4RSA can be f...
The Usage of Semantic Condition Expression for Semantic Web Service Matchmaking
Found in: Intelligent Information Technology Application Workshops, International Symposium on
By Zhi-Hao Zeng, Shi Ying
Issue Date:December 2008
pp. 243-246
Semantic Web service matchmaking is the process of searching the space of possible matches between demands and supplies, and finding the best available ones. To achieve this, the semantic Web service matchmaking framework is one of the absolutely necessary...
Simulation and Analysis of High-Speed Train Running Quality Affected by Route Alignment Condition
Found in: Intelligent Computation Technology and Automation, International Conference on
By Xu-you Long, Qing-chao Wei, Jin Shi, Ying-jie Wang
Issue Date:October 2008
pp. 708-712
Owing to the sharply increase of running speed of high-speed railway trains, the influence of route geometric condition on running quality becomes more sensitive. In order to investigate into the effects of high-speed railway route alignment condition on t...
Web Page Categorization Based on k-NN and SVM Hybrid Pattern Recognition Algorithm
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Xuelin Shi, Ying Zhao, Xiangjun Dong
Issue Date:October 2008
pp. 523-527
Traditional Information Retrieval (IR) method use keywords matching to filter the documents, but usually retrieves unrelated web pages. In order to effectively classify web pages, we present a Web page categorization algorithm, named WebPSC (Web Page Simil...
An Approach for Multi-Dimensional Separation Concerns at Architecture Level
Found in: Power Electronics and Intelligent Transportation System, Workshop on
By Lin-Lin Zhang, Shi Ying, You-Cong Ni, Jing Wen, Kai Zhao
Issue Date:August 2008
pp. 541-545
Traditional architecture design approaches suffer from the crosscutting features and behaviors, which scattered and tangled in the components and connectors, result in the final architecture solutions uneasy to evolve and reuse. In this paper, we propose a...
Traffic Signal Optimization with Vehicles Queue and the Number of Pedestrians Non-Complying at Single Intersection
Found in: Power Electronics and Intelligent Transportation System, Workshop on
By Zhi-Na Zhou, Zhong-Ke Shi, Ying-Feng Li
Issue Date:August 2008
pp. 175-180
In urban traffic signal optimization, the length of vehicle queue, waiting for green signal, is regarded as a performance index (PI). However, pedestrians are reluctant to waiting for green signal without person specially assigned to manage pedestrians in ...
A New Architecture Description Language for Service-Oriented Architec
Found in: Grid and Cloud Computing, International Conference on
By Xiangyang Jia, Shi Ying, Tao Zhang, Honghua Cao, Dan Xie
Issue Date:August 2007
pp. 96-103
<p>Service Oriented Architecture (SOA) is a new form of distributed software architecture. In SOA, the coarse-grained, discoverable, loosely coupled, autonomous services are its basic constitutional units. This makes the SOA different from other arch...
A Reflection Mechanism for Reusing Software Architecture
Found in: Quality Software, International Conference on
By Shi Ying, ZaoQing Liang, JunLi Wang, FuDi Wang
Issue Date:October 2006
pp. 235-243
Reusing software architecture and its constituents, which are a kind of coarse-grained software resources, are confronted with great difficulty. Reflection mechanism has been successfully applied in the reuse of code component, but scarcely applied in the ...
A Modeling Framework for Service-Oriented Architecture
Found in: Quality Software, International Conference on
By Tao Zhang, Shi Ying, Sheng Cao, Xiangyang Jia
Issue Date:October 2006
pp. 219-226
As a new type of software architecture, Service- Oriented Architecture (SOA) provides a blueprint to solve software reuse and enterprise system integration issues. With the emergence and the rapid development of Web Services technologies, SOA has been paid...
Towards Model-based Verification of BPEL with Model Checking
Found in: Computer and Information Technology, International Conference on
By Honghua Cao, Shi Ying, Dehui Du
Issue Date:September 2006
pp. 190
BPEL is widely used to specify Web service composition and it?s correctness is very important in B2B and B2C domains. However, the correctness of BPEL can only be verified at runtime. This paper presents a model-based verification framework, which can veri...
A fast texture-by-numbers synthesis method based on texture optimization
Found in: Proceedings of the 5th International Symposium on Visual Information Communication and Interaction (VINCI '12)
By Jing Fan, Xiao-Ying Shi, Ying Tang, Zhan Zhou
Issue Date:September 2012
pp. 1-10
The framework of Texture-by-numbers (TBN) synthesizes images of global-varying patterns with intuitive user control. Previous TBN synthesis methods have difficulties in achieving high-quality synthesis results and efficiency simultaneously. This paper prop...
