Search For:

Displaying 1-50 out of 197 total
CCVis: A Software Plugin for Unified Visualisation in ContraCancrum Based on VTK Extensions
Found in: Information Visualisation, International Conference on
By Youbing Zhao, Gordon J. Clapworthy, Yubo Tao, Feng Dong, Hui Wei, Tao Wang
Issue Date:July 2011
pp. 610-615
Medical visualisation is an indispensable means for doctors and researchers to better explore and analyse medical images. The EC-funded ContraCancrum project, which aims at more predictable tumour simulation and treatment, uses visualisation as an importan...
Analysis of Business Intelligence and Its Derivative - Financial Intelligence
Found in: Electronic Commerce and Security, International Symposium
By Zhou Qihai, Huang Tao, Wang Tao
Issue Date:August 2008
pp. 997-1000
Business Intelligence is that the banking industry has to resolve the majority of the existing bank of the current problems faced by (for example: how to improve customer service, how to control financial risks, and how to improve the bank's operating perf...
An Internetware Evolution Model and Its Implementation Based on Service Entity
Found in: International Conference on Internet Computing in Science and Engineering
By Tao Wang,Guisheng Yin
Issue Date:November 2010
pp. 130-134
For the current open, dynamic and ever-changing Internet environment, select the security, integrity, trusted, software coordination entity with reliable quality of service has great difficulty, Internetware service entity is difficult to ensure the other'...
A New Retrieval Ranking Method based on Document Retrieval Expected Value in Chinese Document
Found in: Computer Science and Information Technology, International Conference on
By Tao Wang,Yan Jiang,Mei Chen,Hanhu Wang
Issue Date:September 2008
pp. 367-371
Through the analysis of the information on the contents of the document which contained in title, abstract and keywords, find out which documents are more relativity with user's retrieval expectation, this paper adopted
Half-DRAM: A high-bandwidth and low-power DRAM architecture from the rethinking of fine-grained activation
Found in: 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA)
By Tao Zhang,Ke Chen,Cong Xu,Guangyu Sun,Tao Wang,Yuan Xie
Issue Date:June 2014
pp. 349-360
DRAM memory is a major contributor for the total power consumption in modern computing systems. Consequently, power reduction for DRAM memory is critical to improve system-level power efficiency. Fine-grained DRAM architecture [1, 2] has been proposed to r...
Enterprise Organization Oriented Workflow Task Assignment Language
Found in: Advanced Computer Control, International Conference on
By Tao Wang, Qingping Tan, Yonglin Guo
Issue Date:January 2009
pp. 79-86
Task assignment is one of the key technologies of workflow management. We analyzed the current existed workflow task assignment methods and found that they are not agile enough to cope with the complex task assignment requirements in the large complicated ...
Hybrid PSO-BP Based Probabilistic Neural Network for Power Transformer Fault Diagnosis
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Xiaoxia Wang, Tao Wang, Bingshu Wang
Issue Date:December 2008
pp. 545-549
Diagnosis of power transformer abnormality is very important for power system reliability. This paper presents a novel approach for power transformer fault diagnosis based on probabilistic neural network and dissolved gas-in-oil analysis (DGA) technique. A...
An Approach for Text Categorization in Digital Library
Found in: Database Engineering and Applications Symposium, International
By Tao Wang, Bipin C. Desai
Issue Date:September 2007
pp. 21-27
Text categorization is a very effective way to organize enormous number of documents in Digital Libraries. Accurate classification of documents is able to not only enhance document search precision, but also facilitate browsing-by-topic functionality. It i...
SLEP - System Level Estimation and Partitioning: A Software Environment for Rapid Prototyping
Found in: Southeastern Symposium on System Theory
By Tao Wang, Roger L. Haggard
Issue Date:April 1996
pp. 401
In this paper, we present a software environment for System Level Estimation and Partitioning (SLEP). The software is developed based on the Structural Analysis Estimation method and the Adaptive Weight Partitioning algorithm, which were recently proposed ...
Hardware/Software Co-Simulation for Last Level Cache Exploration
Found in: Networking, Architecture, and Storage, International Conference on
By Tao Wang, Qigang Wang, Dong Liu, Michael Liao, Kevin Wang, Lu Cao, Li Zhao, Ravi Iyer, Ramesh Illikkal, Liang Wang, John Du
Issue Date:July 2009
pp. 371-378
Larger last level caches are being considered for bridging the performance gap between the processors and the memory subsystem. It requires much longer simulation time to exercise the whole cache and get accurate evaluation results. In this paper, we motiv...
