Search For:

Displaying 1-45 out of 45 total
DENNC: A Wireless Malicious Detection Approach Based on Network Coding
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Hong Song,Xiao Xiao,Weiping Wang,Luming Yang
Issue Date:November 2011
pp. 160-165
In wireless networks, communications among nodes are vulnerable to attacks launched by malicious nodes. Presently, Existing malicious node detection approaches either need special hardware or depend on node listening, node encryption or node identity authe...
 
Education IPTV for E-learning in Rural Area
Found in: Information Science and Engieering, International Symposium on
By Zhu Xiao Liang, Liu Quan, Yin Jie, Song Xiao Juan
Issue Date:December 2008
pp. 268-271
How to acquire fair educational opportunities in rural areas as in city is now a social hotspot in China. To solve the problem, E-leaning should play an important rule. However, some new challenges should be addressed in rural areas than in city. Based on ...
 
A IEEE802.11 Rate Control Scheme for Streaming Media Transmission over Wireless Mesh Network
Found in: Information Science and Engieering, International Symposium on
By Zhu Xiao Liang, Liu Quan, Yin Jie, Song Xiao Juan
Issue Date:December 2008
pp. 272-275
This paper proposes a simplified model to describe distance node interference in IEEE802.11 based Wireless Mesh Network (WMN). An Interference Range based Rate Control (IRRC) scheme to resist interference from distant terminals based on interference level ...
 
Blind Image Tampering Identification Based on Histogram Features
Found in: Multimedia Information Networking and Security, International Conference on
By Kaiwei Cai,Xiaoqing Lu,Jianguo Song,Xiao Wang
Issue Date:November 2011
pp. 300-303
Nowadays, digital forensics has emerged as an important research field with applications of authenticity/integrality verification for digital data. In this paper, we focus on image forensic techniques and propose a blind scheme for image tampering identifi...
 
An Error Concealment Algorithm Based on Non-uniform Lagrange Interpolation
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Jianlong Zhang,Xinbao Gao,Song Xiao,Jianchao Du
Issue Date:October 2011
pp. 286-289
In this paper, we propose an error concealment algorithm based on non-uniform Lagrange interpolation for H.264 standard. To increase the accuracy of error concealment algorithm we utilize the 4 4 pixel block interpolation mode supported by H.264 standard, ...
 
A Video Transmission Framework Based on Packet Criticality Model
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Jianchao Du,Song Xiao,Chengke Wu,Jianlong Zhang
Issue Date:October 2011
pp. 270-273
During video streaming over packet-erasure network, packets may lose due to network congestion. Since video packets have different significance and validity for decoding, the streaming system is expected to transmit the most critical packets when congestio...
 
Fast Mode Decision Algorithm for H.264/SVC Based on Motion Vector Relation Analysis
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Xuesong Sun,Song Xiao,Jianchao Du,Min Hu
Issue Date:October 2011
pp. 278-281
Recently, scalable video coding technique has attracted a lot of attention for its desired scalable functionality and coding efficiency. H.264/SVC encodes a video in a hierarchical way by which the coded bit stream can satisfy terminals with different capa...
 
A Threshold-Based Coefficients Cutting Method for Compressive Imaging
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Lei Quan,Song Xiao,Jianchao Du,Janli Zhou
Issue Date:October 2011
pp. 274-277
Compressive sensing is a new technique in signal processing which can recover a sparse signal vector via a much smaller of non-adaptive, linear measurements than the dimension of the signal vector. In this paper, we applied compressive sensing to a joint s...
 
An Opportunistic Network Coding Algorithm Based on the Queue State and Network Topology
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Li Zhang,Song Xiao,Ning Cai,Jianchao Du
Issue Date:October 2011
pp. 290-293
Network coding is an emerging and powerful solution that can significantly improve the throughput and power efficiency of wireless networks by allowing mixing of various traffic flows into a single packet. However, when network coding is applied, a packet ...
 
