Search For:

Displaying 1-40 out of 40 total
Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Shuhui Yang, Jie Wu, Fei Dai
Issue Date:December 2008
pp. 1601-1613
In this paper, we consider the issue of constructing an energy-efficient virtual network backbone in mobile ad hoc networks (MANETs) for broadcasting applications using directional antennas. In directional antenna models, the transmission/reception range i...
 
Iterative Local Solutions for Connected Dominating Set in Ad Hoc Wireless Networks
Found in: IEEE Transactions on Computers
By Jie Wu, Fei Dai, Shuhui Yang
Issue Date:May 2008
pp. 702-715
In this paper, we propose a general framework of the iterative local solution (ILS) for computing a connected dominating set (CDS) in ad hoc wireless networks, which include wireless sensor networks (WSNs) and mobile ad hoc networks (MANETs). This approach...
 
A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks
Found in: IEEE Transactions on Computers
By Jie Wu, Fei Dai
Issue Date:October 2004
pp. 1343-1354
We propose a generic framework for distributed broadcasting in ad hoc wireless networks. The approach is based on selecting a small subset of nodes to form a forward node set to carry out a broadcast process. The status of each node, forward or nonforward,...
 
A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks
Found in: Distributed Computing Systems, International Conference on
By Jie Wu, Fei Dai
Issue Date:May 2003
pp. 460
We propose a generic framework for distributed broadcasting in ad hoc wireless networks. The approach is based on selecting a small subset of hosts (also called nodes) to form a forward node set to carry out a broadcast process. The status of each node, fo...
 
Using CONDENSATION Tracking to Recover Stroke Order of Chinese Calligraphic Handwritings with CCM
Found in: Image Analysis for Multimedia Interactive Services, International Workshop on
By WU Ying-fei, Zhuang Yue-ting, PAN Yun-he, WU Fei
Issue Date:June 2007
pp. 24
Stroke order is an intrinsic writing feature which is missing in off-line handwriting. Recovering stroke order from off-line handwriting is an important task by which the visualization of writing process is possible. Chinese Calligraphic handwriting is som...
 
Mobility-Sensitive Topology Control in Mobile Ad Hoc Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Jie Wu, Fei Dai
Issue Date:June 2006
pp. 522-535
<p><b>Abstract</b>—In most existing localized topology control protocols for mobile ad hoc networks (MANETs), each node selects a few <it>logical neighbors</it> based on location information and uses a small transmission range...
 
Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks
Found in: IEEE Transactions on Mobile Computing
By Jie Wu, Fei Dai
Issue Date:May 2005
pp. 259-270
We study an efficient broadcast scheme in mobile ad hoc networks (MANETs). The objective is to determine a small set of forward nodes to ensure full coverage. We first study several methods that guarantee coverage when the local view of each node on its ne...
 
Personalized News Filtering and Summarization on the Web
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Xindong Wu,Fei Xie,Gongqing Wu,Wei Ding
Issue Date:November 2011
pp. 414-421
Information on the World Wide Web is congested with large amounts of news contents. Recommendation, filtering, and summarization of Web news have received much attention in Web intelligence, aiming to find interesting news and summarize concise content for...
 
Distributed Fiber Grating Spectrum Optimization Based on BP Neural Network
Found in: Internet Computing and Information Services, International Conference on
By Wu Zhaoxia,Zhu Guangshuai,Ma Zhenhe,Wu Fei,Chang Lei,Shi Leilei
Issue Date:September 2011
pp. 465-468
In this dissertation, the research of distributed fiber grating spectrum form optimization is given. Spatial division multiplexing transform and time division multiplexing are the advantages of distributed fiber grating so that it can highly enhance effici...
 
Finite-element Analysis of Emissivity in Cylindrical Blackbody Cavity Sensor
Found in: Internet Computing and Information Services, International Conference on
By Wu Fei,Zhao Jing,Liu Bin,Shi Leilei,Wu Zhaoxia,Zhu Guangshuai
Issue Date:September 2011
pp. 453-456
The model of cylindrical blackbody cavity sensor is established based on finite element thermal analysis method. By comparing the emissivity of cylindrical blackbody cavity and its combinations, including sphere cylindrical, conical-cylindrical, and trunca...
 