Mining Software Profile across Multiple Repositories for Hierarchical Categorization
Found in: 2013 IEEE International Conference on Software Maintenance (ICSM)
By Tao Wang, Huaimin Wang, Gang Yin,Charles X. Ling, Xiang Li, Peng Zou
Issue Date:September 2013
pp. 240-249
The large amounts of software repositories over the Internet are fundamentally changing the traditional paradigms of software maintenance. Efficient categorization of the massive projects for retrieving the relevant software in these repositories is of vit...
Explore Social Question and Answer System Based on Relationships in Social Network
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Qing Du,Qixuan Wang,Jiaying Cheng,Yi Cai,Tao Wang,Huaqing Min
Issue Date:September 2013
pp. 490-495
In recent years, Community Question Answering (CQA) service becomes more and more popular, which enables users to ask and answer questions on the web. One important problem is how to find out experts who are qualified and willing to answer the question. Al...
Explore Social Question and Answer System Based on Relationships in Social Network
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Qing Du,Qixuan Wang,Jiaying Cheng,Yi Cai,Tao Wang,Huaqing Min
Issue Date:September 2013
pp. 490-495
In recent years, Community Question Answering (CQA) service becomes more and more popular, which enables users to ask and answer questions on the web. One important problem is how to find out experts who are qualified and willing to answer the question. Al...
Exploiting Attribute Redundancy in Extracting Open Source Forge Websites
Found in: 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
By Xiang Li,Yanxu Zhu,Gang Yin,Tao Wang,Huaimin Wang
Issue Date:October 2012
pp. 13-20
Open Source Forge (OSF) websites provide information on massive open source software projects, extracting these web data is important for open source research. Traditional extraction methods use string matching among pages to detect page template, which is...
Implementing the Jacobi Algorithm for Solving Eigenvalues of Symmetric Matrices with CUDA
Found in: 2012 IEEE 7th International Conference on Networking, Architecture, and Storage (NAS)
By Tao Wang,Longjiang Guo,Guilin Li,Jinbao Li,Renda Wang,Meirui Ren,Jing (Selena) He
Issue Date:June 2012
pp. 69-78
Solving the eigenvalues of matrices is an open problem which is often related to scientific computation. With the increasing of the order of matrices, traditional sequential algorithms are unable to meet the needs for the calculation time. Although people ...
Green Computing Wanted: Electricity Consumptions in the IT Industry and by Household Computers in Five Major Chinese Cities
Found in: IEEE/ACM International Conference on Green Computing and Communications
By Luyang Wang,Tao Wang
Issue Date:August 2011
pp. 226-229
Exhausted energy consumption becomes a world-wide issue nowadays. Computing contributes a large portion of energy consumption. The concept of green computing has been popularized. Along with the rapid development of China, energy issue becomes more and mor...
Research on Framework of Distributive NC System Based on Field-Bus
Found in: Intelligent Computation Technology and Automation, International Conference on
By Tao Wang, Qingjian Liu, Liwen Wang
Issue Date:May 2010
pp. 1169-1172
Architecture of distributed numerical control (NC) system based on field-bus is discussed in the paper for solving the problems in robustness and openness coming from the current integration-design method of NC system. The basic framework of system, noddin...
Building the Semantic Relations-Based Web Services Registry through Services Mining
Found in: Computer and Information Science, ACIS International Conference on
By Shizhan Chen, Zhiyong Feng, Hui Wang, Tao Wang
Issue Date:June 2009
pp. 736-743
Bridging the gap between service consumer and service provider, Web services registry (WSR) plays an important role in the Web services architecture. But the main obstacle in front of service register is short of adequate knowledge. In this paper, we prese...
P2P Traffic Identification Based on NetFlow TCP Flag
Found in: Future Computer and Communication, International Conference on
By Wang Jinsong, Liu Weiwei, Zhang Yan, Liu Tao, Wang Zilong
Issue Date:April 2009
pp. 700-703
P2P flow identification is the precondition of flow control in large-scale network. For the limited practicality existing in P2P flow identification method based on flow characteristic, a novel P2P traffic identification method based on NetFlow TCP Flag is...
An Efficient Method for Battlefield Information Data Stream Mining
Found in: Computational Sciences and Optimization, International Joint Conference on
By Ning Wang, Tao Wang
Issue Date:April 2009
pp. 723-725
The data model generated by battlefield information is data streams. Because of the rapid data arriving speed and huge size of data set in stream model, novel one-pass algorithms are devised to support data aggregation on demand. VFDT is one of the most su...
