Search For:

Displaying 1-50 out of 52 total
Applying Combinatorial Method to Test Browser Compatibility
Found in: Multimedia Software Engineering, International Symposium on
By Baowen Xu, Lei Xu, Changhai Nie, William Chu, C. H. Chang
Issue Date:December 2003
pp. 156
In order to ensure the displaying effect of Web applications, it is important to perform compatibility testing for browsers under the different user-side configurations. Since the user-side configurations have many combinations, it is a hard task to test t...
 
Recommending Web Service Based on User Relationships and Preferences
Found in: 2013 IEEE International Conference on Web Services (ICWS)
By Min Gong,Zhaogui Xu,Lei Xu,Yanhui Li,Lin Chen
Issue Date:June 2013
pp. 380-386
With the popularity of social network and the increasing number of Web Services, making individual service recommendation has been a hot research spot nowadays. In this paper, we present a service recommendation algorithm named as URPC-Rec (User Relationsh...
 
Combining MDE and UML to Reverse Engineer Web-Based Legacy Systems
Found in: Computer Software and Applications Conference, Annual International
By Jianjun Pu, Hongji Yang, Baowen Xu, Lei Xu, William Cheng-Chung Chu
Issue Date:August 2008
pp. 718-725
The research in this paper focuses on an approach to reverse engineering web-based legacy systems with the integration of model-driven engineering and UML. Three types of link-based models of web-based legacy systems are presented. Web-based legacy systems...
 
A Boundary Scan Based Realization Method for Fault Diagnosis of Torn Analog Subnet
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Cao Jin,Xu Lei,Guo Yifei,Guo Ruixu
Issue Date:October 2011
pp. 168-171
Though the subnet tearing strategy provides a fault diagnosis method of analog circuit with high performance, the lack of efficient test isolation and stimuli generation methods are still the chief difficulties and challenges in the practical application. ...
 
Coupled Kernel-Based Subspace Learning
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Shuicheng Yan, Dong Xu, Lei Zhang, Benyu Zhang, HongJiang Zhang
Issue Date:June 2005
pp. 645-650
It was prescriptive that an image matrix was transformed into a vector before the kernel-based subspace learning. In this paper, we take the Kernel Discriminant Analysis (KDA) algorithm as an example to perform kernel analysis on 2D image matrices directly...
 
Nested-SIFT for Efficient Image Matching and Retrieval
Found in: IEEE MultiMedia
By Pengfei Xu,Lei Zhang,Kuiyuan Yang,Hongxun Yao
Issue Date:July 2013
pp. 34-46
To improve the effectiveness of feature representation and the efficiency of feature matching, we propose a new feature representation, named Nested-SIFT, which utilizes the nesting relationship between SIFT features to group local features. A Nested-SIFT ...
 
Passive bilateral teleoperation of a car-like mobile robot
Found in: Mediterranean Conference on Control and Automation
By Zhihao Xu, Lei Ma, Klaus Schilling
Issue Date:June 2009
pp. 790-796
This paper addresses the bilateral teleoperation of a car-like planetary rover under communication delay. The teleoperation platform is built up between the rover and a haptic device, which provides the human operator a force-feedback mechanism describing ...
 
Answering label-constraint reachability in large graphs
Found in: Proceedings of the 20th ACM international conference on Information and knowledge management (CIKM '11)
By Dongyan Zhao, Jeffery Xu Yu, Kun Xu, Lei Chen, Lei Zou, Yanghua Xiao
Issue Date:October 2011
pp. 1595-1600
In this paper, we study a variant of reachability queries, called label-constraint reachability (LCR) queries, specifically,given a label set S and two vertices u1 and u2 in a large directed graph G, we verify whether there exists a path from u1 to u2 unde...
     
Threat on Physical Layer Security: Side Channel vs. Wiretap Channel
Found in: 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)
By Peng Luo,Huiyun Li,Guoqing Xu,Lei Peng
Issue Date:December 2013
pp. 295-300
The location-specific channel state information can be exploited to generate secret keys for wireless system services, In the multipath wireless environment. Its secrecy capacity was usually studied with the wiretap channel model. This paper proposes a sid...
 
An Experimental Study of BATMAN Performance in a Campus Deployment of Wireless Mesh Networks
Found in: Mobile Ad-hoc and Sensor Networks, International Conference on
By Jiaqi Xu,Lei Wang,Yongnan Li,Zhenquan Qin,Ming Zhu
Issue Date:December 2011
pp. 341-342
Based on a fundamental understanding of a high-quality routing protocol called Better Approach To Mobile Ad-hoc Networking or BATMAN, we provide an experimental study of its performance considering a representative set of meaningful measures with a real Wi...
 
