Search For:

Displaying 1-45 out of 45 total
A New Universal-Environment Adaptive Multi-processor Scheduler for Autonomous Cyber-Physical System
Found in: Computer and Information Science, ACIS International Conference on
By Kailong Zhang,Yuan Yao,Ouassila Labanni,Zhou Lu,Xiao Wu,Kailong Zhang,Yuan Yao,Zhou Lu,Xiao Wu
Issue Date:June 2012
pp. 373-378
Robot, spaceship and other applications that can be called autonomous Cyber-Physical Systems (CPS) are all smart embedded systems, which usually run in open environment by themselves with inhered intelligent capabilities. Besides the application intelligen...
 
Real-Time Hand Pose Estimation from RGB-D Sensor
Found in: 2012 IEEE International Conference on Multimedia and Expo (ICME)
By Yuan Yao,Yun Fu
Issue Date:July 2012
pp. 705-710
Hand pose estimation in cluttered environment is always challenging. In this paper, we address the problem of hand pose estimation from RGB-D sensor. To achieve robust real-time usability, we first design a data acquisition strategy, using a color glove to...
 
Power Cost Reduction in Distributed Data Centers: A Two-Time-Scale Approach for Delay Tolerant Workloads
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yuan Yao,Longbo Huang,Abhishek B. Sharma,Leana Golubchik,Michael J. Neely
Issue Date:January 2014
pp. 200-211
This paper considers a stochastic optimization approach for job scheduling and server management in large-scale, geographically distributed data centers. Randomly arriving jobs are routed to a choice of servers. The number of active servers depends on serv...
 
Improving the Revenue, Efficiency and Reliability in Data Center Spot Market: A Truthful Mechanism
Found in: 2013 IEEE 21st International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS)
By Kai Song,Yuan Yao,Leana Golubchik
Issue Date:August 2013
pp. 222-231
Data centers are typically over-provisioned, in order to meet certain service level agreements (SLAs) under worst-case scenarios (e.g., peak loads). Selling unused instances at discounted prices thus is a reasonable approach for data center providers to of...
 
Boreas: an accurate and scalable token-based approach to code clone detection
Found in: 2012 27th IEEE/ACM International Conference on Automated Software Engineering (ASE)
By Yang Yuan,Yao Guo
Issue Date:September 2012
pp. 286-289
Detecting code clones in a program has many applications in software engineering and other related fields. In this paper, we present Boreas, an accurate and scalable token-based approach for code clone detection. Boreas introduces a novel counting-based me...
 
Subgraph Extraction for Trust Inference in Social Networks
Found in: 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
By Yuan Yao, Hanghang Tong, Feng Xu, Jian Lu
Issue Date:August 2012
pp. 163-170
Trust inference is an essential task in many real world applications. Most of the existing inference algorithms suffer from the scalability issue, making themselves computationally costly, or even infeasible, for the graphs with more than thousands of node...
 
Relationship between Resource-Based Multinational Corporations and Host Country
Found in: 2012 Fifth International Conference on Business Intelligence and Financial Engineering (BIFE)
By Yuan Yao,Jingru Jiao
Issue Date:August 2012
pp. 583-587
No summary available.
 
CMCD: Count Matrix Based Code Clone Detection
Found in: Asia-Pacific Software Engineering Conference
By Yang Yuan,Yao Guo
Issue Date:December 2011
pp. 250-257
This paper introduces CMCD, a Count Matrix based technique to detect clones in program code. The key concept behind CMCD is Count Matrix, which is created while counting the occurrence frequencies of every variable in situations specified by pre-determined...
 
Region-Based Line Field Design Using Harmonic Functions
Found in: IEEE Transactions on Visualization and Computer Graphics
By Chih-Yuan Yao,Ming-Te Chi,Tong-Yee Lee,Tao Ju
Issue Date:June 2012
pp. 902-913
Field design has wide applications in graphics and visualization. One of the main challenges in field design has been how to provide users with both intuitive control over the directions in the field on one hand and robust management of its topology on the...
 
