Search For:

Displaying 1-50 out of 83 total
A Privacy-Leakage-Tolerance Based Noise Enhancing Strategy for Privacy Protection in Cloud Computing
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Gaofeng Zhang, Yun Yang, Jinjun Chen
Issue Date:July 2013
pp. 1-8
Cloud computing promises a service-oriented environment where customers can utilise IT services in a pay-as-you-go fashion while saving huge capital investments on their own IT infrastructures. Due to the openness, malicious service providers may exist in ...
 
A Time-Series Pattern Based Noise Generation Strategy for Privacy Protection in Cloud Computing
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Gaofeng Zhang,Yun Yang,Xiao Liu,Jinjun Chen
Issue Date:May 2012
pp. 458-465
Cloud computing promises an open environment where customers can deploy IT services in a pay-as-you-go fashion while saving huge capital investment in their own IT infrastructure. Due to the openness, various malicious service providers may exist. Such ser...
 
An Algorithm for Cost-Effectively Storing Scientific Datasets with Multiple Service Providers in the Cloud
Found in: 2013 IEEE 9th International Conference on eScience (eScience)
By Dong Yuan, Xiao Liu, Lizhen Cui, Tiantian Zhang, Wenhao Li, Dahai Cao, Yun Yang
Issue Date:October 2013
pp. 285-292
The proliferation of cloud computing allows scientists to deploy computation and data intensive applications without infrastructure investment, where large generated datasets can be flexibly stored with multiple cloud service providers. Due to the pay-as-y...
 
A Highly Practical Approach toward Achieving Minimum Data Sets Storage Cost in the Cloud
Found in: IEEE Transactions on Parallel and Distributed Systems
By Dong Yuan,Yun Yang,Xiao Liu,Wenhao Li,Lizhen Cui,Meng Xu,Jinjun Chen
Issue Date:June 2013
pp. 1234-1244
Massive computation power and storage capacity of cloud computing systems allow scientists to deploy computation and data intensive applications without infrastructure investment, where large application data sets can be stored in the cloud. Based on the p...
 
Supporting Distributed Software Development Processes in a Web-Based Environment
Found in: Technology of Object-Oriented Languages, International Conference on
By Yun Yang, Paul Wojcieszak
Issue Date:September 1999
pp. 292
Research into software development processes has been active in the software engineering community for more than a decade. However, given the exposure of the Internet and the Web, there is a significant impact on Web-based software development support whic...
 
A Novel Timestamp Ordering Approach for Co-existing Traditional and Cooperative Transaction Processing
Found in: Cooperative Information Systems, IFCIS International Conference on
By Yanchun Zhang, Yahiko Kambayashi, Yun Yang, Chengzheng Sun
Issue Date:August 1998
pp. 132
In order to support both traditional short transaction and long cooperative transactions, we propose a novel timestamp ordering approach. With this timestamp ordering method, short transactions can be processed in the traditional way, as if there are no co...
 
Classification of and Experimentation on Tool Interfacing in Software Development Environments
Found in: Asia-Pacific Software Engineering Conference
By Yun Yang, Jun Han
Issue Date:December 1996
pp. 56
The effectiveness of tool integration in software development environments is ultimately measured by its ability in improving the productivity of the user. Traditionally, issues related to tool integration are often classified according to aspects of such ...
 
Formulating Cost-Effective Monitoring Strategies for Service-Based Systems
Found in: IEEE Transactions on Software Engineering
By Qiang He,Jun Han,Yun Yang,Hai Jin,Jean-Guy Schneider,Steve Versteeg
Issue Date:May 2014
pp. 461-482
When operating in volatile environments, service-based systems (SBSs) that are dynamically composed from component services must be monitored in order to guarantee timely and successful delivery of outcomes in response to user requests. However, monitoring...
 
An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Chang Liu, Xuyun Zhang, Chengfei Liu, Yun Yang,Rajiv Ranjan,Dimitrios Georgakopoulos, Jinjun Chen
Issue Date:July 2013
pp. 9-16
As the new-generation distributed computing platform, cloud computing environments offer high efficiency and low cost for data-intensive computation in big data applications. Cloud resources and services are available in pay-as-you-go mode, which brings ex...
 
A Decentralized Service Discovery Approach on Peer-to-Peer Networks
Found in: IEEE Transactions on Services Computing
By Qiang He,Jun Yan,Yun Yang,Ryszard Kowalczyk,Hai Jin
Issue Date:January 2013
pp. 64-75
Service-Oriented Computing (SOC) is emerging as a paradigm for developing distributed applications. A critical issue of utilizing SOC is to have a scalable, reliable, and robust service discovery mechanism. However, traditional service discovery methods us...
 
