Search For:

Displaying 1-50 out of 51 total
Multilabel Learning via Random Label Selection for Protein Subcellular Multilocations Prediction
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Xiao Wang, Guo-Zheng Li
Issue Date:March 2013
pp. 436-446
Prediction of protein subcellular localization is an important but challenging problem, particularly when proteins may simultaneously exist at, or move between, two or more different subcellular location sites. Most of the existing protein subcellular loca...
NEX: Virtual Machine Monitor Level Single System Support in Xen
Found in: Education Technology and Computer Science, International Workshop on
By Xiao Wang, Mingfa Zhu, Limin Xiao, Zhonglin Liu, Xiao Zhang, Xiangshan Li
Issue Date:March 2009
pp. 1047-1051
Numerous approaches have been investigated to achieve single system image in order to simplify the complexity of programming and administration of cluster. This paper focuses on virtualization approach and presents NEX, a system of cooperative hypervisors ...
Design and Research on Interactive Intelligent Information Platform for Workflow and Network Flow Oriented to Express Logistics
Found in: Web Information Systems and Mining, International Conference on
By Chen Lin, Shenglu Zhou, Da Li, Xiao Wang, Xiao Wang
Issue Date:October 2010
pp. 429-432
There exists workflow represented by business flow and network flow represented by products flow and vehicle flow in Logistics Enterprise, and there are also obvious interaction and impacts between the two flows. At present, the researches on logistics inf...
IX-Level Adversaries on Entry- and Exit-Transmission Paths in Tor Network
Found in: 2013 IEEE 8th International Conference on Networking, Architecture, and Storage (NAS)
By Peipeng Liu,Jinqiao Shi,Lihong Wang,Xiao Wang,Qingfeng Tan
Issue Date:July 2013
pp. 166-172
Tor is a worldwide publicly deployed low-latency anonymity system. In order to prevent observers from telling where the data came from and where it's going, data packets on the Tor network take a pathway through several intermediate relays. However, nodes ...
Impact of Mobility and Heterogeneity on Coverage and Energy Consumption in Wireless Sensor Networks
Found in: Distributed Computing Systems, International Conference on
By Xiao Wang, Xinbing Wang, Jun Zhao
Issue Date:June 2011
pp. 477-487
In this paper, we investigate the coverage of mobile heterogeneous wireless sensor networks (WSNs). By the term heterogeneous, we mean that sensors in the network have various sensing radii, which is an inherent property of many applied WSNs. Two sensor de...
Finite Element Simulation of a Novel Laser High Speed Punching
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Zongbao Shen, Huixia Liu, Hejun Wang, Xiao Wang
Issue Date:March 2010
pp. 289-291
A novel laser high speed punching is presented. The laser induced shock wave acts as a punch. The forming speed can be controlled by adjustment of the laser energy. The previously-reported experimental results show that laser high speed punching is possibl...
Low Cost Implementation of Motion Estimation System Based on Diagonal Match Criterion
Found in: Image and Signal Processing, Congress on
By Yang Li, Ning-mei Yu, Dong-fang Wang, Yu-min Liao, Xiao Wang
Issue Date:May 2008
pp. 18-22
To reduce the excessive amount of computation of traditional motion estimation (ME) algorithm, the diagonal match criterion (DMC) was proposed. DMC brings 75% reduction of computation Complexity and just 2.08% reduction of performance (PSNR) compare with t...
A Pragmatical Option Pricing Method Combining Black-Scholes Formula, Time Series Analysis and Artificial Neural Network
Found in: 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
By Kai Liu,Xiao Wang
Issue Date:December 2013
pp. 149-153
Although many theoretical methods were developed to price various derivatives, pricing deviation still remains very high. This paper provides a pragmatical option pricing method by combining skew ness and kurtosis adjusted Black-Scholes model of Corrado an...
A Tool to Verify the Consistency of Requirements Concern Model
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Liu Hua-Xiao,Wang Shou-Yan,Jin Ying
Issue Date:June 2013
pp. 1955-1958
The completeness and consistency of requirements model is the basis for the success of a software project, and the verification of requirements models is a key activity in a software life cycle. We have developed a tool based on JENA to verify the consiste...
SenSec: Mobile security through passive sensing
Found in: 2013 International Conference on Computing, Networking and Communications (ICNC)
By Jiang Zhu,Pang Wu,Xiao Wang,Joy Zhang
Issue Date:January 2013
pp. 1128-1133
We introduce a new mobile system framework, SenSec, which uses passive sensory data to ensure the security of applications and data on mobile devices. SenSec constantly collects sensory data from accelerometers, gyroscopes and magnetometers and constructs ...