Structural Analysis of Size of Machine Vision Measuring System Based on Structured Light and Its Experimental Study
Found in: Digital Manufacturing and Automation, International Conference on
By Qinghua Wu,Xueru Wu,Fei Zhong
Issue Date:August 2011
pp. 1121-1124
To overcame the problem of low metering accuracy of on-Line automatic size measurement and the complexity of its tradition system structure. We propose a size of the machine vision measurement system based on CCD and structured Light, and study its appLica...
 
News Filtering and Summarization on the Web
Found in: IEEE Intelligent Systems
By Xindong Wu, Gong-Qing Wu, Fei Xie, Zhu Zhu, Xue-Gang Hu
Issue Date:September 2010
pp. 68-76
The news filtering and summarization (NFAS) system can automatically recognize Web news pages, retrieve each news page's title and news content, and extract key phrases. This extraction method substantially outperforms methods based on term frequency and l...
 
Design of a GALS Wrapper for Network on Chip
Found in: Computer Science and Information Engineering, World Congress on
By Wu Ning, Ge Fen, Wu Fei
Issue Date:April 2009
pp. 592-595
In this paper, we present the design of a GALS wrapper used in Network on Chip (NoC) based on standard cells. The GALS wrapper includes two communication ports, 4-phase handshake circuits, data buffer and signal synchronizer. The detailed design methodolog...
 
The Design and Implementation of WiMAX Base Station MAC Based on Intel Network Processor
Found in: Embedded Software and Systems, International Conference on
By Ming Wu, Fei Wu, Changsheng Xie
Issue Date:July 2008
pp. 350-354
The paper provides WiMAX BS (base station) MAC design, implementation discussion with performance analysis based on Intel IXP2350, which include MAC design key issues discussion, base station usage model and architecture, MAC hardware and software high lev...
 
Efficient Backbone Construction Methods in MANETs Using Directional Antennas
Found in: Distributed Computing Systems, International Conference on
By Shuhui Yang, Jie Wu, Fei Dai
Issue Date:June 2007
pp. 45
In this paper, we consider the issue of constructing an energy-efficient virtual network backbone in mobile ad hoc networks (MANETs) for broadcasting applications using directional antennas. In directional antenna models, the transmission/reception range i...
 
A Resource Discovery Algorithm with Probe Feedback Mechanism Based on Advance Reservation
Found in: Grid and Cloud Computing, International Conference on
By Jianqun Cui, Yanxiang He, Libing Wu, Fei Li
Issue Date:October 2006
pp. 281-286
Resource discovery is a challenging problem in grid computing because computational resources are large-scale geographically distributed. Traditional decentralized resource discovery algorithms often focus on the searching method in forwarding direction. R...
 
A Distributed Formation of a Virtual Backbone in MANETs Using Adjustable Transmission Ranges
Found in: Distributed Computing Systems, International Conference on
By Jie Wu, Fei Dai
Issue Date:March 2004
pp. 372-379
Recently, the use of a virtual backbone (connected dominating set) in various applications in mobile ad hoc networks (MANETs) has become popular. These applications include topology management, point and area coverage, and routing protocol design. In a mob...
 
A Generic Broadcast Protocol in Ad Hoc Networks Based on Self-Pruning
Found in: Parallel and Distributed Processing Symposium, International
By Jie Wu, Fei Dai
Issue Date:April 2003
pp. 29a
In ad hoc wireless networks, a successful broadcasting requires that the nodes forwarding the broadcast packet form a connected dominating set to ensure the coverage. An efficient broadcast method should generate a small forward node set without excessive ...
 
Using Multilevel Phase Change Memory to Build Data Storage: A Time-Aware System Design Perspective
Found in: IEEE Transactions on Computers
By Qi Wu,Fei Sun,Wei Xu,Tong Zhang
Issue Date:October 2013
pp. 2083-2095
This paper advocates a time-aware design methodology for using multilevel per cell (MLC) phase-change memory (PCM) in data storage systems such as solid-state disk and disk cache. It is well known that phase-change material resistance drift gradually reduc...
 
Localized Movement-Assisted Sensor Deployment in Wireless Sensor Networks
Found in: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference
By Shuhui Yang, Jie Wu, Fei Dai
Issue Date:October 2006
pp. 753-758
In a wireless sensor network (WSN), the sensor distribution is vital to the quality of service (QoS) of the network, because the effectiveness of the network depends on the coverage of the monitoring area. In WSNs where sensors have locomotion facilities, ...
 
