Search For:

Displaying 1-41 out of 41 total
Diurnal Forced Models for Worm Propagation Based on Conficker Dataset
Found in: Multimedia Information Networking and Security, International Conference on
By Yu Yao,Wen-long Xiang,Hao Guo,Ge Yu,Fu-xiang Gao
Issue Date:November 2011
pp. 431-435
Due to the vulnerability of computer system, Internet worm is still greatly threatenning network security. It is found that the spread of worm regularly change because of the different space distributions of hosts and this phenomenon is defined as diurnal ...
 
Semantic Consistency within Web Services Interactions
Found in: Multimedia Software Engineering, International Symposium on
By Xiang Gao, Jen-Yao Chung
Issue Date:December 2004
pp. 240-247
In this paper we create
 
Barrier Optimization for OpenMP Program
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Hongtu Ma, Rongcai Zhao, Xiang Gao, Youwei Zhang
Issue Date:May 2009
pp. 495-500
Barrier construct in OpenMP program is a directive used to remove race code before continuing. Each thread waits until all of the other threads of a team have reached the barrier region. And data dependence is a technology to find whether two statements ca...
 
A HW/SW Co-design of Execution Migration for Shared-ISA Heterogeneous Chip Multiprocessors
Found in: 2013 IEEE 8th International Conference on Networking, Architecture, and Storage (NAS)
By Hongwei Liu,Bo Sang,Jing Huang,Ji Qiu,Xiang Gao
Issue Date:July 2013
pp. 23-30
Heterogeneous multi-core processors have strong potential for performance improvement, energy efficiency and area efficiency, compared to the homogeneous multi-core processors. The present methods of execution migration for heterogeneous multi-core process...
 
Luminance and Chrominance Parallelization of H.264/AVC Decoding on a Multi-core Processor
Found in: 2013 IEEE 8th International Conference on Networking, Architecture, and Storage (NAS)
By Xiaofu Meng,Xiang Gao,Qian Yu,Shuangshuang Zhang,Xiaochun Zhang,Jing Huang
Issue Date:July 2013
pp. 252-256
This paper proposes a novel method to optimizing H.264 decoding on multi-core processors by exploiting color component level parallelism. Compared with sequential decoding and macro-block level parallelism, the proposed method achieves optimal balance betw...
 
Accurate detection of SNPs using base-specific cleavage and mass spectrometry
Found in: 2012 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
By Ruimin Sun,Xiang Gao,Nanyu Han,Qiong Wu,Yuguang Mu,Kai Tang,Xin Chen
Issue Date:October 2012
pp. 1-4
Accurate detection of single-nucleotide polymorphisms (SNPs) is crucial for the success of many downstream analyses such as clinical diagnosis, virus identification, genetic mapping and association studies. Among many others, one valuable approach for SNP ...
 
A Dispatching-Rule-Based Task Scheduling Policy for MapReduce with Multi-type Jobs in Heterogeneous Environments
Found in: 2012 Seventh ChinaGrid Annual Conference (ChinaGrid)
By Xiang Gao,Qing Chen,Yurong Chen,Qingwei Sun,Yan Liu,Mingzhu Li
Issue Date:September 2012
pp. 17-24
MapReduce has emerged as an important and widely used programming model for distributed and parallel computing, due to its ease of use, generality and scalability. This model is proposed to mainly solve large-scale data processing, i.e. data-intensive jobs...
 
Using Direct Cache Access Combined with Integrated NIC Architecture to Accelerate Network Processing
Found in: 2012 IEEE 14th Int'l Conf. on High Performance Computing and Communication (HPCC) & 2012 IEEE 9th Int'l Conf. on Embedded Software and Systems (ICESS)
By Wen Su,Longbing Zhang,Dan Tang,Xiang Gao
Issue Date:June 2012
pp. 509-515
As network speed continues to grow, new challenges of network processing are emerging. In this paper, we first study the overheads and interactions among the different steps of networking from a hardware perspective and point out that I/O and related memor...
 
Radar Management Model and Its Application in Enterprise Transformation and Upgrading
Found in: Services, IEEE Congress on
By Liang-Jie Zhang,Sheng-Ping Wu,Xiang Gao,Yu-Hui Liu,Ming-Yu Chen
Issue Date:July 2011
pp. 33-40
Enterprise management is improving its capacities, with its practice being advanced. However, it is facing greater challenge of transformation and upgrading, as the result of fiercer competition and accelerated globalization driven by global economic chang...
 
An Efficient Shared Memory Based Virtual Communication System for Embedded SMP Cluster
Found in: Networking, Architecture, and Storage, International Conference on
By Wenxuan Yin,Xiang Gao,Xiaojing Zhu,Deyuan Guo
Issue Date:July 2011
pp. 288-294
With the prevalence of multi-core processors, it is a trend that the embedded cluster deploys SMP nodes to gain more computing power. As a crucial issue, the MPI inter-process communication has been suffering the contradiction between high performance and ...
 
