Search For:

Displaying 1-38 out of 38 total
Modelling Robust Resource Allocation for Grid Computing
Found in: Grid and Cloud Computing, International Conference on
By Zhimin Tian, Yang Yang, Zhengli Zhai
Issue Date:October 2006
pp. 32-37
With the increase in size, complexity, and heterogeneity of grid computing environments, we argue that, in addition to performance metrics, the resource allocation algorithms should be designed for robustness. That is, they should have the ability to maint...
Independently-Controlled-Gate FinFET 6T SRAM Cell Design for Leakage Current Reduction and Enhanced Read Access Speed
Found in: 2014 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)
By Kaisheng Ma,Huichu Liu,Yang Xiao,Yang Zheng,Xueqing Li,Sumeet Kumar Gupta,Yuan Xie,Vijaykrishnan Narayanan
Issue Date:July 2014
pp. 296-301
In this paper, two novel 6T SRAM cells based on Independently-Controlled-Gate FinFETs are proposed. The new 6T cells are derived from 4T cells: by separating the read timing and read-line, the proposed new cells allow simultaneously read & write to...
Influence Strength Aware Diffusion Models for Dynamic Influence Maximization in Social Networks
Found in: International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing
By Fei Hao,Chunsheng Zhu,Min Chen,Laurence T. Yang,Zheng Pei
Issue Date:October 2011
pp. 317-322
Social network plays a fundamental role as a medium for the spread of influence among its individuals. During the influence spreading process, one favorable goal is achieving influence maximization in social marketing. Thus diffusion model which identifies...
Static Check of WS-CDL Documents
Found in: Service-Oriented System Engineering, IEEE International Workshop on
By Lei Zhou, Hanyi Zhang, Tao Wang, Chuchao Yang, Zheng Wang, Meng Sun, Geguang Pu
Issue Date:December 2008
pp. 142-147
This paper presents an approach to check WS-CDL documents statically. To deal with those constraints appeared in CDL documents, which cannot be captured by its meta model (XML Schema) totally, we use B abstract machines to represent the constraints and des...
The Research of K-means Clustering Algorithm Based on Association Rules
Found in: Challenges in Environmental Science and Computer Engineering
By Wang Jun, Ou Yang Zheng-Zheng
Issue Date:March 2010
pp. 285-286
With the continued expansion of network resources and the rapid change of old and new information, the traditional information retrieval is difficult to adapt to the need of management of mass electronic data. It is a very important aspect of how to locate...
PSO Based Passive Satellite Localization Using TDOA and FDOA Measurements
Found in: Computer and Information Science, ACIS International Conference on
By Yang Zheng Bin,Qiu Yan,Lu An Nan
Issue Date:May 2011
pp. 251-254
Passive localization using TDOA and FDOA measurements usually does not have direct solution and requires numerical methods to determine the emitter's geolocation. We examine a satellite passive localization method based on particle swarm optimization(PSO),...
Extraction of Weak Pulse in Crack Inspection Based on Stochastic Resonance
Found in: Intelligent Computation Technology and Automation, International Conference on
By Dingxin Yang,Zheng Hu
Issue Date:March 2011
pp. 661-664
Acoustic method is widely used in industrial pipe crack inspection. A series of sound wave transmits through the pipe. When there is a crack at some position of the pipe, a sound pulse containing the position information of the crack will emerge in the rec...
Establishment of Air Quality Assessment Model with Weight Based on Extension Theory
Found in: Digital Manufacturing and Automation, International Conference on
By Zhao Xiaoliang, Qi Qingjie, Zhou Yang, Zheng Jiao
Issue Date:December 2010
pp. 663-665
Combining extension engineering method with cluster analysis, the classic and limited matter elements were constructed according to air quality standards and main air affecting factors. The logical domain was extended from (0, 1)to (-∞ ,+∞), meanwhile, the...
Data Exchange between Multilevel Security Management System Based Ice
Found in: Multimedia Information Networking and Security, International Conference on
By Luo Yang, Zheng Chang-xing
Issue Date:November 2010
pp. 473-476
Multilevel security management system can effectively manage the security devices, but how to realize data exchange between multilevel security management is an important problem. This paper designs and realizes data exchange between multilevel security sy...
