Search For:

Displaying 1-50 out of 75 total
Collaborative Online Multitask Learning
Found in: IEEE Transactions on Knowledge and Data Engineering
By Guangxia Li,Steven C. H. Hoi,Kuiyu Chang,Wenting Liu,Ramesh Jain
Issue Date:August 2014
pp. 1-1
We study the problem of online multitask learning for solving multiple related classification tasks in parallel, aiming at classifying every sequence of data received by each task accurately and efficiently. One practical example of online multitask learni...
 
PoWerStore: proofs of writing for efficient and robust storage
Found in: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (CCS '13)
By Dan Dobre, Ghassan Karame, Matthias Majuntke, Neeraj Suri, Wenting Li, Marko Vukolić
Issue Date:November 2013
pp. 285-298
Existing Byzantine fault tolerant (BFT) storage solutions that achieve strong consistency and high availability, are costly compared to solutions that tolerate simple crashes. This cost is one of the main obstacles in deploying BFT storage in practice. In ...
     
Speedy transactions in multicore in-memory databases
Found in: Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles (SOSP '13)
By Barbara Liskov, Eddie Kohler, Samuel Madden, Stephen Tu, Wenting Zheng
Issue Date:November 2013
pp. 18-32
Silo is a new in-memory database that achieves excellent performance and scalability on modern multicore machines. Silo was designed from the ground up to use system memory and caches efficiently. For instance, it avoids all centralized contention points, ...
     
A Conceptual Prototype for Digital Media Cloud
Found in: 2013 8th ChinaGrid Annual Conference (ChinaGrid)
By Wenting Tan,Xiaoshi Wang,Yu Zhang,Bin Zhou,Xiaowu Chen
Issue Date:August 2013
pp. 103-108
In order to effectively integrate and share the enormous dispersed digital media resources, we propose Digital Media Cloud (DMCloud), aiming to integrate and share the distributed digital media resources and provide digital media synthesis services. In thi...
 
A Two-Phase Bio-NER System Based on Integrated Classifiers and Multiagent Strategy
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Lishuang Li, Wenting Fan, Degen Huang
Issue Date:July 2013
pp. 897-904
Biomedical named entity recognition (Bio-NER) is a fundamental step in biomedical text mining. This paper presents a two-phase Bio-NER model targeting at JNLPBA task. Our two-phase method divides the task into two subtasks: named entity detection (NED) and...
 
RMORM: A framework of Multi-objective Optimization Resource Management in Clouds
Found in: 2013 IEEE World Congress on Services (SERVICES)
By Wenyun Dai,Haopeng Chen,Wenting Wang,Xi Chen
Issue Date:June 2013
pp. 488-494
Cloud computing has attracted increasing attention in recent years. With the growth in the number and frequency of applications being deployed into clouds, the burden of resource management of cloud providers is becoming heavier. The resource deployment mu...
 
Research on WAP Browsing Mobile Learning Mode Based on 3G Technology
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Yuan Jiugen,Zhang Wenting
Issue Date:June 2013
pp. 23-25
Mobile learning is a new stage of distance education, and is the product of the stage in which wireless mobile communication device and wireless mobile communication network technology are developed to be mature. Its main characteristic is the 4A"Anyo...
 
An NER-based Product Identification and Lucene-based Product Linking Approach to CPROD1 Challenge: Description of Submission System to CPROD1 Challenge
Found in: 2012 IEEE 12th International Conference on Data Mining Workshops
By Zhiqiang Toh,Wenting Wang,Man Lan,Xiaoli Li
Issue Date:December 2012
pp. 869-871
This paper presents our methodology for CPROD1 Challenge, which is to identify the product mentions from text and then link the product to the entries in the catalog file. Our solution follows 2 steps. First, we use processing pipelines to extract product ...
 