Traffic Congestion and Social Media in China
Found in: IEEE Intelligent Systems
By Ke Zeng,Wenli Liu,Xiao Wang,Songhang Chen
Issue Date:January 2013
pp. 72-77
Research on social media has been applied to various academic fields. During this year's Chinese National Holiday traffic congestion event, online users showed great enthusiasm on social media, such as forums, Weibo, communities, and other platforms. This ...
A game theoretic malicious nodes detection model in MANETs
Found in: 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012)
By Xiao Wang,Renjian Feng,Yinfeng Wu,Shenyun Che,Yongji Ren
Issue Date:October 2012
pp. 1-6
Network security will face tougher challenges for MANETs due to emerging purposive strategic attacks conducted by smart malicious nodes. All these purposive strategic attacks eventually run out of the throughput which results in network crashes. In this pa...
Detecting and Validating Sybil Groups in the Wild
Found in: 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops)
By Jing Jiang,Zifei Shan,Wenpeng Sha,Xiao Wang,Yafei Dai
Issue Date:June 2012
pp. 127-132
Sybil attacks are one of the well-known and powerful attacks against online social networks. Sybil users propagate spam or unfairly increase the influence of target users. Previous works focus on detecting sybil users. However, sybil users alone do not har...
Quick Cultivation of Micro-aerobic Granular Sludge with Simultaneous Nitrogen Removal and the Influence of Oxygenation
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Liu Xiao,Wang Hao,Yang Yong
Issue Date:May 2012
pp. 1627-1630
This work aims to accelerate the cultivation of micro-aerobic granular sludge with the ability of simultaneous COD and nitrogen removal from domestic wastewater. Expanded granular sludge bed (EGSB) reactor was used to investigate the granulation of excess ...
Multi-label Learning for Protein Subcellular Location Prediction
Found in: Bioinformatics and Biomedicine, IEEE International Conference on
By Xiao Wang,Guo-Zheng Li,Jia-Ming Liu,Rui-Wei Zhao
Issue Date:November 2011
pp. 282-285
Protein sub cellular localization aims at predicting the location of a protein within a cell using computational methods. Knowledge of sub cellular localization of proteins indicates protein functions and helps in identifying drug targets. Prediction of pr...
A Covert Communication Method Based on User-Generated Content Sites
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Qingfeng Tan,Peipeng Liu,Jinqiao Shi,Xiao Wang,Li Guo
Issue Date:November 2011
pp. 1053-1056
with the worldwide increasing of Internet censorship, censorship-resistance technology has attracted more and more attentions, some famous systems, such as Tor and JAP, have been deployed to provide public service for censorship-resistance. However, these ...
Blind Image Tampering Identification Based on Histogram Features
Found in: Multimedia Information Networking and Security, International Conference on
By Kaiwei Cai,Xiaoqing Lu,Jianguo Song,Xiao Wang
Issue Date:November 2011
pp. 300-303
Nowadays, digital forensics has emerged as an important research field with applications of authenticity/integrality verification for digital data. In this paper, we focus on image forensic techniques and propose a blind scheme for image tampering identifi...
Performance Testing of Open Laboratory Management System Based on LoadRunner
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Xiaojiao Yan,Fuan Wen,Chunmei Fan,Xiao Wang
Issue Date:October 2011
pp. 164-167
Open Laboratory Management System provides an open virtual experiment environment for students, so that its system performance immediately impacts the quality of students learning. According to analyze the performance requirements of Open Laboratory Manage...
Compressed sensing for abnormal event detection in wireless networks
Found in: Software Maintenance and Reengineering, European Conference on
By Yu Xia,Zhifeng Zhao,Xiao Wang,Honggang Zhang
Issue Date:August 2011
pp. 16-20
Compressed sensing (CS) is a recently developed theory that has earned increasing interests in the area of wireless communications and signal processing. It states that the main information of a signal can be recovered from a relatively small number of lin...
Temperature Response in the Process of Ultrasonic Seawater Desalination
Found in: Asia-Pacific Power and Energy Engineering Conference
By Lingyun Zhang, Hua Dong, Xiao Wang
Issue Date:March 2011
pp. 1-4
A Stealthy Path Planning Method for Aircraft by Constant Azimuth
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Ling-Xiao Wang, De-Yun Zhou, Rui Zheng
Issue Date:December 2010
pp. 497-503
According to the characteristic of Radar Cross Section (RCS) of the aircraft and the Schematic graph of the radar range, Flight with certain constant azimuth can make the generic aircraft which does not have the ability of stealth eluding radars in battlef...
