Search For:

Displaying 1-50 out of 84 total
Sequential particle swarm optimization for visual tracking
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Xiaoqin Zhang, Weiming Hu, Steve Maybank, Xi Li, Mingliang Zhu
Issue Date:June 2008
pp. 1-8
Visual tracking usually involves an optimization process for estimating the motion of an object from measured images in a video sequence. In this paper, a new evolutionary approach, PSO (particle swarm optimization), is adopted for visual tracking. Since t...
 
Graph Based Discriminative Learning for Robust and Efficient Object Tracking
Found in: Computer Vision, IEEE International Conference on
By Xiaoqin Zhang, Weiming Hu, Steve Maybank, Xi Li
Issue Date:October 2007
pp. 1-8
Object tracking is viewed as a two-class 'one-versus-rest' classification problem, in which the sample distribution of the target is approximately Gausian while the background samples are often multimodal. Based on these special properties, we propose a gr...
 
Adaptive Distributed Intrusion Detection Using Parametric Model
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Jun Gao, Weiming Hu, Xiaoqin Zhang, Xi Li
Issue Date:September 2009
pp. 675-678
Due to the increasing demands for network security, distributed intrusion detection has become a hot research topic in computer science. However, the design and maintenance of the intrusion detection system (IDS) is still a challenging task due to its dyna...
 
Image spam filtering using Fourier-Mellin invariant features
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Haiqiang Zuo, Xi Li, Ou Wu, Weiming Hu, Guan Luo
Issue Date:April 2009
pp. 849-852
Image spam is a new obfuscating method which spammers invented to more effectively bypass conventional text based spam filters. In this paper, a framework for filtering image spams by using the Fourier-Mellin invariant features is described. Fourier-Mellin...
 
Detecting Associations in Large Dataset on MapReduce
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Dong Dai, Xi Li, Chao Wang, Junneng Zhang, Xuehai Zhou
Issue Date:July 2013
pp. 1788-1794
In daily life, we are surrounded by all kinds of data. How to find the relationship between these data has become one of the most challenges before the data scientists. In 2011, David N. Reshef etc. took a great leap on solving this problem. They has prove...
 
Segment Model Based Vehicle Motion Analysis
Found in: Advanced Video and Signal Based Surveillance, IEEE Conference on
By Pengfei Zhu, Weiming Hu, Xi Li, Li Li
Issue Date:September 2009
pp. 514-517
Motion analysis is a very attractive research direction in computer vision field. In this paper, we propose a framework for analyzing real vehicle motion in visual traffic surveillance by using Segment Model (SM), which is a kind of probabilistic model. SM...
 
Clustering High-frequency Stock Data for Trading Volatility Analysis
Found in: Machine Learning and Applications, Fourth International Conference on
By Xiao-Wei Ai, Tianming Hu, Xi Li, Hui Xiong
Issue Date:December 2010
pp. 333-338
This paper proposes a Realized Trading Volatility (RTV) model for dynamically monitoring anomalous volatility in stock trading. Specifically, the RTV model first extracts the sequences for price volatility, volume volatility, and realized trading volatilit...
 
Numerical Simulation of Nonliner Wave Propagating in Flume
Found in: International Conference on Natural Computation
By Su-xiang Zhang, Xi Li
Issue Date:October 2008
pp. 649-653
The convention method of testing breakwaters in flume by physical model was replaced by purely numerical model. A Bretschneider/Mitsuyasu spectrum wave was generated in numerical flume, and the design of breakwater is in accordance with Code of Hydrology f...
 
Visual tracking via incremental Log-Euclidean Riemannian subspace learning
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Xi Li, Weiming Hu, Zhongfei Zhang, Xiaoqin Zhang, Mingliang Zhu, Jian Cheng
Issue Date:June 2008
pp. 1-8
Recently, a novel Log-Euclidean Riemannian metric [28] is proposed for statistics on symmetric positive definite (SPD) matrices. Under this metric, distances and Riemannian means take a much simpler form than the widely used affine-invariant Riemannian met...
 
A Coarse-to-Fine Strategy for Vehicle Motion Trajectory Clustering
Found in: Pattern Recognition, International Conference on
By Xi Li, Weiming Hu, Wei Hu
Issue Date:August 2006
pp. 591-594
High-level semantic understanding of vehicle motion behaviors is often based on vehicle motion trajectory clustering. In this paper, we propose an effective trajectory clustering framework in which a coarse-to-fine strategy is taken. Our framework consists...
 