Enhancing the Symmetry and Proportion of 3D Face Geometry
Found in: IEEE Transactions on Visualization and Computer Graphics
By Qiqi Liao,Xiaogang Jin,Wenting Zeng
Issue Date:October 2012
pp. 1704-1716
We present an engine for enhancing the geometry of a 3D face mesh model while making the enhanced version share close similarity with the original. After obtaining the feature points of a given scanned 3D face model, we first perform a local and global sym...
 
An Availability-Aware Virtual Machine Placement Approach for Dynamic Scaling of Cloud Applications
Found in: 2012 IEEE 9th Int'l Conference on Ubiquitous Intelligence & Computing / 9th Int'l Conference on Autonomic & Trusted Computing (UIC/ATC)
By Wenting Wang,Haopeng Chen,Xi Chen
Issue Date:September 2012
pp. 509-516
Cloud computing promises customers the on-demand ability to dynamically provision virtualization resources in face of workload variations. Most existing scaling approaches addressed this problem by allocating application to a certain amount of cloud resour...
 
Cross-domain representation-learning framework with combination of class-separate and domain-merge objectives
Found in: Proceedings of the 1st International Workshop on Cross Domain Knowledge Discovery in Web and Social Network Mining (CDKD '12)
By Shiliang Sun, Wenting Tu
Issue Date:August 2012
pp. 18-25
Recently, cross-domain learning has become one of the most important research directions in data mining and machine learning. In multi-domain learning, one problem is that the classification patterns and data distributions are different among domains, whic...
     
SWAP: Parallelization through Algorithm Substitution
Found in: IEEE Micro
By Hengjie Li,Wenting He,Yang Chen,Lieven Eeckhout,Olivier Temam,Chengyong Wu
Issue Date:July 2012
pp. 54-67
By explicitly indicating which algorithms they use and encapsulating these algorithms within software components, programmers make it possible for an algorithm-aware compiler to replace their original algorithm implementations with compatible parallel impl...
 
Distributed replay protocol for distributed uniprocessors
Found in: Proceedings of the 26th ACM international conference on Supercomputing (ICS '12)
By Bobin Deng, Hong An, Mengjie Mao, Tao Sun, Wei Zhou, Wenting Han, Xuechao Wei
Issue Date:June 2012
pp. 3-14
Data speculation technique has been heavily exploited in various scenarios of architecture design. It bridges the time or space gap between data producer and data consumer, which gives opportunities to processors to gain significant speedups. However, larg...
     
An Availability-Aware Approach to Resource Placement of Dynamic Scaling in Clouds
Found in: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)
By Wenting Wang,Haopeng Chen,Xi Chen
Issue Date:June 2012
pp. 930-931
The availability of Web applications influenced by Virtual Machine (VM)-based physical locations during resource scaling is a crucial concern for customers and cloud providers. In this paper, we present a novel computing model to describe availability attr...
 
WMS-Based Flow Mapping Services
Found in: 2012 IEEE World Congress on Services (SERVICES)
By Danhuai Guo,Kaichao Wu,Zhenghua Zhang,Wenting Xiang
Issue Date:June 2012
pp. 234-241
Flow Mapping, also known as spatial interaction data visualization, has become widely used for exploratory spatio-temporal data analysis to understand complex spatial phenomena such as human migration, commercial trading, and social networks. The unitary f...
 
A Speculative HMMER Search Implementation on GPU
Found in: 2012 26th IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)
By Xiaoqiang Li,Wenting Han,Gu Liu,Hong An,Mu Xu,Wei Zhou,Qi Li
Issue Date:May 2012
pp. 735-741
Due to the exponentially growing bioinformatics databases and rapidly popular of GPU for general purpose computing, it is promising to employ GPU techniques to accelerate the sequence search process. Hmmsearch from HMMER bioinformatics software package is ...
 
The Biodegradation Experiment of 1-chloronaphthalene and 2-chloronaphthalene
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Jian Yu,Wenting He,Zhihui Lei,Youqun Song
Issue Date:May 2012
pp. 1770-1777
The concentration-time curve could be obtained through the biodegradation experiment of 1-chloronaphthalene and 2-chloronaphthalene at different concentration by Pseudomonas sp HY. And the influence of growth substance on the degradation was also investiga...
 