A Rate Distortion-Based Network Coding Design for Video Transmission
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Ying Kang,Song Xiao,Ji Lu,Chengke Wu
Issue Date:October 2011
pp. 282-285
In the process of video transmission, packets loss may lead to the reconstruction distortion. When network coding is used for video transmission, the original error will cause propagation in the following nodes. To reduce the impact of error propagation, a...
 
An Error Concealment Approach for Pixel Based Wyner-Ziv Video Coding
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Yangli Wang, Chengke Wu, Song Xiao
Issue Date:October 2010
pp. 595-598
In the new Wyner-Ziv (WZ) video coding paradigm, a virtual correlation channel is assumed between the quantized source and the side information (SI) at the decoder, and channel coding is generally applied to achieve compression. In this paper, we address e...
 
Robust Video Transmission Scheme Based on Network Coding
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Song Xiao, Ji Lu, Yangli Wang, Chengke Wu
Issue Date:October 2010
pp. 591-594
In this paper, a robust transmission scheme based on unequal error protection (UEP) with network coding for scalable video bit stream is studied. A dynamic random network model with Poisson distribution for single-source multicast network is set up. At the...
 
A Pixel-Level Rate Control Algorithm for the Optimal Prediction Residual
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Hongwei Li, Song Xiao, Chengke Wu, Yuli Feng
Issue Date:October 2010
pp. 603-606
In order to further improve the performance of rate control in H.264, a pixel-level rate control algorithm for the optimal prediction residual is proposed. Firstly, this proposed algorithm determines whether discrete cosine transform (DCT) should be applie...
 
Optimized State-Distortion Extraction for Scalable Extension of H.264/AVC
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Ji Lu, Song Xiao, Chengke Wu
Issue Date:October 2010
pp. 599-602
A GOP-based state extraction algorithm for scalable video coding (SVC) is proposed to improve the video streaming transmission efficiency and reconstructed quality. According to the scalable features and internal relationship of SVC enhancement layers, we ...
 
Distributed Compressive Hyperspectral Image Sensing
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Haiying Liu, Yunsong Li, Song Xiao, Chengke Wu
Issue Date:October 2010
pp. 607-610
A novel compression framework called distributed compressed hyper spectral image sensing (DCHIS) is proposed in this paper. In our framework, the random measurements of each spectral band are obtained using compressed sensing (CS) encoding independently at...
 
The Development Stage Positioning Research for an Innovative City
Found in: Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, IACIS International Symposium on
By Xu Nan, Song Xiao-zhong, Wang Li-yan
Issue Date:October 2010
pp. 385-389
Building an innovative city is the localization and materialization of building an innovation-oriented country and is a complex systematic social project which should have scientific theoretical basis and guidance. With the life cycle theory and the resear...
 
The Decision Model Research Based on Cooperative Game with Interest Subject of Venture Capital Investment
Found in: Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, IACIS International Symposium on
By Wang Li-yan, Song Xiao-zhong
Issue Date:October 2010
pp. 378-381
The venture success is determined by how the interest subject of venture capital investment measures the feasibility of cooperation and the consequential decision about cooperation. This study analyses the relationship between venture entrepreneur and vent...
 
Collaborative Development System Based on Federation Integration
Found in: Networking and Distributed Computing, International Conference on
By Wu Song, Xiao Tianyuan, Fan Wenhui, Cui Bing
Issue Date:October 2010
pp. 372-375
Existing collaborative development systems for design, simulation and optimization adopt tight integration model, thus the collaborative components are difficult to join and exit dynamically, causing inconvenience for dynamic adjustment of the collaborativ...
 
Research on Framework and Tool of MDA Oriented Simulation System
Found in: Information Technology and Applications, International Forum on
By Sun Yong, Gong Guanghong, Han Liang, Song Xiao, Li Ni
Issue Date:July 2010
pp. 292-295
The Model Driven Architecture (MDA) concept and key technology were discussed, including modeling technology, model transformation technology and model template. A MDA framework using UML for Platform Independent Model (PIM) and XML for Platform Specific M...
 