A Knowledge Discovery Case Study of Software Quality Prediction: ISBSG Database
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Xiao Wang, Yuehua Zhang, Lingling Zhang, Yong Shi
Issue Date:September 2010
pp. 219-222
Software becomes more and more important in modern society. However, the quality of software is influenced by many un-trustworthy factors. This paper applies MCLP model on ISBSG database to predict the quality of software and reveal the relation between th...
The Low Complexity Research of Adaptive OFDM Technology
Found in: Communications and Mobile Computing, International Conference on
By Zhang Xiaoguang, Ma Xiao, Wang Bo
Issue Date:April 2010
pp. 455-458
Adaptive OFDM technology is the real-time response of the transmitter according to the time-varying channel, it has been widely applied to wireless channels with multi-path interference to build high-speed, reliable communication links. At present, Campell...
Numerical Simulation of a Radiant Heating System Using Solar-Ground Coupled Heat Pump with Seasonal Thermal Storage
Found in: Computer Modeling and Simulation, International Conference on
By Xiao Wang,Maoyu Zheng,Wenyong Zhang
Issue Date:January 2010
pp. 56-60
To apply the solar-ground coupled heat pump (SGCHP) in severe cold areas, this paper presents the simulation study on a radiant heating system using SGCHP with seasonal thermal storage. The radiant heating system was installed in a detached house in the su...
Design of New Type of Heating Measuring Systems
Found in: Computer Modeling and Simulation, International Conference on
By Xiao Wang,Rujian Ma,Xueyan Yang,Enping Zhang
Issue Date:January 2010
pp. 560-563
A new type of heating measuring system is designed in this paper based on radio frequency identification technology. The heating measurement is achieved by the information transmitting and processing between radio-frequency card and calorimeter reader. The...
Modeling and Simulation of Solar Seasonal Underground Thermal Storage in a Solar-Ground Coupled Heat Pump System
Found in: Computer Modeling and Simulation, International Conference on
By Wenyong Zhang,Maoyu Zheng,Xiao Wang
Issue Date:January 2010
pp. 27-31
This paper presents a three-dimensional unsteady state fluid-solid coupling mathematical model of multiple ground heat exchangers (GHE) used in a solar-ground coupled heat pump system (SGCHPS). The model was developed with the commercial computational flui...
Application of RFID Technology in Heat Meters
Found in: MEMS, NANO, and Smart Systems, International Conference on
By Xueyan Yang, Rujian Ma, Xiao Wang, Guoxian Ren
Issue Date:December 2009
pp. 199-202
The application of RFID technology in heat meters is presented in this paper. Heat meters are terminal equipment in heat supply management system. By use of RFID technology in heat meters, the data can be exchanged between heat meters and heat supplying de...
An Improved Method of Quantum Key Distribution Protocol
Found in: Computer Science-Technology and Applications, International Forum on
By Sun Baili, Hao Shangfu, Zhang Xiao, Wang Zhihui
Issue Date:December 2009
pp. 115-117
Classic encryption methods used in our life based on mathematical ideas are unsafe actually, so quantum encryption is proposed nowadays. Although quantum encryption is the unique method to protect datas and data transmission in theory, more processes are r...
An Adaptive Synchronization of a Chaotic System with Unknown Parameters
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Xiaoming Liu, Zhicai Xiao, Wang Dong, Junwei Lei
Issue Date:November 2009
pp. 309-313
The sign of unknown input coefficients is assumed to be known in most papers about the input uncertainties. In this paper, a Nussbaum gain method is adopted to cope with the situation that both the sign and the value of input are unknown. And the unknown p...
Research on Coupling Simulation Between Dynamics of Multi-body and Hydrodynamic Lubrication of Piston-Cylinder Sleeve System
Found in: Information and Computing Science, International Conference on
By Cheng Ying, Song Xiao, Wang Dong-jie
Issue Date:May 2009
pp. 300-303
For the purpose of establish a more accurate dynamic model of internal combustion engine (I.C.E) piston cylinder system, the model coupling between hydrodynamic lubrication and dynamics of multi-body system of piston cylinder system was built by linking AD...