Study on the Self-Organization Evolutionary Process of Cluster Innovation Based on the Theory of Knowledge Flow
Found in: Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, IACIS International Symposium on
By Chen Wang, Hai-yan Yan, Bo Xu, Yang Zheng
Issue Date:October 2010
pp. 253-257
In the study of innovation theory, some scholars believe that innovation process is the process of knowledge evolution. Cluster innovation is a complex economic activity based on knowledge resource, It is systematic, procedure, and with the evolutionary pr...
The Parametric Design of Office Chairs Based on Ergonomics
Found in: Computing, Control and Industrial Engineering, International Conference on
By Wang Lili, Shang Tao, Yang Zheng, Li Yixiong
Issue Date:June 2010
pp. 355-360
In china, the theoretical researches on ergonomics are mainly from the data to design parameter value and simply line out size in two-dimensional projection map. However, the ergonomics is involved in many aspects. Abstract numerical value and simple two d...
Synthesizing Novel Dimension Reduction Algorithms in Matrix Trace Oriented Optimization Framework
Found in: Data Mining, IEEE International Conference on
By Jun Yan, Ning Liu, Shuicheng Yan, Qiang Yang, Zheng Chen
Issue Date:December 2009
pp. 598-606
Dimension Reduction (DR) algorithms are generally categorized into feature extraction and feature selection algorithms. In the past, few works have been done to contrast and unify the two algorithm categories. In this work, we introduce a matrix trace orie...
Digital Image Watermarking Using Iterative Blending Based on Wavelet Technique
Found in: Multimedia Information Networking and Security, International Conference on
By Shun-liao Yang, Zheng-bing Zhang
Issue Date:November 2009
pp. 83-86
With the rapid growth of Internet technology, image watermarking techniques have been widely studied since the need for copyright protection. This paper presents a scheme of digital image watermarking using iterative blending based on Discrete Wavelet Tran...
FiLM: A Runtime Monitoring Tool for Distributed Systems
Found in: Secure System Integration and Reliability Improvement
By Fuyuan Zhang, Zhengwei Qi, Haibing Guan, Xuezheng Liu, Mao Yang, Zheng Zhang
Issue Date:July 2009
pp. 40-46
It is well recognized that debugging or testing a distributed system is a great challenge. FiLM is a runtime monitoring tool that can monitor the execution of distributed applications against LTL specifications on finite traces. Implemented within the onli...
Research and Realization of Trusted Computing Platform Based on EFI
Found in: Electronic Commerce and Security, International Symposium
By Weiwei Fang, Bingru Yang, Zheng Peng, ZhiGang Tang
Issue Date:May 2009
pp. 43-46
Trusted computing has become a new and challenging research issue in the field of information security. To further enhance the safety of BIOS, we construct a trusted computing platform based on Extensible Firmware Interface (EFI), the trust chain is transf...
Agile semantic conflict detection in real-time collaborative systems
Found in: Collaborative Technologies and Systems, International Symposium on
By Yang Zheng, Haifeng Shen, Chengzheng Sun
Issue Date:May 2009
pp. 139-146
Real-time collaborative systems allow geographically dispersed users to concurrently work on shared artifacts. Conflict detection and management present major challenges in the design of those systems. In this paper, we propose a novel technique for detect...
Leveraging single-user AutoCAD for collaboration by transparent adaptation
Found in: International Conference on Computer Supported Cooperative Work in Design
By Yang Zheng, Haifeng Shen, Chengzheng Sun
Issue Date:April 2009
pp. 78-83
It has been years since Computer-Aided Design (CAD) technology was used to assist engineers, architects and other design professionals in their design activities. Collaboration has been increasingly needed in the CAD community and various CSCW technologies...
A Watermarking Algorithm Based on Wavelet and Cosine Transform for Color Image
Found in: Education Technology and Computer Science, International Workshop on
By Wei-Min Yang, Zheng Jin
Issue Date:March 2009
pp. 899-903
In this paper, we propose a watermarking algorithm for color image based DCT and DWT. A binary image as watermark is embedded into green component or blue component of color image. The algorithm can satisfy the transparence and robustness of the watermarki...
