Search For:

Displaying 1-50 out of 392 total
Transferring a generic pedestrian detector towards specific scenes
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Meng Wang, Wei Li, Xiaogang Wang
Issue Date:June 2012
pp. 3274-3281
The performance of a generic pedestrian detector may drop significantly when it is applied to a specific scene due to mismatch between the source dataset used to train the detector and samples in the target scene. In this paper, we investigate how to autom...
 
Characteristic Pattern Study of Coronary Heart Disease with Qi-yin Deficiency Syndrome Based on Decision Tree
Found in: Intelligent Computation Technology and Automation, International Conference on
By Huihui Zhao, Jianxin Chen, Na Hou, Qin Hou, Peng Zhang, Jing Han, Qige Qi, Yong Wang, Juan Wang, Wei Wang
Issue Date:October 2009
pp. 150-153
Unstable angina (UA) is now a severe burden on society and family in both industrialized and developing countries, but the traditional related factors can not explain the whole situations. The effect of treatment is very limited. Determination of treatment...
 
Adaptive Data Compression in Wireless Body Sensor Networks
Found in: Computational Science and Engineering, IEEE International Conference on
By Kun Hua, Honggang Wang, Wei Wang, Shaoen Wu
Issue Date:December 2010
pp. 1-5
This paper introduces an innovative data compression methodology in an adaptive way guaranteeing signal interpretation quality and energy efficiency in wireless body area sensor network. The approach is based on the discrete cosine transform. Under differe...
 
Design optimization and modeling of on-chip RF inductors in 0.13
Found in: Circuits and Systems, Midwest Symposium on
By Fan Zhang, Zhihua Wang, Xin Wang, He Tang, Qiang Fang, Albert Wang, Wei Chen, Lee Yang, Bin Zhao, Gary Zhang, Xingang Wang
Issue Date:August 2009
pp. 975-978
This paper discusses general procedures for simulation, design optimization, measurement and modeling of accurate and scalable on-chip RF spiral inductors in standard foundry CMOS for industrial applications. Electro-magnetic (EM) solver is used to simulat...
 
A New Approach for Detecting Anonymity of Patterns
Found in: Web-Age Information Management, International Conference on
By Zhihui Wang, Wei Wang, Baile Shi
Issue Date:July 2008
pp. 333-340
Information sharing becomes more frequently and easily than before. However, it also brings serious threats towards individual's privacy. It is no doubt that sharing personal data can cause privacy breaches. Moreover, sharing the knowledge discovered by da...
 
The Research and Design of the Intelligent Security Defendable Software's Cooperative Framework
Found in: Business and Information Management, International Seminar on
By Jin-Dong Wang, Wei-Wei Cao, Kun Wang, Heng-Wei Zhang
Issue Date:December 2008
pp. 273-276
Coordinated defense is one of network security technology development directions, and how to make security systems work cooperatively is a critical problem. So uniform coordinated working mechanisms and policies are necessary.
 
Research of NC Program Processor in Embedded Control System
Found in: Embedded Computing, IEEE International Symposium on
By Qikui Wang, Wei Li, Youdong Chen, Hongxing Wei, Yong Zou
Issue Date:October 2008
pp. 276-281
NC program processor is an important module in Computer Numerical Control (CNC) system. NC program processor is divided into interpreter and look-ahead function. In the paper, the macro variable computation, the geometric transformation and the look-ahead ...
 
Using Proximity and Homophily to Connect Conference Attendees in a Mobile Social Network
Found in: 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops)
By Alvin Chin,Bin Xu,Fangxi Yin,Xia Wang,Wei Wang,Xiaoguang Fan,Dezhi Hong,Ying Wang
Issue Date:June 2012
pp. 79-87
In an academic conference, it is difficult to find people that share similar research interests with you, and it is also a chore to add them into your personal online social network for later communication. Aiming at helping the conference attendees better...
 