FlexBFS: a parallelism-aware implementation of breadth-first search on GPU
Found in: Proceedings of the 17th ACM SIGPLAN symposium on Principles and Practice of Parallel Programming (PPoPP '12)
By Gu Liu, Hong An, Tao Sun, Wei Zhou, Wenting Han, Xiaoqiang Li, Xuechao Wei, Xulong Tang
Issue Date:February 2012
pp. 279-280
In this paper, we present FlexBFS, a parallelism-aware implementation for breadth-first search on GPU. Our implementation can adjust the computation resources according to the feedback of available parallelism dynamically. We also optimized our program in ...
     
A digital testbed for a PHEV/PEV enabled parking lot in a Smart Grid environment
Found in: Innovative Smart Grid Technologies, IEEE PES
By Wencong Su,Wente Zeng,Mo-Yuen Chow
Issue Date:January 2012
pp. 1-7
The anticipation of a large penetration of Plug-in Hybrid Electric Vehicles (PHEVs) and Plug-in Electric Vehicles (PEVs) into the market brings up many technical problems that need to be addressed within the next 10 years. In the future, electric-powered v...
 
Optimization of the Fermentation Medium for Epothilones High-Producing Strain Using Response Surface Methodology Coupled with Desirability Function
Found in: Intelligent Computation Technology and Automation, International Conference on
By Bu Wenting,Du Linna,Zhou Xinhui,Song Jia,Shao Chen,Li Peng,Meng Qingfan,Teng Lirong
Issue Date:January 2012
pp. 246-249
In this paper, response surface methodology was applied to optimize the fermentation medium for epothilones high-producing strain. Considering the activity of epothilones, desirability function was employed to establish the criterion for the optimization. ...
 
Characterizing web application performance for maximizing service providers' profits in clouds
Found in: Cloud and Service Computing, International Conference on
By Xi Chen,Haopeng Chen,Qing Zheng,Wenting Wang,Guodong Liu
Issue Date:December 2011
pp. 191-198
A number of challenges in implementing cloud technique related to further improving Web application performance and decreasing the cost. In order to achieve high profits, cloud-based web application providers must carefully balance cloud resources and dyna...
 
Transferable Discriminative Dimensionality Reduction
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Wenting Tu,Shiliang Sun
Issue Date:November 2011
pp. 865-868
In transfer learning scenarios, previous discriminative dimensionality reduction methods tend to perform poorly owing to the difference between source and target distributions. In such cases, it is unsuitable to only consider discrimination in the low-dime...
 
Genetic Interpretation of American Financial Bailout: Gene Recombination Model and its Application
Found in: Management of e-Commerce and e-Government, International Conference on
By Zhang Kai,Zhang Wenting
Issue Date:November 2011
pp. 76-83
This author proposes a Gene Recombination Model, encompassing the six sub-models, homologous recombination, site-specific recombination, double strand break recombination, chromosome rearrangement, template-selective recombination and transposition recombi...
 
Collaborative online learning of user generated content
Found in: Proceedings of the 20th ACM international conference on Information and knowledge management (CIKM '11)
By Guangxia Li, Kuiyu Chang, Ramesh Jain, Steven C.H. Hoi, Wenting Liu
Issue Date:October 2011
pp. 285-290
We study the problem of online classification of user generated content, with the goal of efficiently learning to categorize content generated by individual user. This problem is challenging due to several reasons. First, the huge amount of user generated ...
     
Web Multimedia Object Clustering via Information Fusion
Found in: Document Analysis and Recognition, International Conference on
By Wenting Lu,Lei Li,Tao Li,Honggang Zhang,Jun Guo
Issue Date:September 2011
pp. 319-323
Multimedia information plays an increasingly important role in humans daily activities. Given a set of web multimedia objects (images with corresponding texts), a challenging problem is how to group these images into several clusters using the available in...
 