A novel spectrum handoff management scheme based on SVM in cognitive radio networks
Found in: Software Maintenance and Reengineering, European Conference on
By Jinghua Guo, Hong Ji, Yi Li, Xi Li
Issue Date:August 2011
pp. 645-649
Cognitive radio networks bring spectrum access opportunities to SUs(Second Users) when primary users would not use this spectrum so as to enhance the resource utilization. The SUs have to change spectrum channel no matter when and where the PU(Primary User...
 
QoS-Driven Service Composition with Multiple Flow Structures
Found in: Services Computing, IEEE International Conference on
By Wen-jun Li,Xi Li,Xiao-jun Liang,Xiao-cong Zhou
Issue Date:July 2011
pp. 362-369
With the increasing number of functionally similar services deployed over the Internet, QoS (Quality of Service) plays a more and more important role on deciding which component services should be selected to satisfy the quality requirements for a composit...
 
The Color Components' Computing on Different Color Spaces and the Using for Image Segmentation
Found in: Multimedia Information Networking and Security, International Conference on
By Xi Li,Hang Dai
Issue Date:November 2011
pp. 29-32
The image segmentation is an important using in the computer image processing, and there are many different processing methods. In this paper, authors proposed a new method: the color components' computing on the different color spaces. Based the method an...
 
The Color Components' Exchanging on Different Color Spaces and the Using for Image Segmentation
Found in: Intelligence Information Processing and Trusted Computing, International Symposium on
By Xi Li,Hang Dai
Issue Date:October 2011
pp. 123-126
The image segmentation is an important using in the computer image processing. This paper proposed a new method: the color components' exchanging on the different color spaces. Based the method and combine with other traditional image segmentation methods,...
 
A Novel CMOS Current Controlled Conveyor II and Its Applications
Found in: Intelligent Computation Technology and Automation, International Conference on
By Yan-hui Xi, Li Liu
Issue Date:October 2008
pp. 7-10
A novel translinear CMOS current controlled conveyor II(CCCII) is presented. The principle of the CCCII circuit and its implementation in CMOS process are described. Then, the application of CCCII to active simulated inductance and active filter is present...
 
Contextual Hypergraph Modeling for Salient Object Detection
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Xi Li,Yao Li,Chunhua Shen,Anthony Dick,Anton Van Den Hengel
Issue Date:December 2013
pp. 3328-3335
Salient object detection aims to locate objects that capture human attention within images. Previous approaches often pose this as a problem of image contrast analysis. In this work, we model an image as a hyper graph that utilizes a set of hyper edges to ...
 
Layered fault management scheme for end-to-end transmission in internet of things
Found in: Software Maintenance and Reengineering, European Conference on
By Xi Li,Hong Ji,Yi Li
Issue Date:August 2011
pp. 1021-1025
Internet of things (IoT) network makes the interaction between people and things more active and provides the connection among different existing networks. To ensure the reliability of end-to-end transmission through the hierarchical networks, fault manage...
 
Modeling and analysis of dynamic spectrum allocation in high-speed railways
Found in: Software Maintenance and Reengineering, European Conference on
By Liang Chen, Hong Ji, Yi Li, Xi Li
Issue Date:August 2011
pp. 1191-1195
Chinese Train Control System (CTCS) is based on mobile communication, which the key problem is how to support reliability and security of control information transmission to improve track utilization and enhance train safety. In this paper, we firstly prop...
 
Shape Constancy Computation Based on Visual Perception Theory
Found in: Innovative Computing ,Information and Control, International Conference on
By Xi Li, Bing Li, De Xu, Rui Beijing Lu
Issue Date:September 2007
pp. 506
This paper presents a computable model for shape constancy. In this approach, object shape transformation, which caused by depth in 2-D image, can be recovered. And in this paper, we used the visual psychology theory to solve computer vision and image proc...
 
Application of Shuffled Frog Leaping Algorithm and Wavelet Neural Network in Sound Source Location
Found in: Information Science and Engineering, International Conference on
By Feng Hu, Rui-Yu Liang, Di-Xi Li, Li Zhao
Issue Date:December 2009
pp. 3600-3604
Propose a wavelet neural network (WNN) sound source model based on Shuffled Frog Leaping Algorithm (SFLA). Utilize frog leaping algorithm to optimize weights and thresholds of WNN, obtain initial weights and thresholds possessing certain ergodicity and the...
 