A Chaotic Encryption Algorithm for Palette Image
Found in: 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
By Wang Wei,Liu Fenlin,Ge Xin,Zhao Zheng
Issue Date:December 2013
pp. 734-737
According to the feature of palette image, a chaotic encryption algorithm for image of palette format is proposed in this paper. In the algorithm, the index matrix of pixel and the palette are both encrypted. In the encryption procedure of the index matrix...
 
Construction of an Online RFID Enabled Supply Chain System Reliability Monitoring Model
Found in: Computer, Consumer and Control, International Symposium on
By Chiao-Tzu Huang,Shu-Jen Wang,Wei-Ling Wang,Yung-Sheng Wang
Issue Date:June 2012
pp. 626-629
Radio Frequency Identification (RFID) application are becoming increasingly popular such as access control, location tracking, industrial automation, and as a replacement for barcodes in consumer products. There are a lot of system components suppliers ava...
 
LI-MR: A Local Iteration Map/Reduce Model and Its Application to Mine Community Structure in Large-Scale Networks
Found in: Data Mining Workshops, International Conference on
By Qiuhong Li,Zhihui Wang,Wei Wang,Yimin Liu,Peng Wang,Tao Yu
Issue Date:December 2011
pp. 174-179
The analysis of large-scale networks requires the parallel techniques of graph processing. Hadoop as an open-source version of Map/Reduce implementation gains its popularity by high efficiency, scalability and fault tolerance. However, Map/Redeuce as a sim...
 
A Hardware-Software Collaborated Method for Soft-Error Tolerant MPSoC
Found in: VLSI, IEEE Computer Society Annual Symposium on
By Weichen Liu, Jiang Xu, Xuan Wang, Yu Wang, Wei Zhang, Yaoyao Ye, Xiaowen Wu, Mahdi Nikdast, Zhehui Wang
Issue Date:July 2011
pp. 260-265
Multiprocessor systems-on-chip (MPSoCs) are attractive platforms for embedded applications with growing complexity, because integrating a system or a complex subsystem on a single chip provides better performance and energy efficiency and lower cost per fu...
 
A Robust Multiple Object Tracking Algorithm under Highly Occlusion
Found in: Computer Graphics, Imaging and Visualization, International Conference on
By Dang Xiaoyan, Zhang Ya, Wang Wei, Wang Zhuo, Wang Zhihua
Issue Date:August 2010
pp. 5-8
We describe a real-time multiple face-tracking algorithm under highly occlusion. In order to resolve the occlusion and temporal lost problem, a robust data association + filtering procedure is proposed. The mechanism combines the census transform based blo...
 
A Speed Control System of Permanent Magnet Linear Synchronous Motor Using Neuron Adaptive Controller
Found in: Intelligent Computation Technology and Automation, International Conference on
By Wang Wei, Wang YuHua, Wang ShiRong
Issue Date:October 2009
pp. 35-38
The neuron net has ability to self-learning and adaptation, so its application into control does not depends on mathematic model of control object, and the neuron net controller can overcome the defect of less robustness of the conventional PI controller w...
 
Motivated learning agent model for distributed collaborative systems
Found in: International Conference on Computer Supported Cooperative Work in Design
By Rui Wang, Xiangyu Wang, Wei Wang
Issue Date:April 2009
pp. 221-226
The paper develops and discusses a conceptual model for a Mixed Reality-based remote collaborative system (MR-Collab) based on motivated learning Agents. The proposed MR-Collab system is described in details as well to help better understand this model. Se...
 
The Application of Support Vector Machine to Operon Prediction
Found in: Future Generation Communication and Networking
By Xiumei Wang, Wei Du, Yan Wang, Chen Zhang, Chunguang Zhou, Shuqin Wang, Yanchun Liang
Issue Date:December 2008
pp. 59-62
In this paper, we apply the least-square support vector machine (LS-SVM) to operon prediction of Escherichia coli (E.coli), with different combinations of intergenic distance, gene expression data, and phylogenetic profile. Experimental results demonstrate...
 