Precise, Scalable, and Online Request Tracing for Multitier Services of Black Boxes
Found in: IEEE Transactions on Parallel and Distributed Systems
By Bo Sang,Jianfeng Zhan,Gang Lu,Haining Wang,Dongyan Xu,Lei Wang,Zhihong Zhang,Zhen Jia
Issue Date:June 2012
pp. 1159-1167
As more and more multitier services are developed from commercial off-the-shelf components or heterogeneous middleware without source code available, both developers and administrators need a request tracing tool to 1) exactly know how a user request of in...
 
A Multi-dimensional Progressive Perfect Hashing for High-Speed String Matching
Found in: Symposium On Architecture For Networking And Communications Systems
By Yang Xu,Lei Ma,Zhaobo Liu,H. Jonathan Chao
Issue Date:October 2011
pp. 167-177
Aho-Corasick (AC) automaton is widely used for multi-string matching in today's Network Intrusion Detection System (NIDS). With fast-growing rule sets, implementing AC automaton with a small memory without sacrificing its performance has remained challengi...
 
The Researches on the Developments and Typical Application of NPs Based System
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Liu Zhiming,Xu Lei,Deng Gaoming,Li Sheng
Issue Date:October 2011
pp. 220-223
With the development of computer network, traditional general CPU and ASIC cannot meet the corresponding needs due to their disadvantages, nevertheless, the Network Processor(NP) finds its wide application in today's network devices because of its great ba...
 
Study on Course Design of
Found in: Internet Computing and Information Services, International Conference on
By Cui Jian,Xu Lei,Zhang Yuanfeng
Issue Date:September 2011
pp. 551-553
This research starts from teaching practice which mainly uses documentary analysis, action research, questionnaire, interview and other methods. Based on the analysis of characteristics of
 
Theoretical Derivations of Min-Max Information Clustering Algorithm
Found in: Internet Computing and Information Services, International Conference on
By Chi Zhang,Xu-Lei Yang,Guanzhou Zhao,Jie Wan
Issue Date:September 2011
pp. 128-131
The min-max information (MMI) clustering algorithm was proposed in [8] for robust detection and separation of spherical shells. In current paper, we make efforts to revisit the proposed MMI algorithm theoretically and practically. Firstly, we present the t...
 
Instructional Design on
Found in: Internet Computing and Information Services, International Conference on
By Cui Jian,Xu Lei,Wang Feng
Issue Date:September 2011
pp. 554-556
According to the requirement of
 
Design of Detection System for Complex Artillery Weapon Communication System
Found in: Intelligent Computation Technology and Automation, International Conference on
By Fengrong Ji,Yaqing Xu,Lei Ji
Issue Date:March 2011
pp. 411-414
The maintenance and technical support for complex artillery weapon communication system is very difficult in the army. In order to solve this problem, the paper designed a detection system for communication system, and provided a detection method which com...
 
Researches on the Fault Diagnosis of Circuit by Energy Based Information Entropy
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Liu Wei, Xu Lei, Han Yang
Issue Date:January 2011
pp. 161-166
The quantitative descriptions of fault responses’ characters are the chiefly presupposition of circuit fault analysis and diagnosis. Aimed to solving the deficiency of traditional information entropy theory in characters extraction of the information mutat...
 
Building a Self-Adjusted Map for Mobile Robot Navigation
Found in: Intelligent Systems, WRI Global Congress on
By Ke Xu, Lei Zhang, Ruiqing Fu, Yongsheng Ou, Xinyu Wu
Issue Date:December 2010
pp. 262-265
An accurate map is essential to autonomous mobile robots. Two of the most popular map types are Occupancy Grid Map (OGM) and Topological Map (TM). However, the OGM is inefficient since it requires a large amount of memory to represent the environment. The ...
 
Multiple Sink Dynamic Destination Geographic Routing in Wireless Sensor Networks
Found in: Cyber-Enabled Distributed Computing and Knowledge Discovery, International Conference on
By Chen Xu, Lei Cao, Wei Shao
Issue Date:October 2010
pp. 121-124
In this work, we propose Multiple Sink Dynamic Destination Geographic Routing (MSDDGR), a routing protocol for multiple sink wireless sensor networks. MSDDGR is based on greedy forwarding scheme, which decides the route only using the neighboring informati...
 
