Search For:

Displaying 1-50 out of 93 total
Trees Weighting Random Forest Method for Classifying High-Dimensional Noisy Data
Found in: E-Business Engineering, IEEE International Conference on
By Hong Bo Li, Wei Wang, Hong Wei Ding, Jin Dong
Issue Date:November 2010
pp. 160-163
Random forest is an excellent ensemble learning method, which is composed of multiple decision trees grown on random input samples and splitting nodes on a random subset of features. Due to its good classification and generalization ability, random forest ...
Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain
Found in: Advanced Information Networking and Applications, International Conference on
By Ying-Wei Kuo, Shou-Hsuan Stephen Huang, Wei Ding, Rebecca Kern, Jianhua Yang
Issue Date:April 2010
pp. 198-205
Stepping-stone attack in network intrusion detection are attackers who use a sequence of intermediate (or so called stepping-stone) hosts to initiate attacks in order to hide their origins. We investigate a number of dynamic programming based pattern recog...
An Attitude Determination System For A Small Unmanned Helicopter Using Low-Cost Sensors
Found in: Robotics and Biomimetics, IEEE International Conference on
By Tongyue Gao, Zhenbang Gong, Jun Luo, Wei Ding, Wei Feng
Issue Date:December 2006
pp. 1203-1208
Attitude determination system (ADS) that use inexpensive sensors and are based on computationally efficient and robust algorithms are indispensable for real-time vehicle navigation, guidance and control application. This paper describes an attitude determi...
IP_TASCM: An IP Trace Analysis System Based on Code Moving
Found in: Information Technology and Computer Science, International Conference on
By Han Zhang, Wei Ding, Haiting Zhu
Issue Date:July 2009
pp. 309-312
This paper proposes an IP Trace Analysis System based on Code Moving (IP_TASCM) for sharing Internet measurement, tools and dataset. However, two characteristics differentiate it from other prior similar systems. One of them is that besides the common cata...
SenseNet: A Knowledge Representation Model for Computational Semantics
Found in: Cognitive Informatics, IEEE International Conference on
By Wei Ding, Chengmin Ding
Issue Date:July 2006
pp. 434-439
Knowledge representation is essential for semantics modeling and intelligent information processing. For decades researchers have proposed many knowledge representation techniques. However, it is a daunting problem how to capture deep semantic information ...
Bipart: Learning Block Structure for Activity Detection
Found in: IEEE Transactions on Knowledge and Data Engineering
By Yang Mu,Henry Z. Lo,Wei Ding,Kevin Amaral,Scott E. Crouter
Issue Date:October 2014
pp. 2397-2409
Physical activity consists of complex behavior, typically structured in bouts which can consist of one continuous movement (e.g., exercise) or many sporadic movements (e.g., household chores). Each bout can be represented as a block of feature vectors corr...
A Cloud-Pattern Based Network Traffic Analysis Platform for Passive Measurement
Found in: 2012 International Conference on Cloud and Service Computing (CSC)
By Hengbo Wang,Wei Ding,Zhen Xia
Issue Date:November 2012
pp. 1-7
The existing Internet traffic passive measurement solutions are mainly based on a technical route of downloading traffic dataset and analysis tool from the corresponding distribution site, and then carrying out a local place research based on off-line traf...
Cost-Effective IP Trace Publishing Using Data Sketch
Found in: Network Computing and Information Security, International Conference on
By Li-hua Miao, Wei Ding, Hai-ting Zhu, Qing Xia
Issue Date:May 2011
pp. 180-184
IP Traces are sets of IP packets (or packet headers) captured at the measuring point. Their publishing, which is most challenged by massive size concern, is crucial for network research. In this paper, we propose a new scheme for IP Trace publishing which ...
Subkilometer crater discovery with boosting and transfer learning
Found in: ACM Transactions on Intelligent Systems and Technology (TIST)
By Lourenco Bandeira, Ricardo Ricardo, Ricardo Ricardo, Tianyu Cao, Tianyu Cao, Tomasz F. Stepinski, Tomasz F. Stepinski, Wei Ding, Wei Ding, Xindong Wu, Xindong Wu, Yang Mu, Yang Mu, Youxi Wu, Youxi Wu, Zhenyu Lu, Zhenyu Lu
Issue Date:July 2011
pp. 1-22
Counting craters in remotely sensed images is the only tool that provides relative dating of remote planetary surfaces. Surveying craters requires counting a large amount of small subkilometer craters, which calls for highly efficient automatic crater dete...