Mobility-Sensitive Topology Control in Mobile Ad Hoc Networks
Found in: Parallel and Distributed Processing Symposium, International
By Jie Wu, Fei Dai
Issue Date:April 2004
pp. 28a
In most existing localized topology control protocols for mobile ad hoc networks (MANETs), each node selects a few logical neighbors based on location information, and uses a small transmission range to cover those logical neighbors. Transmission range red...
 
On Locality of Dominating Set in Ad Hoc Networks with Switch-On/Off Operations
Found in: Parallel Architectures, Algorithms, and Networks, International Symposium on
By Jie Wu, Fei Dai
Issue Date:May 2002
pp. 0085
Routing based on a connected dominating set is a promising approach, where the search space for a route is reduced to the hosts in the set. A set is dominating if all the hosts in the system are either in the set or neighbors of hosts in the set. In this p...
 
Abnormal Behavior Recognition Based on Trajectory Feature and Regional Optical Flow
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By A-Lin Hou,Jun-Liang Guo,Chong-Jin Wang,Liang Wu,Fei Li
Issue Date:July 2013
pp. 643-649
In order to recognize the human abnormal behavior by the video monitoring system, this paper proposes an abnormal behavior recognition method of trajectory characteristics and regional optical flow based on the characteristics of the two kinds. By adopting...
 
Analysis of the File System and Block IO Scheduler for SSD in Performance and Energy Consumption
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Sun Hui,Zeng Rui,Cheng Jin,Liu Lei,Wu Fei,Xie Chang Sheng
Issue Date:December 2011
pp. 48-55
SSD (Solid State Disk) is reconsidered as the next storage device, an alternative to the HDD (Hard Disk Driver). The read/write performance and energy consumption are main aspects to the users. In our experiment, we recognize that the performance and energ...
 
Image Classification Based on Dempster-Shafer Evidence Theory and Neural Network
Found in: Intelligent Systems, WRI Global Congress on
By Zhaofu Wu, Fei Gao
Issue Date:December 2010
pp. 296-298
Dempster-Shafer Evidence theory was extended from Bayes Decision, and it can combine together the certainty and uncertainty multi-source remote sensing images to effectively identify the images. Taking the results from the training of neural network as evi...
 
On the Ruin Probability for a Dependent Risk Model under the Heavy-Tailed
Found in: Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, IACIS International Symposium on
By Wang Yongmao, Shi Hanwu, Liu Suhong, Wu Fei
Issue Date:October 2010
pp. 67-70
This paper introduced the insurance company light and heavy tail of debt risk model, with assumption is negatively associated relationship. Basing on the nature of and negatively associated sequences, this paper transform different types of dependency risk...
 
The Concept of Betweenness in the Analysis of Power Grid Vulnerability
Found in: Engineering. Complexity in
By Ettore Bompard, Di Wu, Fei Xue
Issue Date:February 2010
pp. 52-54
Vulnerability analysis in power systems is a key issue in modern society and many efforts have contributed to the analysis. Recently, complex network metrics applied to assess the topological vulnerability of networked systems have been used in power syste...
 
Simulation Modeling and Analysis of Business Process
Found in: Electronic Commerce and Security, International Symposium
By Yanxiang He, Liang Zhao, Zhao Wu, Fei Li
Issue Date:May 2009
pp. 391-395
Web services composition technology is promising technology to efficiently integrate heterogeneous, distributed and legacy software system. Performance becomes the key issue when web services composition model complex and mission-critical application. The ...
 
Key Design of Control-Monitoring System of Steady High Magnetic Field Facility
Found in: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE
By Chunshan Shen, Zhongcheng Wu, Fei Shen, Jiarong Luo, Bo Lv, Jie Zhu, Chao Song, Jie Zou
Issue Date:December 2008
pp. 81-85
Steady High Magnetic Field Facility (SHMFF) is a basic tool for many scientific experiments and its control-monitoring system is the core part which supports experimental devices and subsystems for safe and reliable operation. The control-monitoring system...
 
Modeling Web Services Composition with Transaction Extension for Performance Evaluation
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Yanxiang He, Liang Zhao, Zhao Wu, Fei Li
Issue Date:December 2008
pp. 476-481
Web Services can be composed to build domain-specific application and solution. The standards of several Web services composition (WSC) are proposed, for example, WS-BPEL and WS-CDL. Moreover, there is a great demand for the performance optimization of WSC...
 