Static or Dynamic: Trade-Offs for Task Dependency Analysis for Heterogeneous MPSoC
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Qi Guo, Chao Wang, Xuehai Zhou, Xi Li
Issue Date:July 2013
pp. 903-910
Out-of-order execution scheme is one of the most promising technologies for task level parallelization in MPSoC design paradigms. However, it still poses a significant challenge to efficiently analyze the inter-task dependencies. This paper applies a tradi...
 
iVMp: An Interactive VM Placement Algorithm for Agile Capital Allocation
Found in: 2013 IEEE 6th International Conference on Cloud Computing (CLOUD)
By Xi Li,Anthony Ventresque,Nicola Stokes,James Thorburn,John Murphy
Issue Date:June 2013
pp. 950-951
Server consolidation is an important problem in any enterprise, where capital allocators (CAs) must approve any cost saving plans involving the acquisition or allocation of new assets and the decommissioning of inefficient assets. Our paper describes iVMp ...
 
SOBA: A Services-Oriented Browser Architecture with Distributed URL-Filtering Mechanisms for Teenagers
Found in: 2013 IEEE World Congress on Services (SERVICES)
By Aili Wang,Chao Wang,Xi Li,Xuehai Zhou
Issue Date:June 2013
pp. 67-74
In order to protect the teenagers in online cyberspace, this paper presents SOBA, novel services-oriented internet browser architecture with distributed filtering mechanisms. SOBA is the first literature that introduces SOA concepts into the web browser de...
 
SmartClass: A Services-Oriented Approach for University Resource Scheduling
Found in: 2013 IEEE International Conference on Services Computing (SCC)
By Aili Wang,Chao Wang,Xi Li,Xuehai Zhou
Issue Date:June 2013
pp. 745-746
Classroom scheduling problem has long been proven to be a NP-Complete problem. This paper presents a novel services-oriented scheduling approach. Regarding each type of resource as a service, Smart Class originally introduces SOA into this problem to effic...
 
Evaluating user-centric multihomed flow management in multi-user scenarios
Found in: 2013 IEEE 14th International Symposium on
By Xi Li,Olivier Mehani,Ramon Aguero,Umar Toseef,Yasir Zaki,Carmelita Gorg
Issue Date:June 2013
pp. 1-7
Modern mobile devices comprise multiple interfaces for heterogeneous network technologies. However, currently implemented mechanisms to decide which one(s) to use and distribute application flows accordingly (i.e., solving the multihomed flow management pr...
   
An Incremental DPMM-Based Method for Trajectory Clustering, Modeling, and Retrieval
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Weiming Hu, Xi Li, Guodong Tian,S. Maybank, Zhongfei Zhang
Issue Date:May 2013
pp. 1051-1065
Trajectory analysis is the basis for many applications, such as indexing of motion events in videos, activity recognition, and surveillance. In this paper, the Dirichlet process mixture model (DPMM) is applied to trajectory clustering, modeling, and retrie...
 
Incremental Learning of 3D-DCT Compact Representations for Robust Visual Tracking
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Xi Li,A. Dick, Chunhua Shen,A. van den Hengel, Hanzi Wang
Issue Date:April 2013
pp. 863-881
Visual tracking usually requires an object appearance model that is robust to changing illumination, pose, and other factors encountered in video. Many recent trackers utilize appearance samples in previous frames to form the bases upon which the object ap...
 
Single and Multiple Object Tracking Using Log-Euclidean Riemannian Subspace and Block-Division Appearance Model
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Weiming Hu, Xi Li, Wenhan Luo, Xiaoqin Zhang,S. Maybank, Zhongfei Zhang
Issue Date:December 2012
pp. 2420-2440
Object appearance modeling is crucial for tracking objects, especially in videos captured by nonstationary cameras and for reasoning about occlusions between multiple moving objects. Based on the log-euclidean Riemannian metric on symmetric positive defini...
 
Behavior Aware Data Locality for Caches
Found in: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS)
By Gangyong Jia,Xi Li,Chao Wang,Xuehai Zhou,Zongwei Zhu
Issue Date:December 2012
pp. 514-521
Optimizing cache performance through improving data locality has been receiving a lot of attention. However, none of the existing approaches can combine each task's behavior to optimize data locality for caches. We present a behavior aware data locality (B...
 
Sedna: A Memory Based Key-Value Storage System for Realtime Processing in Cloud
Found in: 2012 IEEE International Conference on Cluster Computing Workshops and Posters (CLUSTER WORKSHOPS)
By Dong Dai,Xi Li,Chao Wang,Mingming Sun,Xuehai Zhou
Issue Date:September 2012
pp. 48-56
Comparing with the traditional disk based distributed storage system, RAM based storage has been proven to be an effective way to accelerate real time applications processing speed. In this paper, we propose a memory based distributed Cloud storage system ...
 