Implementation of Pointer Logic for Automated Verification
Found in: Young Computer Scientists, International Conference for
By Zhifang Wang, Yiyun Chen, Zhenming Wang, Wei Wang, Bo Tian
Issue Date:November 2008
pp. 2295-2301
As the security of software is deeply valued while its complexity and size are increasing, automated verification is highly desirable. On the other hand, verification of pointer programs remains a major challenge. In our previous work Pointer Logic has bee...
 
An Extension to Pointer Logic for Verification
Found in: Theoretical Aspects of Software Engineering, Joint IEEE/IFIP Symposium on
By Zhifang Wang, Yiyun Chen, Zhenming Wang, Wei Wang, Bo Tian
Issue Date:June 2008
pp. 49-56
The safety of pointer programs is an important issue in high-assurance software design, and their verification remains a major challenge. Pointer Logic has been proposed to verify basic safety properties of pointer programs in our previous work, but still ...
 
The Factor Graph Approach for Inferring Link Loss in MANET
Found in: International Conference on Internet Computing in Science and Engineering
By Wang Wei, Cai Wan-Dong, Wang Bei-Zhan, Wang Ya-Ping, Tian Guang-Li
Issue Date:January 2008
pp. 166-172
The dynamic nature of topology makes it challengeable to estimate link loss rates in mobile ad hoc network (MANET). Firstly, simulation results based on existing mobility models have the unrealistic movement scenarios which may not correctly reflect true M...
 
MANET Loss Tomography Based on Circle-Movement Mobile Model
Found in: Data, Privacy, and E-Commerce, International Symposium on
By Wang Bei-Zhan, Wang Ya-Ping, Wang Wei, Lou Run-Yu
Issue Date:November 2007
pp. 122-127
Mobile Ad hoc network (MANET) loss tomography is a process for inferring internal wireless links loss rates based on End-to-End network measurement. The crucial step in MANET loss tomography is topology identification. Since the simulation results based on...
 
Inference of Wireless Link Performance in MANET
Found in: Convergence Information Technology, International Conference on
By Wang Bei-zhan,Wang Ya-ping,Wang Wei,Lou Run-yu
Issue Date:November 2007
pp. 1481-1487
The link performance (loss rate and delay probability) inference is important for evaluating mobile ad hoc network (MANET). The crucial step is MANET topology identification. Since the majority of existing mobility models (MM) may not correctly reflect the...
 
A Watermarking Algorithm for Vector Data Based on Spatial Domain
Found in: Information Science and Engineering, International Conference on
By Chao Wang, Wei Wang, Baiyan Wu, Qianqing Qin
Issue Date:December 2009
pp. 1959-1962
In recent years, digital maps are used more and more widely, it plays a significant role in the national economy and defense construction, illegal duplication and distribution or forgery of the maps is also easy. Digital watermarking algorithms for vector ...
 
Variable-Width Channel Allocation for Access Points: A Game-Theoretic Perspective
Found in: IEEE Transactions on Mobile Computing
By Wei Yuan,Ping Wang,Wei Liu,Wenqing Cheng
Issue Date:July 2013
pp. 1428-1442
Channel allocation is a crucial concern in variable-width wireless local area networks. This work aims to obtain the stable and fair nonoverlapped variable-width channel allocation for selfish access points (APs). In the scenario of single collision domain...
 
The Design and Implementation of Hardware Task Configuration Management Unit on Dynamically Reconfigurable SoC
Found in: Embedded Software and Systems, Second International Conference on
By Xiao-Wei Wang, Wei-Nan Chen, Ying Wang, Hong-Jun You, Cheng-Lian Peng
Issue Date:May 2009
pp. 179-184
The advantages and the flexibility introduced into the hardware implementation by partial dynamic reconfiguration have rapidly changed the design flow of embedded systems. Configuration management is an important issue in operating system for dynamically r...
 
