Search For:

Displaying 1-50 out of 148 total
The Contribution of Intellectual Capital to Firms
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Jin Shui-ying, Wu Ying-yu
Issue Date:December 2008
pp. 394-397
The principal purpose of this article is to investigate empirically the relation between intellectual capital and Chinese firms’ sustainable growth ability. Using data drawn from a sample of 699 companies publicly traded on Chinese Stock Exchange from 2000...
 
The Study of Suitable Operational Item Template Based on Bloom's Taxonomy
Found in: Computer Engineering and Applications, International Conference on
By Chorng-Shiuh Koong, Chi-Ying Wu, Shuhui Chiu
Issue Date:March 2010
pp. 299-303
Item templates do not solely confined to conventional true & false, multiple choice, completion item and short answer but also includes those of operational ones, for example, link, match, classification, and order. Since not all the same template can ...
 
Context-Aware Visual Tracking
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Ming Yang, Ying Wu, Gang Hua
Issue Date:July 2009
pp. 1195-1209
Enormous uncertainties in unconstrained environments lead to a fundamental dilemma that many tracking algorithms have to face in practice: Tracking has to be computationally efficient, but verifying whether or not the tracker is following the true target t...
 
View-Independent Recognition of Hand Postures
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Ying Wu, Thomas S. Huang
Issue Date:June 2000
pp. 2088
Since human hand is highly articulated and deformable, hand posture recognition is a challenging example in the research of view-independent object recognition. Due to the difficulties of the model-based approach, the appearance-based learning approach is ...
 
Order determination and sparsity-regularized metric learning adaptive visual tracking
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Nan Jiang, Wenyu Liu, Ying Wu
Issue Date:June 2012
pp. 1956-1963
Recent attempts of integrating metric learning in visual tracking have produced encouraging results. Instead of using fixed and pre-specified metric in visual appearance matching, these methods are able to learn and adjust the metric adaptively by finding ...
 
Discovering the Thematic Object in Commercial Videos
Found in: IEEE Multimedia
By Gangqiang Zhao,Junsong Yuan,Jiang Xu,Ying Wu
Issue Date:July 2011
pp. 56-65
The thematic object in a commercial video is representative of its content. The authors propose a data-mining method for thematic object discovery in commercials by finding spatially collocated visual features.
 
Variational Maximum A Posteriori by Annealed Mean Field Analysis
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Gang Hua, Ying Wu
Issue Date:November 2005
pp. 1747-1761
This paper proposes a novel probabilistic variational method with deterministic annealing for the maximum a posteriori (MAP) estimation of complex stochastic systems. Since the MAP estimation involves global optimization, in general, it is very difficult t...
 
A Co-inference Approach to Robust Visual Tracking
Found in: Computer Vision, IEEE International Conference on
By Ying Wu, Thomas S. Huang
Issue Date:July 2001
pp. 26
Visual tracking could be treated as a parameter estimation problem of target representation based on observations in image sequences. A richer target representation would incur better chances of successful tracking in cluttered and dynamic environments. Ho...
 
Capturing Natural Hand Articulation
Found in: Computer Vision, IEEE International Conference on
By Ying Wu, John Y. Lin, Thomas S. Huang
Issue Date:July 2001
pp. 426
Vision-based motion apturing of hand articulation is a challenging task, since the hand presents a motion of high degrees of freedom. Model-based approaches could be taken to approach this problem by searching in a high dimensional hand state space, and ma...
 
A Queue-Length-Based Detection Scheme for Urban Traffic Congestion by VANETs
Found in: 2012 IEEE 7th International Conference on Networking, Architecture, and Storage (NAS)
By Yuwei Xu,Ying Wu,Jingdong Xu,Dongying Ni,Gongyi Wu,Lin Sun
Issue Date:June 2012
pp. 252-259
Traffic congestion has become a global problem in urban areas, resulting in a great waste of time and fuel every year. Thus, the real-time detection for road congestion becomes a great challenge for both scientists and engineers. Recently, the technology o...
 
