Search For:

Displaying 1-50 out of 176 total
Implementing a Serial ATA Controller Base on FPGA
Found in: Computational Intelligence and Design, International Symposium on
By Wei Wu, Hai-bing Su, Qin-zhang Wu
Issue Date:December 2009
pp. 467-470
In order to store massive image data in real-time system, a high performance Serial Advanced Technology Attachment[1] (SATA) controller is proposed in this paper. RocketIO GTX transceiver[2] realizes physical layer of SATA protocol. Link layer and transpor...
 
Parallel Continuous k-Nearest Neighbor Computing in Location Based Spatial Networks on GPUs
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Liao Wei,Zhang Zhiming,Yuan Zhimin,Fu Wei,Wu Xiaoping
Issue Date:June 2013
pp. 271-274
The k nearest neighbor (kNN) computing is an important task in different fields such as LBSN and database area. Recently some methods have been proposed to accelerate kNN searching algorithms for static points with GPUs. To evaluate massive concurrent quer...
 
A Cluster-Tree-Based GTS Allocation Scheme for IEEE 802.15.4 MAC Layer
Found in: 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
By Der-Chen Huang,Hsiang-Wei Wu,Yi-Wei Lee
Issue Date:July 2012
pp. 524-528
Based on IEEE 802.15.4, a contention-free period (CFP) adopts guarantee time slot (GTS) mechanism to ensure each device can access the radio channel. However, it is hard to get the authority to access the radio channel due to more competitors access the ra...
 
Transport and Mixing Characteristics of Pollutants by Continuous Point Source Discharge in the Multi-anabranch River with Three Braid Bars
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Wei Ji,Zulin Hua,Wei Wu,Jun Peng
Issue Date:May 2012
pp. 1866-1869
The physical processes of the pollutant transport in multi-anabranch rivers are not clear at the present time compared with straight rivers and meandering rivers. A physical model of a multi-anabranch river with three braid bars was set up to explore the p...
 
Research of Monitoring System for Network Terminal
Found in: Computer Science and Electronics Engineering, International Conference on
By Wei-Wei Wu
Issue Date:March 2012
pp. 310-313
With the development of internet and information technology network security has become the hot spots of computer science. Effective monitoring operational status of every equipment is very important in the Local Area Network (LAN). This paper studies key ...
 
A Novel Architecture and Routing Algorithm for Dynamic Reconfigurable Network-on-Chip
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Li-Wei Wu, Wei-Xiang Tang, Yarsun Hsu
Issue Date:May 2011
pp. 177-182
Hybrid networks, which combine the flexibility of packet-switched network and the low-latency of circuit-switched network, provide decent performance. However, users are obligated to maintain the configuration of temporary circuit-switched connection. In t...
 
The Mesh Characteristics of Arch Cylindrical Gear and Its Digitization Analysis
Found in: Digital Manufacturing and Automation, International Conference on
By Ai-ping Song, Shang Gao, Wei-wei Wu
Issue Date:December 2010
pp. 720-724
As a new kind of cylindrical gear, the in volute arch cylindrical gear has preferable transmission characteristics, but its main geometry parameters have no unified standard. In this paper, the ideal geometry parameters of in volute arch cylindrical gear a...
 
Bandwidth- and Latency-Aware Peer-to-Peer Instant Friendcast for Online Social Networks
Found in: Parallel and Distributed Systems, International Conference on
By Jehn-Ruey Jiang, Chao-Wei Hung, Jih-Wei Wu
Issue Date:December 2010
pp. 829-834
Online Social Networks (OSNs) are more and more popular recently, people may through them interact with each other for the purpose of social intercourse. The client/server OSN architecture brings about the bottleneck of bandwidth and computation. It leads ...
 
Reducing Code Size by Graph Coloring Register Allocation and Assignment Algorithm for Mixed-Width ISA Processor
Found in: Computational Science and Engineering, IEEE International Conference on
By Jyh-Shian Wang, I-Wei Wu, Yu-Sheng Chen, Jean Jyh-Jiun Shann, Wei-Chung Hsu
Issue Date:August 2009
pp. 174-181
Reducing program size is a critical issue in manyembedded systems which require more functionalitieswithout increasing the memory size. One of theapproaches is to adopt a mixed-width instruction setarchitecture (ISA) which usually has an instruction setin ...
 
A Traffic Signal Control Method Based on Large Phase Using Fuzzy System and GA
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Wei Wu, Wei Min, Xie Sai
Issue Date:August 2009
pp. 530-534
This paper presents a traffic signal control method based on “large phase” to solve the problem of traffic signal control. And a traffic signal control method using fuzzy system and genetic algorithm (GA) for city single-intersection is studied. The result...
 