A Co-design Flow for Reconfigurable Embedded Computing System with RTOS Support
Found in: Embedded Software and Systems, Second International Conference on
By Xiao-Wei Wang, Wei-Nan Chen, Ying Wang, Cheng-Lian Peng
Issue Date:May 2009
pp. 467-474
Reconfigurable system provides both flexibility of software and performance of hardware. It is a significant trend in embedded application domain. Some new reconfigurable technologies and technology-dependent tools have been developed, but the whole design...
 
Learning Hash Codes with Listwise Supervision
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Jun Wang,Wei Liu,Andy X. Sun,Yu-Gang Jiang
Issue Date:December 2013
pp. 3032-3039
Hashing techniques have been intensively investigated in the design of highly efficient search engines for large-scale computer vision applications. Compared with prior approximate nearest neighbor search approaches like tree-based indexing, hashing-based ...
 
3DLoc: Three Dimensional Wireless Localization Toolkit
Found in: Distributed Computing Systems, International Conference on
By Jizhi Wang, Yinjie Chen, Xinwen Fu, Jie Wang, Wei Yu, Nan Zhang
Issue Date:June 2010
pp. 30-39
In this paper, we present 3DLoc: an integrated system of hardware and software toolkits for locating an 802.11-compliant mobile device in a three dimensional (3D) space. 3DLoc features two specialized antennas: an azimuth antenna and an elevation antenna, ...
 
Modeling Household Car Ownership by Decision Rules
Found in: Intelligent Computation Technology and Automation, International Conference on
By Weijie Wang, Wei Wang, Gang Ren
Issue Date:October 2009
pp. 99-102
This paper aims to develop a decision rule-based model of household car ownership by using household travel survey data. The rough set approach as one of data mining techniques provides an effective tool to model the presented data set with decision rule s...
 
Accelerating Video-Mining Applications Using Many Small, General-Purpose Cores
Found in: IEEE Micro
By Eric Li, Wenlong Li, Xiaofeng Tong, Jianguo Li, Yurong Chen, Tao Wang, Patricia P. Wang, Wei Hu, Yangzhou Du, Yimin Zhang, Yen-Kuang Chen
Issue Date:September 2008
pp. 8-21
Emerging video-mining applications such as image and video retrieval and indexing will require real-time processing capabilities. A many-core architecture with 64 small, in-order, general-purpose cores as the accelerator can help meet the necessary perform...
 
Maintaining K-Anonymity against Incremental Updates
Found in: Scientific and Statistical Database Management, International Conference on
By Jian Pei, Jian Xu, Zhibin Wang, Wei Wang, Ke Wang
Issue Date:July 2007
pp. 5
K-anonymity is a simple yet practical mechanismto protect privacy against attacks of re-identifying individuals by joining multiple public data sources. All existing methods achieving k-anonymity assume implicitly that the data objects to be anonymized are...
 
Blocking Inference Channels in Frequent Pattern Sharing
Found in: Data Engineering, International Conference on
By Zhihui Wang, Wei Wang, Baile Shi
Issue Date:April 2007
pp. 1425-1429
The knowledge discovered by frequent pattern mining is represented in the form of a collection of frequent patterns with their supports. Sharing the frequent patterns without discrimination may bring threats against privacy and security, because some of fr...
 
Fault Localization Using Passive End-to-End Measurements and Sequential Testing for Wireless Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Bing Wang,Wei Wei,Hieu Dinh,Wei Zeng,Krishna R. Pattipati
Issue Date:March 2012
pp. 439-452
Faulty components in a network need to be localized and repaired to sustain the health of the network. In this paper, we propose a novel approach that carefully combines active and passive measurements to localize faults in wireless sensor networks. More s...
 
A Hybrid System to Find & Fight Phishing Attacks Actively
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Hong Bo,Wang Wei,Wang Liming,Geng Guanggang,Xiao Yali,Li Xiaodong,Mao Wei
Issue Date:August 2011
pp. 506-509
Traditional anti-phishing methods and tools always worked in a passive way to receive users' submission and determine phishing URLs. Usually, they are not fast and efficient enough to find and take down phishing attacks. We analyze phishing reports from An...
 
