Search For:

Displaying 1-50 out of 82 total
An efficient algorithm for compressed MR imaging using total variation and wavelets
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Shiqian Ma, Wotao Yin, Yin Zhang, Amit Chakraborty
Issue Date:June 2008
pp. 1-8
Compressed sensing, an emerging multidisciplinary field involving mathematics, probability, optimization, and signal processing, focuses on reconstructing an unknown signal from a very limited number of samples. Because information such as boundaries of or...
 
Computer Simulation of Air Flow Distribution Characteristics in Inner Filtering Fabric Filters
Found in: Computer Science and Information Engineering, World Congress on
By Yin Qi, Hu Man-yin, Zhang Jing, Hou Wen-long
Issue Date:April 2009
pp. 419-423
Against to the running conditions of fabric filters, the article analyzed the reason which made the air current distribution uneven and proposed the improvement of which modify the structure of inlet and add guide plate in the lower-case. It had been obtai...
 
Study on the Content and Influencing Factors of Groundwater Nitrate Nitrogen in Hebei Province
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Nuan Geng,Guo-Yin Zhang,Shu-Hua Ru,Shi-You Sun,Ling Wang,Gui-Jin Chen
Issue Date:May 2012
pp. 1745-1749
In order to investigate the content of groundwater NO3 -- N in Hebei Province. [Methods] In 2011,500 groundwater samples were collected from 11 cities of Hebei Province before and after the rainy season, the contents of groundwater NO3 -- N was analyzed wi...
 
Identifying Consensus Tags in Social Tagging Systems
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Kening Gao,Yin Zhang,Bin Zhang,Xin Jin,Pengwei Guo
Issue Date:December 2011
pp. 917-923
Social Tagging is a free but also uncontrolled way to index and organize Web 2.0 resources. Many works have been proposed to leverage such tagging information. However, although previous studies have shown that users could reach consensus on which tags sho...
 
Improving Search by Extending Tags According to Recommendation Level and Combinations of Types
Found in: Semantics, Knowledge and Grid, International Conference on
By Jian Tian,Kening Gao,Yin Zhang,Bin Zhang
Issue Date:October 2011
pp. 36-43
As the collaborative tagging systems such as Delicious, Flickr and Last. fm become more and more popular, a large amount of resources produced by publishers, together with rich semantic metadata, become available. There are lots of ways to make use of tag ...
 
Multiresolution Modeling for the Feature-Based Parametric CAD Models
Found in: Software Engineering, World Congress on
By Shuangqing Wu, Yin Zhang, Zhiyang Chen, Sanyuan Zhang, Xiuzi Ye
Issue Date:May 2009
pp. 99-103
Feature-based parametric modeling techniques have been widely used for product design, virtual prototyping and manufacturing. Simplified models at various levels of detail (LOD) are frequently more desirable than the highly complex model in many downstream...
 
Shape Morphing for Point Set Surface Based on Vertex Deformation Gradient
Found in: Software Engineering, World Congress on
By Guanghua Tan, Sanyuan Zhang, Yin Zhang
Issue Date:May 2009
pp. 466-471
Shape morphing, as the efficient means to enhance the visual effects, is widely used in computer animation. In this paper, we propose a novel approach to perform shape morphing for point set surface based on vertex deformation gradient. The basic idea of o...
 
Chaos-Based Semi-Blind Watermarking for CAD Models
Found in: Intelligent Systems, WRI Global Congress on
By Nan Liu, Yin Zhang, Zhiyang Chen, Sanyuan Zhang
Issue Date:May 2009
pp. 411-414
Digital watermarking technique is becoming one of the hot research fields of copyright protecting, private detection for CAD graphic data under the network environment.But existing watermarking algorithms for polygonal meshes and their attributes can’t be ...
 
Feature-Based Automatic Portrait Generation System
Found in: Computer Science and Information Engineering, World Congress on
By Yin Zhang, Lu Gao, Sanyuan Zhang
Issue Date:April 2009
pp. 6-10
Creating a portrait in the style of a particular artistic tradition or a particular artist is a difficult and also an interesting problem in Non-photorealistic Rendering. This paper develops an automatic feature-based portrait generation system, which can ...
 
Study on Semantic Representation of Web Information Based on Repeating Patterns
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Kening Gao, Bin Zhang, Yin Zhang, Hongru Wei, Anxiang Ma
Issue Date:October 2008
pp. 482-486
The method that using repeating information, appeared in Web pages to represent the semantic meaning can be used to improve the correct rate of Web pages classification. This paper analyses and improves the traditional repeating patterns representation met...
 
