Search For:

Displaying 1-50 out of 238 total
Joint Admission Control, Channel Assignment and QoS Routing for Coverage Optimization in Multi-Hop Cognitive Radio Cellular Networks
Found in: Mobile Ad-Hoc and Sensor Systems, IEEE International Conference on
By Qin Xin,Xin Wang,Jiannong Cao,Wei Feng
Issue Date:October 2011
pp. 55-62
In recent years, cognitive radio technology (CR) has been proposed to allow unlicensed secondary users (SUs) to opportunistically access the channels unused by primary users. As a result, there is a lot of recent interests on studying cognitive radio cellu...
 
A New Type of Adaptive Controller Research on the Parameters of Chaos System
Found in: Genetic and Evolutionary Computing, International Conference on
By Jun Wang, TingLei Huang, Xin Wang, HongBo Xin
Issue Date:October 2009
pp. 530-532
In view of Chaos is such a complex nonlinear systems, we analyze the parameters of initial sensitivity and unpredictability, and use a universal adaptive controller based on adaptive control theory, combined with the stability of Lyaponov theory, making th...
 
A New Performance Metric for Construction of Robust and Efficient Wireless Backbone Network
Found in: IEEE Transactions on Computers
By Ziyi Zhang,Xin Wang,Qin Xin
Issue Date:October 2012
pp. 1495-1506
With the popularity of wireless devices and the increasing demand of network applications, it is emergent to develop more effective communications paradigm to enable new and powerful pervasive applications, and to allow services to be accessed anywhere, at...
 
Optimization for Auxiliary Bracing of Non-uniform Section Boom
Found in: Intelligent System Design and Engineering Application, International Conference on
By Xin Wang,Yang Zhou,Shunde Gao
Issue Date:January 2012
pp. 421-425
Combination-boom is a kind of large scale boom with non-uniform sections, which will generate large deflection in the loading cases. As for that, auxiliary bracing is necessary. Using FEM software, an optimization strategy has been proposed. Firstly, based...
 
Deployment of a Connected Reinforced Backbone Network with a Limited Number of Backbone Nodes
Found in: IEEE Transactions on Mobile Computing
By Shan Chu,Peng Wei,Xu Zhong,Xin Wang,Yu Zhou
Issue Date:June 2013
pp. 1188-1200
In recent years, we have witnessed a surge of interest in enabling communications over meshed wireless networks. Particularly, supporting peer-to-peer communications over a multihop wireless network has great potential in enabling ubiquitous computing. How...
 
A Mobile Multicast Algorithm Using Agents for Mobile Ad-hoc Users
Found in: Advanced Information Networking and Applications, International Conference on
By Fei Li, Xin Wang, Xiangyang Xue
Issue Date:March 2003
pp. 838
<p>Hereby we describe an improved agent-based multicast algorithm for mobile ad-hoc users. Mobile multicast agents (MMAs) form a virtual backbone of an ad-hoc network and they provide multicast tree discovery, multicast tree maintenance. However they...
 
Deviation Problem and its Solving
Found in: Computer Science and Computational Technology, International Symposium on
By Xin Wang, Hui-tong Jia, Yu-lian Ma, Yu-dong Wang
Issue Date:December 2008
pp. 771-776
In order to introduce the study on automatic composition of knowledge-based semantic web services, this paper abstracts the main concept of deviation problem (expended knowledge-based analysis system task), analyzes the relation between them, proposes the ...
 
Design optimization and modeling of on-chip RF inductors in 0.13
Found in: Circuits and Systems, Midwest Symposium on
By Fan Zhang, Zhihua Wang, Xin Wang, He Tang, Qiang Fang, Albert Wang, Wei Chen, Lee Yang, Bin Zhao, Gary Zhang, Xingang Wang
Issue Date:August 2009
pp. 975-978
This paper discusses general procedures for simulation, design optimization, measurement and modeling of accurate and scalable on-chip RF spiral inductors in standard foundry CMOS for industrial applications. Electro-magnetic (EM) solver is used to simulat...
 
PCube: Improving Power Efficiency in Data Center Networks
Found in: Cloud Computing, IEEE International Conference on
By Lei Huang,Qin Jia,Xin Wang,Shuang Yang,Baochun Li
Issue Date:July 2011
pp. 65-72
To alleviate the growing concern of energy waste in networked devices, we present PCube, a server-centric data center structure that conserves energy by varying bandwidth availability based on traffic demand. PCube not only supports a low-power mode for ex...
 
