Search For:

Displaying 1-50 out of 218 total
Research on Solving Laser Beam Quality Factor M^2 with Normal Equations
Found in: Electrical and Control Engineering, International Conference on
By Wenbo Jing, Wenbo Yang, Xiaoman Wang, Huilin Jiang
Issue Date:June 2010
pp. 1765-1769
In this paper, the method for solving laser beam quality factor M2 with normal equations is studied, and the numerical algorithm of solving the normal equations (NE) with triangular decomposition is presented at the same time. The normal equations method f...
 
Modeling and Analysis of Availability for SaaS Multi-tenant Architecture
Found in: 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE)
By Wenbo Su,Chuang Lin,Kun Meng,Qu Liu
Issue Date:April 2014
pp. 365-369
Software as a Service(SaaS) is increasingly becoming an important application development and delivery model. Among different implementation architectures, multi-tenant architecture(MTA) has received most attentions. Not only because it is easier to be mai...
 
Accelerating network-on-chip simulation via sampling
Found in: 2014 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)
By Wenbo Dai,Natalie Enright Jerger
Issue Date:March 2014
pp. 135-136
Architectural complexity continues to grow as we consider the large design space of multiple cores, cache architectures, networks-on-chip and memory controllers for emerging architectures. Simulators are growing in complexity to reflect each of these syste...
   
An efficient sampling method for characterizing points of interests on maps
Found in: 2014 IEEE 30th International Conference on Data Engineering (ICDE)
By Pinghui Wang,Wenbo He,Xue Liu
Issue Date:March 2014
pp. 1012-1023
Recently map services (e.g., Google maps) and location-based online social networks (e.g., Foursquare) attract a lot of attention and businesses. With the increasing popularity of these location-based services, exploring and characterizing points of intere...
   
A Tale of Three Social Networks: User Activity Comparisons across Facebook, Twitter, and Foursquare
Found in: IEEE Internet Computing
By Pinghui Wang,Wenbo He,Junzhou Zhao
Issue Date:March 2014
pp. 10-15
Despite recent efforts to characterize online social network (OSN) structures and activities, user behavior across different OSNs has received little attention. Yet such information could provide insight into issues relating to personal privacy protection....
 
Cursing in English on twitter
Found in: Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing (CSCW '14)
By Amit P. Sheth, Krishnaprasad Thirunarayan, Lu Chen, Wenbo Wang
Issue Date:February 2014
pp. 415-425
Cursing is not uncommon during conversations in the physical world: 0.5% to 0.7% of all the words we speak are curse words, given that 1% of all the words are first-person plural pronouns (e.g., we, us, our). On social media, people can instantly chat with...
     
Why application errors drain battery easily?: a study of memory leaks in smartphone apps
Found in: Proceedings of the Workshop on Power-Aware Computing and Systems (HotPower '13)
By Mingyuan Xia, Jie Liu, Wenbo He, Xue Liu
Issue Date:November 2013
pp. 1-5
Mobile operating systems embrace new mechanisms that reduce energy consumption for common usage scenarios. The background app design is a representative implemented in all major mobile OSes. The OS keeps apps that are not currently interacting with the use...
     
Design and Implementation of Holistic Scheduling and Efficient Storage for FlexRay
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yu Hua,Xue Liu,Wenbo He,Dan Feng
Issue Date:November 2013
pp. 1
FlexRay is a new industry standard for next-generation communication in automotives. Though there are a few recent researches on performance analysis of FlexRay, two important aspects of the FlexRay design have been overlooked. The first is a holistic inte...
 
VM image update notification mechanism based on pub/sub paradigm in cloud
Found in: Proceedings of the 5th Asia-Pacific Symposium on Internetware (Internetware '13)
By Jiwei Xu, Jun Wei, Shiyang Ye, Tao Huang, Wenbo Zhang
Issue Date:October 2013
pp. 1-4
Virtual machine image encapsulates the whole software stack including operating system, middleware, user application and other software products. Failure occurred in any layer of the software stack will be treated as image failure. However, virtual machine...
     