Raw vs. Processed: How to Use the Raw and Processed Images for Robust Face Recognition under Varying Illumination
Found in: Pattern Recognition, International Conference on
By Li Xu, Lei Huang, Changping Liu
Issue Date:August 2010
pp. 2692-2695
Many previous image processing methods discard low-frequency components of images to extract illumination invariant for face recognition. However, this method may cause distortion of processed images and perform poorly under normal lighting. In this paper,...
 
Ontology Generation from Web Tables: A 1+1+N Approach
Found in: Information Technology and Applications, International Forum on
By Xu Lei, Ren Yong
Issue Date:July 2010
pp. 234-239
Creating plenty of ontologies is a crucial task for relizing the Semantic Web vision. Techniques of learning ontology from text are far from mature because of the limitations of natual language understanding. However, discovering concepts and relations fro...
 
Design and Development of SBA-based Virtual Vehicles
Found in: Information Technology and Computer Science, International Conference on
By Xuehang Xu, Lei Zou
Issue Date:July 2010
pp. 509-512
Virtual vehicle is a typical human-in-the-loop simulation application, which can support weaponry acquisition at an affordable cost and in less time. Virtual vehicle integrates the techniques of virtual prototype, high level architecture (HLA), virtual rea...
 
Global and local isometry-invariant descriptor for 3D shape comparison and partial matching
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Huai-Yu Wu, Hongbin Zha, Tao Luo, Xu-Lei Wang, Songde Ma
Issue Date:June 2010
pp. 438-445
In this paper, based on manifold harmonics, we propose a novel framework for 3D shape similarity comparison and partial matching. First, we propose a novel symmetric mean-value representation to robustly construct high-quality manifold harmonic bases on no...
 
Numerical Simulation of the Tensile Fractures of the Glass Fabric Composite with 3-D Finite Element Approach (FEA)
Found in: Electrical and Control Engineering, International Conference on
By Wang Rui, Xu Lei
Issue Date:June 2010
pp. 2872-2875
With the rapid growth of the computer applications, multitudinous procedures were developed for the prediction of the strength and fractures of various materials in engineering applications. A finite element simulation of composite woven reinforcement form...
 
Logarithmic Backoff Algorithm of MAC Protocol in Ad Hoc Networks
Found in: International Conference on E-Business and E-Government
By Fang Hong-yu,Xu Lei,Li Xiao-hui
Issue Date:May 2010
pp. 1695-1698
A new backoff algorithm based on logarithmic function is presented by introducing the parameter which can change with the network state, in allusion to the problems of Binary Exponential Backoff algorithm of IEEE 802.11 MAC. This algorithm dynamic changes ...
 
Dynamic Simultaneous Optimization of Production and Pricing under Reference Effect in Perishable Products Supply Chain
Found in: International Conference on E-Business and E-Government
By Xu Lei,Bu Xiang-zhi,Tian Long-wei
Issue Date:May 2010
pp. 3354-3357
Price reference effect theory is introduced in an electronic products supply chain composed of one supplier and buyers. The supplier produces the electronic products that are perishable and sells to the buyers. Under reference effect, both spot price and r...
 
User Experience Based Adaptive Transmission Control in Network Surveillance System
Found in: International Conference on E-Business and E-Government
By Yang Bangliang,Xu Lei
Issue Date:May 2010
pp. 1672-1674
UDP is usually used as the mechanism to transmit real-time video data. However, it has no control over the packet it transferred, and unaware of the network condition it is running on, such as packet loss, delay and jitter. As bandwidth is crucial for surv...
 
A Study on Chinese Agricultural Supply Chain under E-commerce
Found in: Intelligent Computation Technology and Automation, International Conference on
By Xu Lei, Fu Xinhong
Issue Date:May 2010
pp. 358-360
This paper analyzes e-commerce’s impact on agricultural supply chain, and introduces the present research of agricultural supply chain under e-commerce. At the end of this paper, agricultural supply chains are built from the agricultural supply enterprises...
 
Data Caching Based on Improved DGA in Ad Hoc Networks
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Hongbin Song, Xiaoqiang Xiao, Ming Xu, Lei Lin
Issue Date:December 2009
pp. 562-565
Data caching is an important technique in wireless ad hoc networks, where it can increase data availability and significantly improve the efficiency of information access by reducing the access latency and bandwidth usage. However, designing efficient cach...
 
Modified Learning of T-S Fuzzy Neural Network Control for Autonomous Underwater Vehicles
Found in: Information Technology and Computer Science, International Conference on
By Fang Wang, Yuru Xu, Lei Wan, Ye Li
Issue Date:July 2009
pp. 361-365
In this paper, an improved Takagi-Sugeno (T-S) Fuzzy Neural Network (FNN) based on modified learning is proposed for the motion control of Autonomous Underwater Vehicles (AUV). Aiming to improve the control precision and adaptability of T-S fuzzy model, a ...
 