A Spatial Decision Support System for Citrus Management â€â€? A Case Study of the Three Gorges Area of China
Found in: Environmental Science and Information Application Technology, International Conference on
By Wei Wu, Hongbin Liu, Henglin Dai, Wei Li, Pengshou Sun
Issue Date:July 2009
pp. 601-603
Geographic information system technology has been applied to manage and analyze the citrus production information in the Three Gorges area of China. Massive information related to citrus production management including spatial and non-spatial data are coll...
 
The Mobile Robot GPS Position Based on Neural Network Adaptive Kalman Filter
Found in: Computational Intelligence and Natural Computing, International Conference on
By Wei Wu, Wei Min
Issue Date:June 2009
pp. 26-29
This paper presents a GPS positioning method based on neural network adaptive Kalman filter. Using the innovation vector which reflects the degree how the model fits the data, and real-timely accessing to the innovation vector’s ratio of the theoretical va...
 
Research on Airline Route Scheme Optimization Model
Found in: Software Engineering, World Congress on
By Wei-wei Wu, Jin-fu Zhu
Issue Date:May 2009
pp. 391-396
Applying for new airline routes is an important airline decision-making. Key points are considered, such as airline’s operating cost, traffic forecasting and airport capacity restriction. The airline route scheme optimization model is proposed based on the...
 
Design Methods of Multi-DSP Parallel Processing System
Found in: Computer Science and Information Engineering, World Congress on
By Wei Wu, Jun Wang, Wei Li, Wenhao Zhang
Issue Date:April 2009
pp. 458-464
In this paper, the cascaded topology of Multi-Digital Signal Processor (DSP) parallel processing system is presented, and the common architecture for multi-DSP parallel systems is summarized. In addition, according to the features of Field Programmable Gat...
 
ECTSA: Energy-Efficient Clustering Time Synchronization Algorithm for Sleeping-Based MAC Protocol
Found in: Advanced Computer Control, International Conference on
By Liyan Liu, Wei Wu
Issue Date:January 2009
pp. 111-115
Time synchronization and energy saving are important for sleeping-based media access control protocols in wireless sensor networks. Existing time synchronization methods were not designed for energy-efficient and sleeping based MAC protocol in WSN in mind....
 
Simulation of the Humanoid Running Robot Based on ADAMS
Found in: Computer Modeling and Simulation, International Conference on
By Hangxin Wei, Wei Wu, Mingzhi Liu
Issue Date:April 2008
pp. 726-731
The virtual model of the humanoid running robot is built by using the software ADAMS. With this model, one can research the problem how to realize the running of a humanoid robot without the physical model of the robot. In addition, a method of realizing r...
 
An object-oriented model for drawing understanding and its ability of noise absorption
Found in: Document Analysis and Recognition, International Conference on
By Wei Wu, Wei Lu, M. Sakauchi
Issue Date:August 1995
pp. 261
In this paper we propose a new framework of object-oriented model named MTDM (Matching Tree Driving Model) for drawing understanding and verify its ability of noise absorption. MTDM makes use of descriptions of object-oriented style and is an integration o...
 
Realistic Fire Simulation: A Survey
Found in: Computer-Aided Design and Computer Graphics, International Conference on
By Zhaohui Wu,Zhong Zhou,Wei Wu
Issue Date:September 2011
pp. 333-340
As fire is one of the basic elements of nature, realistic fire simulation plays a significant role in fire control, film special effects, military emulation, and virtual reality. Fire simulation has been being an eternal theme in the field of computer grap...
 
A High Performance Serial ATA Host Controller
Found in: Computer Science and Software Engineering, International Conference on
By Wei Wu,Hai-Bing Su,Qin-Zhang Wu
Issue Date:December 2008
pp. 18-23
In order to increase transfer rate and enhance performance in mass data transmission and storage in real time system, a high performance Serial Advanced Technology Attachment generation 2(SATA II) host controller is proposed in this paper. This paper prese...
 
Remote Sensing Images Super-resolution Based on Sparse Dictionaries and Residual Dictionaries
Found in: 2013 IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC)
By Yingying Zhang,Wei Wu,Yong Dai,Xiaomin Yang,Binyu Yan,Wei Lu
Issue Date:December 2013
pp. 318-323
In this paper, a sensing image super-resolution (SR) reconstruction method is proposed. Sparse dictionary dealing with remote sensing image SR problem is introduced in this work. The sparse dictionary is based on a sparsity model where the dictionary atoms...
 