A Novel Binary Quantum-Behaved Particle Swarm Optimization Algorithm
Found in: 2013 12th International Symposium on Distributed Computing and Applications to Business, Engineering & Science (DCABES)
By Jing Zhao,Ming Li,Zhihong Wang,Wenbo Xu
Issue Date:September 2013
pp. 119-123
To keep the balance between the global search and local search, a novel binary quantum-behaved particle swarm optimization algorithm with comprehensive learning and cooperative approach (CCBQPSO) is presented. In the proposed algorithm, all the particles' ...
 
Minimizing energy consumption based on capabilities of users for carrier aggregation in LTE-Advanced systems
Found in: 2013 8th International Conference on Communications and Networking in China (CHINACOM)
By Jianjun Sun, Hao Jin, Yong Li, Xiaodong Ji, Mugen Peng, Wenbo Wang
Issue Date:August 2013
pp. 605-609
The issue of energy consumption in LTE-Advanced systems draws more and more attention recently. In this paper, we propose a dynamic switch on/off scheme for base station based on the capabilities of users for carrier aggregation in LTE-Advanced Systems in ...
   
A Markovian approach to spectrum access in cooperative spectrum sharing networks
Found in: 2013 8th International Conference on Communications and Networking in China (CHINACOM)
By Dandan Liu, Wenbo Wang, Wenbin Guo
Issue Date:August 2013
pp. 954-958
In cooperative spectrum sharing networks, dynamic spectrum access is regraded as an important and challenging issue. In this paper, we consider a non-real-payoff cooperative spectrum sharing between one primary user (PU) and one secondary user (SU) over mu...
   
On the study of outage performance for interference alignment (IA) in cognitive relay networks
Found in: 2013 8th International Conference on Communications and Networking in China (CHINACOM)
By Jia Xing,Xing Zhang,Wenbo Wang
Issue Date:August 2013
pp. 75-79
In cognitive radio systems, interference between primary users and secondary users greatly affects the system performance, which is an issue worth studying. Recently, interference alignment (IA) has been proposed as an effective method to deal with the int...
   
A UE-grouping based load balancing scheme for Carrier Aggregation in LTE-advanced systems
Found in: 2013 8th International Conference on Communications and Networking in China (CHINACOM)
By Yun Lin,Wenbo Wang, Yuan Li
Issue Date:August 2013
pp. 281-285
By aggregating Component Carriers (CCs) to enlarge the transmission bandwidth, Carrier Aggregation (CA) greatly improves the peak data rate for Long Term Evolution-Advanced (LTE-Advanced) system. However, more than one carrier scheduling in a system result...
   
Parallel Coordinates Visualization of Large Data Investigation on HDDs
Found in: 2013 10th International Conference Computer Graphics, Imaging and Visualization (CGIV)
By Wenbo Wang,Mao Lin Huang
Issue Date:August 2013
pp. 93-99
Data Visualization and Visual Analytics (DVVA) techniques help human to extract essential information and knowledge from large and complex data sets, and then represent them clearly and comprehensively in the graphic format for better understanding. These ...
 
Green cloud virtual network provisioning based ant colony optimization
Found in: Proceeding of the fifteenth annual conference companion on Genetic and evolutionary computation conference companion (GECCO '13 Companion)
By Bin Wang, Jiqiang Liu, Jogesh Muppala, Wenbo Wang, Xiaolin Chang
Issue Date:July 2013
pp. 1553-1560
Network virtualization is being regarded as a promising technology to create an ecosystem for cloud computing applications. One critical issue in network virtualization technology is power-efficient virtual network embedding (PE-VNE), which deals with the ...
     
Simulated annealing based resource allocation for cloud data centers
Found in: Proceeding of the fifteenth annual conference companion on Genetic and evolutionary computation conference companion (GECCO '13 Companion)
By Bin Wang, Jiqiang Liu, Wenbo Wang, Xiaolin Chang
Issue Date:July 2013
pp. 81-82
Network virtualization technology can be applied to provide the performance guarantee by creating a virtual network for running the user application. One of the most important issues in the network virtualization is the virtual network embedding (VNE) prob...
     
Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time
Found in: 2013 IEEE Symposium on Security and Privacy (SP) Conference
By Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai
Issue Date:May 2013
pp. 174-188
This paper presents a novel mechanism, called Ally Friendly Jamming, which aims at providing an intelligent jamming capability that can disable unauthorized (enemy) wireless communication but at the same time still allow authorized wireless devices to comm...
   
Scheduling Sensor Data Collection with Dynamic Traffic Patterns
Found in: IEEE Transactions on Parallel and Distributed Systems
By Wenbo Zhao, Xueyan Tang
Issue Date:April 2013
pp. 789-802
The network traffic pattern of continuous sensor data collection often changes constantly over time due to the exploitation of temporal and spatial data correlations as well as the nature of condition-based monitoring applications. In contrast to most exis...
 
Optimal density and power allocation of D2D communication under heterogeneous networks on multi-bands with outage constraints
Found in: 2013 International Conference on Computing, Networking and Communications (ICNC)
By Ziyang Liu,Hao Chen,Tao Peng,Wenbo Wang
Issue Date:January 2013
pp. 1179-1183
This paper analyzes the maximum achievable transmission capacity of the Device-to-Device (D2D) communication in heterogeneous networks with multi-bands. The heterogeneous networks contain one or several cellular systems, and D2D communication shares uplink...
 
Elasticat: A load rebalancing framework for cloud-based key-value stores
Found in: 2012 19th International Conference on High Performance Computing (HiPC)
By Xiulei Qin,Wei Wang,Wenbo Zhang,Jun Wei,Xin Zhao,Tao Huang
Issue Date:December 2012
pp. 1-10
The problem of load rebalancing is an important issue for cloud-based key-value stores. However, the new virtualization environment and the store's stateful feature make this classical issue more challenging. In this paper, we build a new load rebalancing ...
   
A Multi-agent Learning Model for Service Composition
Found in: 2012 IEEE Asia-Pacific Services Computing Conference (APSCC)
By Wenbo Xu,Jian Cao,Haiyan Zhao,Lei Wang
Issue Date:December 2012
pp. 70-75
Agent technology has gained increasing popularity in service oriented architecture (SOA) because of its features of autonomy, initiative, interactivity, persistency and adaptability. There are already a plenty of implementations which integrate SOA with mu...
 
SeTM: Efficient Execution of Speculative Threads with Hardware Transactional Memory
Found in: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS)
By Gongming Li,Hong An,Qi Li,Bobin Deng,Wenbo Dai
Issue Date:December 2012
pp. 522-531
Thread-Level Speculation (TLS) was researched to automatically parallelize portions of serial programs for execution, and transactional memory (TM) was studied as a promising alternative of lock for parallel programming due to its simplicity. Both TLS and ...
 
Optimizing data migration for cloud-based key-value stores
Found in: Proceedings of the 21st ACM international conference on Information and knowledge management (CIKM '12)
By Jun Wei, Tao Huang, Wei Wang, Wenbo Zhang, Xin Zhao, Xiulei Qin
Issue Date:October 2012
pp. 2204-2208
As one database offloading strategy, elastic key-value stores are often introduced to speed up the application performance with dynamic scalability. Since the workload is varied, efficient data migration with minimal impact in service is critical for the i...
     
FCM-Based QPSO for Evolutionary Fuzzy-System Design
Found in: 2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science
By Wenqing Guan,Jun Sun,Jian Xu,Wenbo Xu
Issue Date:October 2012
pp. 466-469
This paper proposes a FCM-based QPSO algorithm for evolutionary fuzzy-system design. The objective of this paper is to learn TSK type fuzzy rules with high accuracy. In the designed fuzzy system, data is firstly clustered into classes by fuzzy c-means algo...
 