The Digital Marauder's Map: A WiFi Forensic Positioning Tool
Found in: IEEE Transactions on Mobile Computing
By Xinwen Fu,Nan Zhang,Aniket Pingley,Wei Yu,Jie Wang,Wei Zhao
Issue Date:March 2012
pp. 377-389
No summary available.
 
An Systematic Analysis on Problems and Optimization of Corporate Governance Ecology
Found in: International Conference on E-Business and E-Government
By Wang Wei-hong,Li Ya,Wang Wei-peng
Issue Date:May 2010
pp. 2890-2893
The quality of accounting information depends on the design of corporate governance structure and its operational effect, but corporate governance structure will not realize its scheduled effect spontaneously, automatically and independently, it still rely...
 
The Hardware Thread Interface Design and Adaptation on Dynamically Reconfigurable SoC
Found in: Embedded Software and Systems, Second International Conference on
By Ying Wang, Wei-Nan Chen, Xiao-Wei Wang, Hong-Jun You, Cheng-Lian Peng
Issue Date:May 2009
pp. 173-178
Nowadays, one of the challenges for creating a mixed hardware/software application on dynamically reconfigurable SoC is how to provide a unified programming model for hybrid hardware/software tasks and a portable interface adaptation for dynamically reconf...
 
Design of movable contactless conductivity detector for microchip capillary electrophoresis
Found in: International Conference on Nano/Micro Engineered and Molecular Systems
By Hai-feng Zhang, Xiao-wei Liui, Zhi-cheng Peng, Xi-Lian Wang, Wei Wang, Yu-feng Chen
Issue Date:January 2009
pp. 190-193
In this paper a novel detecting device based on movable contactless conductivity detector was described. The stainless steel mould replaces the silicon and nickel mould to fabricate the capillary electrophoresis chip and overcome the disadvantage of compli...
 
A Note on Shacham and Waters Ring Signatures
Found in: Computational Intelligence and Security, International Conference on
By Puwen Wei, Mingqiang Wang, Wei Wang
Issue Date:December 2007
pp. 652-656
In 2007, Shacham and Waters [9] propose the first effi- cient ring signature scheme, without random oracles, based on standard assumptions. And the signature size is linear in the size of the ring. In this paper, we analyze the security of Shacham and Wate...
 
Extend Force-directed Scheduling for System-level Synthesis in Timeconstrained System-on-Chip Design
Found in: Embedded Software and Systems, Second International Conference on
By Qiang Wu, Renfa Li, Wei Wang, Wei Xie, Jinian Bian, Yunfeng Wang, Haili Wang
Issue Date:December 2005
pp. 174-180
Scheduling time-constrained task graph to minimize resource requirement is a common and important problem in system-level synthesis (SLS) for system-onchip (SoC) designs. Many algorithms have been proposed to address this issue. In this paper, an extended ...
 
Identification and Evaluation of Sharing Memory Covert Timing Channel in Xen Virtual Machines
Found in: Cloud Computing, IEEE International Conference on
By JingZheng Wu,Liping Ding,Yongji Wang,Wei Han
Issue Date:July 2011
pp. 283-291
Virtualization technology is the basis of cloud computing, and the most important property of virtualization is isolation. Isolation guarantees security between virtual machines. However, covert channel breaks the isolation and leaks sensitive message cove...
 
Emission characteristics of nanosized-scandia doped dispenser cathodes at different operating modes
Found in: IEEE International Vacuum Electronics Conference
By Yiman Wang, Wei Liu, Jinshu Wang, Xizhu Zhang
Issue Date:February 2011
pp. 375-376
Emission properties of nanosized scandia doped dispenser (SDD) cathodes tested at pulse mode with different pulse widths and duty cycles as well as at DC mode are reported and discussed in this paper.
 
