Search For:

Displaying 1-50 out of 287 total
A hands-on overview course for computer science and modern information technologies
Found in: Frontiers in Education, Annual
By Lixin Tao, Li-Chiou Chen
Issue Date:October 2008
pp. T3B-12-T3B-17
This paper describes the logics and experience in piloting a new project-based program overview course to introduce the fundamental computer science concepts, methodologies and technologies underpinning the latest information technologies for students who ...
 
Work in progress -- Improving web security education with virtual labs and shared course modules
Found in: Frontiers in Education, Annual
By Lixin Tao, Li-Chiou Chen, Chienting Lin
Issue Date:October 2010
pp. F2F-1-F2F-3
One challenge in web security education is its interdisciplinary and practical nature. Students need to have the basic knowledge and skills of a web developer to understand many of the web security topics, and some of them are normally covered in multiple ...
 
LVMCI: Efficient and Effective VM Live Migration Selection Scheme in Virtualized Data Centers
Found in: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS)
By Wei Zhang,Mingfa Zhu,Yiduo Mei,Limin Xiao,Li Ruan,Tao Gong,Tao Li,Yunwei Gao,Yuzhong Sun
Issue Date:December 2012
pp. 368-375
Virtualization can provide significant benefits in virtualized data centers by enabling efficient and effective live migration to ensure service level agreement(SLA). Most of existing studies make decision on which bad virtual machines (VMs) should be migr...
 
Scheduling Divisible Loads from Multiple Input Sources in MapReduce
Found in: 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)
By Tao Gu,Qun Liao,Yulu Yang,Tao Li
Issue Date:December 2013
pp. 1263-1270
MapReduce is a programming model for data-intensive applications. The performance of MapReduce is greatly affected by the scheduling efficiency, which needs to consider both the parallelism of processing and overhead of data transmission. Lots of researche...
 
Non-negative Laplacian Embedding
Found in: Data Mining, IEEE International Conference on
By Dijun Luo, Chris Ding, Heng Huang, Tao Li
Issue Date:December 2009
pp. 337-346
Laplacian embedding provides a low dimensional representation for a matrix of pairwise similarity data using the eigenvectors of the Laplacian matrix. The true power of Laplacian embedding is that it provides an approximation of the Ratio Cut clustering. H...
 
Using Uncorrelated Discriminant Analysis for Tissue Classification with Gene Expression Data
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Jieping Ye, Tao Li, Tao Xiong, Ravi Janardan
Issue Date:October 2004
pp. 181-190
<p><b>Abstract</b>—The classification of tissue samples based on gene expression data is an important problem in medical diagnosis of diseases such as cancer. In gene expression data, the number of genes is usually very high (in the thous...
 
Approximate Global Alignment of Sequences
Found in: Bioinformatic and Bioengineering, IEEE International Symposium on
By Tamer Kahveci, Venkatakrishnan Ramaswamy, Han Tao, Tao Li
Issue Date:October 2005
pp. 81-88
We propose two novel dynamic programming (DP) methods that solve the the approximate bounded and unbounded global alignment problems for biological sequences. Our first method solves the bounded alignment problem. It computes the distribution of the edit d...
 
Research on Motion Detection and Target Contour Extraction in Wearable Video System
Found in: Wearable Computing Systems, Asia-Pacific Conference on
By Xiaoping Li, Tao Li, Feng Ling, Yinxiang Li
Issue Date:April 2010
pp. 90-93
The wearable video system supports decision making through analyzing video images. Because personnel who wear the system or the object monitored is always moving, the technology of motion detection and target contour extraction used in the wearable video s...
 
Significant Level in V-detector Generation Algorithm
Found in: Information Processing, Asia-Pacific Conference on
By Guiyang Li, Tao Li, Jie Zeng, Haibo Li
Issue Date:July 2009
pp. 513-516
The V-detector generation algorithm is a kind of negative selection algorithm (NSA) inspired by biological immune system (BIS). In this paper, V-detector generation algorithm is simply introduced. The problem that V-detector generation algorithm can not me...
 
From Offline toward Real Time: A Hybrid Systems Model Checking and CPS Codesign Approach for Medical Device Plug-and-Play Collaborations
Found in: IEEE Transactions on Parallel and Distributed Systems
By Tao Li,Feng Tan,Qixin Wang,Lei Bu,Jian-Nong Cao,Xue Liu
Issue Date:March 2014
pp. 642-652
Hybrid systems model checking is a great success in guaranteeing the safety of computerized control cyber-physical systems (CPS). However, when applying hybrid systems model checking to Medical Device Plug-and-Play (MDPnP) CPS, we encounter two challenges ...
 