Research about Intrusion Detection Based on Entities-Relations-Problems Knowledge Representation System in E-government Environment
Found in: Education Technology and Computer Science, International Workshop on
By Peng You, Wang Tao, Wang YanZhang
Issue Date:March 2009
pp. 665-668
Aiming at the problems take place in current intrusion detection systems, which are techniques lack of connection, and so on. The author propose a method that build the knowledge base used in intrusion detection based on Entities-Relations-Problems Knowled...
Static Check of WS-CDL Documents
Found in: Service-Oriented System Engineering, IEEE International Workshop on
By Lei Zhou, Hanyi Zhang, Tao Wang, Chuchao Yang, Zheng Wang, Meng Sun, Geguang Pu
Issue Date:December 2008
pp. 142-147
This paper presents an approach to check WS-CDL documents statically. To deal with those constraints appeared in CDL documents, which cannot be captured by its meta model (XML Schema) totally, we use B abstract machines to represent the constraints and des...
A Credit Evaluation Model for Computational Grid Nodes
Found in: Future Trends of Distributed Computing Systems, IEEE International Workshop
By Tao Wang, Xing-she Zhou, Yun-lan Wang, Jian Hu
Issue Date:October 2008
pp. 95-98
Computational Grid is a cooperative computing environment which collects all kinds of high performance software and hardware computing resources distributed in WAN and provides networked computing services. The computational grid systems that have been the...
Accelerating Video-Mining Applications Using Many Small, General-Purpose Cores
Found in: IEEE Micro
By Eric Li, Wenlong Li, Xiaofeng Tong, Jianguo Li, Yurong Chen, Tao Wang, Patricia P. Wang, Wei Hu, Yangzhou Du, Yimin Zhang, Yen-Kuang Chen
Issue Date:September 2008
pp. 8-21
Emerging video-mining applications such as image and video retrieval and indexing will require real-time processing capabilities. A many-core architecture with 64 small, in-order, general-purpose cores as the accelerator can help meet the necessary perform...
Temporal and Spatial Analysis on Labor Productivity of Radio and TV Industry in China
Found in: International Workshop on Knowledge Discovery and Data Mining
By Chun Dong, Hongmei Zhang, Tao Wang, Yong Wang, Agen Qiu
Issue Date:January 2008
pp. 301-304
In order to find out the industrial characteristics and development trend of radio and TV industry in China, the developing course of this industry has been analysis from labor productivity, based on contrastive analysis and diagrammatic analysis. By compa...
Scene Segmentation and Categorization Using NCuts
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Yanjun Zhao, Tao Wang, Peng Wang, Wei Hu, Yangzhou Du, Yimin Zhang, Guangyou Xu
Issue Date:June 2007
pp. 1-7
For video summarization and retrieval, one of the important modules is to group temporal-spatial coherent shots into high-level semantic video clips namely scene segmentation. In this paper, we propose a novel scene segmentation and categorization approach...
An Adaptive Resource Scheduling Algorithm for Computational Grid
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Tao Wang, Xing-she Zhou, Qiu-rang Liu, Zhi-yi Yang, Yun-lan Wang
Issue Date:December 2006
pp. 447-450
The emerging computational grid infrastructure consists of heterogeneous resource in widely distributed autonomous domains, which makes resource scheduling even more challenging. In this paper, we propose an adaptive resource scheduling algorithm for compu...
Campus Computational Grid oriented Resource Optimizing Management
Found in: Grid and Cooperative Computing Workshops, International Conference on
By Xingshe Zhou, Zhengxiong Hou, Yunlan Wang, Qiurang Liu, Tao Wang
Issue Date:October 2006
pp. 54-57
Resource management is one of the crucial issues in the campus grid environment. In this paper, we propose a resources optimizing management scheme in the campus computational grid environment. The NPU Campus computational grid is introduced. Then, we prop...
A Symmetric Image Encryption Scheme Using Chaotic Baker Map and Lorenz System
Found in: 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
By Chong Fu,Wen-Jing Li,Zhao-Yu Meng,Tao Wang,Pei-Xuan Li
Issue Date:December 2013
pp. 724-728
Chaos-based image encryption techniques have recently been extensively studied due to their superior properties in efficiency. However, many of the proposed schemes suffer from known/chosen plaintext attacks as the key stream used in diffusion stage is usu...
Sentiment Analysis for Cantonese Opinion Mining
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Jian Chen,Yu Liu,Guangyi Zhang,Yi Cai,Tao Wang,Huaqing Min
Issue Date:September 2013
pp. 496-500
With the dramatic growth of E-commerce's popularity, the amount of products and services reviews are increasing rapidly. Many researchers put effects on mining user opinions from reviews. There are many research works in opinion mining. However, all curren...