DTS: Using Dynamic Time-Slice Scaling to Address the OS Problem Incurred by DVFS
Found in: 2012 IEEE International Conference on Cluster Computing Workshops and Posters (CLUSTER WORKSHOPS)
By Gangyong Jia,Xuhong Gao,Xi Li,Chao Wang,Xuehai Zhou
Issue Date:September 2012
pp. 65-72
Dynamic voltage and frequency scaling (DVFS) has been the most useful technology to reduce power consumption, but it causes unpredictable program performance decreasing and unfair performance sharing among threads, which may render performance analysis, op...
 
Memory Affinity: Balancing Performance, Power, Thermal and Fairness for Multi-core Systems
Found in: 2012 IEEE International Conference on Cluster Computing (CLUSTER)
By Gangyong Jia,Xi Li,Chao Wang,Xuehai Zhou,Zongwei Zhu
Issue Date:September 2012
pp. 605-609
Main memory is expected to grow significantly in both speed and capacity for it is a major shared resource among cores in a multi-core system, which will lead to increasing power consumption. Therefore, it is critical to address the power issue without ser...
 
Cloud Based Short Read Mapping Service
Found in: 2012 IEEE International Conference on Cluster Computing (CLUSTER)
By Dong Dai,Xi Li,Chao Wang,Xuehai Zhou
Issue Date:September 2012
pp. 601-604
Bioinformatics is an emerging field with seemingly limitless possibilities for advances in numerous scientific research and applications domains. In this paper, we summaries the explosive cutting-edge acceleration engines for the emerging short read mappin...
 
Cache Promotion Policy Using Re-reference Interval Prediction
Found in: 2012 IEEE International Conference on Cluster Computing (CLUSTER)
By Gangyong Jia,Xi Li,Chao Wang,Xuehai Zhou,Zongwei Zhu
Issue Date:September 2012
pp. 534-537
The last-level cache (LLC) mitigates the long latencies of memory access in today's chip multi-core processor (CMP). The promotion policy in the LLC largely affects cache efficiency, while an inappropriate promotion policy may lead useless blocks to remain...
 
Phase Detection for Loop-Based Programs on Multicore Architectures
Found in: 2012 IEEE International Conference on Cluster Computing (CLUSTER)
By Chao Wang,Xi Li,Dong Dai,Gangyong Jia,Xuehai Zhou
Issue Date:September 2012
pp. 584-587
Phase detection and behavior analysis have been major concerned to improve the performance as well as the system throughputs. However, for the distributed acceleration engines, the execution among different phases is much more difficult to be analyzed, esp...
 
Frequency Affinity: Analyzing and Maximizing Power Efficiency in Multi-core Systems
Found in: 2012 IEEE 20th International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS)
By Gangyong Jia,Xi Li,Chao Wang,Xuehai Zhou,Zongwei Zhu
Issue Date:August 2012
pp. 495-497
Performance optimization and energy efficiency are the major challenges in multi-core system design. Of the state-of-the-art approaches, cache affinity aware scheduling and techniques based on dynamic voltage frequency scaling (DVFS) are widely applied to ...
 
Analyzing Parallelization and Program Performance in Heterogeneous MPSoCs
Found in: 2012 IEEE 20th International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS)
By Chao Wang,Xi Li,Junneng Zhang,Gangyong Jia,Peng Chen,Xuehai Zhou
Issue Date:August 2012
pp. 489-491
In this paper we extend and analyze Amdahl's law to general heterogeneous MPSoC era, to find out how the speedup is affected by the parameters, including amount and speedup for microprocessors and accelerators, as well as the task partition characteristics...
 
Non-sparse linear representations for visual tracking with online reservoir metric learning
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Xi Li, Chunhua Shen, Qinfeng Shi,A. Dick,A. van den Hengel
Issue Date:June 2012
pp. 1760-1767
Most sparse linear representation-based trackers need to solve a computationally expensive l i -regularized optimization problem. To address this problem, we propose a visual tracker based on non-sparse linear representations, which admit an efficient clos...
 
FPM: A Flexible Programming Model for MPSoC on FPGA
Found in: 2012 26th IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)
By Chao Wang,Xi Li,Junneng Zhang,Peng Chen,Xiaojing Feng,Xuehai Zhou
Issue Date:May 2012
pp. 477-484
This paper proposes a flexible programming model (FPM), which addresses the automatic parallel execution for functional tasks on heterogeneous multiprocessors. Guided by the simply annotated source codes, a front-end source to source compiler is provided t...
 
Detecting Data Hazards in Multi-Processor System-on-Chips on FPGA
Found in: 2012 26th IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)
By Chao Wang,Xi Li,Peng Chen,Xiaojing Feng,Junneng Zhang,Xuehai Zhou
Issue Date:May 2012
pp. 282-287
This paper presents a novel data hazards detecting engine, task score boarding, which applies instruction level score boarding algorithm to reconfigurable MPSoC on FPGA for out-of-order task execution. Task score boarding can detect inter-task data depende...
 
