Search For:

Displaying 1-34 out of 34 total
The Spectrum Analysis Optimization for Band-limited Discrete Spectrum Continuous Signal Based on PSO
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Ling Yun,Peng Qionglin,Xiao Shenping
Issue Date:January 2013
pp. 1541-1544
In the actual system the law of changing with time of continuous signal can be completely described by the signal frequency spectrum. Only choose the reasonable sampling frequency and sampling time zone width, signal spectrum can approximate continuous sig...
A Cellular Automaton Model with Extended Neighborhood for Epidemic Propagation
Found in: Computational Sciences and Optimization, International Joint Conference on
By Chao Guan, Wenyan Yuan, Yun Peng
Issue Date:April 2011
pp. 623-627
A cellular automaton model with extended neighborhood is presented to simulate an infectious disease outbreak. The model facilitates the study of the dynamics of epidemics of different infectious diseases. The effects of different infectivity parameters, i...
A New Weighted Ensemble Model for Detecting DoS Attack Streams
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Jinghua Yan, Xiaochun Yun, Peng Zhang, Jianlong Tan, Li Guo
Issue Date:September 2010
pp. 227-230
Recently, DoS (Denial of Service) detection has become more and more important in web security. In this paper, we argue that DoS attack can be taken as continuous data streams, and thus can be detected by using stream data mining methods. More specifically...
Twin Butterfly High Throughput Parallel Architecture FFT Algorithm
Found in: Information Science and Engieering, International Symposium on
By Wang Chao, Han Yun Peng
Issue Date:December 2008
pp. 637-640
A novel parallel memory accessing for decimation-in-time twin butterfly parallel architecture radix-4 FFT algorithm is proposed, which is based on
An Algorithm of Web Text Clustering Analysis Based on Fuzzy Set
Found in: Computer Science and Computational Technology, International Symposium on
By Yun Peng, Shu-liang Ding
Issue Date:December 2008
pp. 109-113
There are a large quantity of non-certain and non-structure contents in the web text at the present time. It is difficult to cluster the text by some normal classification methods. An algorithm of web text clustering analysis based on fuzzy set is proposed...
An Efficient Method for Probabilistic Knowledge Integration
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Shenyong Zhang, Yun Peng, Xiaopu Wang
Issue Date:November 2008
pp. 179-182
This paper presents an efficient method, SMOOTH, for modifying a joint probability distribution to satisfy a set of inconsistent constraints. It extends the well-known
Joint Routing and Channel Assignment in WMN Using Extended Petri Net
Found in: Distributed Computing Systems Workshops, International Conference on
By Hejiao Huang, Yun Peng, Jing Li
Issue Date:June 2008
pp. 108-113
This paper integrates routing, channel assignment and scheduling expecting for throughput optimization of traffic profile in wireless mesh networks (WMNs). In this paper, Extended Petri Net (EPN) is introduced to describe WMN for the first time. This model...
An Enhancement Dynamic Contract Net Protocol
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Zhao-Wen Wei, Jun-Yan Yan, Yun-Peng Ou
Issue Date:August 2007
pp. 475-480
In the paper, we do some enhancement based on DCNP. In the EDCNP, we improved the credibility update rules and lead credibility range[min, max] and the volatilization into the algorithm. In this way we can reduce the amount of calculating and improve the s...
Belief Update in Bayesian Networks Using Uncertain Evidence
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Rong Pan, Yun Peng, Zhongli Ding
Issue Date:November 2006
pp. 441-444
This paper reports our investigation on the problem of belief update in Bayesian networks (BN) using uncertain evidence. We focus on two types of uncertain evidences, virtual evidence (represented as likelihood ratios) and soft evidence (represented as pro...
Confessible Threshold Ring Signatures
Found in: Systems and Networks Communication, International Conference on
By Yu-Shian Chen, Chin-Laung Lei, Yun-Peng Chiu, Chun-Ying Huang
Issue Date:November 2006
pp. 25
We present two threshold ring signature schemes with different properties. One focuses on the confessibility (or signer verifiability) and the denouncibility properties. The other focuses on the threshold-confessibility. Our schemes are built on generic ri...
Secure Content Delivery using Key Composition
Found in: Local Computer Networks, Annual IEEE Conference on
By Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Hann-Huei Chiou, Chin-Laung Lei
Issue Date:November 2005
pp. 484-485
<p>In this paper, we propose a novel framework for secure multicast on overlay networks. Our contributions are threefold: 1) a technique key composition is proposed to cope with the secure multicast problems, 2) the proposed framework is totally dist...
Search on the Semantic Web
Found in: Computer
By Li Ding, Tim Finin, Anupam Joshi, Yun Peng, Rong Pan, Pavan Reddivari
Issue Date:October 2005
pp. 62-69
To help human users and software agents find relevant knowledge on the Semantic Web, the Swoogle search engine discovers, indexes, and analyzes the ontologies and facts that are encoded in Semantic Web documents.