Sentiment Analysis for Cantonese Opinion Mining
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Jian Chen,Yu Liu,Guangyi Zhang,Yi Cai,Tao Wang,Huaqing Min
Issue Date:September 2013
pp. 496-500
With the dramatic growth of E-commerce's popularity, the amount of products and services reviews are increasing rapidly. Many researchers put effects on mining user opinions from reviews. There are many research works in opinion mining. However, all curren...
Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques
Found in: 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
By Xinjie Zhao,Shize Guo,Fan Zhang,Zhijie Shi,Chujiao Ma,Tao Wang
Issue Date:August 2013
pp. 41-51
This paper proposes a fault analysis technique on LED by combining algebraic cryptanalysis and differential fault analysis (DFA). The technique is called algebraic differential fault analysis (ADFA). In ADFA on LED, we use DFA to deduce the possible fault ...
Blind Detection of Region Duplication Forgery by Merging Blur and Affine Moment Invariants
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Tao Wang,Jin Tang,Bin Luo
Issue Date:July 2013
pp. 258-264
Region duplication is a simple and effective operation to create digital image forgeries, where a part of the image is copied and pasted on another part of the same image. Most existing region duplication detection methods are based on directly matching bl...
A Hierarchical Architectural Framework for Reconfigurable Logic Computing
Found in: 2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW)
By Peng Li,Angshuman Parashar,Michael Pellauer,Tao Wang,Joel Emer
Issue Date:May 2013
pp. 287-292
Recently there has been growing interest in using Reconfigurable Logic (RL) for computation because of the significant performance gains that they can provide over traditional architectures on many classes of workloads. While there is a rich body of prior ...
A Business Model for Personalized Promotion Systems on Using WLAN Localization and NFC Techniques
Found in: 2013 Workshops of International Conference on Advanced Information Networking and Applications (WAINA)
By Kam-Yiu Lam,Joseph K. Ng,Jian-Tao Wang
Issue Date:March 2013
pp. 1129-1134
Although wireless local area networks (WLAN) have been shown to be an effective technique for localization of moving objects, their potential for business applications still have a lot of rooms for exploration. In this paper, we propose a novel business mo...
Understanding the Role of Technical Features and Network Effects in Explaining Microblogging Acceptance
Found in: 2012 International Conference on Management of e-Commerce and e-Government (ICMeCG)
By Tao Wang,Bin Fu,Minghui Kang,Han Zhang
Issue Date:October 2012
pp. 183-188
The popularity of microblogging has drawn an increasing amount of attention from users keen to expand friendship, facilitate information sharing and seeking. Given the extensive use of microblogging services, there is a pressing need to understand user acc...
Multimodal and Multi-task Audio-Visual Vehicle Detection and Classification
Found in: 2012 9th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)
By Tao Wang,Zhigang Zhu
Issue Date:September 2012
pp. 440-446
Moving vehicle detection and classification usingmultimodal data is a challenging task in data collection, audio-visual alignment, and feature selection, andeffective vehicle classification in uncontrolledenvironments. In this work, we first present a syst...
Reliable Power Delivery System Design for Three-Dimensional Integrated Circuits (3D ICs)
Found in: 2012 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)
By Pei-Wen Luo,Tao Wang,Chin-Long Wey,Liang-Chia Cheng,Bih-Lan Sheu,Yiyu Shi
Issue Date:August 2012
pp. 356-361
Three-dimensional integrated circuits (3D ICs) have drawn groundswell of interest in both academia and industry in recent years. However, the power integrity of 3D ICs is threatened by the increased current density brought by vertical integration. To enhan...
A Hybrid Particle Swarm Optimization Improved by Mutative Scale Chaos Algorithm
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Ming Chen,Tao Wang,Jian Feng,Yong-Yong Tang,Li-Xin Zhao
Issue Date:August 2012
pp. 321-324
When using the standard particle swarm optimization to optimize the complex problems with high dimension, low convergence efficiency and falling into local optimization usually occur because of its inherent disadvantages. To avoid these disadvantages, a no...
Using an Interactive Dymaxion Map to Convey Research Information through Visualization
Found in: 2012 16th International Conference on Information Visualisation (IV)
By Chen Zhong,Tao Wang,Stephen Cairns,Stefan Muller Arisona
Issue Date:July 2012
pp. 422-425
Visualization is a medium for communicating information to and between people with different background knowledge. The availability of digital tools and the progress of visualization technologies enhance the potential of visual representation. But along wi...