A Non-blocking Programming Framework for Pipeline Application on Multi-core Platform
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Xiaoqiang Li, Hong An, Gu Liu, Wenting Han, Mu Xu, Wei Zhou, Qi Li
Issue Date:May 2011
pp. 25-30
Many applications meet certain programming patterns like pipeline, fork-join, do-all etc. While tools such as OS threads and OpenMP allow programmers only to express task or data parallelism, special support for programming patterns is distinctly lacking. ...
 
Sustainability Assessment of Regional Development Based on the Ecological Footprint Model: A Case Study of Ningxia Hui Autonomous Region, Northwest China
Found in: Asia-Pacific Power and Energy Engineering Conference
By Chengpeng Lu, Xingpeng Chen, Zilong Zhang, Wenting Jiao, Bing Xue, Bo Zhao
Issue Date:March 2011
pp. 1-4
NA
 
Synthesizing Enterprise Strategic Model and Business Processes in Active-i*
Found in: Enterprise Distributed Object Computing Conference Workshops, IEEE International
By Tuoye Xu, Wenting Ma, Lin Liu, Dimitris Karagiannis
Issue Date:October 2010
pp. 345-354
Modeling high-level enterprise strategies helps clarify the intentional dependencies between the organizational actors. Business process models, on the other hand, give more elaborated descriptions to the enterprise daily operations. In this paper, we aim ...
 
Optimizing Requirements Elicitation with an i* and Bayesian Network Integrated Modelling Approach
Found in: Computer Software and Applications Conference Workshops
By Haochi Wu, Lin Liu, Wenting Ma
Issue Date:July 2010
pp. 182-188
In today’s web-based environment, strategic actors collaborate and compete to further its interests and opportunities. In this paper, we propose optimizing the requirements elicitation process through the combined use of the i* modeling framework with the ...
 
Transmit diversity scheme for TDS-OFDM system over the time selective fading channel
Found in: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference (IWCMC '10)
By Changyong Pan, Jian Song, Jintao Wang, Wenting Chang
Issue Date:June 2010
pp. 251-255
Transmit diversity is an attractive technology in broadcasting environment. When it is applied in Chinese Digital Terrestrial Television Broadcasting (DTTB) system, the training sequences (TS) from the different transmit antennas for channel estimation and...
     
Large-Scale Deterministic Predictions of Nonlinear Ocean Wave-Fields
Found in: HPCMP Users Group Conference
By Wenting Xiao,Yuming Liu,Dick K. P. Yue
Issue Date:June 2010
pp. 317-324
A direct phase-resolved simulation tool for nonlinear ocean surface wave-field evolution, which is named SNOW (simulation of nonlinear ocean wave-fields), is applied to under the dynamics and to obtain a reliable prediction of realistic ocean waves. Unlike...
 
The Variable-frequency Carrier Bands Pulse Width Modulation Using in Cascade H-Bridge Converter
Found in: Electrical and Control Engineering, International Conference on
By Sun YunQuan, Sheng Ji, Yin Qiang, Pan WenTing
Issue Date:June 2010
pp. 2459-2462
In this paper, cascade H-bridge converter with Variable-Frequency Carrier Bands PWM method (VFCB-PWM) has been proposed, which is the combination of cascade structure and CPS-SPWM method. High equivalent switching frequency can be obtained with low switchi...
 
Research on the Elder Tourism Market in Shanghai
Found in: International Conference on E-Business and E-Government
By Tang Wenting,Pan HaiLan,Wu Cuihong
Issue Date:May 2010
pp. 2526-2529
The aging population is an unavoidable development trend over the world. Our country has become a member of the countries of aging population. In recent years, the governable income for the elder has been increased constantly and on that point, those perso...
 