Data mining with big data
Found in: IEEE Transactions on Knowledge and Data Engineering
By Xindong Wu, Xingquan Zhu, Gong-Qing Wu, Wei Ding
Issue Date:January 2014
pp. 97-107
Big Data concern large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data are now rapidly expanding in all science and engineering domains,...
Local Discriminative Distance Metrics and their Real World Applications
Found in: 2013 IEEE 13th International Conference on Data Mining Workshops (ICDMW)
By Yang Mu,Wei Ding
Issue Date:December 2013
pp. 1145-1152
The ultimate goal of distance metric learning is to use discriminative information to keep data samples in the same class close, and those in different classes separate. Local distance metric methods can preserve discriminative information by considering n...
Mining Adverse Drug Reactions from Electronic Health Records
Found in: 2013 IEEE 13th International Conference on Data Mining Workshops (ICDMW)
By Henry Z. Lo,Wei Ding,Zohreh Nazeri
Issue Date:December 2013
pp. 1137-1140
Over 2 million serious side effects, including 100,000 deaths, occur due to adverse drug reactions (ADR) every year in the US. Though various NGOs monitor ADRs through self reporting systems, earlier detection can be achieved using patient electronic healt...
Markov Blanket Feature Selection with Non-faithful Data Distributions
Found in: 2013 IEEE International Conference on Data Mining (ICDM)
By Kui Yu,Xindong Wu,Zan Zhang,Yang Mu,Hao Wang,Wei Ding
Issue Date:December 2013
pp. 857-866
In faithful Bayesian networks, the Markov blanket of the class attribute is a unique and minimal feature subset for optimal feature selection. However, little attention has been paid to Markov blanket feature selection in a non-faithful environment which w...
Group Feature Selection with Streaming Features
Found in: 2013 IEEE International Conference on Data Mining (ICDM)
By Haiguang Li,Xindong Wu,Zhao Li,Wei Ding
Issue Date:December 2013
pp. 1109-1114
Group feature selection makes use of structural information among features to discover a meaningful subset of features. Existing group feature selection algorithms only deal with pre-given candidate feature sets and they are incapable of handling streaming...
Bridging Causal Relevance and Pattern Discriminability: Mining Emerging Patterns from High-Dimensional Data
Found in: IEEE Transactions on Knowledge and Data Engineering
By Kui Yu,Wei Ding,Hao Wang,Xindong Wu
Issue Date:December 2013
pp. 2721-2739
It is a nontrivial task to build an accurate emerging pattern (EP) classifier from high-dimensional data because we inevitably face two challenges 1) how to efficiently extract a minimal set of strongly predictive EPs from an explosive number of candidate ...
Online Feature Selection with Streaming Features
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Xindong Wu, Kui Yu, Wei Ding, Hao Wang, Xingquan Zhu
Issue Date:May 2013
pp. 1178-1192
We propose a new online feature selection framework for applications with streaming features where the knowledge of the full feature space is unknown in advance. We define streaming features as features that flow in one by one over time whereas the number ...
Locality-aware mapping and scheduling for multicores
Found in: 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO)
By Wei Ding,Yuanrui Zhang,Mahmut Kandemir,Jithendra Srinivas,Praveen Yedlapalli
Issue Date:February 2013
pp. 1-12
This paper presents a cache hierarchy-aware code mapping and scheduling strategy for multicore architectures. Our mapping strategy determines a loop iteration-to-core mapping by taking into account application data access patterns and on-chip cache hierarc...
Self-Taught Active Learning from Crowds
Found in: 2012 IEEE 12th International Conference on Data Mining (ICDM)
By Meng Fang,Xingquan Zhu,Bin Li,Wei Ding,Xindong Wu
Issue Date:December 2012
pp. 858-863
The emergence of social tagging and crowdsourcing systems provides a unique platform where multiple weak labelers can form a crowd to fulfill a labeling task. Yet crowd labelers are often noisy, inaccurate, and have limited labeling knowledge, and worst of...
Compiler-directed file layout optimization for hierarchical storage systems
Found in: 2012 SC - International Conference for High Performance Computing, Networking, Storage and Analysis
By Wei Ding,Yuanrui Zhang,Mahmut Kandemir,Seung Woo Son
Issue Date:November 2012
pp. 1-11
File layout of array data is a critical factor that effects the behavior of storage caches, and has so far taken not much attention in the context of hierarchical storage systems. The main contribution of this paper is a compiler-driven file layout optimiz...