Simulating human saccadic scanpaths on natural images
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Wei Wang, Cheng Chen, Yizhou Wang, Tingting Jiang, Fang Fang, Yuan Yao
Issue Date:June 2011
pp. 441-448
Human saccade is a dynamic process of information pursuit. Based on the principle of information maximization, we propose a computational model to simulate human saccadic scanpaths on natural images. The model integrates three related factors as driven for...
 
A Technology Based Benefit Analysis on Reuse of Vector Register for SIMD Vectorization Optimization
Found in: Information Science and Engieering, International Symposium on
By Ming Yang, Yuan Yao, Shuai Wei, Yuanyuan Zhang, Lei Huang
Issue Date:December 2010
pp. 101-104
The reuse-rate of vector register is one of the most important aspects that influence the SIMD performance. However, the reuse of vector register probably can lead ton on-continuous memory access and non-hit of cache. Based on register reuse analysis, we e...
 
A History-Case-Based Rapid Prototyping and Manufacturing System
Found in: System Science, Engineering Design and Manufacturing Informatization, International Conference on
By Kai Zhou, Yuan Yao, Qingxi Hu, Di Wu
Issue Date:November 2010
pp. 133-136
Online business is growing rapidly for small sized companies in retail industry, but the small companies’ online manufacturing services are less developed. The main reason is that the manufacturing process is very complex. And there are a lot of manufactur...
 
Management Decision-Making Based on Fuzzy Neural Network
Found in: International Conference on E-Business and E-Government
By Yuan Yao,Xiaokun Zhou,Peng Dong
Issue Date:May 2010
pp. 2454-2456
In this paper, it proposes fuzzy neural network(NN) system which is used for management decision-making and composed of three separate networks. The system's input can be both figures and vector language. The system's output exceeds the standard neural net...
 
Stability Analysis of Patent Pool via a Novel Growth-Absorption Model of Knowledge Stocks
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Yuan Yao, Wei Song, Linyu Fang
Issue Date:December 2009
pp. 262-265
By establishing a novel model on the growth of knowledge stocks, we first perform analysis on the requirements that enterprises join a patent pool. After that, a function model of knowledge absorption capacity is introduced, based on which, we take the inf...
 
FEAS: Fuzzy-Logic Based Environment Adaptive Scheduler for Agent System
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Kailong Zhang, Xingshe Zhou, Yuan Yao, Chongqing Zhao
Issue Date:May 2009
pp. 269-274
According to the environment adaptability require-ment of an autonomous agent system, this paper studies the mapping relationships between the dynamic environment aspects and task scheduling, and then, gives the definitions and computation models of the ta...
 
On the tradeoff between playback delay and buffer space in streaming
Found in: Parallel and Distributed Processing Symposium, International
By Alix L.H. Chow,Leana Golubchik,Samir Khuller,Yuan Yao
Issue Date:May 2009
pp. 1-12
We consider the following basic question: a source node wishes to stream an ordered sequence of packets to a collection of receivers, which are distributed among a number of clusters. A node may send a packet to another node in its own cluster in one time ...
 
A New Modeling Method on Skull Defect Repair
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Fei You, Qingxi Hu, Yuan Yao, Qi Lu
Issue Date:April 2009
pp. 568-572
To obtain the fairing surface model of the loss part of detective skull rapidly, a new modeling method on skull defect repair is proposed in this paper. This method is to adopt the surface reconstruction algorithm to construct the local model of defective ...
 
Video Multipoint Processor Based on H.264 and DM642
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Yuan Yao, Zhengbing Hu, Jinsheng Xiao, Benshun Yi, Honggang Xie
Issue Date:April 2009
pp. 851-854
An embedded video multipoint processor in videoconferencing system is presented. The embedded video multipoint processor hardware system is designed based on TMS320DM642, which can meet the requirements of real time and video processing in videoconference....
 
An Enterprise Ontology Model for Web Services of Web-Based Manufacturing
Found in: Computer Science and Information Engineering, World Congress on
By Yuan Yao, Guangwen Lu, Qingxi Hu
Issue Date:April 2009
pp. 508-512
This paper aims to resolve the problem of lacking of necessary semantic information when web service is described in the filed of web-based manufacturing. An enterprise ontology model is built from the view of web service. The enterprise class, as the cent...
 