Data Collection for the Detection of Urban Traffic Congestion by VANETs
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Yuwei Xu, Ying Wu, Gongyi Wu, Jingdong Xu, Boxing Liu, Lin Sun
Issue Date:December 2010
pp. 405-410
Vehicle traffic congestion has become a serious urban phenomenon in recent years, resulting in a large number of negative effects both on economy and ecology. Thus, finding a way to detect traffic congestion is a highly urgent problem to be solved by scien...
 
One-Trip-Time based Congestion Control for Distributed Real-time Applications
Found in: MultiMedia and Information Technology, International Conference on
By Ying Wu, Dafan Dong, Zi Hu, Gongyi Wu
Issue Date:April 2010
pp. 204-207
The traditional loss based congestion control protocol is not suitable for media streaming. because the loss based congestion control can not limit the Round Trip Time and it is also too sensitive about one side congestion, while most ADSL links which ofte...
 
Application of Blind Source Separation in Ultrasonic NDE
Found in: Education Technology and Computer Science, International Workshop on
By Ying Wu, Tian-tai Guo, Bo Zhang, Lin Guo, Jun-jie Wu, Liang Zhao
Issue Date:March 2010
pp. 115-118
Blind source separation (BSS) allows the recovery of unknown signals from observed signals mixed by an unknown propagation medium, and is a promising technique for signal processing and data analysis. In ultrasonic nondestructive evaluation (NDE), BSS can ...
 
Classification of Plant Leaves by Near-infrared Spectroscopy Using ANN and Wavelet
Found in: Education Technology and Computer Science, International Workshop on
By Tian-tai Guo, Bo Zhang, Lin Guo, Dong-sheng Li, Ying Wu, Jun-jie Wu, Liang Zhao
Issue Date:March 2010
pp. 20-23
Near-infrared (NIR) spectroscopy is a kind of non-destructive technology, which has many advantages. Infrared spectrum is highly characteristic and can be used to analyze and identify. However, researches and applications of NIR spectroscopy in plant class...
 
Research on Internet Storage Service Model and Protocol Based IPv6
Found in: Computer Science and Information Engineering, World Congress on
By Wu Ying, Wu Gongyi, Xu Jingdong
Issue Date:April 2009
pp. 96-100
With the rapid increase in the quantity of data and users of network storage, and the enhancement of security requirements and convenient access methods, the customary idea of storage research must be changed.The paper presents an Internet storage service ...
 
The Effect of Routing-Load Dispersion on Congestion Control in Structured P2P Networks
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Guowei Huang, Zhi Chen, Ying Wu, Gongyi Wu
Issue Date:December 2008
pp. 424-430
In structured P2P networks, the heterogeneity of node capacity, the skewness in query pattern and the greedy routing strategy could result in the load imbalance problem. However, existing load balancing algorithms for structured P2P networks mainly focused...
 
Deep Analysis of Intending Peer-to-Peer Botnet
Found in: Grid and Cloud Computing, International Conference on
By Dafan Dong, Ying Wu, Liang He, Guowei Huang, Gongyi Wu
Issue Date:October 2008
pp. 407-411
Botnet has recently been identified as one of the most important security threats of the Internet. So we should study the new technology which may be used by botmaster in the near future. In this paper we predict the new feature of the next generation botn...
 
Similarity Search in Metric Space over Content Addressable Network
Found in: High Performance Computing and Communications, 10th IEEE International Conference on
By Dafan Dong, Ying Wu, Xuefei Wang, Tao Luo, Guowei Huang, Gongyi Wu
Issue Date:September 2008
pp. 702-707
Similarity search plays an important part in data management field. In this paper, we present a novel similarity search scheme basing on Content Addressable Network (CAN) system. We design a new similarity measurement method to improve the system load bala...
 
A Spam Filter System Based on P2P Architecture
Found in: Networking, Architecture, and Storage, International Conference on
By Dafan Dong, Jianzhong Zhang, Ying Wu, Hongbo Lu, Gongyi Wu
Issue Date:June 2008
pp. 155-156
Nilsimsa algorithm plays an important part in the anti-spam technique. In the paper, we design a P2P based Anti-spam system using CAN Overlay, and demonstrate the effectiveness of our mechanism by simulation at last.
 