Word Sense Disambiguation with Automatically Acquired Knowledge
Found in: IEEE Intelligent Systems
By Ping Chen,Chris Bowes,Wei Ding,Max Choly
Issue Date:July 2012
pp. 46-55
This article describes an automatic word sense disambiguation method—determining which word sense fits in a given context—that makes the process feasible in practice.
Solving the Optimal Natural Casing Packing Problem by a Double-Objective Integer Programming
Found in: 2012 Fifth International Conference on Information and Computing Science (ICIC)
By Wei Ding,Bingwu Chen,Liqing Wang,Yongliang Li
Issue Date:July 2012
pp. 79-82
In the paper, we firstly formulate the natural casing packing problem (NCPP) as a double-objective integer programming model, and then propose a two-stage heuristic algorithm for solving NCPP. Numerical results show that our model and algorithm can determi...
Classification of UDP traffic from P2P applications
Found in: Networks, IEEE International Conference on
By Gang Wang,Wei Ding,Shi Dong
Issue Date:December 2011
pp. 252-257
In this paper, we select several prevalent Peer-to-peer (P2P) network TV as research objects, and analyze their differences in port usage and packet size distribution thoroughly, based on their traffic from local captured files. By observing and summarizin...
Causal Associative Classification
Found in: Data Mining, IEEE International Conference on
By Kui Yu,Xindong Wu,Wei Ding,Hao Wang,Hongliang Yao
Issue Date:December 2011
pp. 914-923
Associative classifiers have received considerable attention due to their easy to understand models and promising performance. However, with a high dimensional dataset, associative classifiers inevitably face two challenges: (1) how to extract a minimal se...
Crime Forecasting Using Data Mining Techniques
Found in: Data Mining Workshops, International Conference on
By Chung-Hsien Yu,Max W. Ward,Melissa Morabito,Wei Ding
Issue Date:December 2011
pp. 779-786
Crime is classically “unpredictableâ€Â?. It is not necessarily random, but neither does it take place consistently in space or time. A better theoretical understanding is needed to facilitate practical crime prevention solutions that correspond to s...
Personalized News Filtering and Summarization on the Web
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Xindong Wu,Fei Xie,Gongqing Wu,Wei Ding
Issue Date:November 2011
pp. 414-421
Information on the World Wide Web is congested with large amounts of news contents. Recommendation, filtering, and summarization of Web news have received much attention in Web intelligence, aiming to find interesting news and summarize concise content for...
Optimizing data locality using array tiling
Found in: Computer-Aided Design, International Conference on
By Wei Ding,Yuanrui Zhang,Jun Liu,Mahmut Kandemir
Issue Date:November 2011
pp. 142-149
Data transformation is one of the key optimizations in maximizing cache locality. Traditional data transformation strategies employ linear data layouts, e.g., row-major or column-major, for multidimensional arrays. Although a linear layout matches the line...
Exploring heterogeneous NoC design space
Found in: Computer-Aided Design, International Conference on
By Hui Zhao,Mahmut Kandemir,Wei Ding,Mary Jane Irwin
Issue Date:November 2011
pp. 787-793
The Network-on-Chip (NoC) plays a crucial role in designing low cost chip multiprocessors (CMPs) as the number of cores on a chip keeps increasing. However, buffers in NoC routers increase the cost of CMPs in terms of both area and power. Recently, bufferl...
Optimizing Data Layouts for Parallel Computation on Multicores
Found in: Parallel Architectures and Compilation Techniques, International Conference on
By Yuanrui Zhang,Wei Ding,Jun Liu,Mahmut Kandemir
Issue Date:October 2011
pp. 143-154
The emergence of multicore platforms offers several opportunities for boosting application performance. These opportunities, which include parallelism and data locality benefits, require strong support from compilers as well as operating systems. Current c...
Compiler Directed Data Locality Optimization for Multicore Architectures
Found in: Parallel Architectures and Compilation Techniques, International Conference on
By Wei Ding,Jithendra Srinivas,Mahmut Kandemir,Mustafa Karakoy
Issue Date:October 2011
pp. 171-172
This paper presents and evaluates a cache hierarchy-aware code parallelization/mapping and scheduling strategy for multicore architectures. Our proposed parallelization/mapping strategy determines a loop iteration-to-core mapping by taking into account the...