GPU Accelerating for Rapid Multi-core Cache Simulation
Found in: Parallel and Distributed Processing Workshops and PhD Forum, 2011 IEEE International Symposium on
By Wan Han,Long Xiang,Gao Xiaopeng,Li Yi
Issue Date:May 2011
pp. 1387-1396
To find the best memory system for emerging workloads, traces are obtained during application's execution, then caches with different configurations are simulated using these traces. Since program traces can be several gigabytes, simulation of cache perfor...
 
Equivalent Model for Calculating Short Circuit Current of Doubly Fed Wind Generator under Uninterrupted Excitation
Found in: Asia-Pacific Power and Energy Engineering Conference
By Zheng-rong Wu, Gang Wang, Hai-feng Li, Xiang Gao
Issue Date:March 2011
pp. 1-4
NA
 
From Prime Codes to Cubic Prime Sequences
Found in: Communications and Intelligence Information Security, International Conference on
By Qingge Liu, Xiang Gao
Issue Date:October 2010
pp. 211-214
From concatenation view, this letter analyzed the construction of new frequency hopping (FH) sequences–cubic prime sequences. It is concluded that cubic prime sequences can be constructed by concatenating the frequency-shifted or time-shifted versions of p...
 
Research and Design of Smart Home System Based on Zigbee Technology
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Xiang Gao, Li Zhao
Issue Date:October 2010
pp. 290-293
A system of wireless Smart home sensor network based on ZigBee technology was proposed in this paper. A common control unit and binding idea are used in design of this system, which improves the development efficiency and makes it easy to expand and upgrad...
 
Sliding Mode Formation Control of Nonholonomic Robots
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Xiang Gao, Qiuju Huang, Ming Wan, Chunxiang Liu
Issue Date:October 2010
pp. 67-71
This paper discusses a method of nonholonomic robot formation control based on leader-follower. The leader moves along a designated trajectory, the follower keeps a specified distance and angle when following the leader so as to keep a certain formation. S...
 
The Basic Tactics of Constructing the CAFA System
Found in: Education Technology and Computer Science, International Workshop on
By Liu Bin, Ren Xiang, Gao Decheng, Wang Jianguo
Issue Date:March 2010
pp. 720-723
The fact that computer is applied to educational assessment is the presence of scientization and modernization in the means and methods of education assessment, as well as the development to traditional education assessment. Take the teaching of Math in Mi...
 
An Enhanced HyperTransport Controller with Cache Coherence Support for Multiple-CMP
Found in: Networking, Architecture, and Storage, International Conference on
By Huandong Wang, Dan Tang, Xiang Gao, Yunji Chen
Issue Date:July 2009
pp. 215-218
HyperTransport link is a high performance IO interface for system connection. In this paper, the architecture of a HyperTransport interface is introduced.This HyperTransport interface realizes efficient HT-AXI bidirectional transformation, where AXI is a p...
 
Efficiency-Aware QoS DRAM Scheduler
Found in: Networking, Architecture, and Storage, International Conference on
By Menghao Su, Xiang Gao, Yunji Chen, Qi Liu, Longbing Zhang
Issue Date:July 2009
pp. 223-226
For most SoCs, off-chip DRAM is an important resource that is shared by many heterogeneous function units(FU).To meet different memory access requirements by these FUs,it is crucial that the memory subsystem is capable of providing different Quality of Ser...
 
Godson-3: A Scalable Multicore RISC Processor with x86 Emulation
Found in: IEEE Micro
By Weiwu Hu, Jian Wang, Xiang Gao, Yunji Chen, Qi Liu, Guojie Li
Issue Date:March 2009
pp. 17-29
<p>The Godson-3 microprocessor aims at high-throughput server applications, high-performance scientific computing, and high-end embedded applications. It offers a scalable network on chip, hardware support for x86 emulation, and a reconfigurable arch...
 
Anonymous ID Signature Scheme with Provable Identity
Found in: Future Generation Communication and Networking
By Xiaodong Liu, Xiang Gao
Issue Date:December 2008
pp. 183-186
In this paper, a user can login a certain system with a anonymous ID generated by Key Generate Center (KGC) and perform data signing operation. Other Members in the group, even KGC, can not reveal the real identity of the user from his anonymous ID. When d...
 
Optimal Selection of Aggregation Nodes in Sensor Networks with Time Delay Constraint
Found in: Mobile Ad-hoc and Sensor Networks, International Conference on
By Bo Sun, Sui-Xiang Gao, Zhi-Peng Jiang
Issue Date:December 2008
pp. 169-176
A critical problem in wireless sensor networks is to maximize their lifetimes. Data aggregation is an effective method to reduce redundant data and minimize the overall energy consumption. This method requires data to be delayed and processed in their path...
 