Tracking Algorithm of WSN Based on Improved Particle Filter
Found in: 2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science
By Guodong Zhang,Yanrui Ding,Jian Xu,Wenbo Xu
Issue Date:October 2012
pp. 149-152
In this paper, in order to achieve single target tracking in the wireless network, the original particle filter algorithm has been improved. I introduce the essence of the APIT algorithm about how to infer the particle position. Firstly, we determine the m...
 
Research and Simulation of Node Localization in WSN Based on Quantum Particle Swarm Optimization
Found in: 2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science
By Litao Gong,Jun Sun,Wenbo Xu,Jian Xu
Issue Date:October 2012
pp. 144-148
there're so many kinds of localization algorithms with a big localization error. And how to reduce this error is really a very important problem. This paper studies four distributed localization algorithms in WSN, and introduces a pretty popular optimizati...
 
The Domain Decomposition Method in Land Surface Model
Found in: 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
By Jianhui Shi,Wenbo Zhou,Ying Liu
Issue Date:October 2012
pp. 531-534
The domain decomposition method is a superior method in solving big and complicated problem. This article puts forward a domain decomposition method based on the weighted average, this method decomposes the grid based on the land cover, and discrete parame...
 
Towards a Cost-Aware Data Migration Approach for Key-Value Stores
Found in: 2012 IEEE International Conference on Cluster Computing (CLUSTER 2012)
By Xiulei Qin, Wenbo Zhang, Wei Wang, Jun Wei, Xin Zhao, Tao Huang
Issue Date:September 2012
pp. 551-556
Live data migration is an important technique for key-value stores. However, due to the stateful feature, new virtualization technology, stringent low latency requirements and unexpected workload changes, key-value stores deployed in cloud environment have...
 
VMFDF: A Virtualization-based Multi-Level Fault Detection Framework for High Availability Computing
Found in: 2012 IEEE 9th International Conference on e-Business Engineering (ICEBE)
By Jianhua Zhang,Wenbo Zhang,Heng Wu,Tao Huang
Issue Date:September 2012
pp. 367-373
Virtualization has been widely adopted by lots of business companies. It is now becoming an effective way to manage massive hardware resources in flexible scales. While power and hardware cost can be significantly saved through virtualization, the fault de...
 
Performance analysis of cooperative mode selection in hybrid D2D and IMT-Advanced network
Found in: 2012 7th International ICST Conference on Communications and Networking in China (CHINACOM 2012)
By Shangwen Xiang, Qingyi Quan, Tao Peng, Wenbo Wang
Issue Date:August 2012
pp. 717-721
While Device-to-Device communication enables high-speed local services in the traditional cellular networks, it also brings potential mutual interference additionally. Previous works neither make decisions cooperatively nor take involute situations resulte...
   
Joint multi-user precoding in multi-relay systems
Found in: 2012 7th International ICST Conference on Communications and Networking in China (CHINACOM 2012)
By Hang Long, Wei Xiang, Yueying Zhang, Jing Wang, Wenbo Wang
Issue Date:August 2012
pp. 451-456
Multi-user precoding in multi-relay systems is investigated in this paper. Firstly, a distributed precoder through the relay nodes is presented, which performs as a sub-optimum solution in terms of both the outage probability and ergodic capacity. Then, a ...
   
Relay self-selection for secure cooperative in Amplify-And-Forward networks
Found in: 2012 7th International ICST Conference on Communications and Networking in China (CHINACOM 2012)
By Shi Yan, Mugen Peng, Wenbo Wang, Liang Dong,M. Ahmed
Issue Date:August 2012
pp. 581-585
Cooperative communication in wireless relay systems can improve the physical layer security, and the relay selection has great impacts on the security performances. In this paper the relay selection in Amplify-and-Forward (AF) cooperative networks is inves...
   
Approximate performance study of non-line-of-sight ultraviolet communication links in noncoplanar geometry
Found in: 2012 7th International ICST Conference on Communications and Networking in China (CHINACOM 2012)
By Yong Zuo, Houfei Xiao, Wenbo Zhang, Haoran Xu, Jian Wu
Issue Date:August 2012
pp. 296-300
This paper presents an approximate closed-form model of non-line-of-sight (NLOS) ultraviolet (UV) single-scatter propagation in noncoplanar geometry for tractable analysis. The path loss is given as a function of the transceiver geometry settings and the o...
   