Architecture Design of RP-Oriented Rapid Response Service System
Found in: Computer Science and Information Engineering, World Congress on
By Di Wu, Qingxi Hu, Yuan Yao, Gaochun Xu, Minglun Fang
Issue Date:April 2009
pp. 101-105
Aiming at the present situation of Rapid Manufacturing (RM) and demands of whole manufacture industry in China, The paper presents the rapid response service system for RM enterprises. It provides basic frame of manufacturing service which integrate RM ent...
 
A Study on Workflow Technology for RP Application
Found in: Computer Science and Information Engineering, World Congress on
By Di Wu, Qingxi Hu, Yuan Yao, Gaochun Xu, Minglun Fang
Issue Date:April 2009
pp. 1-5
At present, the workflow technology has been widely used in manufacturing. The people rely more and more on the workflow management system (WfMS), at the same time, people have higher demand on the flexibility, stability, and interactive ability of WfMS. O...
 
Design and Implementation of a Knowledge Engineering-Based Dental Diagnostic Expert System (DDES)
Found in: Computer Science and Information Engineering, World Congress on
By Haiguang Zhang, Qingxi Hu, Yuan Yao, Qi Wang
Issue Date:April 2009
pp. 362-366
In this paper, we propose an expert system which is based on Knowledge Engineering named DDES - Dental Diagnostic Expert System. Besides, a hybrid knowledge acquisition strategy is proposed to efficiently elicit the knowledge from experienced dentists and ...
 
Study on Generation of Macro-pores of Bionic Bone Scaffold Based on Knapsack Problem Model
Found in: Computer Science and Information Engineering, World Congress on
By Fei You, Qingxi Hu, Yuan Yao, Gaochun Xu, Minglun Fang
Issue Date:April 2009
pp. 559-563
An algorithm to generate macro-pores of bionic bone scaffold is proposed based on knapsack problem model in the paper. That is to construct the negative model of macro-pore structure of bionic bone scaffold according to the structure of knapsack problem mo...
 
Study on Web Service Matching and Composition Based on Ontology
Found in: Computer Science and Information Engineering, World Congress on
By Fei You, Qingxi Hu, Yuan Yao, Gaochun Xu, Minglun Fang
Issue Date:April 2009
pp. 542-546
Because web service function is continually strengthened, and web service quantity increases rapidly, it is urgent to solve the problem on automatic service matching and composition to meet service request. The service matching algorithm for bionic manufac...
 
Design of a Prototype for Augmented Reality Defective Bone Repair Simulation System
Found in: Education Technology and Computer Science, International Workshop on
By Yuan Yao, Xiu-xiang Pang, Tao Liu, Qing-xi Hu
Issue Date:March 2009
pp. 66-70
Combining the exiting bone scaffold design system and augmented reality interactive technology, this paper presents an aided planning and test interactive system frame for defective bone repair surgery, and develops the prototype system based on it. The sy...
 
Collabrative Education UI in Augmented Reality from Remote to Local
Found in: Education Technology and Computer Science, International Workshop on
By Yuan Yao, Di Wu, Yu Liu
Issue Date:March 2009
pp. 670-673
The goal of this paper is to provide a easy way for manipulating 3D graphical object in remote education system. We describe a remote collaborative framework running in an augmented reality environment. It provides a nature operation interface for manipula...
 
Thoughts of Teaching Reform for
Found in: Knowledge Acquisition and Modeling, International Symposium on
By Yuan Yao, Shi-long Dong, Fen-rong Cao, Yan-wen Wu, Yu-tao Ling
Issue Date:December 2008
pp. 467-471
No summary available.
 
Wavelets Based on Lifting Scheme and Its Application on Image Processing
Found in: Knowledge Acquisition and Modeling, International Symposium on
By Jinsheng Xiao, Benshun Yi, Yuan Yao
Issue Date:December 2008
pp. 628-631
The lifting scheme is a fast and efficient method to realize wavelet transform. This paper aims at analysis the second generation wavelets based on the lifting scheme. It can fully control over these degrees of freedom to custom design the wavelet for a pa...
 