Online music integration system based on cloud computing
Found in: 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS)
By Xiuxia Chen,Wenqian Shang,Minyong Shi,Ying Li
Issue Date:June 2014
pp. 405-408
With the development of network music digitization, how to effectively integrate the massive music resources on the web and to provide service for user has became an urgent problem to be solved. This paper designs a system which combines cloud computing an...
Physically-Based Real-Time Animation of Draped Cloth
Found in: Computer Graphics International Conference
By Chiyi Cheng, Jiaoying Shi, Ying-Qing Xu, Heung-Yeung Shum
Issue Date:July 2001
pp. 0257
Abstract: In this paper, we propose a new physically-based model for real-time animation of draped cloth which not only speeds up the rendering greatly, but also maintains visually appealing results. Our simplified model is represented as a grid object com...
Visualizing inference process of a rule engine
Found in: Proceedings of the 2011 Visual Information Communication - International Symposium (VINCI '11)
By Hongan Wang, Jian Shi, Ying Qiao
Issue Date:August 2011
pp. 1-9
In this paper, we introduce an approach to visualize the inference process in a rule engine -- Drools, which employs Rete as its pattern matching algorithm. As a software visualization work, our approach is focused on both static structure of the Rete netw...
Ultra-fast interconnect driven cell cloning for minimizing critical path delay
Found in: Proceedings of the 19th international symposium on Physical design (ISPD '10)
By Charles J. Alpert, Cliff Sze, David A. Papa, Shiyan Hu, Weiping Shi, Ying Zhou, Zhuo Li
Issue Date:March 2010
pp. 75-82
In a complete physical synthesis flow, optimization transforms, that can improve the timing on critical paths that are already well-optimized by a series of powerful transforms (timing driven placement, buffering and gate sizing) are invaluable. Finding su...
SRAM methodology for yield and power efficiency: per-element selectable supplies and memory reconfiguration schemes
Found in: Proceeding of the thirteenth international symposium on Low power electronics and design (ISLPED '08)
By Hung Ngo, JB Kuang, Rajiv Joshi, Rouwaida Kanj, Sani Nassif, Weiping Shi, Ying Zhou, Zhou Li
Issue Date:August 2008
pp. 383-384
We present a novel power-aware yield enhancement design methodology and reconfiguration scheme for deep submicron SRAM designs. We show that with the continued trend of raising array supply to counter process variations, it is more effective to use a per-e...
Fast capacitance extraction in multilayer, conformal and embedded dielectric using hybrid boundary element method
Found in: Proceedings of the 44th annual conference on Design automation (DAC '07)
By Weiping Shi, Ying Zhou, Zhuo Li
Issue Date:June 2007
pp. 835-840
In modern VLSI circuits, metal conductors are separated by multiple planar, conformal or embedded dielectric media. Previous algorithms based on Boundary Element Method (BEM) are inefficient to extract interconnect capacitance due to the complex dielectric...
Implementation and Application of Remote IP Control System
Found in: Electrical and Control Engineering, International Conference on
By Hou Shi-ying, Tong Shi-hua
Issue Date:June 2010
pp. 1166-1168
With the widespread application of industrial ethernet in automation field, intelligent instruments play a important role. The remote on-line modifying IP presented in this paper brings intelligent instruments applied in different network segments of indus...
An Improvement Key Distribution Protocol and Its BAN Analysis
Found in: Future Computer and Communication, International Conference on
By Shi-ying Shi, Yu-ming Mao
Issue Date:April 2009
pp. 381-384
This paper mainly discusses the role of formal analysis in the design of the authentication protocols function; in allusion to Needham-Schroeder Protocol with shared key and Otway-Rees Protocol , this paper propose a new authentication protocol and then an...
Reform the Setting of Computer Hardware Teaching
Found in: Electronic Computer Technology, International Conference on
By Shi-ying Shi
Issue Date:February 2009
pp. 345-348
This paper discusses the reform of the computer hardware teaching in the new circumstances and the establishment of a new-style system structure of computer hardware and tries to give a useful discussion about the problems such as the reform of experimenta...
Study on Incentive Contract of Total Synergy by Logistics Service Information Grid
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Zhang De-hai, Kang Shi-ying
Issue Date:December 2008
pp. 133-136
Because logistics service supply chain is a complex system composed of all kinds of enterprises, it is very important to fully collaborate with service information. In the paper, we firstly construct the concept framework and multi-task principal-agent mod...