Search For:

Displaying 1-21 out of 21 total
Computing Refined Ordering Relations with Uncertainty for Acyclic Process Models
Found in: IEEE Transactions on Services Computing
By Tao Jin,Jianmin Wang,Lijie Wen,Gen Zou
Issue Date:July 2014
pp. 415-426
Since the behavior is the essential characteristic of business process models, and ordering relations between execution of tasks can be used to describe the behavior of process models, we need to compute the ordering relations between tasks in process mode...
 
Efficient Spread Spectrum Communication without Preshared Secrets
Found in: IEEE Transactions on Mobile Computing
By Aldo Cassola,Tao Jin,Guevara Noubir,Bishal Thapa
Issue Date:August 2013
pp. 1669-1680
Spread spectrum (SS) communication relies on the assumption that some secret is shared beforehand among communicating nodes to establish the spreading sequence for long-term wireless communication. Strasser et al. identified this as the circular dependency...
 
Advance of the Research on Crop Suffering from Waterlogged Stress
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By An-Xun Liu,Jian-Qiang Zhu,Tao Jin
Issue Date:January 2013
pp. 227-230
Water logging land is one main kind of low productive soil in the middle and lower reaches area of Yangtze River and Yellow River and coastal areas in our country, and there is 24.4×106 hectares of flood soil and 7.67×106 hectares of soak soil in China. Wa...
 
Aging-Aware Instruction Cache Design by Duty Cycle Balancing
Found in: 2012 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)
By Tao Jin,Shuai Wang
Issue Date:August 2012
pp. 195-200
The degradation of CMOS devices over the lifetime can cause the severe threat to the system performance and reliability at deep sub micron semiconductor technologies. The negative bias temperature instability (NBTI) is among the most important sources of t...
 
Low power aging-aware register file design by duty cycle balancing
Found in: 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE 2012)
By Shuai Wang, Tao Jin, Chuanlei Zheng, Guangshan Duan
Issue Date:March 2012
pp. 546-549
The degradation of CMOS devices over the lifetime can cause the severe threat to the system performance and reliability at deep submicron semiconductor technologies. The negative bias temperature instability (NBTI) is among the most important sources of th...
 
A Distributed Framework for Forensics Based on the Content of Network Transmission
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Tang Hong,Zou Tao,Jin Qi,Zhang Jianbo
Issue Date:October 2011
pp. 852-855
A distributed framework for network forensics is presented in this paper, which tries to capture and store the digital evidence of the information leaking through the network. The architecture of the frame work is composed of the distributed data agents an...
 
Research on Multi-dimensional Simulation Data Management Model for Complicated Product
Found in: Electrical and Control Engineering, International Conference on
By Wei Wang, Rong Mo, Ye Tao Jin, Yan Zhang
Issue Date:June 2010
pp. 2948-2951
Simulation analysis data proliferate in the process of product collaborative simulation, therefore, capability to access and manage the simulation analysis data is critical for the collaborative simulation. In order to achieving the integrality, coherence ...
 
An Improved Way of Multicast in Wearable WSN
Found in: Wearable Computing Systems, Asia-Pacific Conference on
By Xiaoping Li, Tao Jin, Feng Ling, Yinxiang Li, Xiaoxing Lv
Issue Date:April 2010
pp. 86-89
Modern wearable system requires users to transmit their own information of exact location and physical characteristics timely. It is required to reduce the network delay and excessive energy consumption, which are caused by network code in wearable WSNs. A...
 
Data Mining for the Analytical Redundancy of Power Plant Critical Parameters
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Tao Jin, Zhongguang Fu, Gang Liu, Yongping Yang
Issue Date:November 2009
pp. 317-321
As a new modeling thought, the accurate analytical redundancy model of power plant critical parameters was established by data mining method, which obtained effective information from the large number of real-time operation data. The basic modeling mode, i...
 
Automatic Generation of Chinese Calligraphic Writings with Style Imitation
Found in: IEEE Intelligent Systems
By Songhua Xu, Hao Jiang, Tao Jin, Francis C.M. Lau, Yunhe Pan
Issue Date:March 2009
pp. 44-53
An automatic algorithm can generate Chinese calligraphy by quantitatively representing the characteristics of personal handwriting acquired from learning examples.
 
Automatic Generation of Music Slide Show Using Personal Photos
Found in: Multimedia, International Symposium on
By Songhua Xu, Tao Jin, Francis C. M. Lau
Issue Date:December 2008
pp. 214-219
We present an algorithmic system capable of automatically generating a music slide show given a piece of music with lyrics. Different from previous approaches, our method generates slide shows using personal photos which are without annotation. We introduc...
 