Palmprint Recognition Based on PFI and Fuzzy Logic
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Leqing Zhu, Sanyuan Zhang, Rui Xing, Yin Zhang
Issue Date:October 2008
pp. 178-182
Palmprint is one of the most reliable features in personal identification because of its stability and uniqueness. This paper proposed a novel palmprint recognition algorithm based on principal lines: a new irregular geometrical shape was employed to get v...
 
Region of Interest Fragile Watermarking for Image Authentication
Found in: Computer and Computational Sciences, International Multi-Symposiums on
By Yiping Chu, Yin Zhang, Sanyuan Zhang, Xiuzi Ye
Issue Date:June 2006
pp. 726-731
Digital watermarking plays an important role in image verification and copyright protection. A watermarking scheme for authenticating ROI (region of interest) of image has been proposed in the paper. To embed the watermark in the interior of ROI, Poisson m...
 
Human Contour Extraction Using Level Set
Found in: Computer and Information Technology, International Conference on
By Lin Liu, Sanyuan Zhang, Yin Zhang, Xiuzi Ye
Issue Date:September 2005
pp. 608-613
<p>Human contour information is important for human activity understanding and human motion capture. Traditional human contour extraction methods are based on image morphological operation, but they will fail when the contour information is dim and d...
 
Error Resilience Schemes of H.264/AVC for 3G Conversational Video Services
Found in: Computer and Information Technology, International Conference on
By Lin Liu, Sanyuan Zhang, Xiuzi Ye, Yin Zhang
Issue Date:September 2005
pp. 657-661
<p>The emerging of third generation mobile system (3G) makes conversational video transmission in wireless environment possible, and the latest 3GPP/3GPP2 standards suggest 3G terminals support H.264/AVC. Due to high bit error rate in wireless enviro...
 
Radius-Normal Histogram and Hybrid Strategy for 3D Shape Retrieval
Found in: Shape Modeling and Applications, International Conference on
By Xiang Pan, Yin Zhang, Sanyuan Zhang, Xiuzi Ye
Issue Date:June 2005
pp. 374-379
Recent development in computer hardware and modeling technologies has led to a fast increasing of 3D models. To help user find expected models accurately and efficiently, technologies on content-based 3D model retrievals have become one of the most challen...
 
Clustering Blog Posts Using Tags and Relations in the Blogosphere
Found in: Information Science and Engineering, International Conference on
By Yin Zhang, Kening Gao, Bin Zhang, Jinhua Guo, Feihang Gao, Pengwei Guo
Issue Date:December 2009
pp. 817-820
Clustered Web pages, such as blog posts, could be used to improve Web search. In this paper, we propose a folksonomy extending framework using relations in the Blogosphere and demonstrate how the framework could be used to help clustering blog posts. We ev...
 
HRPaaS: A Handwriting Recognition Platform as a Service  Based on Middleware and the HTTP API
Found in: 2013 IEEE World Congress on Services (SERVICES)
By Desheng Li,Lianwen Jin,Yin Zhang
Issue Date:June 2013
pp. 215-220
In this paper, we present a new Handwriting Recognition Platform as a Service (HRPaaS) using cloud infrastructure as a service(IaaS), middleware, and HTTP application programming interface (API) technologies. Based on the OpenStack cloud IaaS architecture,...
 
Vertical Distribution of Available Heavy Metal in Vegetable Soil
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Ling Wang,Guo-Yin Zhang,Shi-You Sun,Shu-Hua Ru,Nuan Geng,Gui-Jin Chen
Issue Date:May 2012
pp. 1893-1896
Vertical distribution of diverse available heavy metal elements in vegertable soil profile ( 0 ~ 2m ) was studied with different extractants. The results indicated that the content of available heavy metal in soil decreased with the increase the depth. Thi...
 
Effects of Chicken Manure Application on Crop Yields and Soil Nutrients Accumulation in Wheat-Corn Rotation System
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Shu-Hua Ru,Guo-Yin Zhang,Jun-Fang Niu,Shi-You Sun,Ling Wang,Nuan Geng
Issue Date:May 2012
pp. 1392-1396
Aimed at resolving the unreasonable disposition and disadvantage to environment of poultry manures, the research on the effect of different chicken manure rates on crop yields and the soil nutrients accumulation were carried out by a field plot experiment....
 
Tag Clustering and Refinement on Semantic Unity Graph
Found in: Data Mining, IEEE International Conference on
By Yang Liu,Fei Wu,Yin Zhang,Jian Shao,Yueting Zhuang
Issue Date:December 2011
pp. 417-426
Recently, there has been extensive research towards the user-provided tags on photo sharing websites which can greatly facilitate image retrieval and management. However, due to the arbitrariness of the tagging activities, these tags are often imprecise an...
 