The Color Tag Design and Color Model Study in Mirosot
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Ma Gang, Liu Tian-shi, Han Jia-xin, Wang Xiao-xiao
Issue Date:October 2010
pp. 72-76
The paper gives a new color pattern based on contrasting the advantages and disadvantages of several kinds of color tag schemes. It adopts HSI color space and improves the transition from RGB color model to HSI color model by analyzing the particular chara...
 
Puffer Characteristic Calculation of a Circuit Breaker Using Fluorocarbon Gas Mixture as an Arc Quenching Medium
Found in: Electrical and Control Engineering, International Conference on
By Kang Li, Weijun Xing, Guoqiang Zhang, Wenhao Niu, Xin Wang
Issue Date:June 2010
pp. 3994-3997
because of its high dielectric strength, good partial discharge capability, low global warming potential (GWP), none ozone depletion potential (ODP) and nontoxicity, fluorocarbon gas is possible substitute for SF6, and can be used hopefully in electrical e...
 
The implementation of video-segmentation-accelerated VCR support for P2P VoD systems with network coding
Found in: Computers in Education, International Conference on
By Linxiang Gao, Jiawu Zhong, Lingjie Yu, Jin Zhao, Xin Wang
Issue Date:January 2009
pp. 1-2
Video-on-demand (VoD) service has been greatly enhanced with the maturation of both peer-to-peer (P2P) and network coding (NC) technology. Digital video cassette recording (VCR) function provides users with more freedom that they can choose different playb...
 
Access Control for Human Tasks in Service Oriented Architecture
Found in: E-Business Engineering, IEEE International Conference on
By Xin Wang, Yanchun Zhang, Hao Shi
Issue Date:October 2008
pp. 455-460
Business process management is designed to make business activity coordination easier and more cost effective. WS-BPEL and BPEL4People extension together coordinate the web services and human activities within business process. However, the increasing busi...
 
Utilizing Digital Tabletops in Collocated Agile Planning Meetings
Found in: AGILE Conference
By Yaser Ghanam, Xin Wang, Frank Maurer
Issue Date:August 2008
pp. 51-62
In agile software development, planning meetings play a pivotal role in establishing a concrete under-standing of customers’ requirements. Using tools to enhance the effectiveness of the planning meetings without affecting the agility of the practices or d...
 
Scenario-Based Petri Net Approach for Collaborative Business Process Modelling
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Xin Wang, Yanchun Zhang, Hao Shi
Issue Date:December 2007
pp. 18-25
Web services composition techniques provide a practical foundation for business process management in loosely coupled distributed environments. Requirements analysis, however, is still the essential step for launching any commercial systems. Nevertheless, ...
 
Collaborative Legal Information Sharing on P2P Network
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Yanchun Zhang, Hao Shi, Xin Wang, Jingyuan Zhang
Issue Date:September 2007
pp. 41-47
Peer-to-Peer (P2P) information sharing attracts much attention from both legal and IT communities. P2P architectures have the potential to accelerate communication processes and reduce collaboration costs. A prototype, named vuCRN has been developed for re...
 
Object Localization Based on Directional Information: Case of 2D Raster Data
Found in: Pattern Recognition, International Conference on
By Pascal Matsakis, JingBo Ni, Xin Wang
Issue Date:August 2006
pp. 142-146
A directional spatial relationship to a reference object (e.g.,
 
An Improved Dynamic Priority Queue for Multimedia Network Communications
Found in: Advanced Information Networking and Applications, International Conference on
By Xin Wang, Fei Li, Xiangyang Xue
Issue Date:March 2003
pp. 233
In this paper we propose an optimizing queue scheme for multimedia network communications with dynamic priority. Arriving users are classified into two types based on their transmission contents, and they are served by different priority degrees. The high ...
 
FMTCP: A Fountain Code-Based Multipath Transmission Control Protocol
Found in: 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS)
By Yong Cui,Xin Wang,Hongyi Wang,Guangjin Pan,Yining Wang
Issue Date:June 2012
pp. 366-375
Ideally, the throughput of a Multipath TCP (MPTCP) connection should be as high as that of multiple disjoint single-path TCP flows. In reality, the throughput of MPTCP is far lower than expected. This is fundamentally caused by the fact that a sub flow wit...
 
Research on Parameterization and Modularization Design Technology of Crawler Crane and CelerityDesign Platform Development
Found in: Software Engineering, World Congress on
By Xu-Yang Cao, Shun-De Gao, Qian Wang, Jian-Song Wang, Xin Wang
Issue Date:May 2009
pp. 342-347
Taking crawler crane as subject investigated, this paper presents the integration of modularizing and parameterizing design technology, by which crawler crane is parameterized and disassembled into several modules. Several modules build up a design element...
 
