Search For:

Displaying 1-12 out of 12 total
Design of a GALS Wrapper for Network on Chip
Found in: Computer Science and Information Engineering, World Congress on
By Wu Ning, Ge Fen, Wu Fei
Issue Date:April 2009
pp. 592-595
In this paper, we present the design of a GALS wrapper used in Network on Chip (NoC) based on standard cells. The GALS wrapper includes two communication ports, 4-phase handshake circuits, data buffer and signal synchronizer. The detailed design methodolog...
 
Application of Cloud Storage in Traffic Video Detection
Found in: Computational Intelligence and Security, International Conference on
By Ru Xue,Zong-Sheng Wu,A-Ning Bai
Issue Date:December 2011
pp. 1294-1297
Cloud storage is a hot topic in the field of research and applications. At present, there has been a lot of attention on its application in video detection. Through the cloud infrastructure and utilization of virtualization and distributed computing techni...
 
Mobile Grid Routing Algorithm in Mobile Ad Hoc Networks with Obstacles
Found in: Semantics, Knowledge and Grid, International Conference on
By Di Wu, Ning Tong, Keqiu Li
Issue Date:November 2006
pp. 12
Mobile grid provides mobile devices with a high reliability, performance and cost-efficiency. Physical limitations of the mobile devices make necessary the adaptation of the services that mobile grid can provide to the mobile devices. In the paper, we prop...
 
Parallelization Methods for Edge Extraction Applied to Chip Multiprocessor Clusters
Found in: 2012 IEEE 12th International Conference on Computer and Information Technology (CIT)
By Guo Cheng,Luo Chen,Qiuyun Wu,Ning Jing
Issue Date:October 2012
pp. 156-162
As the parallel computing technologies become mature, many computationally intensive and/or data intensive algorithms could be improved with parallelization methods. In this paper, we improve the performance of the edge extraction algorithmic program by pa...
 
A Coverage-Driven Verification Platform for Evaluating NoC Performance and Test Structure
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Zhang Ying,Wu Ning,Ke Xiazhi,Ge Fen
Issue Date:March 2012
pp. 261-265
NoC (Network-on-Chip) has been proposed as a new solution to deal with the global communication problem of complex SoC(System-on-Chip). An evaluation tool is essential for optimizing the NoC design, through which the functionality and performance of the No...
 
Humanistic Study on the Relationship between Knowledge Management and Technology
Found in: Information Technology, Computer Engineering and Management Sciences, International Conference of
By Yulin Wu,Ning Liu,Ruiling Liu
Issue Date:September 2011
pp. 168-170
Recently, more and more attentions are paid on the knowledge management in business and academic communities. The article begins with a brief introduction of knowledge management and definition of technology. Then the relationship between modern technology...
 
Document Image Retrieval with Local Feature Sequences
Found in: Document Analysis and Recognition, International Conference on
By Jilin Li, Zhi-Gang Fan, Yadong Wu, Ning Le
Issue Date:July 2009
pp. 346-350
In recent years, many document image retrieval algorithms have been proposed. However, most of the current approaches either need good quality images or depend on the page layout structure. This paper presents a fast, accurate and OCR-free image retrieval ...
 
A Novel Cryptographic Algorithm Based on Iris Feature
Found in: Computational Intelligence and Security, International Conference on
By Xiukun Li, Xiangqian Wu, Ning Qi, Kuanquan Wang
Issue Date:December 2008
pp. 463-466
Biometric cryptography is a technique using biometric features to encrypt the data, which can improve the security of the encrypted data and overcome the shortcomings of the traditional cryptography. This paper proposes a novel biometric cryptographic algo...
 
A Novel Cryptosystem Based on Iris Key Generation
Found in: International Conference on Natural Computation
By Xiangqian Wu, Ning Qi, Kuanquan Wang, David Zhang
Issue Date:October 2008
pp. 53-56
Biometric cryptography is a technique using biometric features to encrypt data, which can improve the security of the encrypted data and overcome the shortcomings of the traditional cryptography. This paper proposes a novel biometric cryptosystem based on ...
 
An Ontology Modeling Method in Semantic Composition of Web Services
Found in: E-Commerce Technology for Dynamic E-Business, IEEE International Conference on
By Juntao Cui, Jiamao Liu, Yujin Wu, Ning Gu
Issue Date:September 2004
pp. 270-273
The automatic composition of Web services requires the existing services to be encoded in a semantic form, such as ontology. If Web services are represented with ontology, we can automatic compose Web services by means of their semantics. Ontology modeling...
 
Nondestructive Evaluation of MEMS Devices by Laser Confocal Measurements
Found in: MEMS, NANO, and Smart Systems, International Conference on
By Xiao-ming WU, Ning-xin ZHANG, Tian-ling REN, Li-tian LIU
Issue Date:July 2005
pp. 69-76
<p>This paper proposes an innovative nondestructive evaluation (NDE) setup for MEMS mechanical deformation measurements. The setup is based on an active laser confocal displacement meter, and a computer controlled motor-driven 3-dimension (3D) stage....
 
Design and Realization of Embedded Image Transmission System Based on GPRS
Found in: Computational Intelligence for Modelling, Control and Automation, International Conference on
By Zhang Yong-qiang, Zhao Ji-chun, Wu ning
Issue Date:December 2006
pp. 39
The embedded image transmission system introduced in this paper is realized in Advanced RISC Machines (ARM9) platform and embedded Linux system which has excellent network function, and it is connected to net through the General Packet Radio Service (GPRS)...
 
 1