Data mining on prescription, herbal pairs, and pattern identification of pulmonary tuberculosis cases
Found in: 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)
By Yun Yang
Issue Date:October 2012
pp. 332-335
Purpose: Adapting the features of TCM, this study establishes a new methodology of clinical decision making, like online diagnosis and treatment. Methods: Firstly, using major symptoms as the keywords got 26 cases of He, Hongfang, an ancient pulmonary tube...
 
QoS-Driven Service Selection for Multi-tenant SaaS
Found in: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)
By Qiang He,Jun Han,Yun Yang,John Grundy,Hai Jin
Issue Date:June 2012
pp. 566-573
Cloud-based software applications (Software as a Service - SaaS) for multi-tenant provisioning have become a major development paradigm in Web engineering. Instead of serving a single end-user, a multi-tenant SaaS provides multiple end-users with the same ...
 
A Cost-Effective Mechanism for Cloud Data Reliability Management Based on Proactive Replica Checking
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Wenhao Li,Yun Yang,Jinjun Chen,Dong Yuan
Issue Date:May 2012
pp. 564-571
In current Cloud computing environments, management of data reliability has become a challenge. For data-intensive scientific applications, storing data in the Cloud with the typical 3-replica replication strategy for managing the data reliability would in...
 
A Novel Cost-Effective Dynamic Data Replication Strategy for Reliability in Cloud Data Centres
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Wenhao Li,Yun Yang,Dong Yuan
Issue Date:December 2011
pp. 496-502
Nowadays, large-scale Cloud-based applications have put forward higher demand for storage ability of data centres. Data in the Cloud need to be stored with high efficiency and cost effectiveness while meeting the requirement of reliability. While in curren...
 
A Generic QoS Framework for Cloud Workflow Systems
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Xiao Liu,Yun Yang,Dong Yuan,Gaofeng Zhang,Wenhao Li,Dahai Cao
Issue Date:December 2011
pp. 713-720
Due to the dynamic nature of cloud computing, how to achieve satisfactory QoS (Quality of Service) in cloud workflow systems becomes a challenge. Meanwhile, since QoS requirements have many dimensions, a unified system design for different QoS management c...
 
Context-aware Access Control Policy Research for Web Service
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Huabo Li,Yun Yang,Zhengqiu He,Guyu Hu
Issue Date:October 2011
pp. 529-532
Web service environment is characterized by its openness and distribution, in which the interacting entities usually have little knowledge about each other and may be in different domains, so the access control for web service has become a challenging prob...
 
Research on Intrusion Prevention System Using Imbalanced Classification
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Jiannan Xu,Yun Yang,Jun Luo,Xia Ding
Issue Date:October 2011
pp. 537-540
This paper designed an intrusion prevention system based on system call traces, which refers to imbalanced Classification algorithm called I-SVDD. The penalty factor C. Selection point using Genetic Algorithm was also put forward, Experiments show the actu...
 
The Application of Competency Model in Staff Training
Found in: Information Technology, Computer Engineering and Management Sciences, International Conference of
By Jiahai Yuan,Xue Yun,Yang Zhou
Issue Date:September 2011
pp. 153-155
In order to establish the training system which is suitable to the characteristics of enterprises and to improve the effectiveness of staff training, this paper discusses the competency theory and the application of correlative model in the entire training...
 
A Local-Optimisation Based Strategy for Cost-Effective Datasets Storage of Scientific Applications in the Cloud
Found in: Cloud Computing, IEEE International Conference on
By Dong Yuan,Yun Yang,Xiao Liu,Jinjun Chen
Issue Date:July 2011
pp. 179-186
Massive computation power and storage capacity of cloud computing systems allow scientists to deploy computation and data intensive applications without infrastructure investment, where large application datasets can be stored in the cloud. However, due to...
 
Sparse Signal Recovery Based on lq(0 < q = 1) Minimization
Found in: Multimedia and Signal Processing, International Conference on
By JianJun Wang, Chun-Yun Yang, Baili Chen
Issue Date:May 2011
pp. 239-242
In this paper, we present a concise analysis of the constrained lq(0 < q = 1)- minimization method for sparse signal recovery. The obtained results are helpful in understanding the recovery capability of lq-minimization, and meaningful in the developmen...
 