Research and Implementation of Embedded Layout Accelerator Based on Multi-Cores System
Found in: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE
By Qing Cheng Li, Liu Yang, Zheng Xuan Bai, Xiao Li Gong, Zhang Jin
Issue Date:December 2008
pp. 645-649
In this paper, our work is to frame multi-core processors systems which complete
Research and Implementation of Screen Printing System Based on Hybrid CMP
Found in: Computer Science and Computational Technology, International Symposium on
By Qing Cheng Li, Liu Yang, Zheng Xuan Bai, Hai Jun Hu
Issue Date:December 2008
pp. 742-745
In this paper, a screen printing embedded PDF parser was designed and implemented. Also, hardware accelerator for the graphics rendering engine which are time-consuming most in the whole parsing process was worked out. Many experiments on embedded PDF pars...
A Novel ID-Based Verifiably Encrypted Signature without Random Oracle
Found in: Computational Intelligence and Security, International Conference on
By Xiao-Long Ma, Wei Cui, Li-Ze Gu, Yi-Xian Yang, Zheng-Ming Hu
Issue Date:December 2008
pp. 359-363
The verifiably encrypted signature schemes proposed by Asokan solved the fairness problem in the fair exchange process. In the work, we propose an ID-based strong unforgeability verifiably encrypted signature scheme without random oracles, and show that th...
Frequency Selective Pilot Arrangement for Orthogonal Wavelet Packet Modulation Systems
Found in: Computer Science and Information Technology, International Conference on
By Min Yang,Zheng Liu,Jufeng Dai
Issue Date:September 2008
pp. 499-503
Orthogonal Wavelet Packet Modulation (OWPM) is a potential technique for achieving high bit rates required wireless access. Effective channel estimation can supply channel state information (CSI) at the receiver, the knowledge of which OWPM system performa...
Real-Time Collaborative Software Modeling Using UML with Rational Software Architect
Found in: International Conference on Collaborative Computing: Networking, Applications and Worksharing
By Siyuan Liu, Yang Zheng, Haifeng Shen, S. Xia, Chengzheng Sun
Issue Date:November 2006
pp. 68
Modeling is commonly used in the process of software development. UML (Unified Modeling Language) is a standard software modeling language and has been widely adopted for software analysis and design. As software systems are getting larger and more complex...
Vehicle License Plate Location Based on Histogramming and Mathematical Morphology
Found in: Automatic Identification Advanced Technologies, IEEE Workshop on
By Feng Yang, Zheng Ma
Issue Date:October 2005
pp. 89-94
In a vehicle license plate identification system, plate region detection is the key step before the final recognition. This paper presents a license plate detection algorithm from complex background based on histogramming and mathematical morphology. The p...
The Effect of Correlation on the Accuracy of Meta-Learning Approach
Found in: Advanced Learning Technologies, IEEE International Conference on
By Li-ying Yang, Zheng Qin
Issue Date:July 2005
pp. 793-795
Meta-learning is an efficient approach in the field of machine learning, which involves multiple classifiers. In this paper, a meta-learning framework consisting of stacking meta-learning and cascade meta-learning was proposed firstly. Then the algorithm f...
Design and Research of the Geological Disaster Decision-Making Sustain Geography Information System in Tianshan Mountain
Found in: Information Science and Engineering, International Conference on
By Bin Yang, Zheng-wei He
Issue Date:December 2009
pp. 2034-2037
In the study of the Tianshan road geo-hazard stability appraisal and decision manage, utilizes ArcEngine components of ESRI Company, imports correlative theoretic, methods and technique of GIS, RS and introduces fuzzy comprehensive evaluation, developing a...
Rescue Method for Vehicle Routing Problem under Vehicle Disruptions
Found in: Information Science and Engineering, International Conference on
By Wenchao Yang, Zheng Wang
Issue Date:December 2009
pp. 2345-2348
Vehicle routing problem under disruptions is an important and difficult problem in the area of logistics. When a disruption event happens during the execution process of initial scheduling plan, actions should be taken immediately in order to provide timel...
Information extraction from nanotoxicity related publications
Found in: 2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
By Lemin Xiao,Kaizhi Tang,Xiong Liu,Hui Yang,Zheng Chen,Roger Xu
Issue Date:December 2013
pp. 25-30
High-quality experimental data are important when developing predictive models for studying nanomaterial environmental impact (NEI). Given that raw data from experimental laboratories and manufacturing workplaces are usually proprietary and small-scaled, e...