Notice of Retraction The Role-Based Delegation Model with Time-Constraint and Transmission-Limitation
Found in: 2009 International Conference on Signal Processing Systems (ICSPS)
By Gao Lijun, Zhang Lu, Zheng Zhiyong, Xu Lei
Issue Date:May 2009
pp. 398-401
Notice of Retraction After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles. We hereby retract the content of this paper. Reas...
 
Investigation and Analysis on the Use of Multimedia in the College Physical Education
Found in: Intelligent Ubiquitous Computing and Education, International Symposium on
By Xu Lei, Zhang Wei
Issue Date:May 2009
pp. 271-274
To adopt the methodology of literature analysis, questionnaire and mathematical statistics, this paper aims to investigate and analyze the College Physical education on the use of multimedia in teaching and analysis. The main conclusion is that: the overal...
 
Design of USB2.0 Device Controller IP Soft-Core Based on SoC Technology and WISHBONE Bus
Found in: Computer Science and Information Engineering, World Congress on
By Wang Ziting, Xu Lei, Li Panfeng, Geng Wenbo
Issue Date:April 2009
pp. 440-443
With a widespread development of SoC technology and universal application of USB protocol, embedded USB device controller IP core has become more and more important in chip design. Based on the WISHBONE on-chip bus by OpenCores organization maintaining, th...
 
Intelligent Control System of Multi-segments Continuously Sintering Furnace
Found in: Knowledge Acquisition and Modeling, International Symposium on
By Shukun Cao, Xiangbo Ze, Jing Xu, Lei Shi
Issue Date:December 2008
pp. 869-872
Due to the continuously sintering furnace affected by many factors, it is very difficult to establish a precise mathematical model, designed for the expert control system based on temperature field analysis for the continuously sintering furnace temperatur...
 
Object Tracking Using Particle Filter Based on Color Correlogram
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Dongbin Xu, Lei Huang, Changping Liu
Issue Date:December 2008
pp. 608-612
This paper proposes an approach for object tracking using particle filter based on an improved color correlogram. The improved color correlogram for representation object contains not only color information but also spatial information, which makes feature...
 
Disturbance Accommodating LQR Method Based Pitch Control Strategy for Wind Turbines
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Jianlin Li, Hongyan Xu, Lei Zhang, Zhuying, Shuju Hu
Issue Date:December 2008
pp. 766-770
A disturbance accommodating Linear Quadratic Regulator (LQR) method was applied in pitch control system to achieve good performance. The disturbance can be estimate by designing state estimator, and a feedback was added into the input to eliminate disturba...
 
The Development of a Realistic Simulation Framework with OMNeT++
Found in: Future Generation Communication and Networking
By Jiming Chen, Jianhui Zhang, Weiqiang Xu, Lei Shu, Youxian Sun
Issue Date:December 2008
pp. 497-500
A novel realistic simulation framework (R-simulator) is developed based on OMNeT++ in the paper. R-Simulator has realistic GUI and strong “message” management while considers the mobility of node and protocol stack. RSimulator is also time-saving and memor...
 
Ray Tracing Dynamic Scenes using fast KD-tree Base on Multi-Core Architectures
Found in: Computer Science and Software Engineering, International Conference on
By Xin Yang, Duan-qing Xu, Lei Zhao
Issue Date:December 2008
pp. 1120-1123
We present a simple and efficient algorithm for interactive ray tracing of dynamic Scenes using kd-tree base on multi-core architectures. Instead of alternating between phases of rendering and (potentially infrequent) building, our approach exploits the pa...
 
The Temperature Control System of Continuously Multi-Segments Sintering Furnace
Found in: Intelligent Networks and Intelligent Systems, International Workshop on
By Shu-kun Cao, Jing Xu, Lei Shi
Issue Date:November 2008
pp. 433-436
In order to improve the temperature control precision and the big lag of the continuously sintering furnace, the temperature control system is developed. By the thermal analysis function in finite element, the temperature field is analyzed at the coupling ...
 
Simulation Study on a Single Neuron PID Control System of DC/DC Converters
Found in: Power Electronics and Intelligent Transportation System, Workshop on
By Xinggui Wang, Bing Xu, Lei Ding
Issue Date:August 2008
pp. 127-130
In order to improve the traditional PID control system charged with the parameters perturbed sensitive defects, and use excellent knowledge extraction of neural network and learning ability, people start to put the neural network control strategy into the ...
 