Research on Remote Collaborative Engineering Practices for Master of Software Engineering Based on Cloud Computing Environment
Found in: Software Engineering Education and Training, Conference on
By Qing Ding,Xi Li,Ye Liu,Zhu Shi
Issue Date:April 2012
pp. 110-114
This paper describes the development and implementation of a cloud computing-based remote collaborative system for performing practices in basic IT software engineering courses. In cloud computing environment, the features of remote collaborative engineeri...
 
Graph mode-based contextual kernels for robust SVM tracking
Found in: Computer Vision, IEEE International Conference on
By Xi Li,Anthony Dick,Hanzi Wang,Chunhua Shen,Anton van den Hengel
Issue Date:November 2011
pp. 1156-1163
Visual tracking has been typically solved as a binary classification problem. Most existing trackers only consider the pairwise interactions between samples, and thereby ignore the higher-order contextual interactions, which may lead to the sensitivity to ...
 
Spring model-based call admission control mechanism for high-speed railway environment
Found in: Software Maintenance and Reengineering, European Conference on
By Yisheng Zhao, Xi Li, Hong Ji
Issue Date:August 2011
pp. 1196-1200
Call admission control in mobility environment is a challenging issue. For high-speed railway environment, call admission control mechanism needs to be designed in order to admit more users when system bandwidth resource becomes scare. In this paper, a cal...
 
A Deadline Satisfaction Enhanced Workflow Scheduling Algorithm
Found in: 19th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2011)
By Xi Li, Zhigang Hu, Chaokun Yan
Issue Date:February 2011
pp. 55-61
Meeting users' deadline constraint is usually the most important goal of workflow scheduling in Grid environment. In order to consider the dynamism of Grid resource, we adopted a stochastic model to describe dynamic workloads of Grid resources. A concept c...
 
The Color Components' Exchanging on Different Color Spaces for Image Segmentation of Hematocyte
Found in: Multimedia Information Networking and Security, International Conference on
By Hang Dai, Xi Li
Issue Date:November 2010
pp. 10-13
Image segmentation of hematocyte is a practice ofcomputer medical detection which is based on the medicalcharacteristics of hematocyte, the Computer Graphics, andImage Segmentation. In this paper, we have proposed anew color components’ exchanging method o...
 
The Color Components' Computing on Different Color Spaces for Image Segmentation of Hematocyte
Found in: Intelligence Information Processing and Trusted Computing, International Symposium on
By Hang Dai, Xi Li
Issue Date:October 2010
pp. 75-78
Hematocytes image segmentation is a practice of computer medical detection which is based on the medical characteristics of blood cells, the Computer Graphics, and Image Segmentation. In this paper, we have proposed a new color components’ computing method...
 
Semi-supervised Trajectory Learning Using a Multi-Scale Key Point Based Trajectory Representation
Found in: Pattern Recognition, International Conference on
By Yang Liu, Xi Li, Weiming Hu
Issue Date:August 2010
pp. 3525-3528
Motion trajectories contain rich high-level semantic information such as object behaviors and gestures, which can be effectively captured by supervised trajectory learning. However, it is usually a tough task to obtain a large number of high-quality manual...
 
Study on Stability of Machining Center Spindle System Based on Vector Control
Found in: Electrical and Control Engineering, International Conference on
By Yi Dai, Hang-jun Zhang, Xi Li
Issue Date:June 2010
pp. 2128-2134
Based on the theory of vector control and combined with induction motor spindle system, we use Roth Criterion to analyze and calculate the parameter setting of the system transfer function for the stability analysis. And then the simulation verification wa...
 
Interconnecting Approach of Train Network in Marshalling
Found in: e-Education, e-Business, e-Management and e-Learning, International Conference on
By Guoqiang Cai, Xi Li, Limin Jia, Yong Qin, Liming Zhou
Issue Date:January 2010
pp. 655-659
Trains marshalling leads to the changes among the train communication networks(TCN)of the different vehicles. It’s required that the trianbus technology should be adopted to those changes by Rail transport, which means that the trianbus can be connected an...
 
An Open Laboratory Management System Based on Fingerprints Recognition
Found in: Computational Intelligence and Design, International Symposium on
By Niu Wenliang, Han Xi, Li Zheying, Wang Shuying
Issue Date:December 2009
pp. 510-512
Focuses on the demand of the opening administration for the laboratory in high school, combined with the fingerprint recognition technology, this paper designs a universal laboratory management system, which contains checking on work attendance, students i...
 
 1  2 Next >>