The Applying of Compressed Sensing in M-Sequence UWB Radar
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Wang Wei,Ding Yipeng,Xu Xin,Wang Wenpeng,Zhang Qunying,Fang Guangyou
Issue Date:October 2011
pp. 708-711
A maximum length binary sequence, in short an M-sequence, is a special kind of pseudo-random binary sequence(PRBS). It can be well used in Ground Penetrating Radar(GPR) because of advanced characteristics. Compressed Sensing(CS) provides a way to sample th...
Extended Most Reliable Source on an Unreliable General Network
Found in: Internet Computing and Information Services, International Conference on
By Wei Ding
Issue Date:September 2011
pp. 529-533
In an unreliable communication network, the most reliable source (MRS) of the network is a good candidate as the source for data broadcast. Previous studies focused on seeking either an MRS that maximizes the expected number of nodes reachable from it or a...
JSERNET UDP53 Port Traffic Analysis
Found in: Networking and Distributed Computing, International Conference on
By Yanjun Su,Wei Ding,Shi Dong
Issue Date:September 2011
pp. 50-53
As the well known port for DNS service, the 53 port won't be shielded by most of firewalls or network services. This defect can be used to send packets through firewalls without being detected. For comprehensive understanding of this phenomenon, a program ...
Research on Errors of Utilized Bandwidth Measured by NetFlow
Found in: Networking and Distributed Computing, International Conference on
By Haiting Zhu,Xiaoguo Zhang,Wei Ding
Issue Date:September 2011
pp. 45-49
NetFlow is a popular technology in network management nowadays. It supports administrators to get various performance metrics. But metric values estimated from NetFlow records may inaccurate in some circumstance. This paper aims at studying the errors of u...
On-chip cache hierarchy-aware tile scheduling for multicore machines
Found in: Code Generation and Optimization, IEEE/ACM International Symposium on
By Jun Liu, Yuanrui Zhang, Wei Ding, Mahmut Kandemir
Issue Date:April 2011
pp. 161-170
Iteration space tiling and scheduling is an important technique for optimizing loops that constitute a large fraction of execution times in computation kernels of both scientific codes and embedded applications. While tiling has been studied extensively in...
Bus Trip Planning Service Based on Real Time Data
Found in: Annual SRII Global Conference
By Jiashun Liu, Yu Yuan, Feng Li, Wei Ding
Issue Date:April 2011
pp. 530-539
Public transportation is regarded as one of the most efficient means to confront the explosively growing city traffic problems such as congestion and pollution. However, a major obstacle for public transportation to be more adopted by citizens is its gener...
Detecting Intruders Using a Long Connection Chain to Connect to a Host
Found in: Advanced Information Networking and Applications, International Conference on
By Wei Ding, Shou-Hsuan Stephen Huang
Issue Date:March 2011
pp. 121-128
A common technique hackers use to break into a computer host is to route their traffic through a chain of stepping-stone hosts. There is no valid reason to use a long connection chain for remote login such as SSH connections. One way to protect a host of b...
Causal Discovery from Streaming Features
Found in: Data Mining, IEEE International Conference on
By Kui Yu, Xindong Wu, Hao Wang, Wei Ding
Issue Date:December 2010
pp. 1163-1168
In this paper, we study a new research problem of causal discovery from streaming features. A unique characteristic of streaming features is that not all features can be available before learning begins. Feature generation and selection often have to be in...
An Intelligent Recommendation Model with a Case Study on u-Tour Taiwan of Historical Momuments and Cultural Heritage
Found in: Technologies and Applications of Artificial Intelligence, International Conference on
By Wei-Ding Liao, Don-Lin Yang, Ming-Chuan Hung
Issue Date:November 2010
pp. 72-79
Although there are many recommendation systems in use, they all face various challenges including the integration of diverse source data, improvement of prediction precision and meeting the user’s satisfaction. In order to increase success rate of satisfie...
Many-to-Many Multicast Routing under a Fixed Topology: Basic Architecture, Problems and Algorithms
Found in: Networking and Distributed Computing, International Conference on
By Wei Ding
Issue Date:October 2010
pp. 128-132
Many-to-many multicast can be widely used in computer and communication networks supporting various continuous multi-media applications. This paper assumes each user is both a source and a receiver as well as a terminal in many-to-many multicasting. Under ...
Extended Hamilton Circuit and Its Application
Found in: Information and Computing Science, International Conference on
By Wei Ding
Issue Date:June 2010
pp. 62-65
In this paper, we propose the definition of extended Hamilton circuit (EHC) and its corresponding optimization version of Extended Hamilton Circuit Problem (OEHCP), as well as prove OEHCP to be NP-hard and design an efficient heuristic for OEHCP. In additi...