Knowledge Mining for Web Business Intelligence Platform and Its Sequence Knowledge Model
Found in: Computational Intelligence and Security Workshops, International Conference on
By Jie Shen, Liu-hua Wei, Kun He, Fa-yan Xu, Lei Bi, Rong-shuang Sun
Issue Date:December 2007
pp. 156-160
The everchanging market information makes the traditional information collection and the way for using it unfitted for enterprises' business requirements. Knowledge Mining for Web Business Intelligence (KB4WBI) platform is put forward in this paper, and on...
 
Modelling and Simulating IPv6 Mobility
Found in: Computer and Information Technology, International Conference on
By Xu Lei, Yong Soo Kim, Richard Lai
Issue Date:October 2007
pp. 381-386
Mobile Internet Protocol version 6 (IPv6) is a protocol enhancement that is designed to allow transparent routing of IPv6 packets to mobile nodes. Without specific support for mobility in IPv6, packets destined to a mobile node would not be able to reach i...
 
A Lightweight Description Model to Support Experience Management
Found in: Intelligent Agent Technology, IEEE / WIC / ACM International Conference on
By XIE Xiong, ZHANG Weishi, XU Lei
Issue Date:September 2005
pp. 694-697
<p>Experience management being implemented in small and medium-sized organizations with low cost and less risk is widely recognized to be one of the crucial problems. We discuss requirements aimed at making the experience management system flexible, ...
 
VLIW coprocessor for IEEE-754 quadruple-precision elementary functions
Found in: ACM Transactions on Architecture and Code Optimization (TACO)
By Hongjian Li, Jie Zhou, Jinbo Xu, Lei Guo, Yazhuo Dong, Yong Dou, Yuanwu Lei
Issue Date:September 2013
pp. 1-22
In this article, a unified VLIW coprocessor, based on a common group of atomic operation units, for Quad arithmetic and elementary functions (QP_VELP) is presented. The explicitly parallel scheme of VLIW instruction and Estrin's evaluation scheme for polyn...
     
Fault-Tolerant RFID Reader Localization Based on Passive RFID Tags
Found in: IEEE Transactions on Parallel and Distributed Systems
By Weiping Zhu,Jiannong Cao,Yi Xu,Lei Yang,Junjun Kong
Issue Date:August 2014
pp. 2065-2076
With the growing use of RFID-based devices, there are increasing attentions on utilizing RFID technology for localization. In this paper, we consider RFID reader localization which locates an object by attaching it with an RFID reader that communicates wit...
 
Optimal mobile App advertising keyword auction model with variable costs
Found in: 2013 8th International Conference on Communications and Networking in China (CHINACOM)
By Meng Wang, Zhide Chen, Li Xu, Lei Shao
Issue Date:August 2013
pp. 166-171
With the rapid development of mobile App advertising, how to allocate App advertising more reasonable is now need to be studied. This paper proposes an App advertising auction mechanism based on optimal keyword auctions. First, we analyze the development t...
   
Predicting the social influence of upcoming contents in large social networks
Found in: Proceedings of the Fifth International Conference on Internet Multimedia Computing and Service (ICIMCS '13)
By Bin Zhou, Binying Xu, Lei Deng, Lumin Zhang, Yan Jia, Yi Han
Issue Date:August 2013
pp. 17-22
Online social networks, such as twitter and facebook, are continuously generating the new contents and relationships. To fully understand the spread of topics, there are some essential but remaining open questions. Why do some seemingly ordinary topics act...
     
Social circle analysis on ego-network based on context frequent pattern mining
Found in: Proceedings of the Fifth International Conference on Internet Multimedia Computing and Service (ICIMCS '13)
By Bin Zhou, Bingying Xu, Lei Deng, Yan Jia, Yi Han
Issue Date:August 2013
pp. 139-144
Effective organization and management of a user's ego-network is one of the effective means to deal with information overload. Manual organization methods are often time-consuming and difficult to promote. In this paper, an automatic identification of soci...
     
Tracking the evolution of public concerns in social media
Found in: Proceedings of the Fifth International Conference on Internet Multimedia Computing and Service (ICIMCS '13)
By Bin Zhou, Bingying Xu, Lei Deng, Lumin Zhang, Peng Zou, Yi Han
Issue Date:August 2013
pp. 353-357
Microblogging is becoming a popular social media in recent years. Observations show that a large part of posts in microblogging were talking about public events occurred in the real world. Public concerns reflect interests and expectations of the mass for ...
     
 1  2 Next >>