Privacy Preservation in Streaming Data Collection
Found in: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS)
By Wee Siong Ng,Huayu Wu,Wei Wu,Shili Xiang,Kian-Lee Tan
Issue Date:December 2012
pp. 810-815
Big data management and analysis has become a hot topic in academic and industrial research. In fact, a large portion of big data in service today are initially streaming data. To preserve the privacy of such data that are collected from data streams, the ...
 
Optimizing the Deployment of Maintenance Persons Based on Dynamic Programming Method
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Hu Qiang,Liu Feng,Wu Wei,Wu Mingfei
Issue Date:August 2012
pp. 1266-1268
This paper sets up a model for optimizing the deployment of equipment maintenance persons. With a case study, the model optimizes the deployment of three levels of equipment maintenance persons using dynamic programming method and provides an effective qua...
 
Storage Capacity of the Hopfield Network Associative Memory
Found in: Intelligent Computation Technology and Automation, International Conference on
By Yue Wu,Jianqing Hu,Wei Wu,Yong Zhou,K.L. Du
Issue Date:January 2012
pp. 330-336
The Hop field model is a well-known dynamic associative-memory model. In this paper, we investigate various aspects of the Hop field model for associative memory. We conduct a systematic simulation investigation of several storage algorithms for Hop field ...
 
Peer-to-Peer Immersive Voice Communication for Massively Multiplayer Online Games
Found in: Parallel and Distributed Systems, International Conference on
By Chi-Wen Fann,Jehn-Ruey Jiang,Jih-Wei Wu
Issue Date:December 2011
pp. 759-764
In this paper, we propose a peer-to-peer voice communication scheme, called immersive voice communication (IVC), to provide MMOG players with the immersive experience to hear the voice of neighbor players within the area of interest (AOI). IVC uses a relat...
 
Objective Assessment of Multiresolution Image Fusion Algorithms for Context Enhancement in Night Vision: A Comparative Study
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Zheng Liu,Erik Blasch,Zhiyun Xue,Jiying Zhao,Robert Laganière,Wei Wu
Issue Date:January 2012
pp. 94-109
Comparison of image processing techniques is critically important in deciding which algorithm, method, or metric to use for enhanced image assessment. Image fusion is a popular choice for various image enhancement applications such as overlay of two image ...
 
The Prospects and Challenges of Carbon Capture and Storage Technology
Found in: 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010)
By Guo Yun, Cao Wei-wu, Huang Zhi-qiang, Wu Xiao-jiang
Issue Date:October 2010
pp. 705-708
Coal will remain the dominant source for electricity generation in the foreseeable future and power generation is the primary CO 2 emission, so efficient and clean use of coal is the key to solve the low-carbon development. Carbon Capture and Storage (CCS)...
 
MEMS Gyro Denoising Based on Second Generation Wavelet Transform
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Mao Ben, Wu Jun Wei, Wu Jian Tong, Zhou Xue Mei
Issue Date:September 2010
pp. 255-258
In order to improve the precision of MEMS gyro, the MEMS gyro denoising method based on second generation wavelet transform is investigated in this paper. After introducing the principles and establishment of the second generation wavelet transform, a wave...
 
A Research on Automatic Modulation Recognition with the Combination of the Rough Sets and Neural Network
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Hua-Kui Wang, Bin Zhang, Juan-Ping Wu, Ying-Zheng Han, Xiao-Wei Wu, Ruo-Si Jia
Issue Date:September 2010
pp. 807-810
Automatic modulation recognition of modulation signals is the key problem in non-cooperative communication systems. The method which combines the rough set theory and the neural network is designed for identifying the six modulation types based on the rese...
 
Parallel Sorting by Approximate Splitting for Multi-core Processors
Found in: Computational Sciences and Optimization, International Joint Conference on
By Wei Wu, Pin Wu, Weilie Shang, Youtong Fang
Issue Date:May 2010
pp. 308-311
Many pivot-based sorting methods benefit from balanced partition of data into smaller chunks with better parallelism and locality. However, it is difficult to partition data with the same high efficiency. This paper presents an improved partition method, P...
 
Multi-Processor Parallel System Based on High-Speed Serial Transceiver
Found in: Education Technology and Computer Science, International Workshop on
By Xiao-yun Huang, Hai-bing Su, Qin-zhang Wu, Wei Wu
Issue Date:March 2010
pp. 178-181
The data exchange capacity among each processing units was a key factor in performance of multiprocessor parallel system. Parallel interconnection based on master-slave architecture constrained by several factors could not be further increased bandwidth. H...
 