Formal Modeling of Transaction Behavior in WS-BPEL
Found in: Computer Science and Software Engineering, International Conference on
By Yanxiang He, Liang Zhao, Zhao Wu, Fei Li
Issue Date:December 2008
pp. 490-494
Web Services can be composed to build domain-specific application and solution. Some Web Services Composition (WSC) standards are proposed, for instance, WS-BPEL and WS-CDL. WS-BPEL consists of basic activity, structured activity and control-flow. It uses ...
 
Continuous Reverse k-Nearest-Neighbor Monitoring
Found in: Mobile Data Management, IEEE International Conference on
By Wei Wu, Fei Yang, Chee Yong Chan, Kian-Lee Tan
Issue Date:April 2008
pp. 132-139
The processing of a Continuous Reverse k-Nearest-Neighbor (CRkNN) query on moving objects can be divided into two sub tasks: continuous filter, and continuous refinement. The algorithms for the two tasks can be completely independent. Existing CRkNN soluti...
 
Hardware/Software Codesign ? Pedagogy for the Industry
Found in: Information Technology: New Generations, Third International Conference on
By Min He, Ming-Che Tsai, Xiaolong Wu, Fei Wang, Ramzi Nasr
Issue Date:April 2008
pp. 279-284
With the essentiality of hardware/software codesign in present and future designs, it has become more and more important to educate engineers in this area. In this paper, industry trends and expectations are investigated in the area of hardware/software co...
 
A Practical Method to Form Energy Efficient Connected -Coverage in Wireless Sensor Networks
Found in: Distributed Computing Systems Workshops, International Conference on
By Zhen Jiang, Robert Kline, Jie Wu, Fei Dai
Issue Date:July 2006
pp. 81
In the wireless sensor networks, an important issue of area coverage is to know how many sensor nodes are needed in a deployment under a certain kind of distribution. In that way, the nodes can be dense enough to form a complete and connected cover of inte...
 
An Extended Fault-Tolerant Link-State Routing Protocol in the Internet
Found in: IEEE Transactions on Computers
By Jie Wu, Fei Dai, Xiaola Lin, Jiannong Cao, Weijia Jia
Issue Date:October 2003
pp. 1298-1311
<p><b>Abstract</b>—Link-state routing protocols, such as OSPF and IS-IS, are widely used in the Internet today. In link-state routing protocols, global network topology information is first collected at each node. A shortest path tree (SP...
 
An Extended Link Reversal Protocol in Dynamic Networks
Found in: Parallel and Distributed Processing Symposium, International
By Jie Wu, Fei Dai
Issue Date:April 2003
pp. 73b
We consider the problem of maintaining routing paths between nodes in a dynamic network. Gafni and Bertsekas proposed a link reversal approach called the BG method that maintains a directed acyclic graph (DAG) with a given destination as the sink node. By ...
 
The Technique of Network Diode
Found in: Information Science and Engineering, International Conference on
By Kehe Wu, Fei Chen, Wenchao Cui
Issue Date:December 2009
pp. 1923-1926
While enterprise information improves its business productivity, it also puts forward higher requirements for enterprise information security. In order to ensure data security of enterprises' critical businesses and implement information synchronization be...
 
Cluster Supply Chain Network Operating Mechanism: Co-Competition and Interaction
Found in: Information Science and Engineering, International Conference on
By Qun Wu, Fei-long Chen
Issue Date:December 2009
pp. 4219-4222
Cluster supply chain as a new type of network organization coupling of industry clusters and supply chain. It is a combination of competition and cooperation. While in cluster supply chain that exist interaction between logistics, capital flow and informat...
 
Voltage Assignment for Soft Real-Time Embedded Systems with Continuous Probability Distribution
Found in: Real-Time Computing Systems and Applications, International Workshop on
By Meikang Qiu, Jiande Wu, Fei Hu, Shaobo Liu, Lingfeng Wang
Issue Date:August 2009
pp. 413-418
Energy saving is critical to real-time embedded systems. In many embedded systems, some tasks contain conditional instructions or operations that could have different execution times for different inputs. Due to the uncertainties in execution time of these...
 
Qphone: a quantum security VoIP phone
Found in: Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM (SIGCOMM '13)
By Baokang Zhao, Bo Liu, Chunqing Wu, Fei Wang, Jinshu Su, Shihai Sun, Wanrong Yu, Ziling Wei
Issue Date:August 2013
pp. 477-478
This work presents a novel quantum security VoIP phone, called Qphone. Qphone integrates quantum key distribution (QKD) and VoIP steganography, and achieves peer-to-peer communication with information-theoretical security (ITS) guaranteeing. Qphone consist...
     
 1