An Effective Framework of Light-Weight Handling for Three-Level Fine-Grained Recoverable Temporal Violations in Scientific Workflows
Found in: Parallel and Distributed Systems, International Conference on
By Xiao Liu, Zhiwei Ni, Zhangjun Wu, Dong Yuan, Jinjun Chen, Yun Yang
Issue Date:December 2010
pp. 43-50
Temporal violations may often take place and deteriorate the overall QoS of scientific workflows. To handle temporal violations in an automatic and cost-effective fashion, we need to resolve the following issues: 1) how to define fine-grained recoverable t...
 
Preventing Temporal Violations in Scientific Workflows: Where and How
Found in: IEEE Transactions on Software Engineering
By Xiao Liu,Yun Yang,Yuanchun Jiang,Jinjun Chen
Issue Date:November 2011
pp. 805-825
Due to the dynamic nature of the underlying high-performance infrastructures for scientific workflows such as grid and cloud computing, failures of timely completion of important scientific activities, namely, temporal violations, often take place. Unlike ...
 
An Improved Hybrid Peer-to-Peer Routing Algorithm
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Yun Yang, Guyu Hu, Shize Guo, Saisai Yu
Issue Date:September 2010
pp. 112-115
Now botnets have become the great threat of Internet Security. To be well prepared for future attacks, it is not enough to study how to defend against the botnets that have appeared in the past. More importantly, we should study advanced botnet designs tha...
 
Imbalanced Classification Algorithm in Botnet Detection
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Yun Yang, Guyu Hu, Shize Guo, Jun Luo
Issue Date:September 2010
pp. 116-119
An Imbalanced Classification anomaly detection algorithm called “I-SVDD” for detecting Botnet was put forward in this paper. The algorithm combines the One-Class classification with the known Intrusion behaviors. This algorithm has proven effective in redu...
 
Temporal Data Clustering via Weighted Clustering Ensemble with Different Representations
Found in: IEEE Transactions on Knowledge and Data Engineering
By Yun Yang, Ke Chen
Issue Date:February 2011
pp. 307-320
Temporal data clustering provides underpinning techniques for discovering the intrinsic structure and condensing information over temporal data. In this paper, we present a temporal data clustering framework via a weighted clustering ensemble of multiple p...
 
A novel image binarization method using hybrid thresholding
Found in: Multimedia and Expo, IEEE International Conference on
By Tien-Ying Kuo, Yun-Yang Lai, Yi-Chung Lo
Issue Date:July 2010
pp. 608-612
In this paper, we proposed a simple yet effective image binarization method to work with various kinds of images, such as images with the color bleeding characters, or with non-uniform background exposed to poor ambient light, and so forth. Our approach is...
 
Handling Recoverable Temporal Violations in Scientific Workflow Systems: A Workflow Rescheduling Based Strategy
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Xiao Liu, Jinjun Chen, Zhangjun Wu, Zhiwei Ni, Dong Yuan, Yun Yang
Issue Date:May 2010
pp. 534-537
Due to the complex nature of scientific workflow systems, the violations of temporal QoS constraints often take place and may severely affect the usefulness of the execution’s results. Therefore, to deliver satisfactory QoS, temporal violations need to be ...
 
Notice of Retraction The Design of Automotive Burglar-Proof Based on Human Face Recognition
Found in: 2009 International Conference on E-Learning, E-Business, Enterprise Information Systems, and E-Government (EEEE 2009)
By Yun Yang, JinHao Liu
Issue Date:December 2009
pp. 41-44
Notice of Retraction After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles. We hereby retract the content of this paper. Reas...
 
A Domain-Independent Exception Handling Method in Multi-agent System
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By He Liu, Qingshan Li, Haishun Yun, Yang Liu, Shaojie Mao, Yuping Li
Issue Date:November 2009
pp. 258-262
In multi-agent system (MAS), Exception handling is a complex problem due to distributed and decentralized nature of data and control in such systems. The agent has some uncertainties because of its autonomy, which increases the issue of handle Exception. T...
 
Novel Robust Image Watermarking Exploiting the Features of Double Domains
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Xinshan Zhu, Yun Yang, Yanming Chen
Issue Date:September 2009
pp. 921-924
This paper presents a novel image watermarking approach in the framework of double domain watermarking. The watermark pattern is generated as a discrete cosine transform domain signal, and adapted to the characteristics of human visual system by adjusting ...
 