A Novel Information Search and Recommendation Services Platform Based on an Indexing Network (Short Paper)
Found in: 2013 IEEE 6th International Conference on Service-Oriented Computing and Applications (SOCA)
By Xiaodong Deng,Ming Jiang,Haichun Sun,Yangjie Zhang,Junjun Liu,Yu Guo,Xin Wang,Dajie Ge,Pengwei Wang,Zhijun Ding,Hongzhong Chen
Issue Date:December 2013
pp. 194-197
With the rapid development of Internet technology, information resources on the Internet become more abundant, but also bring some problems like diversity, heterogeneity, disorder, and redundancy. Given a brief expression like search keywords only, users' ...
 
Mining User Interests in Web Logs of an Online News Service Based on Memory Model
Found in: 2013 IEEE 8th International Conference on Networking, Architecture, and Storage (NAS)
By Wei Wang,Dongyan Zhao,Haining Luo,Xin Wang
Issue Date:July 2013
pp. 151-155
User profiling plays an important role in online news recommendation systems. In this paper, we analyze the relationship between users' clicking behaviors and the category of the news story to model user's interests by mining web log data of an adaptive ne...
 
Elastic Stability Constraint-Based Method for Joint Point Distribution Optimization of the Lattice Boom Head Section
Found in: 2012 Fifth International Conference on Information and Computing Science (ICIC)
By Xin Wang,Cheng-Lin Wang,Yang Zhou,Shun-De Gao
Issue Date:July 2012
pp. 132-137
Based on Timoshenko theory, the truss boom can be simplified into Timoshenko beam. The mathematic model based on such simplification has been set up and aims at minimizing buckling strain energy. The optimizing analysis program has been formulated in MATLA...
 
A Fast Repair Code Based on Regular Graphs for Distributed Storage Systems
Found in: 2012 26th IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)
By Yan Wang,Xin Wang
Issue Date:May 2012
pp. 2486-2489
Distributed storage systems (DSS) play an important role in data storage applications, since they provide high reliability for huge data storage requirement. As node failures are frequent in a large distributed storage system, the performance of repairing ...
 
Analysis on the Characteristics of URL Spam
Found in: Computer Science and Electronics Engineering, International Conference on
By Wang Zhongtao,Peng Xin,Wang Yuling,Luo Yaohua,Huang Li,Cai Biao
Issue Date:March 2012
pp. 246-249
E-mail is used by hundreds of millions of users every day because it constitutes a reliable, fast, and free media of communication. Nevertheless, huge amounts of spam are being generated and waste significant internet resources, as well as users' time. Spa...
 
The Applying of Compressed Sensing in M-Sequence UWB Radar
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Wang Wei,Ding Yipeng,Xu Xin,Wang Wenpeng,Zhang Qunying,Fang Guangyou
Issue Date:October 2011
pp. 708-711
A maximum length binary sequence, in short an M-sequence, is a special kind of pseudo-random binary sequence(PRBS). It can be well used in Ground Penetrating Radar(GPR) because of advanced characteristics. Compressed Sensing(CS) provides a way to sample th...
 
Numerical Simulation in the Wake of a Horizontal Axis Wind Turbine
Found in: Asia-Pacific Power and Energy Engineering Conference
By Deshun Li, Rennian Li, Congxin Yang, Xiuyong Wang, Xin Wang
Issue Date:March 2011
pp. 1-4
NA
 
Route Optimization Based on Genetic Algorithms of Stacker for Automated Storage and Retrieval System
Found in: Intelligent Systems, WRI Global Congress on
By Liu Jian, Wang Xin, Wang Weize, Li Changlong, Zhang Ting, Zhang Yang
Issue Date:December 2010
pp. 243-248
In this paper, an automated warehouse is taken as the object, its fixed shelf stacker selection of sub-optimal scheduling problem of operations is researched. The model of the sub-analysis is proposed a genetic algorithm fitness function, to join the task ...
 
Codeless Data Acquisition and Analysis Software (CDA&A) Development Platform
Found in: International Symposiums on Information Processing
By Xin Wang, Shumao Wang, Junping Shang
Issue Date:October 2010
pp. 161-165
In this paper, CDA&A, a program for develop the professional acquisition and analysis software for engineering measurement written with Lab Windows/CVI. CDA&A includes many features of general interest to generate the professional measurement softw...
 