Understanding the implications of virtual machine management on processor microarchitecture design
Found in: 2013 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)
By Xiufeng Sui,Tao Sun,Tao Li,Lixin Zhang
Issue Date:April 2013
pp. 45-53
Cloud computing has demonstrated tremendous capability in a wide spectrum of online services. Virtualization provides an efficient solution to the utilization of modern multicore processor systems while affording significant flexibility. The growing popula...
   
Anti-interception communication system based on double layers weighted-type fractional Fourier transform
Found in: Software Maintenance and Reengineering, European Conference on
By Tao Li,Lin Mei, Xuanli Wu,Xuejun Sha,Naitong Zhang
Issue Date:August 2011
pp. 88-92
This paper introduces a new kind of anti-interception communication system based on double layers weighted-type fractional Fourier transform (DL-WFRFT). Comparing with traditional anti-intercepting technique at the physics layer, such as time or frequency ...
 
The Long-term Wealth Effect in Technology Merger and Acquisition
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Haisheng Chen, Zhuo-tao Li, Liang Ge
Issue Date:August 2009
pp. 622-627
Based on the empirical study about long-term wealth effect in technology Merger and Acquisition (abbreviated as M&A below), this paper showed that such kind of M&A can cause negative wealth effect significantly in long term, which reflected its hig...
 
Research on Embedded Real-Time Database Model Based on Wireless
Found in: Database Technology and Applications, International Workshop on
By Chi Tao, Li Tuo, Huang Danfeng
Issue Date:April 2009
pp. 184-187
In the modern greenhouse management system, it not only requires the embedded database to have datum managerial ability like the traditional database, but also requires there can be certain real-time character in the embedded database system. This paper co...
 
An Immune Evolutionary Algorithm Based on Chaos Mutation
Found in: Intelligent Systems Design and Applications, International Conference on
By Jianhua Zhang, Tao Li, Nan Zhang, Diangang Wang, Sunjun Liu
Issue Date:October 2006
pp. 925-929
A chaos immune evolutionary algorithm is presented to keep population's diversity, avoid local optimization and improve performance of evolutionary algorithm. To overcome redundancies, over-spread character of chaos sequence was used. To enlarge searching ...
 
GPU Acceleration of Interior Point Methods in Large Scale SVM Training
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Tao Li, Hua Li, Xuechen Liu, Shuai Zhang, Kai Wang, Yulu Yang
Issue Date:July 2013
pp. 863-870
The convex quadratic programming problem, involved in the large scale support vector machine (SVM) training phase, is computationally expensive. Interior Point Methods (IPM) have been used successfully to solve this problem. They have polynomial time compl...
 
Exploring high-performance and energy proportional interface for phase change memory systems
Found in: 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA)
By Zhongqi Li,Ruijin Zhou,Tao Li
Issue Date:February 2013
pp. 210-221
Phase change memory is emerging as a promising candidate for building up future energy efficient memory systems. To achieve high-performance and energy proportional design, phase change memory devices need to be reorganized so that (1) the relatively long ...
 
Enabling distributed generation powered sustainable high-performance data center
Found in: 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA)
By Chao Li,Ruijin Zhou,Tao Li
Issue Date:February 2013
pp. 35-46
The necessity for capping carbon emission has significantly restricted the potential of modern data centers. For this matter, both industry and academia are proactively seeking opportunities on cross-layer power management schemes that could open a door fo...
 
On minimum delay duty-cycling protocol in sustainable sensor network
Found in: 2012 20th IEEE International Conference on Network Protocols (ICNP)
By Shaojie Tang,Jie Wu, Guihai Chen, Cheng Wang, Xuefeng Liu,Tao Li,Xiang-Yang Li
Issue Date:October 2012
pp. 1-9
To ensure sustainable operations of wireless sensor networks, environmental energy harvesting has been well recognized as one promising solution for long-term applications. Unlike in battery-powered sensor networks, we are targeting a duty-cycle adjustment...
 
Aurora: A thermally resilient photonic network-on-chip architecture
Found in: 2012 IEEE 30th International Conference on Computer Design (ICCD 2012)
By Amer Qouneh,Zhongqi Li,Madhura Joshi,Wangyuan Zhang,Xin Fu,Tao Li
Issue Date:September 2012
pp. 379-386
With silicon optical technology moving towards maturity, the use of photonic network-on-chip (NoCs) for global chip communication is emerging as a promising solution to communication requirements of future many core processors. It is expected that photonic...
 