A demonstration of a cross-layer cooperative routing-MAC scheme in multi-hop Ad-Hoc networks
Found in: Testbeds and Research Infrastructures for the Development of Networks & Communities, International Conference on
By Jian Lin, Thanasis Korakis, Xiao Wang, Shunyuan Ye, Shivendra Panwar
Issue Date:April 2009
pp. 1-3
Cooperative communication fully leverages the broadcast nature of the wireless channel and spatial diversity, thereby achieving tremendous improvements in system capacity and delay. A cross-layer implementation approach has been pursued in this demonstrati...
The Multilevel Comprehensive Grey Evaluation Model for Enterprise Training Effect
Found in: Education Technology and Training & Geoscience and Remote Sensing
By Xiao Wang, Ning Shuai
Issue Date:December 2008
pp. 51-54
Enterprise training is a very useful method to improve comprehensive quality of staff and to enhance the enterprise's core competitiveness, so the effect of training is the emphasis for an enterprise. In the paper, the multilevel comprehensive gray evaluat...
Attacks against Network Coordinate System: Vulnerable PIC
Found in: Computer Science and its Applications, International Symposium on
By Xiaohan Zhao, Xiaoxiao Song, Xiao Wang, Yang Chen, Beixing Deng, Xing Li
Issue Date:October 2008
pp. 251-256
In recent years, network coordinate systems which map nodes into a geometrical space can effectively support overlay applications relying on topology-awareness. However, these systems base on an ideal assumption that the nodes in them are honest to coopera...
On the Grid-Enabled Geospatial Information Workflow
Found in: Information Science and Engineering, International Conference on
By Mingguang Wu, Jingwei Shen, Yongning Wen, Xiao Wang, Hongping Zhang
Issue Date:December 2009
pp. 2109-2112
The concept and classification of the Grid-enabled Spatial Information Workflow are proposed in this paper. The workflow modeling method based on the directed graph and spatial information workflow description method on the BPEL (Business Process Execution...
T-Fuzzy Subalgebras and T-Fuzzy Ideals of BCH-Algebras
Found in: Innovative Computing ,Information and Control, International Conference on
By Feng-Xiao Wang
Issue Date:June 2008
pp. 397
The aim of this paper is to introduce the notions of Tfuzzy subalgebras and T-fuzzy ideals of BCH-algebras and to investigate their properties. We give several characterizations of T-fuzzy subalgebras and T-fuzzy ideals. The relations among various fuzzy s...
Clinical multi-label free text classification by exploiting disease label relation
Found in: 2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
By Rui-Wei Zhao,Guo-Zheng Li,Jia-Ming Liu,Xiao Wang
Issue Date:December 2013
pp. 311-315
Clinical data describing a patient's health status can be multi-labelled. For example, a clinical record describing patient suffering from cough and fever should be tagged with both two disease labels. These co-occurred labels often have interrelation whic...
Uncovering social network Sybils in the wild
Found in: ACM Transactions on Knowledge Discovery from Data (TKDD)
By Ben Y. Zhao, Christo Wilson, Tingting Gao, Xiao Wang, Yafei Dai, Zhi Yang
Issue Date:February 2014
pp. 1-29
Sybil accounts are fake identities created to unfairly increase the power or resources of a single malicious user. Researchers have long known about the existence of Sybil accounts in online communities such as file-sharing systems, but they have not been ...
Understanding latent interactions in online social networks
Found in: ACM Transactions on the Web (TWEB)
By Peng Huang, Xiao Wang, Ben Y. Zhao, Christo Wilson, Jing Jiang, Wenpeng Sha, Yafei Dai
Issue Date:October 2013
pp. 1-39
Popular online social networks (OSNs) like Facebook and Twitter are changing the way users communicate and interact with the Internet. A deep understanding of user interactions in OSNs can provide important insights into questions of human social behavior ...
Predicting user activity level in social networks
Found in: Proceedings of the 22nd ACM international conference on Conference on information & knowledge management (CIKM '13)
By Qiang Yang, Sinno Jialin Pan, Erheng Zhong, Minzhe Zhou, Xiao Wang, Yin Zhu
Issue Date:October 2013
pp. 159-168
The study of users' social behaviors has gained much research attention since the advent of various social media such as Facebook, Renren and Twitter. A major kind of applications is to predict a user's future activities based on his/her historical social ...
Multilabel Learning via Random Label Selection for Protein Subcellular Multilocations Prediction
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
By Guo-Zheng Li, Xiao Wang
Issue Date:March 2013
pp. 436-446
Prediction of protein subcellular localization is an important but challenging problem, particularly when proteins may simultaneously exist at, or move between, two or more different subcellular location sites. Most of the existing protein subcellular loca...