Mapping QTLs for Phosphorus-deficiency Tolerance in Soybean at Seedling Stage
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Jun-jiang Wu,Peng-fei Xu,Li-jun Liu,Shuzhen Zhang,Jin-sheng Wang,Wei-gang Lin,Peng Zhong,Lai Wei,De-jian Dong
Issue Date:May 2012
pp. 370-378
Phosphorous (P) deficiency of soils is one of the major yield-limiting factors worldwide. The most economic and efficient strategy for sustainable agriculture is to breed varieties with P-deficiency tolerance. The objective of this study was to map QTLs fo...
 
Application Specific Instruction Set Processor Design for Underwater Acoustic Communication Systems
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Wang Wei,Qian Liang,Chih-Wei Liu
Issue Date:October 2011
pp. 1007-1010
Underwater acoustic communication systems need Doppler compensation for the server Doppler effects. OFDM (Orthogonal Frequency Division Multiplexing) is widely applied in the underwater acoustic communication systems. FFT is the most computational kernels ...
 
The Digital Marauder's Map: A New Threat to Location Privacy
Found in: Distributed Computing Systems, International Conference on
By Xinwen Fu, Nan Zhang, Aniket Pingley, Wei Yu, Jie Wang, Wei Zhao
Issue Date:June 2009
pp. 589-596
No summary available.
 
Design Methods of Multi-DSP Parallel Processing System
Found in: Computer Science and Information Engineering, World Congress on
By Wei Wu, Jun Wang, Wei Li, Wenhao Zhang
Issue Date:April 2009
pp. 458-464
In this paper, the cascaded topology of Multi-Digital Signal Processor (DSP) parallel processing system is presented, and the common architecture for multi-DSP parallel systems is summarized. In addition, according to the features of Field Programmable Gat...
 
Enabling Reputation and Trust in Privacy-Preserving Mobile Sensing
Found in: IEEE Transactions on Mobile Computing
By Xinlei Oscar Wang,Wei Cheng,Prasant Mohapatra,Tarek Abdelzaher
Issue Date:December 2014
pp. 1-1
Mobile sensing is becoming a popular paradigm to collect information from and outsource tasks to mobile users. These applications deal with lot of personal information, e.g., identity and location. Therefore, we need to pay a deeper attention to privacy an...
 
Diversifying Query Suggestions by Using Topics from Wikipedia
Found in: 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)
By Hao Hu,Mingxi Zhang,Zhenying He,Peng Wang,Wei Wang
Issue Date:November 2013
pp. 139-146
Diversifying query suggestions has emerged recently, by which the recommended queries can be both relevant and diverse. Most existing works diversify suggestions by query log analysis, however, for structured data, not all query logs are available. To this...
 
Head Pose Estimation with Combined 2D SIFT and 3D HOG Features
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Bingjie Wang,Wei Liang,Yucheng Wang,Yan Liang
Issue Date:July 2013
pp. 650-655
In this paper, an approach is presented to estimate the 3D position and orientation of head from RGB and depth images captured by a commercial sensor Kinect. We use 2D Scale-invariant feature transform (SIFT) features together with 3D histogram of oriented...
 
The Research of Electric Multi-channel Optimized Payment Mode
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Wang Wei,Lingxing Long,Wang Wen,Wang Junmei,Fanai Jun,Kong Qingyun,Zhang Wenzhe,Tian Jing
Issue Date:March 2012
pp. 778-782
Based on the proposed electric payment-channel's operation and the requirement of present power company's need, this paper further analysis the true payment data which come from a certain area and according to the optimal method it puts forward a best opti...
 
Multiple-Instance learning from multiple perspectives: Combining models for Multiple-Instance learning
Found in: Applications of Computer Vision, IEEE Workshop on
By Bang Zhang, Yang Wang, Wei Wang
Issue Date:January 2012
pp. 481-487
Multiple-Instance learning (MIL), which relaxes training annotation granularity from instance level to instance collection (bag) level by applying bag concept, obtains increasing attentions from computer vision community. Due to its flexible annotation mec...
 
 1  2 Next >>