An AdaBoost Algorithm with SVM Based on Nonlinear Decision Function
Found in: Computational Intelligence and Natural Computing, International Conference on
By Wei Wu, Zhang Yanan, Wu Linlin
Issue Date:June 2009
pp. 22-25
This paper presents a method of using nonlinear decision function to improve the performance of AdaBoost with SVM based weak learners. Compared with the existing AdaBoostSVM methods,this method, named ERBF-AdaBoostSVM, has advantages of higher hate rate an...
 
On-Chip Memory System Optimization Design for the FT64 Scientific Stream Accelerator
Found in: IEEE Micro
By Mei Wen, Nan Wu, Chunyuan Zhang, Qianming Yang, Jun Ren, Yi He, Wei Wu, Jun Chai, Maolin Guan, Changqing Xun
Issue Date:July 2008
pp. 51-70
With the extension of application domains, hardware-managed memory structures such as caches are drawing attention for dealing with irregular stream applications. However, since a real application usually has both regular and irregular stream characteristi...
 
Examining Web-Based Spyware Invasion with Stateful Behavior Monitoring
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Ming-Wei Wu, Sy-Yen Kuo
Issue Date:December 2007
pp. 275-281
Spyware infection that exploits the vulnerabilities of client-side Web application, especially browser, to install malicious programs has gain significant popularity in recent years. Unlike traditional infection vectors such as software bundling in sharewa...
 
Analysis and Performance Results of a fluid dynamics Application on MASA Stream Processor
Found in: Computer and Information Science, 5th IEEE/ACIS International Conference on
By Mei Wen, Nan Wu, Changqing Xun, Wei Wu, Chunyuan Zhang
Issue Date:July 2006
pp. 350-354
This paper begins with the study of MASA stream architecture; followed by the discussion of the stream algorithm on MASA, together with experiments using a cycle-accurate hardware simulator to analyze the performance of the implementation and to measure ap...
 
Failure Factor Based Yield Enhancement for SRAM Designs
Found in: Defect and Fault-Tolerance in VLSI Systems, IEEE International Symposium on
By Yu-Tsao Hsing, Chih-Wea Wang, Ching-Wei Wu, Chih-Tsun Huang, Cheng-Wen Wu
Issue Date:October 2004
pp. 20-28
With the increasing chip density, semiconductor memory yield improvement is becoming a task that can only be done collaboratively by test engineers, product engineers, process engineers, and circuit designers. Design-for-manufacturability (DFM) and design-...
 
Analysis on Adjustment-Based TCP-Friendly Congestion Control: Fairness and Stability
Found in: Local Computer Networks, Annual IEEE Conference on
By Wei Wu, Yong Ren, Xiuming Shan
Issue Date:November 2001
pp. 142
In this paper, we focus on understanding the binomial congestion control algorithms, which is proposed in [11] and can generalize TCP-style additive-increase by increasing inversely proportional to a power k of the current window (for TCP, k=0) and general...
 
B*-Trees: A New Representation for Non-Slicing Floorplans
Found in: Design Automation Conference
By Guang-Ming Wu, Shu-Wei Wu, Yao-Wen Chang, Yun-Chih Chang
Issue Date:June 2000
pp. 458-463
We present in this paper an efficient, flexible, and effective data structure, B*-trees for non-slicing floorplans. B*-trees are based on ordered binary trees and the admissible placement presented in [1]. Inheriting from the nice properties of ordered bin...
 
Efficient Algorithms for Mining the Concise and Lossless Representation of Closed+ High Utility Itemsets
Found in: IEEE Transactions on Knowledge and Data Engineering
By Cheng-Wei Wu,Philippe Fournier-Viger,Philip S. yu,Vincent S. Tseng
Issue Date:August 2014
pp. 1
Mining high utility itemsets (HUIs) from databases is an important data mining task, which refers to the discovery of itemsets with high utilities (e.g. high profits). However, it may present too many HUIs to users, which also degrades the efficiency of th...
 
Robust Trajectory Clustering for Motion Segmentation
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Feng Shi,Zhong Zhou,Jiangjian Xiao,Wei Wu
Issue Date:December 2013
pp. 3088-3095
Due to occlusions and objects' non-rigid deformation in the scene, the obtained motion trajectories from common trackers may contain a number of missing or mis-associated entries. To cluster such corrupted point based trajectories into multiple motions is ...
 
Research on the Symbolization Method of Single-Line Rivers Based on the River System Structure
Found in: 2013 International Conference on Virtual Reality and Visualization (ICVRV)
By Wang Wei-Wu,Zhu Xia,Li Xian
Issue Date:September 2013
pp. 309-312
In traditional map, considering only the river itself, we use fine line to thick line from upstream to downstream, but without the relationship of rivers. Paper assign the width of river based on the structural model of the water system, to avoid the confl...
 
Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
Found in: IEEE Transactions on Knowledge and Data Engineering
By Vincent S. Tseng,Bai-En Shie,Cheng-Wei Wu,Philip S. Yu
Issue Date:August 2013
pp. 1772-1786
Mining high utility itemsets from a transactional database refers to the discovery of itemsets with high utility like profits. Although a number of relevant algorithms have been proposed in recent years, they incur the problem of producing a large number o...
 
Reliability Prediction Model for SOA Using Hidden Markov Model
Found in: 2013 8th ChinaGrid Annual Conference (ChinaGrid)
By Waseem Ahmed,Yong Wei Wu
Issue Date:August 2013
pp. 40-45
Reliability prediction models for Service Oriented Architecture (SOA) based applications have thoroughly discussed system level & component level details. However, significant difference between applications based on service-oriented architecture a...
 
Object Tracking Based on Particle Filter with Multi-scale Mode
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Wangsheng Yu,Xiaohua Tian,Zhiqiang Hou,Guojian Wei,Wu Li
Issue Date:July 2013
pp. 363-368
In this paper, we propose a particle filter based tracker using multiscale mode to solve the scale changeable object tracking problem. Firstly, we discuss the traditional tracker's deficiency in dealing with scale changeable object and propose the multisca...
 
Exploiting Parallelism by Data Dependency Elimination: A Case Study of Circuit Simulation Algorithms
Found in: IEEE Design & Test
By Wei Wu, Fang Gong,R. Krishnan, Lei He, Hao Yu
Issue Date:February 2013
pp. 26-35
The authors present a methodology geared towards EDA applications such as parasitic extraction, transient circuit simulation, and RF steady-state simulations.
 
Dual-JT: Toward the high availability of JobTracker in Hadoop
Found in: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom)
By Jian Wan,Minggang Liu,Xixiang Hu,Zujie Ren,Jilin Zhang,Weisong Shi,Wei Wu
Issue Date:December 2012
pp. 263-268
MapReduce is a state-of-the-art computation paradigm that is becoming widely used for processing large-scale datasets. Hadoop is an open-source implementation of MapReduce and follows a masterCslave architecture. This architecture makes Hadoop suffer from ...
 
PlugCloud - Scaling by Plugging a Personal Cloud Infrastructure
Found in: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS)
By Wee Siong Ng,See-Kiong Ng,Wei Wu
Issue Date:December 2012
pp. 856-861
We present a novel elastic system architecture called Plug Cloud, which aims to increase the power of low-compute (and possibly mobile) devices, such as tablets, through distributing high-compute tasks, such as rendering, data analysis and visualization, t...
 
Evaluation of Traffic Control in Virtual Environment
Found in: 2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science
By Wang Xiaojing,Ye Wei,Wu Haowei,Ding Linjie,Zhang Chi
Issue Date:October 2012
pp. 332-335
Due to the development of hardware technology, virtualization has been drawing more attention recently. Virtualization brings the benefits of ease management to users but also poses challenges to researchers. As multiple virtual machines run on a single ha...
 
Non-uniform Illumination Representation based on HDR Light Probe Sequences
Found in: 2012 International Conference on Virtual Reality and Visualization (ICVRV)
By Jian Hu,Tao Yu,Lin Wang,Zhong Zhou,Wei Wu
Issue Date:September 2012
pp. 62-68
No summary available.
 
Clustering Based Search Algorithm for Motion Estimation
Found in: 2012 IEEE International Conference on Multimedia and Expo (ICME)
By Ke Chen,Zhong Zhou,Wei Wu
Issue Date:July 2012
pp. 622-627
Motion estimation is the key part of video compression since it removes the temporal redundancy within frames and significantly affects the encoding quality and efficiency. In this paper, a novel fast motion estimation algorithm named Clustering Based Sear...
 
Depth Template Based 2D-to-3D Video Conversion and Coding System
Found in: 2012 IEEE International Conference on Multimedia and Expo (ICME)
By Zhenyu Wang,Ronggang Wang,Shengfu Dong,Wei Wu,Longshe Huo,Wen Gao
Issue Date:July 2012
pp. 308-313
A Depth Template based 2D-to-3D Video Conversion and Coding system (DTVCC) is proposed by this paper. In DTVCC, triangle meshes are exploited to describe depth template for scenes in 2D video, an interactive system is designed to generate reliable depth te...
 
 1  2 Next >>