Distributed cooperative admission and power control for Device-to-Device links with QoS protection in cognitive heterogeneous network
Found in: 2012 7th International ICST Conference on Communications and Networking in China (CHINACOM 2012)
By Pei Liu, Chunjing Hu, Tao Peng, Wenbo Wang
Issue Date:August 2012
pp. 712-716
In this paper, we propose two distributed admission and power control (DAPC) algorithms for Device-to-Device (D2D) communication which share uplink resources with cellular system through cognitive radio techniques in underlay mode. In the presence of quali...
   
Sum-capacity of D2D and cellular hybrid networks over cooperation and non-cooperation
Found in: 2012 7th International ICST Conference on Communications and Networking in China (CHINACOM 2012)
By Ziyang Liu, Tao Peng, Bo Peng, Wenbo Wang
Issue Date:August 2012
pp. 707-711
This paper analyzes the effect of cooperation on the network capacity in hybrid network composed of cellular and D2D communications. The D2D communication shares uplink resource with cellular user and we consider a simple system model which contains one D2...
   
PaaS-Oriented Performance Modeling for Cloud Computing
Found in: 2012 IEEE 36th Annual Computer Software and Applications Conference - COMPSAC 2012
By Wenbo Zhang,Xiang Huang,Ningjiang Chen,Wei Wang,Hua Zhong
Issue Date:July 2012
pp. 395-404
PaaS is one of the most popular paradigms of cloud computing and the performance guarantee of PaaS-oriented applications has been critically concerned. Performance models, such as a Layer Queue Network (LQN) model, are efficient at performance guaranteeing...
 
Workload-Aware Online Anomaly Detection in Enterprise Applications with Local Outlier Factor
Found in: 2012 IEEE 36th Annual Computer Software and Applications Conference - COMPSAC 2012
By Tao Wang,Wenbo Zhang,Jun Wei,Hua Zhong
Issue Date:July 2012
pp. 25-34
Detecting anomalies are essential for improving the reliability of enterprise applications. Current approaches set thresholds for metrics or model correlations between metrics, and anomalies are detected when the thresholds are violated or the correlations...
 
Application-Level CPU Consumption Estimation: Towards Performance Isolation of Multi-tenancy Web Applications
Found in: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)
By Wei Wang,Xiang Huang,Xiulei Qin,Wenbo Zhang,Jun Wei,Hua Zhong
Issue Date:June 2012
pp. 439-446
Performance isolation is a key requirement for application-level multi-tenant sharing hosting environments. It requires knowledge of the resource consumption of the various tenants. It is of great importance not only to be aware of the resource consumption...
 
Dynamic Control of Electricity Cost with Power Demand Smoothing and Peak Shaving for Distributed Internet Data Centers
Found in: 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS)
By Jianguo Yao,Xue Liu,Wenbo He,Ashikur Rahman
Issue Date:June 2012
pp. 416-424
Internet based service providers, such as Amazon, Google, Yahoo etc, build their data centers (IDC) across multiple regions to provide reliable and low latency of services to clients. Ever-increasing service demand, complexity of services and growing clien...
 
Optimistic Scheduling with Geographically Replicated Services in the Cloud Environment (COLOR)
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Wenbo Zhu,Murray Woodside
Issue Date:May 2012
pp. 735-740
This paper proposes a system model that unifies different optimistic algorithms designed for deploying geographically replicated services in a cloud environment. The proposed model thereby enables a generalized solution (COLOR) by which well-specified safe...
 
Research on Visualization of Electromagnetic Environment over Complex Terrain
Found in: Computer Science and Electronics Engineering, International Conference on
By Wenbo Zhang,Yaoqin Cao,Zhiguang Liu
Issue Date:March 2012
pp. 595-598
Visualization of electromagnetic environment over complex terrain is the current development trend of visualization of electromagnetic situation. Visualization of electromagnetic environment requirement is analyzed in this paper, and a method that using el...
 