A Novel Method for Splice Sites Recognition Using Comprehensive Information
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Kejun Wang, Junjie Lv, Weixing Feng, Xin Wang
Issue Date:September 2010
pp. 986-989
To identify splice sites more accurately and efficiently, a method for the recognition of splice sites based on comprehensive information is proposed. By analyzing the splicing signals, splicing sequences, secondary structures of flank sequence, different ...
 
A New Method for Eliminating Redundant Association Rules
Found in: Intelligent Computation Technology and Automation, International Conference on
By Ye Xin, Wang Na, Wang Chunyu
Issue Date:May 2010
pp. 32-36
As one of the fundamental data mining methods, the association rule mining has widely been used in many fields. However, the existence of massive redundant rules has made the analysis very difficult, and has been a main barrier to efficient utilization of ...
 
Study of Repetitive Control on Horizontal Seal System
Found in: Intelligent Computation Technology and Automation, International Conference on
By Wang Xin, Wang Yiqun
Issue Date:May 2010
pp. 431-434
How to get rid of the cumulative errors of the cross seal system is one of the key problems for packaging quality. Through the theoretical deduction, the movement regularity of double-crank slide composite horizontal seal mechanism has been ascertained. Ac...
 
Semi-supervised Multi-task Learning with Task Regularizations
Found in: Data Mining, IEEE International Conference on
By Fei Wang, Xin Wang, Tao Li
Issue Date:December 2009
pp. 562-568
Multi-task learning refers to the learning problem of performing inference by jointly considering multiple related tasks. There have already been many research efforts on supervised multi-task learning. However, collecting sufficient labeled data for each ...
 
Maximum Margin Clustering on Data Manifolds
Found in: Data Mining, IEEE International Conference on
By Fei Wang, Xin Wang, Tao Li
Issue Date:December 2009
pp. 1028-1033
Clustering is one of the most fundamental and important problems in computer vision and pattern recognition communities. Maximum Margin Clustering(MMC) is a recently proposed clustering technique which has shown promising experimental results. The main the...
 
A Solution of Video Semi-fragile Watermarking of Authentication Based on Binary Characteristic Strings
Found in: Multimedia Information Networking and Security, International Conference on
By Hua Jiang, Huijiao Wang, Xin Wang
Issue Date:November 2009
pp. 167-170
The binary characteristic string is calculated from I-frame by using the semi-fragile characteristic in this paper, and the binary watermarking is generated by using the characteristic string as the encryption key. This watermarking based on the content is...
 
A Fuzzy RBAC Model Described by XML-Graph
Found in: Scalable Computing and Communications; International Conference on Embedded Computing, International Conference on
By Jia Tian, He Guo, Yu-Xin Wang, Zheng Wang
Issue Date:September 2009
pp. 154-159
Due to the rapid increasing of system users, it is becoming a tiresome task for the administrator to assign roles and maintain permissions in traditional RBAC model. In order to simplify the administrator’s work and standardize security strategy, human’s f...
 
Comparison on Confidence Bands of Decision Boundary between SVM and Logistic Regression
Found in: Networked Computing and Advanced Information Management, International Conference on
By Xing Wang, Xin Wang, Zhaonan Sun
Issue Date:August 2009
pp. 272-277
Support Vector Machine (SVM) and Logistic Regression (LR) are two popular classification models. The main purpose of a classification algorithm is to figure out the estimator for the decision boundary. In this paper, we considered confidence bands of decis...
 
Beyond the graphs: Semi-parametric semi-supervised discriminant analysis
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Fei Wang, Xin Wang, Tao Li
Issue Date:June 2009
pp. 2113-2120
Linear discriminant analysis (LDA) is a popular feature extraction method that has aroused considerable interests in computer vision and pattern recognition fields. The projection vectors of LDA is usually achieved by maximizing the between-class scatter a...
 
xIP-seq Platform: An Integrative Framework for High-Throughput Sequencing Data Analysis
Found in: Bioinformatics, 2009 Ohio Collaborative Conference
By Xin Wang, Mingxiang Teng, Guohua Wang, Yuming Zhao, Xu Han, Weixing Feng, Lang Li, Jeremy Sanford, Yunlong Liu
Issue Date:June 2009
pp. 26-31
We report an integrative bioinformatic platform for next-generation sequencing data analysis, xIP-seq, which is built on GenePattern package. The purpose for this tool is to provide analysis pipelines for data derived from next-generation sequencing follow...
 
The Study of BSC in Newspaper Based on Knowledge Management
Found in: Computer Science and Software Engineering, International Conference on
By Yanan Wang, Xin Wang
Issue Date:December 2008
pp. 358-361
paper studied the method of designing BSC in newspaper by knowledge management. In virtue of the knowledge management, it makes closer relation between enterprise strategy and evaluation indicators, draws a frame of evaluation from perspective of BSC, and ...
 