An Improved Bayesian Algorithm for Filtering Spam E-Mail
Found in: Intelligence Information Processing and Trusted Computing, International Symposium on
By Hu Yin,Zhang Chaoyang
Issue Date:October 2011
pp. 87-90
With the wide application of E-mail, unsolicited bulk email has become a major problem for E-mail users. In order to reduce the influence of spam false negative result, an improvement solution based on the traditional Bayesian algorithm is proposed, in whi...
 
Experiment Study on Tower Cooling Energy-Saving Technology
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Ji Amin, He Li, Yue Zhiqiang, Jie Li, Gang Yin, Zhang Qinggang
Issue Date:February 2011
pp. 728-730
During the transition season periods the technology of tower cooling is used to cool the internal heat source region in the buildings, which is energy saving and environment friendly technology. To aim at climatic conditions of the transition season in Har...
 
The Application of the Fuzzy Neural Network Control in Elevator Intelligent Scheduling Simulation
Found in: Information Science and Engieering, International Symposium on
By Yine Zhang, Yun Yi, Jian Zhong
Issue Date:December 2010
pp. 512-516
Because of the diversity of target about the elevator group control system and inherent randomness and non-linear of the elevator system, so it is very difficult to improve the performance of the elevator control system through the traditional control meth...
 
Cost-Sensitive Face Recognition
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Yin Zhang, Zhi-Hua Zhou
Issue Date:October 2010
pp. 1758-1769
Most traditional face recognition systems attempt to achieve a low recognition error rate, implicitly assuming that the losses of all misclassifications are the same. In this paper, we argue that this is far from a reasonable setting because, in almost all...
 
Algorithm of Finding All Real Roots Based on Solution Space Compression
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Xinglong Zhu, Xiaobin Wei, Jiping Zhou, Yin Zhang
Issue Date:November 2009
pp. 558-562
Finding the approximate solution of linear or nonlinear equations is a mathematical problem, which is often encountered in engineering. As it is known, Galois E. had proven that over five orders algebraic equation was no root-finding formula. The solutions...
 
Study on Scope of Customization Customers' Perspective Based
Found in: Services Science, Management and Engineering, IITA International Conference on
By Yin Zhang, Rongqiu Chen, Li Li
Issue Date:July 2009
pp. 286-289
The flexibility of manufacturing system in mass customization (MC) requires high initial investments, as well as the technologies of information collection and data processing does. To some extent, the bigger scope of customization induces the higher custo...
 
Self-Tuning, Bandwidth-Aware Monitoring for Dynamic Data Streams
Found in: Data Engineering, International Conference on
By Navendu Jain, Praveen Yalagandula, Mike Dahlin, Yin Zhang
Issue Date:April 2009
pp. 114-125
We present SMART, a self-tuning, bandwidth-aware monitoring system that maximizes result precision of continuous aggregate queries over dynamic data streams. While prior approaches minimize bandwidth cost under fixed precision constraints, they may still o...
 
Minimising Native Interference in Still Image Data Hiding
Found in: Communications and Mobile Computing, International Conference on
By Jian Jun Guo, Xin Xu, Zhao Feng Ma, Jian Yin Zhang
Issue Date:January 2009
pp. 423-429
The technique of using orthogonal sequences to embed digital watermarks is described. It is shown that embedding with sequences which are orthogonal to the cover image can enhance the detection reliability and improve the system performance and robustness ...
 
Construction and Counting Orthomorphism Based on Transversal
Found in: Computational Intelligence and Security, International Conference on
By Qi Liu, Yin Zhang, Cheng Chen, Shuwang Lv
Issue Date:December 2008
pp. 369-373
This paper mainly discussed the properties of orthomorphic latin square, the equivalent relation between orthomorphism and orthomorphic latin square transversal, proposed a constructing method of orthomorphism by orthomorphic latin square transversal, coun...
 
Incentive-aware routing in DTNs
Found in: 2008 IEEE International Conference on Network Protocols
By U. Shevade, Han Hee Song, Lili Qiu, Yin Zhang
Issue Date:October 2008
pp. 238-247
Disruption tolerant networks (DTNs) are a class of networks in which no contemporaneous path may exist between the source and destination at a given time. In such a network, routing takes place with the help of relay nodes and in a store-and-forward fashio...
 
Dynamic Load-Balancing and High Performance Communication in Jcluster
Found in: Parallel and Distributed Processing Symposium, International
By Bao-Yin Zhang, Ze-Yao Mo, Guang-Wen Yang, Wei-Min Zheng
Issue Date:March 2007
pp. 227
This paper describes the dynamic load-balancing and high performance communication provided in Jcluster, an efficient Java parallel environment. For the efficient load-balancing, we implement a task scheduler based on a Transitive Random Stealing algorithm...
 