Quantitative Agent Service Matching
Found in: Web Intelligence, IEEE / WIC / ACM International Conference on
By Xiaocheng Luan, Yun Peng, Timothy Finin
Issue Date:September 2004
pp. 334-340
The ultimate goal of service matching is to find the service provider(s) that would perform tasks of given description with the best overall degree of satisfaction. However, service description matching solves only part of the problem. Agents that match a ...
A Probabilistic Extension to Ontology Language OWL
Found in: Hawaii International Conference on System Sciences
By Zhongli Ding, Yun Peng
Issue Date:January 2004
pp. 40111a
To support uncertain ontology representation and ontology reasoning and mapping, we propose to incorporate Bayesian networks (BN), a widely used graphic model for knowledge representation under uncertainty and OWL, the de facto industry standard ontology l...
ITtalks: A Case Study in the Semantic Web and DAML+OIL
Found in: IEEE Intelligent Systems
By R. Scott Cost, Tim Finin, Anupam Joshi, Yun Peng, Charles Nicholas, Ian Soboroff, Harry Chen, Lalana Kagal, Filip Perich, Youyoung Zou, Sovrin Tolia
Issue Date:January 2002
pp. 40-47
<p>Effective use of the multitude of information available on the Web will require the use of Semantic Web markup languages such as the DARPA Agent Markup Language Ontology Inference Layer (DAML+OIL). These languages will enable automated information...
Mini-track on Multi-Agent Systems, Internet & Applications Software Technology Track
Found in: Hawaii International Conference on System Sciences
By Tim Finin, Anupam Joshi, Yannis Labrou, Yun Peng
Issue Date:January 2000
pp. 8032
The distributed, large-scale, and dynamic nature of the Internet has created the need for new technologies that will allow users and application developers to harness its potential. This is especially so in emerging applications areas such as electronic co...
An Agent-Based Infrastructure for Enterprise Integration
Found in: Agent Systems and Applications, International Symposium on / International Symposium on Mobile Agents
By R. Scott Cost, Tim Finin, Yannis Labrou, Xiaocheng Luan, Yun Peng, Ian Soboroff, James Mayfield, Akram Boughannam
Issue Date:October 1999
pp. 219
Jackal is a Java-based tool for communication using the KQML agent communication language. Some features that make it extremely valuable to agent development are its conversation management facilities, flexible, blackboard style interface and ease of integ...
Agent Communication Languages: The Current Landscape
Found in: IEEE Intelligent Systems
By Yannis Labrou, Tim Finin, Yun Peng
Issue Date:March 1999
pp. 45-52
Despite the substantial number of multi-agent systems that use an Agent Communication Language (ACL), the dust has not settled yet over the landscape of ACLs. The semantic specification issues have monopolized the debate at the expense of other important p...
The Interoperability Problem: Bringing Together Mobile Agents and Agent Communication Languages
Found in: Hawaii International Conference on System Sciences
By Yannis Labrou, Tim Finin, Yun Peng
Issue Date:January 1999
pp. 8063
Interoperability is a central issue for both the mobile agents community and the wider agents community. Un-fortunately, the interoperability concerns are different between the two communities. As a result, inter-agent communication is an issue that has be...
Side-Effect Estimation: A Filtering Approach to the View Update Problem
Found in: IEEE Transactions on Knowledge and Data Engineering
By Yun Peng,Byron Choi,Jianliang Xu,Haibo Hu,Sourav S. Bhowmick
Issue Date:September 2014
pp. 1-1
Views and their updates have long been a fundamental technology required in a wide range of applications. However, it has been known that updates through views is a classical intractable problem. In this paper, we propose a novel, data-oriented approach to...
Towards Efficient Authenticated Subgraph Query Service in Outsourced Graph Databases
Found in: IEEE Transactions on Services Computing
By Zhe Fan,Yun Peng,Byron Choi,Jianliang Xu,Sourav S. Bhowmick
Issue Date:November 2013
pp. 1
Graphs have been a powerful tool that is suitable for a large variety of applications including chemical databases and the Semantic Web, among others. A fundamental query of graph databases is subgraph query: given a query graph q, it retrieves the data gr...
Location-based Cooperative Vehicle Collision Avoidance for Unsignalized Intersections: A Multi-sensor Integration Approach
Found in: 2012 International Conference on Connected Vehicles and Expo (ICCVE)
By Liu Jiang,Cai Bai-Gen,Wang Yun-Peng,Wang Jian
Issue Date:December 2012
pp. 246-251
Safety assurance of vehicles is of great importance to improve the road transportation, especially at the unsignalized intersections. To eliminate safety threat that is mostly caused by vehicle-to-vehicle collisions, technologies and methodologies of coope...
Selectivity estimation of twig queries on cyclic graphs
Found in: Data Engineering, International Conference on
By Yun Peng,Byron Choi,Jianliang Xu
Issue Date:April 2011
pp. 960-971
Recent applications including the Semantic Web, Web ontology and XML have sparked a renewed interest on graph-structured databases. Among others, twig queries have been a popular tool for retrieving subgraphs from graph-structured databases. To optimize tw...