MobileTest: A Tool Supporting Automatic Black Box Test for Software on Smart Mobile Devices
Found in: Automation of Software Test, Second International Workshop on
By Jiang Bo, Long Xiang, Gao Xiaopeng
Issue Date:May 2007
pp. 8
With the development of mobile computing and pervasive computing, smart mobile devices such as PDAs or smart-phones are gradually becoming an indispensable part of our daily life. However, as the software running on these devices becomes more and more powe...
 
On the Small Sample Performance of Boosted Classifiers
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Weiliang Li, Xiang Gao, Ying Zhu, Visvanathan Ramesh, Terrance E. Boult
Issue Date:June 2005
pp. 574-581
Boosting algorithms have been widely applied in the machine vision systems. Two fundamental issues that have to be solved in these systems are how much training data and how many Boosting rounds are needed to achieve a desired performance. We view the Boos...
 
The Capability Matching of Web Services
Found in: Microelectronics Systems Education, IEEE International Conference on/Multimedia Software Engineering, International Symposium on
By Xiang Gao, Jian Yang, Mike. P. Papazoglou
Issue Date:December 2002
pp. 56
A large number of Web services are already available on the Web, and the type and number of Web services grow on a daily basis. As the Web service paradigm becomes popular and more and more applications are developed or deployed as Web services, the need f...
 
Error Analysis of Background Adaption
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Xiang Gao, T.E. Boult, Frans Coetzee, Visvanathan Ramesh
Issue Date:June 2000
pp. 1503
Background modeling is a common component in video surveillance systems and is used to quickly identify regions of interest. To increase the robustness of background subtraction techniques, researchers have developed techniques to update the background mod...
 
Dynamic Learning Style Prediction Method Based on a Pattern Recognition Technique
Found in: IEEE Transactions on Learning Technologies
By Juan Yang,Zhi Xing Huang,Yue Xiang Gao,Hong Tao Liu
Issue Date:April 2014
pp. 165-177
During the past decade, personalized e-learning systems and adaptive educational hypermedia systems have attracted much attention from researchers in the fields of computer science Aand education. The integration of learning styles into an intelligent syst...
 
Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication
Found in: 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom)
By Hien Thi Thu Truong, Xiang Gao,Babins Shrestha,Nitesh Saxena,N. Asokan,Petteri Nurmi
Issue Date:March 2014
pp. 163-171
Zero-Interaction Authentication (ZIA) refers to approaches that authenticate a user to a verifier (terminal) without any user interaction. Currently deployed ZIA solutions are predominantly based on the terminal detecting the proximity of the user's person...
   
POSTER: “Pseudomonas fluorescens Strain NCIMB 11764, a unique bacterium with cyanide adaptation features”
Found in: 2013 IEEE 3rd International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)
By Claudia Vilo,Daniel Kunz,Xiang Gao,Qunfeng Dong
Issue Date:June 2013
pp. 1
Cyanide is a potent poison that can be found naturally in some environments, and released as a waste in human activities. Cyanide waste is indeed a public health and an environmental concern. Its removal is an important issue, which has been addressed by c...
   
The Application of Self-Healing Technology in Smart Grid
Found in: Asia-Pacific Power and Energy Engineering Conference
By Xiang Gao, Xin Ai
Issue Date:March 2011
pp. 1-4
NA
 
Optimized Stage Ratio of Tapered CMOS Inverters for Minimum Power and Mismatch Jitter Product
Found in: VLSI Design, International Conference on
By Ramen Dutta, Tarun Kanti Bhattacharyya, Xiang Gao, Eric A. M. Klumperink
Issue Date:January 2010
pp. 152-157
In this paper, an optimum stage ratio (tapering factor) for a tapered CMOS inverter chain is derived to minimize the product of power dissipation and jitter variance due to device mismatch. Analysis shows that this optimum stage ratio (2.4) is lower than t...
 
Optimal Personal Comfort Management Using SPOT+
Found in: Proceedings of the 5th ACM Workshop on Embedded Systems For Energy-Efficient Buildings (BuildSys'13)
By Peter Xiang Gao, S. Keshav
Issue Date:November 2013
pp. 1-8
We present SPOT+, a system that allows office workers to optimally balance between heating energy consumption and personal thermal comfort. In prior work, we described SPOT: a smart personal thermal control system based on reactive control [8]. In contrast...
     