Learning Actionlet Ensemble for 3D Human Action Recognition
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Jiang Wang,Zicheng Liu,Ying Wu,Junsong Yuan
Issue Date:May 2014
pp. 1-1
Human action recognition is an important yet challenging task. Human actions usually involve human-object interactions, highly articulated motions, high intra-class variations, and complicated temporal structures. The recently developed commodity depth sen...
 
Learning Maximum Margin Temporal Warping for Action Recognition
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Jiang Wang,Ying Wu
Issue Date:December 2013
pp. 2688-2695
Temporal misalignment and duration variation in video actions largely influence the performance of action recognition, but it is very difficult to specify effective temporal alignment on action sequences. To address this challenge, this paper proposes a no...
 
Robust Dictionary Learning by Error Source Decomposition
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Zhuoyuan Chen,Ying Wu
Issue Date:December 2013
pp. 2216-2223
Sparsity models have recently shown great promise in many vision tasks. Using a learned dictionary in sparsity models can in general outperform predefined bases in clean data. In practice, both training and testing data may be corrupted and contain noises ...
 
Knowledge Discovery of Service Satisfaction Based on Text Analysis of Critical Incident Dialogues and Clustering Methods
Found in: 2013 IEEE 10th International Conference on e-Business Engineering (ICEBE)
By Charles Trappey, Hsin-Ying Wu, Kuan-Liang Liu, Feng-Teng Lin
Issue Date:September 2013
pp. 265-270
Text mining of consumer's dialogues regarding their service experiences provides a direct and unbiased feedback to service providers. This research proposes an analysis process to analyze unstructured input from consumer dialogues. The goal is to apply the...
 
Adoption of Internet Banking: An Empirical Study in Vietnam
Found in: 2013 IEEE 10th International Conference on e-Business Engineering (ICEBE)
By Feng-Teng Lin, Hsin-Ying Wu, Tran Thi Nguyet Nga
Issue Date:September 2013
pp. 282-287
Internet banking is growing faster than other e-commerce sectors and has emerged as an evolution in applied banking technology. This study investigates the factors influencing customer intention regarding Internet banking services in Vietnam using elements...
 
Design of event-based Intrusion Detection System on OpenFlow Network
Found in: 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Yung-Li Hu,Wei-Bing Su,Li-Ying Wu,Yennun Huang,Sy-Yen Kuo
Issue Date:June 2013
pp. 1-2
OpenFlow (OF) Network is a novel network architecture many famous cloud service providers have applied it to build their data center network. The difference between OF Network and traditional network architecture is the decoupling of controller planes and ...
 
Test Study and Contrast Analysis about Cold-formed Thin-wall Steel Joints
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Zhao Ying,Wu Xuetao,Zhang Xiaojiao
Issue Date:January 2013
pp. 1387-1389
Cold-formed thin-wall steel structure has so many advantages such as high strength and low weight that this kind of structure is used in building constructions more and more. Joint is one of the most important parts of the structure which play the key role...
 
Scribble Tracker: A Matting-Based Approach for Robust Tracking
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Jialue Fan, Xiaohui Shen, Ying Wu
Issue Date:August 2012
pp. 1633-1644
Model updating is a critical problem in tracking. Inaccurate extraction of the foreground and background information in model adaptation would cause the model to drift and degrade the tracking performance. The most direct yet difficult solution to the drif...
 
Modeling Government Role on the Innovation Diffusion of Infra-Technologies
Found in: 2012 Fifth International Conference on Business Intelligence and Financial Engineering (BIFE)
By Ying Wu,Wen Li
Issue Date:August 2012
pp. 416-420
In order to discuss government role on the diffusion of infra-technologies, a non-uniform model combined with the characteristics of infra-technology is proposed based on Bass model. The model first define government role through intellectual property prot...
 
Thermal-Electric Conversion Efficiency of the Dish/AMTEC Solar Thermal Power System in Wind Condition
Found in: 2012 Third International Conference on Digital Manufacturing and Automation (ICDMA)
By Lan Xiao,Shuang-Ying Wu,You-Rong Li
Issue Date:July 2012
pp. 972-974
The dish/AMTEC solar thermal power system is a newly proposed solar energy utilization system that enables the direct thermal-electric conversion. The performance of the solar dish/AMTEC system in wind condition has been theoretically evaluated in addition...
 