Workload-Aware Online Anomaly Detection in Enterprise Applications with Local Outlier Factor
Found in: 2012 IEEE 36th Annual Computer Software and Applications Conference - COMPSAC 2012
By Tao Wang,Wenbo Zhang,Jun Wei,Hua Zhong
Issue Date:July 2012
pp. 25-34
Detecting anomalies are essential for improving the reliability of enterprise applications. Current approaches set thresholds for metrics or model correlations between metrics, and anomalies are detected when the thresholds are violated or the correlations...
How Does Customer Participation Impact Service Performance? A Perspective of Role Stress
Found in: Service Sciences, International Joint Conference on
By Lan Xu,Nan Cui,Tao Wang,Yanghong Hu,Xuedong Hou
Issue Date:May 2012
pp. 125-129
Existing service marketing literature has not yielded consistent findings regarding the impact of customer satisfaction on service performance. Based on role stress theory, this study aims to explain those different findings, developing a conceptual framew...
Real time moving vehicle detection and reconstruction for improving classification
Found in: Applications of Computer Vision, IEEE Workshop on
By Tao Wang,Zhigang Zhu
Issue Date:January 2012
pp. 497-502
Vehicle images captured by traffic and surveillance video cameras in various conditions usually exhibit several unexpected variations that worsen vehicle classification. These factors include occlusions, motion blur, and changes in perspective views. Compl...
Multi-scale Mathematical Morphology Based Image Edge Detection
Found in: Intelligent System Design and Engineering Application, International Conference on
By Tao Wang,Na Wei
Issue Date:January 2012
pp. 1060-1062
Edge detection is one of the most challenging tasks in image processing. A scheme for edge detection of images based on multi-scale morphology is presented in this paper. Mathematical morphology is a mathematic tool to analyze the image based on the struct...
Fast-ICA Based Blind Estimation of the Spreading Sequences for Down-link Multi-Rate DS/CDMA Signals
Found in: Intelligent Computation Technology and Automation, International Conference on
By Ren Xiao Tian,Xu Hui,Huang Zhi Tao,Wang Fenghua,Lu Feng Bo
Issue Date:January 2012
pp. 501-504
This paper deals with the problem of blind estimation of the spreading sequences in multi-rate direct-sequence code division multiple access(DS-CDMA). The characteristic of the down-link Multi-Rate DS/CDMA signal is analyzed, and the down-link Multi-Rate D...
Multimodal Temporal Panorama for Moving Vehicle Detection and Reconstruction
Found in: Multimedia, International Symposium on
By Tao Wang,Zhigang Zhu,Clark N. Taylor
Issue Date:December 2011
pp. 571-576
In this work, we present a multimodal temporal panorama (MTP) representation that synchronizes visual, motion, and acoustic signatures of moving vehicles in the time axis. The MTP representation includes two layers: a synopsis layer and a snapshot layer. T...
The Design and Realization of Swabbing Wells Liquid Recovery Interpretation Software
Found in: Innovations in Bio-inspired Computing and Applications, International Conference on
By Liu Bo-Tao,Wang Xin-Hai,Chen Yan,Liu Hong,Li Guo-Liang
Issue Date:December 2011
pp. 257-260
To get the working fluid level data by using the liquid level detector and to interpret formation parameters is undoubtedly the hot direction  of interpretation formation parameters in future; because it overcomes the traditional technical shortcomings: ...
Automatic Medical Image Analysis and Potential Impact in India
Found in: Computer Vision, Pattern Recognition, Image Processing and Graphics, National Conference on
By Anup Basu,Irene Cheng,Rui Shen,Tao Wang
Issue Date:December 2011
pp. 1-5
Medical imaging devices have been growing exponentially around the world with the advancements in CT, MRI, Ultrasound and other devices. With these advancements come growing opportunities for medical image analysis which can support diagnostics, surgical a...
Laplacian Margin Distribution Boosting for Learning from Sparsely Labeled Data
Found in: Digital Image Computing: Techniques and Applications
By Tao Wang,Xuming He,Chunhua Shen,Nick Barnes
Issue Date:December 2011
pp. 209-216
Boosting algorithms attract much attention in computer vision and image processing because of their strong performance in a variety of applications. Recent progress on the theory of boosting algorithms suggests a close link between good generalization and ...
A Stakeholder Analysis for Telemedicine in China
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Changan Zhan,Lin Lin,Tao Wang
Issue Date:November 2011
pp. 492-495
Telemedicine is considered as one of the technological approaches that could alleviate the healthcare disparity in China and improve the accessibility, affordability and quality of health services. However, the success and diffusion rates of telemedicine k...
 1  2 Next >>