Efficient XPath Evaluation Using a Structural Summary Index
Found in: Computer Science and Software Engineering, International Conference on
By Xiaojie Yuan,Xin Wang,Chenying Wang
Issue Date:December 2008
pp. 696-699
XPath has been widely used as a query language for selecting nodes from XML documents. Efficient XPath evaluation is thus a core building block in XML query processors. In the paper, we first introduce a compact structural summary index for XML data and th...
 
An Efficient Numbering Scheme for Dynamic XML Trees
Found in: Computer Science and Software Engineering, International Conference on
By Chenying Wang,Xiaojie Yuan,Xin Wang,Songbai He
Issue Date:December 2008
pp. 704-707
It is an essential operation in XML queries to determine the structural relationship between two arbitrary nodes. The numbering scheme is designed to label the XML nodes so that the structural relationships between nodes can be easily determined by compari...
 
An Improved Medium Field Multivariate Public Key Cryptosystem
Found in: Convergence Information Technology, International Conference on
By Xin Wang, Xinmei Wang
Issue Date:November 2008
pp. 1120-1124
The Medium Field Equation (MFE) multivariate public key encryption scheme has the advantages that it uses medium sized field extensions, which makes it encryption or decryption faster. However, it can not resists the second order linearization equation (SOL...
 
Efficient Label Propagation for Interactive Image Segmentation
Found in: Machine Learning and Applications, Fourth International Conference on
By Fei Wang, Xin Wang, Tao Li
Issue Date:December 2007
pp. 136-141
A novel algorithm for interactive multilabel image/video segmentation is proposed in this paper. Given a small number of pixels with user-defined (or pre-defined) labels, our method can automatically propagate those labels to the remaining unlabeled pixels...
 
Minimum Cost Wireless Broadband Overlay Network Planning
Found in: A World of Wireless, Mobile and Multimedia Networks, International Symposium on
By Peng Lin, Hung Ngo, ChunMing Qiao, Xin Wang, Ting Wang, DaYou Qian
Issue Date:June 2006
pp. 228-236
Wireless broadband networks, especially WiMAX networks, have emerged in the industry recently and many challenging research issues arise. In this paper, we proposed a heuristic clustering algorithm for minimum cost wireless broadband overlay network deploy...
 
Simulating Large-Scale Traffic Aggregation in an Automatic Switched Optical Network
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Hua Wang, Xin Wang, Xiangyang Xue
Issue Date:December 2005
pp. 594-597
Automatic Switched Optical Network (ASON), standardized by ITU-T, is emerging as a major technology choice for inter-operational and intervendor optical backbone transportation. With the ability to flexibly and automatically establish and maintain connecti...
 
Adaptive Scheduling in MIMO-Based Heterogeneous Ad Hoc Networks
Found in: IEEE Transactions on Mobile Computing
By Shan Chu,Xin Wang,Yuanyuan Yang
Issue Date:May 2014
pp. 1-1
The demands for data rate and transmission reliability constantly increase with the explosive use of wireless devices and the advancement of mobile computing techniques. Multiple-input and multiple-output (MIMO) technique is considered as one of the most p...
 
Shuttle: Facilitating Inter-Application Interactions for OS-Level Virtualization
Found in: IEEE Transactions on Computers
By Zhiyong Shan,Xin Wang,Tzi-cker Chiueh
Issue Date:May 2014
pp. 1220-1233
OS-level virtualization generates a minimal start-up and run-time overhead on the host OS and thus suits applications that require both good isolation and high efficiency. However, multiple-member applications required for forming a system may need to occa...
 
Single Document Summarization Based on Triangle Analysis of Dependency Graphs
Found in: 2013 16th International Conference on Network-Based Information Systems (NBiS)
By Kai Cheng, Yanting Li, Xin Wang
Issue Date:September 2013
pp. 38-43
Extractive document summarization is a fundamental technique for document summarization. Most well-known approaches to extractive document summarization utilize supervised learning where algorithms are trained on collections of
 
Research of Distributed Data Store Based on HDFS
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Xin Wang,Jianhua Su
Issue Date:June 2013
pp. 1457-1459
This paper analyzes the advantages and disadvantages of the traditional HDFS cluster architecture. An application framework designed for the small and medium-sized HDFS clusters is proposed in this paper to make up for incomplete HDFS application architect...
 
 1  2 Next >>