A Dynamic Trust Evaluation Model on C2C Marketplaces
Found in: Computational Science and Engineering, IEEE International Conference on
By Yun Yang, Juhua Chen
Issue Date:August 2009
pp. 482-485
Today more and more users on C2C marketplaces turn to be professional sellers and their online stores become more like B2C websites. Since that, many C2C marketplaces introduced the trust evaluation model based on B2C to evaluate the credibility of each on...
 
Effects of Cognitive Style on User Acceptance of Blogs and Podcasts
Found in: Advanced Learning Technologies, IEEE International Conference on
By Nauman Saeed, Yun Yang, Suku Sinnappan
Issue Date:July 2009
pp. 293-297
Blogs and podcasts are emerging Web technologies that have been adopted by educators to facilitate on-campus and distance education. However, little is known about user acceptance of these technologies. In this paper, we empirically test a theoretical mode...
 
A Multiple Level Set Model for Multispectral Image Unsupervised Classification
Found in: Education Technology and Training & Geoscience and Remote Sensing
By Ying Lin, Yun Yang
Issue Date:December 2008
pp. 73-76
Satellite imagery especially with high spatial resolution often shows spectral variations and details disturbances in a class. These characteristics bring difficulties to people who are working at automatic classification in the remote sensing fields. To s...
 
A Fast Active Contour Model Driven by Global-Local Statistical Energy
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Ying Lin, Yun Yang, Xiaofang Wang
Issue Date:December 2008
pp. 407-411
Recently, active contour models based on local information have emerged in image segmentation. These models are more robust to local variations of region of interest. But it also brought some new problems, such as local minimum, higher computational cost. ...
 
Forecasting Duration Intervals of Scientific Workflow Activities Based on Time-Series Patterns
Found in: eScience, IEEE International Conference on
By Xiao Liu, Jinjun Chen, Ke Liu, Yun Yang
Issue Date:December 2008
pp. 23-30
In scientific workflow systems, time related functionalities such as workflow scheduling and temporal verification normally require effective forecasting of activity durations due to the dynamic nature of underlying resources such as Web or Grid services. ...
 
An Algorithm in SwinDeW-C for Scheduling Transaction-Intensive Cost-Constrained Cloud Workflows
Found in: eScience, IEEE International Conference on
By Yun Yang, Ke Liu, Jinjun Chen, Xiao Liu, Dong Yuan, Hai Jin
Issue Date:December 2008
pp. 374-375
The concept of cloud computing has been wide spreading very recently. Cloud computing has many unique advantages which can be utilised to facilitate (cloud) workflow execution. Transaction-intensive cost-constrained cloud workflows are workflows with a lar...
 
Using Learning Styles and Preferences to Incorporate Emerging E-Learning Tools in Teaching
Found in: Advanced Learning Technologies, IEEE International Conference on
By Nauman Saeed, Yun Yang
Issue Date:July 2008
pp. 967-971
Emerging e-learning tools have the potential to enrich academic environments. However, there is a need to understand the requirements, expectations, and learning styles of the end users before incorporating new tools into courses. This paper presents detai...
 
Chord4S: A P2P-based Decentralised Service Discovery Approach
Found in: Services Computing, IEEE International Conference on
By Qiang He, Jun Yan, Yun Yang, Ryszard Kowalczyk, Hai Jin
Issue Date:July 2008
pp. 221-228
Service-oriented computing is emerging as a paradigm for developing distributed applications. A critical issue of utilising service-oriented computing is to have a scalable, reliable and robust service discovery mechanism. However, traditional service disc...
 
Temporal dependency based checkpoint selection for dynamic verification of fixed-time constraints in grid workflow systems
Found in: Software Engineering, International Conference on
By Jinjun Chen, Yun Yang
Issue Date:May 2008
pp. 141-150
In grid workflow systems, temporal correctness is critical to assure the timely completion of grid workflow execution. To monitor and control the temporal correctness, fixed-time constraints are often assigned to a grid workflow and then verified. A checkp...
 
An Embedded Tree Matching Algorithm based on Metaphorical Dependency Structure
Found in: Convergence Information Technology, International Conference on
By Jianfeng Li,Yun Yang,Changle Zhou
Issue Date:November 2007
pp. 607-611
Knowledge extraction plays an active role in intelligent systems. This paper proposes an embedded tree matching algorithm oriented to knowledge extraction and natural language processing in intelligent systems to extract semantic structures from discourses...
 