Basic Ant Colony Optimization
Found in: Computer Science and Electronics Engineering, International Conference on
By Ying Pei,Wenbo Wang,Song Zhang
Issue Date:March 2012
pp. 665-667
Recently, the application of Ant Colony Optimization is much wider and it is always the highlight of key algorithm. There are also many improvements about the ACO algorithm, such as: the improvements of algorithm in self-adaptive, the improvements of incre...
 
Research on the Evaluation Method of Regional Reputation
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Xiao Yanling,Li Liping,Hu Wenbo
Issue Date:November 2011
pp. 344-347
Reputation is the foundation stone of market economy. Regional reputation is a component of the social reputation, and it needs the perfect system to support, and it is an important component of constructing system to choose the scientific reputation evalu...
 
Experience cooperative sharing in cross-layer cognitive radio for real-time multimedia communication
Found in: Proceedings of the 4th International Conference on Cognitive Radio and Advanced Spectrum Management (CogART '11)
By Andres Kwasinski, Wenbo Wang
Issue Date:October 2011
pp. 1-5
The central problem in cognitive radio (CR) is how to adapt, given a wireless environment, so as to operate while meeting the constraints of a primary incumbent in a spectrum band. Adaptation for transmission of real-time multimedia lends itself to a cross...
     
Decentralized cooperative compressed spectrum sensing for block sparse signals
Found in: Proceedings of the 4th International Conference on Cognitive Radio and Advanced Spectrum Management (CogART '11)
By Hua Ai, Wenbin Guo, Wenbo Wang, Xing Wang, Yang Lu
Issue Date:October 2011
pp. 1-5
In cognitive radio (CR), compressed sensing (CS) and cooperative sensing are two emerging techniques enabling sub-Nyquist sampling for wide-band sensing and improving the detection performance under fading channels. In this paper, a decentralized cooperati...
     
Calculation of Quantum Entanglement
Found in: International Symposium on Distributed Computing and Applications to Business, Engineering and Science
By Jingshui Yu,Wenbo Xu
Issue Date:October 2011
pp. 87-91
Quantum entanglement which is used as the basis for such applications as quantum cryptography, quantum teleportation, and quantum computing, is a multifaceted property that has attracted much attention. The calculation of quantum entanglement therefore has...
 
Contraction-Expansion Coefficient Learning in Quantum-Behaved Particle Swarm Optimization
Found in: International Symposium on Distributed Computing and Applications to Business, Engineering and Science
By Na Tian,Choi-Hong Lai,Koulis Pericleous,Jun Sun,Wenbo Xu
Issue Date:October 2011
pp. 303-308
Quantum-behaved particle swarm optimization was proposed from the view of quantum world and based on the particle swarm optimization, which has been proved to outperform the traditional PSO. The Expansion-Contraction coefficient is the only parameter in QP...
 
The Research of Multi-hop Routing Algorithm in the Field of Distributed Wireless Sensor Network
Found in: International Symposium on Distributed Computing and Applications to Business, Engineering and Science
By Mingming Wu,Wenbo Xu
Issue Date:October 2011
pp. 234-238
To improve the energy efficiency of nodes in Wireless sensor network, A multi-hop clustering routing algorithm is presented which is based on distributed wireless sensor network, which can improve itself in the process of use according to a kind of protoco...
 
Fabric Defect Detection Based on Projected Transform for Feature Extraction
Found in: International Symposium on Distributed Computing and Applications to Business, Engineering and Science
By Xingye Zhang,Wenbo Xu,Ruru Pan,Jihong Liu,Weidong Gao
Issue Date:October 2011
pp. 192-196
In order to resolve the key technology problem of automated fabric defect detection, projected transform is proposed to extract features of the fabric image making use of fabric characteristic in this paper. Automated fabric defect detection scheme is divi...
 
 1  2 Next >>