Session Mechanism Research Based on Agent in NetGAP
Found in: Intelligent Information Technology Application Workshops, International Symposium on
By Songsen Yu, Yun Peng, Yiju Zhan, Zhenyu Zhao
Issue Date:December 2008
pp. 395-398
NetGAP is used to physically isolate the internal and external networks. Its session strides over both sides of the network. Based on the characteristics of agent, this paper designs several kinds of agent components with file accumulation, content inspect...
A Mean Field Approach to MAP in Belief Networks
Found in: Neural Networks, IEEE - INNS - ENNS International Joint Conference on
By Yun Peng, Miao Jin
Issue Date:July 2000
pp. 5652
The maximum a posteriori probability (MAP) problem is to _nd the most probable instantiation of all un-instantiated variables, given an instantiations of a set of variables in a Bayesian belief network (BBN). MAP is known to be NP-hard. To circumvent the h...
Predicting the optimal ad-hoc index for reachability queries on graph databases
Found in: Proceedings of the 20th ACM international conference on Information and knowledge management (CIKM '11)
By Byron Choi, Fei Liu, Jianliang Xu, Jintian Deng, Yun Peng
Issue Date:October 2011
pp. 2357-2360
Due to the recent advances in graph databases, a large number of ad-hoc indexes for a fundamental query, in particular, reachability query, have been proposed. The performances of these indexes on different graphs have known to be very different. Worst sti...
A distributed key assignment protocol for secure multicast based on proxy cryptography
Found in: Proceedings of the 2006 ACM Symposium on Information, computer and communications security (ASIACCS '06)
By Chin-Laung Lei, Chun-Ying Huang, Kuan-Ta Chen, Yun-Peng Chiu
Issue Date:March 2006
pp. 359-359
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually one "group key" is shared by all approved members. However, this raises the problem of "one affects all," whereby the actions of one member a...
INDIGO: une architecture pour la conception d'applications graphiques interactives distribuées
Found in: Proceedings of the 17th conference on 17ème Conférence Francophone sur l'Interaction Homme-Machine (IHM 2005)
By Michel Beaudouin-Lafon, Renaud Blanch, Stephane Conversy, Thomas Baudel, Yannick Jestin, Yun Peng Zhao
Issue Date:September 2005
pp. 139-146
The INDIGO project develops a new generation of tools for distributed interactive applications. The proposed architecture is composed of object servers that manage the applications's data and interaction and rendering servers that manage display and intera...
Swoogle: a search and metadata engine for the semantic web
Found in: Proceedings of the Thirteenth ACM conference on Information and knowledge management (CIKM '04)
By Anupam Joshi, Joel Sachs, Li Ding, Pavan Reddivari, R. Scott Cost, Rong Pan, Tim Finin, Vishal Doshi, Yun Peng
Issue Date:November 2004
pp. 652-659
Swoogle is a crawler-based indexing and retrieval system for the Semantic Web. It extracts metadata for each discovered document, and computes relations between documents. Discovered documents are also indexed by an information retrieval system which can u...
Semantic resolution for e-commerce
Found in: Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 3 (AAMAS '02)
By Albert Jones, Michael Gruninger, Nenad Ivezic, Xiaocheng Luan, Youyong Zou, Yun Peng
Issue Date:July 2002
pp. 1037-1038
We describe a research project on resolving semantic differences for multi-agent systems (MAS) in electronic commerce. The approach can be characterized as follows: (1) agents in a MAS may have their own specific ontologies defined on top of a shared base ...
Agent development with Jackal
Found in: Proceedings of the third annual conference on Autonomous Agents (AGENTS '99)
By Akram Boughannam, Ian Soboroff, James Mayfield, R. Scott Cost, Tim Finin, Xiaocheng Luan, Yannis Labrou, Yun Peng
Issue Date:April 1999
pp. 358-359
When creating virtual reality environments a large amount of the interaction needs to be programmed. The problem with this is that non-computer expert users lack the programming skills necessary to create useful applications. Specifying interactions remain...
Cryptoanalysis and Improvement of Verifier-based Key Agreement Protocol in Cross-Realm Setting
Found in: Computational Intelligence and Security, International Conference on
By Jing-feng Li,Wei-feng Guo,Lai-shun Zhang,Yun-peng Li
Issue Date:December 2011
pp. 925-929
Most password-authenticated key agreement protocols have focused on authenticated key agreement using shared password between a client and a server. With the emergence of a variety of communication environments such as EPC global network, it is necessary t...
One Kind of Improved Load Balancing Algorithm in Grid Computing
Found in: Network Computing and Information Security, International Conference on
By Hai-yun Peng, Qian Li
Issue Date:May 2011
pp. 347-351
The article tries to solve the problems of resource load balance under the gridding environment, combined with the advantage of simulated annealing algorithm and genetic algorithm. It offered an optimal method of task scheduling based on genetic simulated ...
Practical Protocol Steganography: Hiding Data in IP Header
Found in: Asia International Conference on Modelling & Simulation
By Bo Xu, Jia-zhen Wang, De-yun Peng
Issue Date:March 2007
pp. 584-588
Steganography is defined as the art and science of hiding information, which is a process that involves hiding a message in an appropriate carrier for example an image file. The carrier can then be sent to a receiver without anyone else knowing that it con...