Locating a Broadcast Source in a Tree Network with Complex Unreliability
Found in: Information and Computing Science, International Conference on
By Wei Ding
Issue Date:June 2010
pp. 33-36
In an unreliable communication network, failures may occur to nodes and/or links. The problem of finding a source for data broadcast on the network can be reduced to the problem of computing a most reliable source of the network. Previous studies focused o...
Detecting Stepping-Stone Intruders with Long Connection Chains
Found in: Information Assurance and Security, International Symposium on
By Wei Ding, Matthew J. Hausknecht, Shou-Hsuan Stephen Huang, Zach Riggle
Issue Date:August 2009
pp. 665-669
It is generally agreed that there is no valid reason to use a long connection chain for remote login such as SSH connection. Most of the stepping-stone detection algorithms installed on a host were designed to protect the victim of a third party downstream...
Simulation of Guidance Subsystem of Launch Vehicle Based on Matlab/Simulink
Found in: Information Engineering, International Conference on
By Lan Lin, Hui Li, Wei Ding
Issue Date:July 2009
pp. 439-442
Adapting the CZ series Launch Vehicle as research object, and according to multi-scale Modeling, the simulation model of the Launch Vehicle guidance subsystem was established and simulated in Matlab/Simulink. A series of relatively independent mathematical...
Computing the Most Reliable Source on Stochastic Ring Networks
Found in: Software Engineering, World Congress on
By Wei Ding
Issue Date:May 2009
pp. 345-347
Given a stochastic communication network with a ring topology and n vertices, where the operational probability of each link is independent and no failures happen to vertices, we expect to determine the most reliable source on the network. In this paper, w...
The Study on Difference among Flow Specifications in Internet
Found in: Computer Science and Information Engineering, World Congress on
By Han Zhang, Wei Ding
Issue Date:April 2009
pp. 263-267
Aggregate flow is the base methodology of network measurement and the orientation of next generation network management. For the same data, different flow specifications lead to different results, and the costs also vary significantly. To analyze the corre...
Relay Node Placement in Heterogeneous Wireless Sensor Networks with Basestations
Found in: Communications and Mobile Computing, International Conference on
By Shouwei Li, Guangting Chen, Wei Ding
Issue Date:January 2009
pp. 573-577
Two fundamental functions of the sensor nodes in a wireless sensor network are to sense its environment and to transmit sensed information to a basestation. Heterogeneous wireless sensor networks are composed of a large number of sensors equipped with diff...
Synchronization of Delayed Fuzzy Cellular Neural Networks
Found in: International Conference on Natural Computation
By Wei Ding, Xiaoyi Fu
Issue Date:October 2008
pp. 526-529
This paper studies synchronization of delayed fuzzy cellular neural networks. By the Lyapunov-Lasall principle of functional differential equations, some new stability criteria are obtained. The approaches developed here extendthe ideas and techniques deri...
Business Value Assessment of Packaged Applications
Found in: Services, IEEE Congress on
By Chunhua Tian, Shun Jiang, Rongzeng Cao, Wei Ding, Juhnyoung Lee
Issue Date:July 2008
pp. 67-70
Unlike others, IT services using packaged applications such as SAP and Oracle modules highly reuse and configure prepackaged software modules. However, the implementation and configuration situation of a packaged application project may significantly diffe...
Business Transformation Workbench: A Practitioner's Tool for Business Transformation
Found in: Services Computing, IEEE International Conference on
By Juhnyoung Lee, Rama Akkiraju, Chun Hua Tian, Shun Jiang, Sivaprashanth Danturthy, Ponn Sundhararajan, Carl Nordman, Rakesh Mohan, Hitansh Singala, Wei Ding
Issue Date:July 2008
pp. 81-88
Business transformation is a key management initiative that attempts to align people, process and technology of an enterprise more closely with its business strategy and vision. It is an essential part of the competitive business cycle. Existing consulting...
Study of Lyapunov Exponent Spectra for Axial-Flow Compression System
Found in: Computational Intelligence and Security Workshops, International Conference on
By Jiangming Yu, Jiang Zhang, Wei Ding, Youli Wu
Issue Date:December 2007
pp. 468-471
The Lyapunov exponent spectra of the axial-flow compression system's Moore-Greitzer model were researched with chaos theory. When the parameter B of the MG model is greater (surge) or smaller (stall), the system's Lyapunov exponent spectra are all (0, -) ....
 1  2 Next >>