A Fast Elastic Net Method for Traveling Salesman Problem
Found in: Intelligent Systems Design and Applications, International Conference on
By Junyan Yi, Weixing Bi, Gang Yang, Zheng Tang
Issue Date:November 2008
pp. 462-467
In this paper, we proposed a fast method for improving the Elastic Net to solve the traveling salesman problem. A dynamic parameter strategy is introduced into the Elastic Net, which increases the ability of searching for the cities and helps the network g...
Diverse Topic Phrase Extraction through Latent Semantic Analysis
Found in: Data Mining, IEEE International Conference on
By Jilin Chen, Jun Yan, Benyu Zhang, Qiang Yang, Zheng Chen
Issue Date:December 2006
pp. 834-838
We propose a novel algorithm for extracting diverse topic phrases in order to provide summary for large corpora. Previous works often ignore the importance of diversity and thus extract phrases crowded on some hot topics while failing to cover other less o...
An extended version of scaled small gain condition
Found in: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS '09)
By Li Yang, Zheng Min
Issue Date:November 2009
pp. 280-282
Small gain theorem plays an important role in the fields of control. In order to reduce the conservatism results from ignoring the structure information on uncertainty, the scaled small gain condition was usually applied in practice. However, these conditi...
PQC: personalized query classification
Found in: Proceeding of the 18th ACM conference on Information and knowledge management (CIKM '09)
By Bin Cao, Derek Hao Hu, Evan Wei Xiang, Jian-Tao Sun, Qiang Yang, Zheng Chen
Issue Date:November 2009
pp. 1217-1226
Query classification (QC) is a task that aims to classify Web queries into topical categories. Since queries are usually short in length and ambiguous, the same query may need to be classified to different categories according to different people's perspec...
GPU-based rendering and animation for Chinese painting cartoon
Found in: Proceedings of the 2007 Conference on Graphics Interface (GI '07)
By Manli Yuan, Shuangjiu Xiao, Xubo Yang, Zheng Ren
Issue Date:May 2007
pp. 57-61
This paper presents a real-time rendering system for generating a Chinese ink-and-wash cartoon. The objective is to free the animators from laboriously designing traditional Chinese painting appearance. The system constitutes a morphing animation framework...
Building bridges for web query classification
Found in: Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval (SIGIR '06)
By Dou Shen, Jian-Tao Sun, Qiang Yang, Zheng Chen
Issue Date:August 2006
pp. 131-138
Web query classification (QC) aims to classify Web users' queries, which are often short and ambiguous, into a set of target categories. QC has many applications including page ranking in Web search, targeted advertisement in response to queries, and perso...
Thread detection in dynamic text message streams
Found in: Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval (SIGIR '06)
By Dou Shen, Jian-Tao Sun, Qiang Yang, Zheng Chen
Issue Date:August 2006
pp. 35-42
Text message stream is a newly emerging type of Web data which is produced in enormous quantities with the popularity of Instant Messaging and Internet Relay Chat. It is beneficial for detecting the threads contained in the text stream for various applicat...
A comparison of implicit and explicit links for web page classification
Found in: Proceedings of the 15th international conference on World Wide Web (WWW '06)
By Dou Shen, Jian-Tao Sun, Qiang Yang, Zheng Chen
Issue Date:May 2006
pp. 643-650
It is well known that Web-page classification can be enhanced by using hyperlinks that provide linkages between Web pages. However, in the Web space, hyperlinks are usually sparse, noisy and thus in many situations can only provide limited help in classifi...
Ubiquitous media agents for managing personal multimedia files
Found in: Proceedings of the ninth ACM international conference on Multimedia (MULTIMEDIA '01)
By Fan Lin, Hongjiang Zhang, Liu Wenyin, Mingjing Li, Rui Yang, Zheng Chen
Issue Date:September 2001
pp. 519-521
A novel idea of ubiquitous media agents is presented. Media agents are intelligent systems that are able to automatically collect and build personalized semantic indices of multimedia data on behalf of the user whenever and wherever he/she accesses/uses th...
An experimental study on large-scale web categorization
Found in: Special interest tracks and posters of the 14th international conference on World Wide Web (WWW '05)
By Bin GAO, Hao WAN, Hua-Jun ZENG, Qian ZHOU, Tie-Yan LIU, Wei-Ying MA, Yiming YANG, Zheng CHEN
Issue Date:May 2005
pp. 1106-1107
Taxonomies of the Web typically have hundreds of thousands of categories and skewed category distribution over documents. It is not clear whether existing text classification technologies can perform well on and scale up to such large-scale applications. T...