Multi-scale dynamics in a massive online social network
Found in: Proceedings of the 2012 ACM conference on Internet measurement conference (IMC '12)
By Alessandra Sala, Ben Y. Zhao, Christo Wilson, Haitao Zheng, Sabrina Gaito, Xiao Wang, Xiaohan Zhao
Issue Date:November 2012
pp. 171-184
Data confidentiality policies at major social network providers have severely limited researchers' access to large-scale datasets. The biggest impact has been on the study of network dynamics, where researchers have studied citation graphs and content-shar...
Context-based knowledge discovery and its application
Found in: Proceedings of the Data Mining and Intelligent Knowledge Management Workshop (DM-IKM '12)
By Xiao Wang, Yong Shi
Issue Date:August 2012
pp. 1-9
Mankind is inundated by information, but thirst for knowledge. The use of knowledge discovery to identify potentially useful knowledge from massive data has become an important method, which increasingly attracts much attention. In order to solve the probl...
Who drive people to forward information: publisher or spreader?
Found in: Proceedings of the Fifth Workshop on Social Network Systems (SNS '12)
By Jing Jiang, Pei Chen, Yafei Dai, Xiao Wang
Issue Date:April 2012
pp. 1-6
The explosive growth in online social networks makes them major platforms of information diffusion. People receive large-scale information from friends, but hardly find what they really want. Understanding influential factors of forwarding behavior can be ...
On theme location discovery for travelogue services
Found in: Proceedings of the 34th international ACM SIGIR conference on Research and development in Information (SIGIR '11)
By Mao Ye, Rong Xiao, Wang-Chien Lee, Xing Xie
Issue Date:July 2011
pp. 465-474
In this paper, we aim to develop a travelogue service that discovers and conveys various travelogue digests, in form of theme locations, geographical scope, traveling trajectory and location snippet, to users. In this service, theme locations in a travelog...
Location relevance classification for travelogue digests
Found in: Proceedings of the 20th international conference companion on World wide web (WWW '11)
By Mao Ye, Rong Xiao, Wang-Chien Lee, Xing Xie
Issue Date:March 2011
pp. 163-164
In this paper, we aim to develop a travelogue service to discover and convey various travelogue digests, in form of theme locations and geographical scope to their readers. In this service, theme locations in a travelogue are the core information to discov...
Understanding latent interactions in online social networks
Found in: Proceedings of the 10th annual conference on Internet measurement (IMC '10)
By Ben Y. Zhao, Christo Wilson, Jing Jiang, Peng Huang, Wenpeng Sha, Xiao Wang, Yafei Dai
Issue Date:November 2010
pp. 369-382
Popular online social networks (OSNs) like Facebook and Twitter are changing the way users communicate and interact with the Internet. A deep understanding of user interactions in OSNs can provide important insights into questions of human social behavior,...
Nonlinear modeling of the internet delay structure
Found in: Proceedings of the 2008 ACM CoNEXT Conference (CONEXT '08)
By Beixing Deng, Xiao Wang, Xing Li, Yang Chen
Issue Date:December 2008
pp. 1-2
Modeling the Internet delay structure is an important issue in designing large-scale distributed systems. However, linear models fail to characterize Triangle Inequality Violations (TIV), motivating us to research on nonlinear ones. In this paper, we propo...
Supporting Uncertainty in Indexing and Querying of Moving Objects in Networks Databases
Found in: Information Technology and Applications, International Forum on
By Song Guangjun, Hao Zhong-xiao, Wang Lijie
Issue Date:May 2009
pp. 182-186
In order to get more accurate movement information of moving objects, and to capture the temporal trajectory of the spatial uncertainty, This article describes the uncertain trajectory model of the moving objects in the road networks databases, and extends...
The Development of Infrared Temperature Sensor Based on Thermopile Detector TPS334 and PGA309
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Ya-xiao Wang, Wen-Hui Zhang
Issue Date:April 2009
pp. 62-65
The paper introduces a kind of infrared temperature sensor having wide measure range and stable readings which is developed based on thermopile detector TPS334 and PGA309. The principle of PGA309 signal amplification, ambient temperature compensation and n...
On (Alpha, Beta) Fuzzy Subalgebras of BCH-Algebras
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Feng-xiao Wang, Lu Chen
Issue Date:October 2008
pp. 604-607
By two relations belonging to and quasi-coincidence between fuzzy points and fuzzy sets, we define the concept of (\alpha,\beta)-fuzzy subalgebras where \alpha, \beta are any two of{\in, q, \in\vee q, \in\wedge q} with \alpha \neq \in\wedge q. We state and...
 1  2 Next >>