SWSCPD: Architecture for Complex Product Design Based on Semantic Web Services
Found in: Electrical and Control Engineering, International Conference on
By Song Xiao, He Dongjing, Zhang Lin, Li Jiajia
Issue Date:June 2010
pp. 4779-4782
During Complex Product Design (CPD) process, many problems such as information integration and agile response to users' changing requests need to be implemented, but these problems are yet to be solved. In this paper, a novel framework called SWSCPD for th...
 
The Analysis and Coordination of the Cooperation Risk in Supply Network
Found in: International Conference on E-Business and E-Government
By Hu Song,Xiao Lei
Issue Date:May 2010
pp. 3447-3450
This article distinguishes and analyses the various supply risk, and discusses intensively a kind of important basic risk–cooperation risk from both quality and quantity sides. After discusses of corporate risk’s different respects, the article estimates t...
 
Research on Evaluation of Venture Capital for SMEs
Found in: International Conference on E-Business and E-Government
By Hu Song,Xiao Lei
Issue Date:May 2010
pp. 2495-2497
Modern economic growth has shown an increasing trend to rely on the innovation. SMEs are becoming the main innovation force which can not be ignored, and have significant impact on a country’s economic growth and employment. Venture Capital plays an import...
 
Efficient Protection Scheme for SVC Content Based on Network Coding
Found in: Information Assurance and Security, International Symposium on
By Ji Lu, Song Xiao, Chengke Wu
Issue Date:August 2009
pp. 585-588
How to protect the video streaming for reasonable usage is a necessary technology in multimedia services over network. However, most the previous schemes are too complicated and time-consuming to apply in real multimedia content protection system. Network ...
 
New Properties and Measures of Distance Measure Between Intuitionistic Fuzzy Sets
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Yuan-tao Song, Xiao-guang Zhou, Qiang Zhang
Issue Date:August 2009
pp. 340-343
This paper studies how to calculate the difference between two intuitionistic fuzzy sets (IFSs). A new property of distance measure on IFSs is proposed at first. Some new distance measures on IFSs are proposed secondly. These new properties and new distanc...
 
Research on Coupling Simulation Between Dynamics of Multi-body and Hydrodynamic Lubrication of Piston-Cylinder Sleeve System
Found in: Information and Computing Science, International Conference on
By Cheng Ying, Song Xiao, Wang Dong-jie
Issue Date:May 2009
pp. 300-303
For the purpose of establish a more accurate dynamic model of internal combustion engine (I.C.E) piston cylinder system, the model coupling between hydrodynamic lubrication and dynamics of multi-body system of piston cylinder system was built by linking AD...
 
A Novel Image Fusion Method Based on Contourlet Decomposition
Found in: Computational Sciences and Optimization, International Joint Conference on
By Min Li, Wei Cai, Jian-she Song, Xiao-yan Li, Yun Sun
Issue Date:April 2009
pp. 930-933
Since multisensor image fusion is becoming a promising technique, many image fusion techniques based on the multiresolution wavelet decomposition have been developed. However, wavelets have been proved to have disappointing behaviors in higher dimensions. ...
 
Researches on Modeling and Simulation of Turbo-Shaft Engine and Main Rotor System
Found in: Computer Science and Information Engineering, World Congress on
By Ma Shi-dong, Han Liang, Gong Guang-hong, Song Xiao
Issue Date:April 2009
pp. 187-191
Modeling of power system plays an important part in modeling of helicopter dynamics system. The precision of turbo-shaft engine model affects directly the fidelity of power system model in process of modeling and simulation on helicopter. Modeling techniqu...
 
Study of Polluted Area Mapping System Based on Satellite Imagery
Found in: Education Technology and Computer Science, International Workshop on
By Xia Song, Xiao Weiwei, Jiang Congshi
Issue Date:March 2009
pp. 943-946
This paper mainly focus on managing and processing graphical data and attribute data relative to polluted are abased on Google Earth platform that gets rich geo-data to you with amazing speed and full context. The processes of importing, organizing, visual...
 