Effect of Compliant Interface on the Curvature and Stress of Micron-Size Film-Substrate Composite Structure
Found in: Robotics and Biomimetics, IEEE International Conference on
By Yun Liu, Yin Zhang
Issue Date:December 2006
pp. 154-158
The stress inside the film or substrate can be evaluated by the Stoney's formula and its modified/extended formula, which links the curvature to the stress state inside the composite. However, the Stoney's formula and its modified/extended formula assume t...
 
Fast and Effective Worm Fingerprinting via Machine Learning
Found in: Autonomic Computing, International Conference on
By Stewart Yang, Jianping Song, H. Rajamani, Taewon Cho, Yin Zhang, R. Mooney
Issue Date:June 2006
pp. 311-313
As Internet worms become ever faster and more sophisticated, it is important to be able to extract worm signatures in an accurate and timely manner. In this paper, we apply machine learning to automatically fingerprint polymorphic worms, which are able to ...
 
A Hopfield Neural Network Based Algorithm for RNA Secondary Structure Prediction
Found in: Computer and Computational Sciences, International Multi-Symposiums on
By Qi Liu, Xiuzi Ye, Yin Zhang
Issue Date:June 2006
pp. 10-16
In this paper a Hopfield Neural Network(HNN) based parallel algorithm is presented for predicting the secondary structure of ribonucleic acids(RNA).The HNN here is used to find the near-maximum independent set of an adjacent graph made of RNA base pairs an...
 
A trust-region interior-point method for nonlinear programming
Found in: Richard Tapia Celebration of Diversity in Computing Conference
By M.C. Villalobos, Yin Zhang
Issue Date:October 2005
pp. 7-9
Under mild conditions, the Jacobian associated with the Karush-Kuhn-Tucker (KKT) system of a non-convex, nonlinear program is nonsingular near an isolated solution. However, this property may not hold away from such a solution. To enhance the robustness an...
 
XTreeNet: Scalable Overlay Networks for XML Content Dissemination and Querying (Synopsis)
Found in: Web Content Caching and Distribution, International Workshop on
By William Fenner, Michael Rabinovich, K. K. Ramakrishnan, Divesh Srivastava, Yin Zhang
Issue Date:September 2005
pp. 41-46
<p>XML is becoming a ubiquitous format for information exchange on the Internet. To alleviate the problems of
 
Finding Critical Traffic Matrices
Found in: Dependable Systems and Networks, International Conference on
By Yin Zhang, Zihui Ge
Issue Date:July 2005
pp. 188-197
<p>A traffic matrix represents the amount of traffic between origin and destination in a network. It has tremendous potential utility for many IP network engineering applications, such as network survivability analysis, traffic engineering, and capac...
 
On Self Adaptive Routing in Dynamic Environments - An Evaluation and Design Using a Simple, Probabilistic Scheme
Found in: Network Protocols, IEEE International Conference on
By Lili Qiu, Yang Richard Yang, Yin Zhang, Haiyong Xie
Issue Date:October 2004
pp. 12-23
Recently we have seen an emergent trend of self adaptive routing in both Internet and wireless ad hoc networks. Although there are previous methods for computing the traffic equilibria of self adaptive routing (e.g., selfish routing), these methods use com...
 
On Individual and Aggregate TCP Performance
Found in: Network Protocols, IEEE International Conference on
By Lili Qiu, Yin Zhang, Srinivasan Keshav
Issue Date:November 1999
pp. 203
As the most widely used reliable transport in today's Internet, TCP has been extensively studied in the past. However, previous research usually only considers a small or medium number of concurrent TCP flows. The TCP behavior under many competing TCP flow...
 
Cost-sensitive face recognition
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Yin Zhang, Zhi-Hua Zhou
Issue Date:June 2008
pp. 1-8
Traditional face recognition systems attempt to achieve a high recognition accuracy, which implicitly assumes that the losses of all misclassifications are the same. However, in many real-world tasks this assumption is not always reasonable. For example, i...
 
CARES: a ranking-oriented CADAL recommender system
Found in: Proceedings of the 2009 joint international conference on Digital libraries (JCDL '09)
By Baogang Wei, Chenxing Yang, Jiangqin Wu, Liang Zhang, Yin Zhang
Issue Date:June 2009
pp. 1-1
A recommender system is useful for a digital library to suggest the books that are likely preferred by a user. Most recommender systems using collaborative filtering approaches leverage the explicit user ratings to make personalized recommendations. Howeve...
     