Adaptive Geometry Image
Found in: IEEE Transactions on Visualization and Computer Graphics
By Chih-Yuan Yao, Tong-Yee Lee
Issue Date:July 2008
pp. 948-960
We present a novel post-processing utility called adaptive geometry image (AGIM) for global parameterization techniques that can embed a 3D surface onto a rectangular1 domain. This utility first converts a single rectangular parameterization into many diff...
 
Multi-Aspect + Transitivity + Bias: An Integral Trust Inference Model
Found in: IEEE Transactions on Knowledge and Data Engineering
By Yuan Yao,Hanghang Tong,Xifeng Yan,Feng Xu,Jian Lu
Issue Date:July 2014
pp. 1-1
Inferring the pair-wise trust relationship is a core building block for many real applications. State-of-the-art approaches for such trust inference mainly employ the transitivity property of trust by propagating trust along connected users, but largely ig...
 
Variable Window for Outlier Detection and Impulsive Noise Recognition in Range Images
Found in: 2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)
By Jian Wang,Lin Mei,Yi Li,Jian-Ye Li,Kun Zhao,Yuan Yao
Issue Date:May 2014
pp. 857-864
To improve comprehensive performance of denoising range images, an impulsive noise (IN) denoising method with variable windows is proposed in this paper. Founded on several discriminant criteria, the principles of dropout IN detection and outlier IN detect...
 
A Comment on “Power Cost Reduction in Distributed Data Centers: A two Time Scale Approach for Delay Tolerant Workloads”
Found in: IEEE Transactions on Parallel and Distributed Systems
By Weiwei Fang,Yuan Yao,Longbo Huang,Abhishek Sharma,Leana Golubchik,Michael Neely
Issue Date:May 2014
pp. 1
This comment points out several mathematical errors in the proof of Therorem 3, and gives the correct expression of B3. (e-mail: wwfang@bjtu.edu.cn).
 
The Research on SLP Optimization Technique towards DSP
Found in: 2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science
By Weiyi Suo,Rongcai Zhao,Yuan Yao,Peng Liu
Issue Date:October 2012
pp. 179-183
According to the application of Super word Level Paralleism (SLP) auto-vectorization compiling system in Digital Signal Processing (DSP), due to the specialized functions of DSP frame, such as the specific addressing model, a wide variety of registers, irr...
 
Web User Trust Relationship Prediction Based on Cloud Model
Found in: Proceedings of the Second International Conference on Innovative Computing and Cloud Computing (ICCC '13)
By Baoping Feng, Junhua Wang, Qian Zhang, Tianyi Zhang, Wanli Zuo, Xianglin Zuo, Yuan Yao
Issue Date:December 2013
pp. 143-147
Web user trustiness is closely related to web information credibility, which has attracted wide spread concern since the emergence of Web 2.0. Motivated by the randomness and fuzziness of user trust relationships at the web age, this paper proposes a novel...
     
Towards an operating system for the campus
Found in: Proceedings of the 5th Asia-Pacific Symposium on Internetware (Internetware '13)
By Pengfei Yuan, Yao Guo, Xiangqun Chen
Issue Date:October 2013
pp. 1-4
Almost every computing device runs an operating system, which is responsible for managing different resources on the device and providing higher-level programming abstractions. This paper proposes CampusOS, an operating system which is responsible for mana...
     
Enhancing trustworthiness evaluation in internetware with similarity and non-negative constraints
Found in: Proceedings of the 5th Asia-Pacific Symposium on Internetware (Internetware '13)
By Feng Xu, Jian Lu, Guo Yan, Yuan Yao
Issue Date:October 2013
pp. 1-4
Internetware is envisioned as a new software paradigm where software developers usually need to interact with unknown partners as well as the software entities developed by them. To reduce uncertainty and boost collaborations in such setting, it is importa...
     
Robust evaluation for quality of experience in crowdsourcing
Found in: Proceedings of the 21st ACM international conference on Multimedia (MM '13)
By Qianqian Xu, Jiechao Xiong, Qingming Huang, Yuan Yao
Issue Date:October 2013
pp. 43-52
Strategies exploiting crowdsourcing are increasingly being applied in the area of Quality of Experience (QoE) for multimedia. They enable researchers to conduct experiments with a more diverse set of participants and at a lower economic cost than conventio...
     