Dynamic Game Analysis on Knowledge-Sharing and Knowledge-Spillover in Competitive Alliances
Found in: Computer Science and Software Engineering, International Conference on
By Wang Ming-xian, Song Xiao-zhong
Issue Date:December 2008
pp. 278-281
A conceptual model of the knowledge-sharing and the knowledge-spillover was constructed according to the knowledge voluntary proliferation and the non-voluntary proliferation characteristics between the individual members in the competitive alliance, and a...
 
SkyEye.KOM: An Information Management Over-Overlay for Getting the Oracle View on Structured P2P Systems
Found in: Parallel and Distributed Systems, International Conference on
By Kalman Graffi, Aleksandra Kovacevic, Song Xiao, Ralf Steinmetz
Issue Date:December 2008
pp. 279-286
In order to ease the development and maintenance of more complex P2P applications, which combine multiple P2P functionality (e.g. streaming and dependable storage), we suggest to extend structured P2P systems with a dedicated information management layer. ...
 
Federation Integration Architecture for Shiring Resources of Product Development Platforms
Found in: Grid and Cloud Computing, International Conference on
By Wu Song, Xiao Tianyuan, Fan Wenhui, Sun Hongbo
Issue Date:October 2008
pp. 674-679
Federation Integration Architecture for Sharing Resources of Product Development Platforms (FIASRPDP) is presented, which aims to keep the inherent operation pattern of product development platforms and to share their development resources when the develop...
 
Attacks against Network Coordinate System: Vulnerable PIC
Found in: Computer Science and its Applications, International Symposium on
By Xiaohan Zhao, Xiaoxiao Song, Xiao Wang, Yang Chen, Beixing Deng, Xing Li
Issue Date:October 2008
pp. 251-256
In recent years, network coordinate systems which map nodes into a geometrical space can effectively support overlay applications relying on topology-awareness. However, these systems base on an ideal assumption that the nodes in them are honest to coopera...
 
An Approach to Side Information Estimation Based on Universal Prediction and Motion Compensated Interpolation
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Yangli Wang, Jechang Jeong, Chengke Wu, Song Xiao, Min Zhou
Issue Date:August 2008
pp. 679-682
In Wyner-Ziv (WZ) video coding, decoder side information (SI) estimation takes an important role. In this paper, an approach to SI estimation for WZ video coding is proposed. It is based on universal prediction and motion compensated temporal interpolation...
 
Priority Ordering Algorithm for Scalable Video Coding Transmission over Heterogeneous Network
Found in: Advanced Information Networking and Applications, International Conference on
By Song Xiao, Chengke Wu, Yunsong Li, Jianchao Du, C.C-jay Kuo
Issue Date:March 2008
pp. 896-903
Scalable video representation of the state-of-art scalable extension of the H.264/MPEG-4 AVC (SVC) and its combined 3d scalability feature offer an excellent solution to flexible video multicast over IP network. In order to relieve the impact of the severe...
 
A New Topic Influence Model Research in Online Community
Found in: Computational Intelligence and Security, International Conference on
By Jun-bo Gao, Bo-wen An, An-jun Song, Xiao-feng Wang
Issue Date:December 2007
pp. 466-469
The continual development of the Internet has witnessed a huge accumulation of information from the online community and forum. While this has drawn attentions of more and more people, Internet has become the fourth media of information release. Using the ...
 
Error Resilient Transmission of H.264 Video over Wireless Network
Found in: Data Compression Conference
By Song Xiao, Chengke Wu, Jianchao Du, Yadong Yang
Issue Date:March 2006
pp. 472
For the robust transmission of compressed video over wireless channels, a commonly used approach is unequal error protection (UEP). In order to apply UEP, data partitioning is used in many video compression standards. There are three different partition ty...
   
Robust Video Communication Based on Source Modeling and Network Congestion Control
Found in: Advanced Information Networking and Applications, International Conference on
By Song Xiao, Chengke Wu, Jechang Jeong
Issue Date:March 2005
pp. 488-491
A new method combining source channel coding with source modeling and network congestion control for reliable video transmission over wireless network is proposed in this paper. Based on scene modeling and characteristic analyzing, all layers generated by ...
 