The Application of Six Sigma Method in F Bank
Found in: International Conference on E-Business and E-Government
By Wenting Tang,Xiaobing Pei
Issue Date:May 2010
pp. 2824-2827
The aim of this passage is to analyze the factors that influence the customer satisfaction by combining with the method of Six Sigma and to give out advices on improving. The analysis of the paper is based on the phenomena that customer waiting time is too...
 
EISPI
Found in: Machine Vision and Human-machine Interface, International Conference on
By Jingchun Zhang, Juan Zhao, Wenting Cui, Baojun Gao, Qiaojin Xing
Issue Date:April 2010
pp. 135-137
This paper first gives a brief interview of AVS, especially on prediction modes of motion estimation by sub-pixel and quarter-pixel interpolation. Furthermore a new sub-pixel interpolation algorithm--EISPI based on analyzing some traditional sub-pixel inte...
 
Horizontal Spatial Prediction for High Dimension Intra Coding
Found in: Data Compression Conference
By Pin Tao, Wenting Wu, Chao Wang, Mou Xiao, Jiangtao Wen
Issue Date:March 2010
pp. 552
Intra picture coding plays an important role in video coding algorithms. In this paper, we investigate the pixel spatial correlation in HD picture and propose a macroblock level horizontal spatial prediction(HSP) based intra coding method. Because the pixe...
 
A Method of Compensation Current for DSTATCOM under Asymmetrical Network Voltage
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By YunQuan Sun, Qiang Yin, Ji Sheng, WenTing Pan
Issue Date:March 2010
pp. 141-144
A new detection method based on synchronous reference frame is proposed. A single-phase voltage is derived and used to form virtual symmetrical three-phase system. Sine signal and cosine signal are formed in this reference frame. It substitutes the low pas...
 
Research and Implementation of the Modernized GPS Signal L2C and L5
Found in: Computer and Electrical Engineering, International Conference on
By Wenting He, Qi Zhao
Issue Date:December 2009
pp. 412-415
Modern global positioning system (GPS) signals L2C and L5 have a new developmental prospect, although GPS was originally conceived for use by the military in their missions, it has become an important utility for a number of civil and commercial applicatio...
 
Investigation of Factors Impacting Thread-Level Parallelism from Desktop, Multimedia and HPC Applications
Found in: Frontier of Computer Science and Technology, Japan-China Joint Workshop on
By Yaobin Wang, Hong An, Jie Yan, Qi Li, Wenting Han, Li Wang, Gu Liu
Issue Date:December 2009
pp. 27-32
Applications of different categories contain varying levels of data, instruction and thread-level parallelism inherently. It's important to explore the potential coarse-grain thread-level parallelism in different applications to guide the computing resourc...
 
A Program Behavior Study of Block Cryptography Algorithms on GPGPU
Found in: Frontier of Computer Science and Technology, Japan-China Joint Workshop on
By Gu Liu, Hong An, Wenting Han, Guang Xu, Ping Yao, Mu Xu, Xiurui Hao, Yaobin Wang
Issue Date:December 2009
pp. 33-39
Recently many studies have been made to map cryptography algorithms onto graphics processors (GPU), and gained great performances. This paper does not focus on the performance of a specific program exploited by using all kinds of optimization methods algor...
 
The Mapping Framework and Optimizing Strategy for Block Cryptography Algorithms on Cell Broadband Engine
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Mu Xu, Hong An, Gu Liu, Yaobin Wang, Guang Xu, Ping Yao, Xiurui Hao, Wenting Han
Issue Date:December 2009
pp. 42-47
The Cell Broadband Engine is a typical heterogeneous chip multiprocessor which provides potential high performance for computing-intensive applications. Our researches focus on how to use Cell to speed up block cryptography applications. In this paper, we ...
 
Algorithm of Shot Detection Based on SVM with Modified Kernel Function
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Wenting Tan, Jianrong Cao, Hongyan Li
Issue Date:November 2009
pp. 11-14
Improving the precision of shot boundary detection is very important. This paper presents an algorithm for shot boundary detection based on SVM (support vector machine) in compressed domain. It uses the features, such as the type of macroblock, the differe...
 