Review-oriented metadata enrichment: a case study
Found in: Proceedings of the 2009 joint international conference on Digital libraries (JCDL '09)
By Chenxing Yang, Jiangqin Wu, Liang Zhang, Yin Zhang, Yueting Zhuang
Issue Date:June 2009
pp. 1-1
Book reviews contributed by readers in social sites contain valuable information on books' content, style and merit, many informative words in which can be used to enrich metadata of books in China-Us Million Book Digital Library. In this paper, we present...
     
ViceROI: catching click-spam in search ad networks
Found in: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (CCS '13)
By Saikat Guha, Yin Zhang, Vacha Dave
Issue Date:November 2013
pp. 765-776
Click-spam in online advertising, where unethical publishers use malware or trick users into clicking ads, siphons off hundreds of millions of advertiser dollars meant to support free websites and apps. Ad networks today, sadly, rely primarily on security ...
     
Incentivized cellular offloading via auctions
Found in: Proceedings of the seventh ACM international workshop on Mobility in the evolving internet architecture (MobiArch '12)
By K. K. Ramakrishnan, Leonid Razoumov, Lili Qiu, Rittwik Jana, Swati Rallapalli, Taewon Cho, Wei Dong, Yin Zhang
Issue Date:August 2012
pp. 1-2
The explosive growth of cellular traffic and its highly dynamic nature often make it prohibitive or even infeasible for a cellular service provider to provision enough cellular resources to support the peak traffic demands. The current best practice is to ...
     
Measuring and fingerprinting click-spam in ad networks
Found in: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication (SIGCOMM '12)
By Saikat Guha, Vacha Dave, Yin Zhang
Issue Date:August 2012
pp. 175-186
Advertising plays a vital role in supporting free websites and smartphone apps. Click-spam, i.e., fraudulent or invalid clicks on online ads where the user has no actual interest in the advertiser's site, results in advertising revenue being misappropriate...
     
Rapid detection of maintenance induced changes in service performance
Found in: Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies (CoNEXT '11)
By Ajay Mahimkar, Brian Huntley, Jennifer Yates, Jia Wang, Joanne Emmons, Mark Stockert, Yin Zhang, Zihui Ge
Issue Date:December 2011
pp. 1-12
Service quality in operational IP networks can be impacted due to planned or unplanned maintenance. During any maintenance activity, the responsibility of the operations team is to complete the work order and perform a check-up to ensure there are no unexp...
     
Hypergraph spectral hashing for similarity search of social image
Found in: Proceedings of the 19th ACM international conference on Multimedia (MM '11)
By Fei Wu, Jian Shao, Yang Liu, Yin Zhang, Yueting Zhuang
Issue Date:November 2011
pp. 1457-1460
The development of social media brings great challenges to image retrieval on both efficiency and accuracy. In addition to achieving fast similarity search over large scale data, it is very crucial to represent the complex and high-order relationships amon...
     
Analyzing IPTV set-top box crashes
Found in: Proceedings of the 2nd ACM SIGCOMM workshop on Home networks (HomeNets '11)
By Ajay Mahimkar, Han Hee Song, Jennifer Yates, Jia Wang, Yin Zhang, Zihui Ge
Issue Date:August 2011
pp. 31-36
Recent advances in residential broadband access technologies have led to a wave of commercial IPTV deployments. As IPTV services are rolled out at scale, it is essential for IPTV systems to maintain ultra-high reliability and performance. A major issue tha...
     
When personalization meets socialization: an iCADAL approach
Found in: Proceeding of the 11th annual international ACM/IEEE joint conference on Digital libraries (JCDL '11)
By Baogang Wei, Haihan Yu, Jing Pan, Ruifeng Li, Xiaojun Wang, Yin Zhang
Issue Date:June 2011
pp. 459-460
CADAL has been a large-scale non-profit digital library. Besides various search facilities in the CADAL portal, we designed and implemented the iCADAL system for providing the user-oriented micro-content services on one million books in CADAL. Users of iCA...
     
A social network-aware top-N recommender system using GPU
Found in: Proceeding of the 11th annual international ACM/IEEE joint conference on Digital libraries (JCDL '11)
By Baogang Wei, Haihan Yu, Jiangqin Wu, Ruifeng Li, Xiaojun Wang, Yin Zhang
Issue Date:June 2011
pp. 287-296
A book recommender system is very useful for a digital library. Good book recommender systems can effectively help users find interesting and relevant books from the massive resources, by providing individual recommendation book list for each end-user. By ...
     
 1  2 Next >>