A Novel Transmission and Controlling Strategy for Progressive Streaming Video over the Wireless Internet
Found in: Computational Intelligence and Multimedia Applications, International Conference on
By Fang Zhang, Song Xiao, Chengke Wu
Issue Date:September 2003
pp. 254
A new streaming video transmission and controlling strategy based on wavelet EBCOT coding over the wireless Internet is proposed in this paper. The strategy analyzes the bit streams encoded by EBCOT and packs to multiple transmission layers according to di...
 
A New Robust Multiple Description Coding Method Based on Region of Interest
Found in: Advanced Information Networking and Applications, International Conference on
By Song Xiao, Fang Zhang, Chengk Wu, Yunsong Li, Yaoping Yan
Issue Date:March 2003
pp. 501
A new revised multiple description SPIHT coding is proposed to combat packet loss. According to the region of interest of human eyes, the method reorders the zero trees of wavelet and assigns different coding rates to redundant trees. Simulation results sh...
 
Software Sensor Based on Aspect Recombination for Avionics System
Found in: Information Science and Engineering, International Conference on
By Gang Li, Cheng-Lie Du, Cui-Ye Song, Xiao-Bin Cai
Issue Date:December 2009
pp. 3851-3853
The major approaches to monitor the software environment is software sensor. This paper proposed a kind of software sensor, which is based on environment-aware. Considering the efficiency of the sensor monitoring, we made the identification of concern poin...
 
Manifold: A parallel simulation framework for multicore systems
Found in: 2014 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)
By Jun Wang,Jesse Beu,Rishiraj Bheda,Tom Conte,Zhenjiang Dong,Chad Kersey,Mitchelle Rasquinha,George Riley,William Song,He Xiao,Peng Xu,Sudhakar Yalamanchili
Issue Date:March 2014
pp. 106-115
This paper presents Manifold, an open-source parallel simulation framework for multicore architectures. It consists of a parallel simulation kernel, a set of microarchitecture components, and an integrated library of power, thermal, reliability, and energy...
   
Reorder user's tweets
Found in: ACM Transactions on Intelligent Systems and Technology (TIST)
By Jianmin Wu, Keyi Shen, Li Song, Xiao Gu, Xiaokang Yang, Ya Zhang, Yiping Han
Issue Date:January 2013
pp. 1-17
Twitter displays the tweets a user received in a reversed chronological order, which is not always the best choice. As Twitter is full of messages of very different qualities, many informative or relevant tweets might be flooded or displayed at the bottom ...
     
QoS-Driven Service Composition Modeling with Extended Hierarchical CPN
Found in: Theoretical Aspects of Software Engineering, Joint IEEE/IFIP Symposium on
By Wen-jun LI, Xiao-jun LIANG, Hua-mei SONG, Xiao-cong ZHOU
Issue Date:June 2007
pp. 483-492
Quality of Service (QoS) plays an important role in the composition of services. A Colored Petri Net (CPN) based approach is proposed to model and analyze QoS-driven service composition in a Service-Oriented Architecture (SOA), where all services are consi...
 
Fault Location and Phase Selection for UHV Six-Phase Transmission Lines
Found in: Asia-Pacific Power and Energy Engineering Conference
By Yan Wang, Dan Zhou, Yan-jun Jiao, Song-xiao Xu
Issue Date:March 2011
pp. 1-3
NA
 
Reliable Transmission of H.264 Video over Wireless Network
Found in: Advanced Information Networking and Applications, International Conference on
By Song XIAO, Chengke Wu, Jianchao Du, Yadong Yang
Issue Date:April 2006
pp. 844-848
A new error resilient method based on data partitioning and unequal error protection for H.264 video transmission over wireless network is proposed in this paper. By introducing the Impact factor of Inter MB and p- curve, the method further divides the C t...
 
 1