Semi-supervised Hierarchical Clustering
Found in: Data Mining, IEEE International Conference on
By Li Zheng,Tao Li
Issue Date:December 2011
pp. 982-991
Semi-supervised clustering (i.e., clustering with knowledge-based constraints) has emerged as an important variant of the traditional clustering paradigms. However, most existing semi-supervised clustering algorithms are designed for partitional clustering...
 
A quantitative analysis of cooling power in container-based data centers
Found in: IEEE Workload Characterization Symposium
By Amer Qouneh,Chao Li,Tao Li
Issue Date:November 2011
pp. 61-71
Cooling power is often represented as a single taxed cost on the total energy consumption of the data center. Some estimates go as far as 50% of the total energy demand. However, this view is rather simplistic in the presence of a multitude of cooling opti...
 
Web Multimedia Object Clustering via Information Fusion
Found in: Document Analysis and Recognition, International Conference on
By Wenting Lu,Lei Li,Tao Li,Honggang Zhang,Jun Guo
Issue Date:September 2011
pp. 319-323
Multimedia information plays an increasingly important role in humans daily activities. Given a set of web multimedia objects (images with corresponding texts), a challenging problem is how to group these images into several clusters using the available in...
 
SolarCore: Solar energy driven multi-core architecture power management
Found in: High-Performance Computer Architecture, International Symposium on
By Chao Li, Wangyuan Zhang, Chang-Burm Cho, Tao Li
Issue Date:February 2011
pp. 205-216
The global energy crisis and environmental concerns (e.g. global warming) have driven the IT community into the green computing era. Of clean, renewable energy sources, solar power is the most promising. While efforts have been made to improve the performa...
 
Hierarchical Ensemble Clustering
Found in: Data Mining, IEEE International Conference on
By Li Zheng, Tao Li, Chris Ding
Issue Date:December 2010
pp. 1199-1204
Ensemble clustering has emerged as an important elaboration of the classical clustering problems. Ensemble clustering refers to the situation in which a number of different (input) clusterings have been obtained for a particular dataset and it is desired t...
 
A Simulation Platform for Modeling Islanding Power Systems and its Application in Designing Stability Control Schemes
Found in: Electrical and Control Engineering, International Conference on
By Liu Hui, Zhang Jianming, Bi Tianshu, Wu Tao, Li Qunju, Sun Yu, Xue Ancheng, Li Shanying
Issue Date:June 2010
pp. 4962-4965
Because of the limitation of models in existing power system simulation softwares, only frequency fluctuations in a small range can be simulated in such environment. Relative bigger frequency fluctuations in islanding systems can not be simulated in them. ...
 
Using Analog Network Coding to Improve the RFID Reading Throughput
Found in: Distributed Computing Systems, International Conference on
By Ming Zhang, Tao Li, Shigang Chen, Bo Li
Issue Date:June 2010
pp. 547-556
RFID promises to revolutionize the inventory management in large warehouses, retail stores, hospitals, transportation systems, etc. Periodically reading the IDs of the tags is an important function to guard against administration error, vendor fraud and em...
 
Tracking Maneuvering Target with Angle-Only Measurements Using IMM Algorithm Based on CKF
Found in: Communications and Mobile Computing, International Conference on
By Mingjie Wan, Pengfei Li, Tao Li
Issue Date:April 2010
pp. 92-96
The interacting multiple model (IMM) algorithm is specially designed to track accurately targets whose state and measurement models changes during motion transition. However, when these models are nonlinear, the IMM algorithm must be modified in order to g...
 
Motion Detection and Target Contour Extraction Based on Monitor System
Found in: Education Technology and Computer Science, International Workshop on
By Xiaoping Li, Tao Li, Feng Ling, Jianqiang Xu
Issue Date:March 2010
pp. 113-116
The technology of motion detection and target contour extraction used in the system of monitor are studied. First, the frequently-used algorithms for motion detection are studied, including frame difference method and background subtraction method, and an ...
 
Design of Stable Fuzzy Control for a Flight Based on Popov-Lyapunov's Method
Found in: Intelligent Networks and Intelligent Systems, International Workshop on
By Zheng-qiang Li, Yi-zhe Zhang, Jian-hua Deng, Tao Li
Issue Date:November 2008
pp. 51-55
In this paper, a systematic procedure is presented to analyze and design a stable fuzzy controller for a class of nonlinear systems. Based on the Popov-Lyapunov’s method, the flight model is described with the expert’s linguistic information involved. The ...
 