Decomposing and regularizing sparse/non-sparse components for motion field estimation
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Zhuoyuan Chen, Jiang Wang, Ying Wu
Issue Date:June 2012
pp. 1776-1783
Regularizing motion field is critical to achieve accurate estimation of the motion field. As the motion field may include discontinuity (e.g., at the motion boundaries), traditional smoothness regularization may not work well. Among many approaches to hand...
 
Mining actionlet ensemble for action recognition with depth cameras
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Jiang Wang, Zicheng Liu, Ying Wu, Junsong Yuan
Issue Date:June 2012
pp. 1290-1297
Human action recognition is an important yet challenging task. The recently developed commodity depth sensors open up new possibilities of dealing with this problem but also present some unique challenges. The depth maps captured by the depth cameras are v...
 
Object retrieval and localization with spatially-constrained similarity measure and k-NN re-ranking
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Xiaohui Shen, Zhe Lin,J. Brandt,S. Avidan, Ying Wu
Issue Date:June 2012
pp. 3013-3020
One fundamental problem in object retrieval with the bag-of-visual words (BoW) model is its lack of spatial information. Although various approaches are proposed to incorporate spatial constraints into the BoW model, most of them are either too strict or t...
 
A unified approach to salient object detection via low rank matrix recovery
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Xiaohui Shen, Ying Wu
Issue Date:June 2012
pp. 853-860
Salient object detection is not a pure low-level, bottom-up process. Higher-level knowledge is important even for task-independent image saliency. We propose a unified model to incorporate traditional low-level features with higher-level guidance to detect...
 
Measurements Study on the I/O Performance of Virtualized Cloud System
Found in: 2012 IEEE 7th International Conference on Networking, Architecture, and Storage (NAS)
By Lingjun Pu,Jingdong Xu,Xing Jin,Ying Wu,Jianzhong Zhang
Issue Date:June 2012
pp. 298-302
By splitting up an underutilized physical host into several virtualized domains, Virtualization can make the optimal use of resources and reduce the energy consumption. By delving into the types of I/O applications, adjusting amount of resource, and combin...
 
Distribution of Heavy Metal Concentration of Sewage Sludge in China
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Xiao-Ying Wu,Jin-Ye Li,Ming Zhang,Ming-Juan Shi
Issue Date:May 2012
pp. 1354-1356
Heavy metal contained in sewage sludge prevented the safety resource utilization of sludge and need to be disposed. Survey was conducted to find out main heavy metals in sludge generated in wastewater treatment plants in China and approximate content range...
 
An Algorithm for Calculating Access Time Windows of Spot Targets Based on Space Geometry Model
Found in: Communication Systems and Network Technologies, International Conference on
By Xiao-Dong Liu,Ying-Wu Chen,Ren-Jie He,Ju-Fang Li
Issue Date:May 2012
pp. 459-462
STK software is usually used to calculate access time windows for observing spot targets in aerospace, but it's difficult to develop some applications based on STK. In this paper, we present a novel algorithm for calculating roll angles and access time win...
 
Efficient Detection Scheme for Urban Traffic Congestion Using Buses
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Yuwei Xu,Ying Wu,Jingdong Xu,Lin Sun
Issue Date:March 2012
pp. 287-293
Urban traffic congestion has become a global phenomenon in recent years, resulting in a great waste of time and fuel. Thus, it is a great challenge for both scientists and engineers to detect the road condition timely and accurately. The technology of vehi...
 
An RSU-assisted Cluster Head Selection and Backup Protocol
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Lin Sun,Ying Wu,Jingdong Xu,Yuwei Xu
Issue Date:March 2012
pp. 581-587
In VANET, vehicles moving on the highway usually form clusters, and the wireless communications between vehicles are generally conducted by cluster heads. In most cluster-based protocols, however, the cluster head selection carried out through inter-cluste...
 
Incremental Maintenance of Topological Patterns in Spatial-Temporal Database
Found in: Data Mining Workshops, International Conference on
By Yi-Cheng Chen,Chao-Ying Wu,Suh-Yin Lee
Issue Date:December 2011
pp. 853-860
Spatial temporal mining is an important research area with many interesting topics. Most spatial temporal databases are updating incrementally with time. Some discovered topological patterns may be invalidated and some new topological patterns may be intro...
 