It's not easy being green
Found in: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication (SIGCOMM '12)
By Andrew R. Curtis, Bernard Wong, Peter Xiang Gao, Srinivasan Keshav
Issue Date:August 2012
pp. 211-222
Large-scale Internet applications, such as content distribution networks, are deployed across multiple datacenters and consume massive amounts of electricity. To provide uniformly low access latencies, these datacenters are geographically distributed and t...
     
A multi-FPGA based platform for emulating a 100m-transistor-scale processor with high-speed peripherals (abstract only)
Found in: Proceedings of the 18th annual ACM/SIGDA international symposium on Field programmable gate arrays (FPGA '10)
By Dan Tang, Huandong Wang, Weiwu Hu, Xiang Gao, Yunji Chen
Issue Date:February 2010
pp. 283-283
This paper describes a multi-FPGA based platform for emulating the Loongson-2G micro-processor on different mother boards. This platform is developed targeting at verification and evaluation of the Loongson-2G micro-processor, which is the next generation ...
     
Algorithms for balancing energy consumption in wireless sensor networks
Found in: Proceeding of the 1st ACM international workshop on Foundations of wireless ad hoc and sensor networking and computing (FOWANC '08)
By Bo Sun, Fei Huang, Rui Chi, Sui-Xiang Gao
Issue Date:May 2008
pp. 1-2
Prolonging the lifetime of network is one of the most important designing objectives in wireless sensor networks (WSNs). Keeping up the uniform energy consumption of various sensor nodes is an efficient approach to prolong the lifetime of WSNs. This paper ...
     
Recaption Cost Based LFU Image Cache Algorithm and Application in WAP Browser
Found in: Convergence Information Technology, International Conference on
By Hui-guang Chen, Yun-xiang Gao, Chuang-bai Xiao, Chao-qin Gao, Li-qing Liu
Issue Date:November 2009
pp. 916-920
This paper presents the idea of recaption cost to characterize WAP sources of images and improve the classic cache removal policy. Then It gets a new policy of image caches, LFU based on recaption cost; using the algorithm in the wap browser, It adopts the...
 
The Worm Propagation Model with Pulse Quarantine Strategy
Found in: Multimedia Information Networking and Security, International Conference on
By Yu Yao, Hao Guo, Fu-xiang Gao, Ge Yu
Issue Date:November 2010
pp. 269-273
In this paper, a worm propagation model with pulse quarantine strategy is proposed to control the spread of the worm. This model which combines both the pulse quarantine and the constant quarantine strategy not only describes the propagation of the worm we...
 
Modeling the Chaotic Dynamics of Early Worm Propagation
Found in: Multimedia Information Networking and Security, International Conference on
By Yu Yao, Wei Ying, Fu-xiang Gao, Ge Yu
Issue Date:November 2009
pp. 393-397
A chaotic worm propagation model is proposed to analyze early worm propagation process in this paper. Worm propagation is very complex, whose major transitions are between regular cycles and irregular, possibly chaotic epidemics. This paper deals with a di...
 
A Signature-Behavior-Based P2P Worm Detection Approach
Found in: Hybrid Intelligent Systems, International Conference on
By Yu Yao, Yong Li, Fu-xiang Gao, Ge Yu
Issue Date:August 2009
pp. 391-395
P2P worm based on loopholes spreading in peer-to-peer network is a serious security threat. According to the characteristics of P2P worms, a signature-behavior-based P2P worm detection approach detecting the known P2P worm based on characteristic string ma...
 
Detecting and Defending against Worm Attacks Using Bot-honeynet
Found in: Electronic Commerce and Security, International Symposium
By Yu Yao, Jun-wei Lv, Fu-xiang Gao, Ge Yu, Qing-xu Deng
Issue Date:May 2009
pp. 260-264
We proposed a worm detection and defense system named bot-honeynet in this paper, which combines the best features of honeynet, anomaly detection and botnet. The combination of honeynet and anomaly detection system offers a tradeoff between false positive ...
 
Anomaly Intrusion Detection Approach Using Hybrid MLP/CNN Neural Network
Found in: Intelligent Systems Design and Applications, International Conference on
By Yu Yao, Yang Wei, Fu-xiang Gao, Ge Yu
Issue Date:October 2006
pp. 1095-1102
An anomaly intrusion detection approach based on Hybrid MLP/CNN (Multi-layer Perceptron / Chaotic Neural Network) neural network is proposed in this paper. Most anomaly detection approaches using MLP can detecting novel real-time attacks, but still have hi...
 
Research on Network Security System Based on Intrusion Detection
Found in: International Conference on E-Business and E-Government
By Li Gui-xiang,Gao Wei-min
Issue Date:May 2010
pp. 2096-2100
This paper introduces network security System based on intrusion detection technique. Describe the definition and the classification of intrusion dectection introduce the gengric intrusion detection model, Then we design a network security system based on ...
 
 1