Emerging images synthesis from photographs
Found in: ACM SIGGRAPH 2013 Posters (SIGGRAPH '13)
By Chia-Lun Ku, Chih-Yuan Yao, Hung-Kuo Chu, Mao-Fong Jian, Ruen-Rone Lee, Yu-Shuen Wang
Issue Date:July 2013
pp. 1-1
Emergence refers to a phenomenon by which human perceives complete objects in a seemingly noisy image not by recognizing local parts of image but viewing the image as a whole. The Dalmatian dog image created by R. C. James is probably the best demonstratio...
     
Adaptive manga re-layout on mobile device
Found in: ACM SIGGRAPH 2013 Posters (SIGGRAPH '13)
By Chia-Jung Tsai, Chih-Yuan Yao, Hung-Kuo Chu, Ming-Te Chi, Pei-ying Chiang, Yu-Chi Lai, Yu-Shiang Wong, Yu-Shuen Wang
Issue Date:July 2013
pp. 1-1
In the present day, smart phones and tablets are popular electronic devices for business, entertainment or study due to their convenience, portability and intuitive user interfaces. However, these advantages also induce one of their limitations: the limite...
     
Refocusing images captured from a stereoscopic camera
Found in: ACM SIGGRAPH 2013 Posters (SIGGRAPH '13)
By Chia-Lun Ku, Chia-Sheng Chang, Chih-Yuan Yao, Hung-Kuo Chu, Yu-Shuen Wang
Issue Date:July 2013
pp. 1-1
Traditional photography projects a 3D scene to a 2D image without recording the depth of each local region, which prevents users from changing the focus plane of a photograph once it has been taken. To tackle this problem, Ng et al. [2005] presented light-...
     
Property management in wireless sensor networks with overcomplete radon bases
Found in: ACM Transactions on Sensor Networks (TOSN)
By Leonidas Guibas, Mo Li, Xiaoye Jiang, Yuan Yao
Issue Date:May 2013
pp. 1-26
This article presents a scalable algorithm for managing property information about moving objects tracked by a sensor network. Property information is obtained via distributed sensor observations, but will be corrupted when objects mix up with each other. ...
     
Boreas: an accurate and scalable token-based approach to code clone detection
Found in: Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering (ASE 2012)
By Yang Yuan, Yao Guo
Issue Date:September 2012
pp. 286-289
Detecting code clones in a program has many applications in software engineering and other related fields. In this paper, we present Boreas, an accurate and scalable token-based approach for code clone detection. Boreas introduces a novel counting-based me...
     
Random partial paired comparison for subjective video quality assessment via hodgerank
Found in: Proceedings of the 19th ACM international conference on Multimedia (MM '11)
By Bowei Yan, Qianqian Xu, Qingming Huang, Tingting Jiang, Weisi Lin, Yuan Yao
Issue Date:November 2011
pp. 393-402
Subjective visual quality evaluation provides the groundtruth and source of inspiration in building objective visual quality metrics. Paired comparison is expected to yield more reliable results; however, this is an expensive and timeconsuming process. In ...
     
A Novel Parameter Learning Algorithm for a Self-constructing Fuzzy Neural Network Design
Found in: Computer and Information Science, ACIS International Conference on
By Yuan YAO, Kailong Zhang, Xinshe Zhou
Issue Date:June 2009
pp. 77-81
This paper proposes a novel parameter learning algorithm for a self-constructing fuzzy neural network (SCFFN) design. It concludes dynamic prior adjustment (DPA) which is employed to adjust parameters according to the distribution of the input samples and ...
 
Development of Infrared Real-time Imaging System Based on SOPC
Found in: Embedded Software and Systems, Second International Conference on
By Lu Yuan-yao, Wang Jing-zhong, Chang Feng-wei
Issue Date:July 2008
pp. 63-68
With SOPC technology uncooled focal plane infrared (IR) imaging system has smaller size, lower power consumption and better performance. The paper designs and implements a real time infrared imaging processing system based SOPC. Using UL 01 01 1 IR detecto...
 
 1