Research on Usage Control Model in Work Flow
Found in: Multimedia Information Networking and Security, International Conference on
By Hai Ying Wu
Issue Date:November 2011
pp. 326-329
With the Work Flow (WF) applies in the modern system on a large scale, tasks of access control management becomes more and more complex among the modern information system which also advances new requirements. This paper uses the task as core and adopts Us...
 
Action recognition with multiscale spatio-temporal contexts
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Jiang Wang, Zhuoyuan Chen, Ying Wu
Issue Date:June 2011
pp. 3185-3192
The popular bag of words approach for action recognition is based on the classifying quantized local features density. This approach focuses excessively on the local features but discards all information about the interactions among them. Local features th...
 
Adaptive and discriminative metric differential tracking
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Nan Jiang, Wenyu Liu, Ying Wu
Issue Date:June 2011
pp. 1161-1168
Matching the visual appearances of the target over consecutive image frames is the most critical issue in video-based object tracking. Choosing an appropriate distance metric for matching determines its accuracy and robustness, and significantly influences...
 
Nonlocal matting
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By P. Lee, Ying Wu
Issue Date:June 2011
pp. 2193-2200
This work attempts to considerably reduce the amount of user effort in the natural image matting problem. The key observation is that the nonlocal principle, introduced to denoise images, can be successfully applied to the alpha matte to obtain sparsity in...
 
Tracking low resolution objects by metric preservation
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Nan Jiang, Heng Su, Wenyu Liu, Ying Wu
Issue Date:June 2011
pp. 1329-1336
Tracking low resolution (LR) targets is a practical yet quite challenging problem in real applications. The loss of discriminative details in the visual appearance of the L-R targets confronts most existing visual tracking methods. Although the resolution ...
 
Mining discriminative co-occurrence patterns for visual recognition
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Junsong Yuan, Ming Yang, Ying Wu
Issue Date:June 2011
pp. 2777-2784
The co-occurrence pattern, a combination of binary or local features, is more discriminative than individual features and has shown its advantages in object, scene, and action recognition. We discuss two types of co-occurrence patterns that are complementa...
 
Discriminative Video Pattern Search for Efficient Action Detection
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Junsong Yuan, Zicheng Liu, Ying Wu
Issue Date:September 2011
pp. 1728-1743
Actions are spatiotemporal patterns. Similar to the sliding window-based object detection, action detection finds the reoccurrences of such spatiotemporal patterns through pattern matching, by handling cluttered and dynamic backgrounds and other types of a...
 
Effect of Cavity Wall Temperature and Opening Ratio on the Natural Convection Heat Loss Characteristics of a Solar Cavity Receiver
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Lan Xiao, Shuang-Ying Wu, You-Rong Li
Issue Date:February 2011
pp. 1112-1115
The natural convection heat loss characteristics of a solar cavity receiver have been investigated by numerical simulation method. The results show that, the natural convection heat loss, the convection heat transfer coefficient and Nusselt number increase...
 
Sequential Frequency Vector Based System Call Anomaly Detection
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Ying Wu, Jianhui Jiang, Liangliang Kong
Issue Date:December 2010
pp. 215-222
Although either of temporal ordering and frequency distribution information embedded in process traces can profile normal process behaviors, but none of ever published schemes uses both of them to detect system call anomaly. This paper claims combining tho...
 
A Study on Software Reliability Prediction Based on Transduction Inference
Found in: Asian Test Symposium
By Jungang Lou, Jianhui Jiang, Chunyan Shuai, Ying Wu
Issue Date:December 2010
pp. 77-80
Non-parametric statistical methods are applied to verdict that early failure behavior of the testing process may have less impact on later failure process, so it happens in software failure time prediction that one does not have enough information to estim...
 
Bipolar grouping
Found in: Multimedia and Expo, IEEE International Conference on
By Jiang Xu, Junsong Yuan, Ying Wu
Issue Date:July 2010
pp. 54-59
Most affinity-based grouping methods only model the inclusive relation among the data. When the data set contains a significant amount of noise data that should not be included in any clusters, these methods are likely to lead to undesired results. To addr...
 
 1  2 Next >>