Data Mining for Complex Thermal System Modeling
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Tao Jin, Zhongguang Fu
Issue Date:October 2008
pp. 560-564
As a new modeling thought, the accurate mathematical model of complex thermal system is established by data mining method, which obtains effective information from the large number of real-time operation data and avoids low accuracy of conventional modelin...
 
A Method of Ontology Mapping Based on Subtree Kernel
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Tao Jin, Yuchen Fu, Xinghong Ling, Quan Liu, Zhiming Cui
Issue Date:December 2007
pp. 70-73
In semantic web, ontology mapping is the basis of the interoperation of heterogeneous ontologies. Ontologies are usually distributed and heterogeneous and thus it is necessary to find the mapping between them before processing across them. The current onto...
 
The Design and Implementation of a Topic-Driven Crawler
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Qiong Li, Tao Jin, Yuchen Fu, Quan Liu, Zhiming Cui
Issue Date:December 2007
pp. 153-156
It is indispensable that the users surfing on the Internet could have web pages classified into a given topic as correct as possible. As a result, topic-driven crawlers are becoming important tools to support applications such as specialized web portals, o...
 
A Multistrategy Semantic Web Service Matching Approach
Found in: Convergence Information Technology, International Conference on
By Yuchen Fu,Tao Jin,Xinghong Ling,Quan Liu,Zhiming Cui
Issue Date:November 2007
pp. 253-256
Semantic Web makes the automatic discovery and invocation of Web Services become possible. But existing methods perform the capability matching, which is crucial for service discovery, either only according to inputs and outputs (IO), which results in a no...
 
A Method of Ontology Mapping Based on Instance
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Tao Jin, Yuchen Fu, Xinhong Lin, Quan Liu, Zhiming Cui
Issue Date:November 2007
pp. 145-148
Ontology mapping is the key point to reach interoperability over ontologies. In semantic web environment, ontologies are usually distributed and heterogeneous and thus it is necessary to find the mapping between them before processing across them. Many eff...
 
Organizational Modeling from Event logs
Found in: Grid and Cloud Computing, International Conference on
By Tao Jin, Jianmin Wang, Lijie Wen
Issue Date:August 2007
pp. 670-675
Many process mining approaches have been published, which would be helpful to process modeling, but little attempt has been made for role mining used for organizational modeling. In this paper, a method of role mining using event logs as input is introduce...
 
Application-awareness in SDN
Found in: Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM (SIGCOMM '13)
By Gowtham Bellala, Guevara Noubir, Jeongkeun Lee, Manfred Arndt, Tao Jin, Zafar Ayyub Qazi
Issue Date:August 2013
pp. 487-488
We present a framework, Atlas, which incorporates application-awareness into Software-Defined Networking (SDN), which is currently capable of L2/3/4-based policy enforcement but agnostic to higher layers. Atlas enables fine-grained, accurate and scalable a...
     
Demo: SNEAP: a social network-enabled EAP method no more open hotspots
Found in: Proceedings of the 9th international conference on Mobile systems, applications, and services (MobiSys '11)
By Aldo Cassola, Guevara Noubir, Harsh Kumar, Kamal Sharma, Tao Jin
Issue Date:June 2011
pp. 351-352
As mobile devices evolve, end users have ever increasing demand for ubiquitous network access. WiFi, being now commonplace, has the potential to fulfill this demand. Apart from WiFi hotspots deployed by ISPs, home users start showing interest in sharing ba...
     
Zero pre-shared secret key establishment in the presence of jammers
Found in: Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing (MobiHoc '09)
By Bishal Thapa, Guevara Noubir, Tao Jin
Issue Date:May 2009
pp. 1-2
We consider the problem of key establishment over a wireless radio channel in the presence of a communication jammer, initially introduced in [13]. The communicating nodes are not assumed to pre-share any secret. The established key can later be used by a ...
     
A new visual search interface for web browsing
Found in: Proceedings of the Second ACM International Conference on Web Search and Data Mining (WSDM '09)
By Francis C. M. Lau, Songhua Xu, Tao Jin
Issue Date:February 2009
pp. 2
We introduce a new visual search interface for search engines. The interface is a user-friendly and informative graphical front-end for organizing and presenting search results in the form of topic groups. Such a semantics-oriented search result presentati...
     
 1