Performance and Power Efficiency Analysis of the Symmetric Cryptograph on Two Stream Processor Architectures
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Guang Xu, Hong An, Gu Liu, Ping Yao, Mu Xu, Wenting Han, Xiaoqiang Li, Xiurui Hao
Issue Date:September 2009
pp. 917-920
Multimedia and some scientific applications have achieved good performance on the stream processor architecture by employing the stream programming model. In order to find out the way to accelerate the symmetric cryptograph on stream processor, we implemen...
 
Understanding Chinese Characteristics of Requirements Engineering
Found in: Requirements Engineering, IEEE International Conference on
By Lin Liu, Hongyu Zhang, Fei Peng, Wenting Ma, Yuhui Shan, Jun Xu, Tomas Burda
Issue Date:September 2009
pp. 261-266
Rapid changes in the social and technical environment bring about many new challenges to system requirements engineering, amongst which out-sourcing or off-shoring of certain design tasks to countries with more human resources and broader markets becomes p...
 
Image Edge Detecting Based on Gap Statistic Model and Relative Entropy
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Yang Qiuxia, Tang Liangrui, Dong Wenting, Sun Yi
Issue Date:August 2009
pp. 384-387
Based on Gap statistic model and relative entropy theory, a new edge detecting algorithm is presented in this paper. Firstly, to get the Gap membership functions, a dimensional various Gap plane is established by calculating Gap value per pixel. Then, acco...
 
Multidimensional Association Analysis of Web Users' Access Path for Website Design and Promotion
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Jianyuan Yan, Li Zhang, Fang Zhao, Wenting Liu, Kai Li
Issue Date:August 2009
pp. 103-107
Data mining technology makes it possible to discover knowledge from daily operational data. As we know, web log contains a lot of information about web users’ behavior on the website, for example, web users’ access path. Information discovered from those d...
 
GPU friendly fast Poisson solver for structured power grid network analysis
Found in: Proceedings of the 46th Annual Design Automation Conference (DAC '09)
By Jin Shi, Liwei Ma, Pei-Hsin Ho, Sheldon X.-D. Tan, Wenting Hou, Xiaoyi Wang, Yici Cai
Issue Date:July 2009
pp. 178-183
In this paper, we propose a novel simulation algorithm for large scale structured power grid networks. The new method formulates the traditional linear system as a special two-dimension Poisson equation and solves it using an analytical expressions based o...
     
Ocean Wave Prediction Using Large-Scale Phase-Resolved Computations
Found in: DoD High Performance Computing Modernization Program Users Group Conference (HPCMP-UGC 2009)
By Wenting Xiao, Yuming Liu,D K P Yue
Issue Date:June 2009
pp. 278-284
A direct phase-resolved simulation tool for large-scale nonlinear ocean wavefield evolution, which is named SNOW, has been developed. Unlike the phase-averaged model, it solves the primitive Euler equation and preserves the phases of the wavefield during i...
 
A Top-k Query Calculation Algorithm in Distributed Networks with Probabilistic Guarantees
Found in: Web Mining and Web-based Application, Pacific-Asia Conference on
By Wenting Yu, Yanming Shen, Keqiu Li, Junfeng Xu, Yong Li
Issue Date:June 2009
pp. 74-77
Top-k queries based on ranking elements stop query processing when the top-k ranked results can be safely determined.There are two main methods for top-k query, accurate top-k query and approximate top-k query. However,existing top-k query consumes much ba...
 
An Approximate Top-k Query Algorithm in Distributed Networks
Found in: Computational Intelligence and Natural Computing, International Conference on
By Wenhua Li, Wenting Yu, Xiao Feng
Issue Date:June 2009
pp. 417-420
In this paper, we propose a variant algorithm Rough Classification based on the Precutting parameter p (RCP). As the distribution of page requests generally follows a Zipf-like distribution, RCP precuts the object by predicting the derived bounds and so th...
 
 1  2 Next >>