Peer-to-Peer Based Grid Workflow Runtime Environment of SwinDeW-G
Found in: e-Science and Grid Computing, International Conference on
By Yun Yang, Ke Liu, Jinjun Chen, Joel Lignier, Hai Jin
Issue Date:December 2007
pp. 51-58
Nowadays, grid and peer-to-peer (p2p) technologies have become popular solutions for largescale resource sharing and system integration. For escience workflow systems, grid is a convenient way of constructing new services by composing existing services, wh...
 
Dynamic Setting, Verification and Adjustment of Upper Bound Constraints in Grid Workflow Systems
Found in: Semantics, Knowledge and Grid, International Conference on
By Jinjun Chen, Yun Yang
Issue Date:November 2006
pp. 10
Upper bound constraints are often set when complex scientific or business processes are modelled as grid workflow specifications. However, many existing processes such as climate modelling or international stock market analysis often have only one end-to-e...
 
Implementation of Agent-based Ontology Mapping and Integration
Found in: E-Business Engineering, IEEE International Conference on
By Li Li, Yun Yang, Baolin Wu
Issue Date:October 2006
pp. 208-215
The achievement of some business goals requires more than individual capabilities and knowledge. Hence, it is necessary for different organisations to work together in order to achieve the goals. In this paper, an innovative agentbased architecture is deve...
 
Assigning Local Fixed-time Constraints in Grid Workflow Systems
Found in: Grid and Cooperative Computing Workshops, International Conference on
By Jinjun Chen, Yun Yang
Issue Date:October 2006
pp. 227-234
Many complex grid workflow processes often have only one global fixed-time constraint at the last activity. Since grid workflow execution normally lasts a long time, local control is very important to ensure the overall temporal correctness. With only one ...
 
Ontological Approach Towards E-business Process Automation
Found in: E-Business Engineering, IEEE International Conference on
By Baolin Wu, Li Li, Yun Yang
Issue Date:October 2006
pp. 154-161
This paper discusses the interoperability of e-business processes by using an ontology approach with description logic and agent systems to achieve e-business automation. An innovative e-business process modeling framework is proposed that outlines the bui...
 
Bilingual Phrase Extraction from N-Best Alignments
Found in: Innovative Computing ,Information and Control, International Conference on
By Yong-Zeng Xue, Sheng Li, Tie-Jun Zhao, Mu-Yun Yang, Jun Li
Issue Date:September 2006
pp. 410-414
Improved approach of phrase extraction was proposed for phrase-based statistical machine translation. The effectiveness was investigated when using n-best alignments instead of one-best for phrase extraction. Bilingual phrase pairs were extracted in the pr...
 
How Elementary School Students Contribute to Different Computer Mediated Collaborative Tasks
Found in: Advanced Learning Technologies, IEEE International Conference on
By Chiung-Hui Chiu, Hsiao-Yun Yang
Issue Date:July 2006
pp. 557-559
This paper reports a study which investigated how elementary school students contributed differently to accomplish computer mediated collaborative tasks with different difficulty levels. One hundred and forty-five sixth grade students participated in this ...
 
SwinDeW-S: Extending P2P Workflow Systems for Adaptive Composite Web Services
Found in: Software Engineering Conference, Australian
By Jun Shen, Jun Yan, Yun Yang
Issue Date:April 2006
pp. 61-69
SwinDeW, an innovative decentralised workflow management system, has established an underlying framework for peer-to-peer (p2p) based business process coordination environments. SwinDeW-S extends SwinDeW to support adaptive composite service orchestration ...
 
The Transparent Adaptation Approach to the Development of Awareness Mechanisms for Groupware
Found in: Software Engineering Conference, Australian
By Minh Hong Tran, Yun Yang, Gitesh K. Raikundalia
Issue Date:April 2006
pp. 142-151
Implementing support for group awareness is an essential and challenging process in groupware development. This paper reports our research on developing a Transparent Adaptation (TA) approach, which is used to develop awareness mechanisms for groupware. Th...
 
Multiple Temporal Consistency States for Dynamical Verification of Upper Bound Constraints in Grid Workflow Systems
Found in: e-Science and Grid Computing, International Conference on
By Jinjun Chen, Yun Yang
Issue Date:December 2005
pp. 124-131
Conventional upper bound constraint verification in grid workflow systems is based on the key assumption that an upper bound constraint only has two states: consistency and inconsistency. However, due to complexity of grid workflows and dynamic availabilit...
 
 1  2 Next >>