Cancelable Voiceprint Templates Based on Knowledge Signatures
Found in: Electronic Commerce and Security, International Symposium
By Wenhua Xu, Qianhua He, Yanxiong Li, Tao Li
Issue Date:August 2008
pp. 412-415
Biometric-based authentication can provide strong safety guarantee of user identity, but creates other concerns pertaining to template security. How to prevent the templates from being abused, and how to protect the users' privacy well are important proble...
 
A Novel Chaotic Slow FH System Based on Differential Space-Time Modulation
Found in: Embedded Software and Systems, International Conference on
By Hongmin Deng, Tao Li, Qionghua Wang, Hongbin Li
Issue Date:July 2008
pp. 380-385
Based on the combination of space time modulation and chaotic frequency hopping (FH) techniques, a novel scheme of differential space-time modulation for chaotic slow FH system is proposed. This scheme collects the strong points of differential space-time ...
 
A Novel Detection Method of Filled Pause in Mandarin Spontaneous Speech
Found in: Computer and Information Science, ACIS International Conference on
By Yan-Xiong Li, Qian-Hua He, Tao Li
Issue Date:May 2008
pp. 217-222
Filled pause is one of the hesitation phenomena that current speech recognizers can not effectively handle. Detecting filled pauses is important in spontaneous speech dialogue systems because they play valuable roles, such as helping a speaker keep a conve...
 
BioPerf: a benchmark suite to evaluate high-performance computer architecture on bioinformatics applications
Found in: IEEE Workload Characterization Symposium
By D.A. Bader, Yue Li, Tao Li, V. Sachdeva
Issue Date:October 2005
pp. 163-173
The exponential growth in the amount of genomic data has spurred growing interest in large scale analysis of genetic information. Bioinformatics applications, which explore computational methods to allow researchers to sift through the massive biological d...
 
Workload characterization of biometric applications on Pentium 4 microarchitecture
Found in: IEEE Workload Characterization Symposium
By A.V. Chande, Yue Li, Tao Li
Issue Date:October 2005
pp. 76-86
Biometric computing is a technique that uses physiological and behavioral characteristics of persons to identify and authenticate individuals. Due to the increasing demand on security, privacy and anti-terrorism, biometric applications represent the rapidl...
 
Workload Characterization of Bioinformatics Applications
Found in: Modeling, Analysis, and Simulation of Computer Systems, International Symposium on
By Yue Li, Tao Li, Tamer Kahveci, José Fortes
Issue Date:September 2005
pp. 15-22
<p>The exponential growth in the amount of genomic information has spurred growing interest in large scale analysis of genetic data. Bioinformatics applications represent the increasingly important workloads. However, very few results on the behavior...
 
Practical Routing and Torus Assignment for RDT
Found in: Parallel Architectures, Algorithms, and Networks, International Symposium on
By Tao Li, Yang Yu, Peng Li, Jingpeng Xu, Xirong Ma, Yulu Yang
Issue Date:May 2004
pp. 30
The connection topology of the interconnection networks and the routing algorithm often dominate the system performance in MPCs. RDT has already been proved to be one of the best interconnection networks used in such systems. It supports smaller diameter a...
 
How well can wavelet denoising improve the accuracy of computing fundamental matrices?
Found in: Motion and Video Computing, IEEE Workshop on
By Qi Li, Tao Li, Shenghuo Zhu, Chandra Kambhamettu
Issue Date:December 2002
pp. 247
The existence of noise is a serious obstacle for solving many computer vision problems. Computing fundamental matrix is a typical one. Motivated by the success of wavelet denoising technique in image processing, we study the interesting question: how well ...
 
Improving Medical/Biological Data Classification Performance by Wavelet Preprocessing
Found in: Data Mining, IEEE International Conference on
By Qi Li, Tao Li, Shenghuo Zhu, Chandra Kambhamettu
Issue Date:December 2002
pp. 657
Many real-world datasets contain noise and noise could degrade the performances of learning algorithms. Motivated from the success of wavelet denoising techniques in image data, we explore a general solution to alleviate the effect of noisy data by wavelet...
 
Software Transactional Memory for GPU Architectures
Found in: IEEE Computer Architecture Letters
By Yunlong Xu,Rui Wang,Nilanjan Goswami,Tao Li,Depei Qian
Issue Date:January 2014
pp. 1-1
To make applications with dynamic data sharing among threads benefit from GPU acceleration, we propose a novel software transactional memory system for GPU architectures (GPU-STM). The major challenges include ensuring good scalability with respect to the ...
 
Fast Bloom Filters and Their Generalization
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yan Qiao,Tao Li,Shigang Chen
Issue Date:January 2014
pp. 93-103
Bloom filters have been extensively applied in many network functions. Their performance is judged by three criteria: query overhead, space requirement, and false positive ratio. Due to wide applicability, any improvement to the performance of Bloom filter...
 
A Learning Approach to SQL Query Results Ranking Using Skyline and Users' Current Navigational Behavior
Found in: IEEE Transactions on Knowledge and Data Engineering
By Zhiyuan Chen,Tao Li,Yanan Sun
Issue Date:December 2013
pp. 2683-2693
Users often find that their queries against a database return too many answers, many of them irrelevant. A common solution is to rank the query results. The effectiveness of a ranking function depends on how well it captures users' preferences. However, da...
 
Simulator Implementation and Performance Study of a Polymorphous Array Computer
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Hucai Huang, Tao Li, Jungang Han
Issue Date:July 2013
pp. 1848-1855
This paper reports the implementation of a simulation platform and the performance study for the PAAG array processor. PAAG is a novel, polymorphous array architecture that is capable of supporting a dynamic mixture of data parallel computation (DLP), thre...
 
The Buffered Edge Reconfigurable Cell Array and Its Applications
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Rui Shan, Tao Li, Jungang Han
Issue Date:July 2013
pp. 1023-1030
This paper presents a Buffered Edge Reconfigurable Cell Array (BERCA) architecture and its applications. A distinctive feature of this architecture is its dual mode of operations. A reconfigurable cell in this array can operate in either blocking mode or n...
 
Power-performance co-optimization of throughput core architecture using resistive memory
Found in: 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA)
By Nilanjan Goswami,Bingyi Cao,Tao Li
Issue Date:February 2013
pp. 342-353
Massively parallel computing on throughput computers such as GPUs requires myriad memory accesses to register files, on-chip scratchpad, caches, and off-chip DRAM. Unlike CPUs, these processors have a large register file and on-chip scratchpad memory, whic...
 
Utilizing PCM for Energy Optimization in Embedded Systems
Found in: 2012 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)
By Zili Shao,Yongpan Liu,Yiran Chen,Tao Li
Issue Date:August 2012
pp. 398-403
Due to its high density, bit alterability, and low standby power, phase change memory (PCM) is considered as a promising DRAM alternative. In embedded systems, especially battery-driven mobile devices, energy is one of the most important performance metric...
 
Performance Evaluation and Analysis of OpenVPN on Android
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Junhua Qu,Tao Li,Fangfang Dang
Issue Date:August 2012
pp. 1088-1091
OpenVPN is an open source Virtual Private Networks product providing cross-platform, secure, highly configurable VPN solutions. Tablet computers seem to be directing many of the emerging trends in the marketing industry at the moment. For this case study, ...
 
A Framework for Partitioning and Execution of Data Stream Applications in Mobile Cloud Computing
Found in: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)
By Lei Yang,Jiannong Cao,Shaojie Tang,Tao Li,Alvin T.S. Chan
Issue Date:June 2012
pp. 794-802
The advances in technologies of cloud computing and mobile computing enable the newly emerging mobile cloud computing paradigm. Three approaches have been proposed for mobile cloud applications: 1) extending the access to cloud services to mobile devices; ...
 
Reconfigurable Designs for Networking Silicon
Found in: 2012 26th IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)
By Tao Li,Zhentao Liu,Huimin Du,Lei Zhang,Jungang Han,Lin Jiang,Qingang Dong
Issue Date:May 2012
pp. 294-299
This paper presents a reconfigurable architecture and associated design methodology for developing networking silicon chips. The tools include most of the common traffic QoS features and low level interfaces as well as some special features for extensible ...
 
From Offline toward Real-Time: A Hybrid Systems Model Checking and CPS Co-design Approach for Medical Device Plug-and-Play (MDPnP)
Found in: Cyber-Physical Systems, IEEE/ACM International Conference on
By Tao Li,Feng Tan,Qixin Wang,Lei Bu,Jian-Nong Cao,Xue Liu
Issue Date:April 2012
pp. 13-22
Hybrid systems model checking is a great success in guaranteeing the safety of computerized control cyber-physical systems (CPS). However, when applying hybrid systems model checking to Medical Device Plug-and-Play(MDPnP) CPS, we encounter two challenges d...
 
 1  2 Next >>