Search For:

Displaying 1-33 out of 33 total
Research on Cognitive Radio Model Based on Game Theory
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Zhenyu Zhang, Xiaoyao Xie
Issue Date:April 2010
pp. 181-184
Cognitive radio has already been a new technology hot-spot, many techniques application have been researched in cognitive radio. The Decision Maker of Cognitive Radio is one of the key issues. The limitation of Neel’s CR model is studied. Neel’s model can ...
 
Modeling and Simulation of an Opposed-piston Two-stroke Diesel Engine
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Zhenyu Zhang,Changlu Zhao,Fujun Zhang,Feng Guo
Issue Date:March 2012
pp. 415-419
An opposed-piston two-stroke engine has been investigated. A singer cylinder engine mode has been built to research the scavenging performance at different scavenging pressure and engine performance at full load. The result shows that, scavenging performam...
 
Spectral methods for semi-supervised manifold learning
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Zhenyue Zhang, Hongyuan Zha, Min Zhang
Issue Date:June 2008
pp. 1-6
Given a finite number of data points sampled from a low-dimensional manifold embedded in a high dimensional space together with the parameter vectors for a subset of the data points, we need to determine the parameter vectors for the rest of the data point...
 
Fault Localization Based Only on Failed Runs
Found in: Computer
By Zhenyu Zhang,W.K. Chan,T.H. Tse
Issue Date:June 2012
pp. 64-71
Fault localization commonly relies on both passed and failed runs, but passed runs are generally susceptible to coincidental correctness and modern software automatically produces a huge number of bug reports on failed runs. FOnly is an effective new techn...
 
Investigation on the Control Strategy for the Compound Cycle of Turbo Diesel Engine
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Yunlong Li,Changlu Zhao,Zhenxia Zhu,Feng Wu,Feng Guo,Zhenyu Zhang
Issue Date:March 2012
pp. 385-389
In this paper, a new kind of cycle was proposed, which is named the compound cycle of turbo diesel engine with auxiliary combustion and energy recovery system. Numerical simulation method was adopted to analyze the compound cycle. According to the applicat...
 
Adaptive Manifold Learning
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Zhenyue Zhang, Jing Wang, Hongyuan Zha
Issue Date:February 2012
pp. 253-265
Manifold learning algorithms seek to find a low-dimensional parameterization of high-dimensional data. They heavily rely on the notion of what can be considered as local, how accurately the manifold can be approximated locally, and, last but not least, how...
 
Estimate-Piloted Regularization and Fast ALS Algorithm for Collaborative Filtering
Found in: International Conference on Future Computer Science and Education
By Zhenyue Zhang,Keke Zhao,Hongyuan Zha,Guirong Xue
Issue Date:August 2011
pp. 567-570
Regularized Low-rank approximation with missing data is an effective approach for Collaborative Filtering since it generates high quality rating predictions for recommender systems. Alternative LS (ALS) method is one of the commonly used algorithms for the...
 
Precise Propagation of Fault-Failure Correlations in Program Flow Graphs
Found in: Computer Software and Applications Conference, Annual International
By Zhenyu Zhang,W. K. Chan,T. H. Tse,Bo Jiang
Issue Date:July 2011
pp. 58-67
Statistical fault localization techniques find suspicious faulty program entities in programs by comparing passed and failed executions. Existing studies show that such techniques can be promising in locating program faults. However, coincidental correctne...
 
A Dynamic Fault Localization Technique with Noise Reduction for Java Programs
Found in: Quality Software, International Conference on
By Jian Xu, W.K. Chan, Zhenyu Zhang, T.H. Tse, Shanping Li
Issue Date:July 2011
pp. 11-20
Existing fault localization techniques combine various program features and similarity coefficients with the aim of precisely assessing the similarities among the dynamic spectra of these program features to predict the locations of faults. Many such techn...
 
Towards Cloud and Terminal Collaborative Mobile Social Network Service
Found in: Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 2010 IEEE International Conference on
By Wu Zhenyu, Zhang Chunhong, Ji Yang, Wang Hao
Issue Date:August 2010
pp. 623-629
Mobile Social Network Service has been broadly researched on nowadays, however few people tries to explain the essence of MSNS, which leads to no common architecture for MSNS system. Consequently, in this article we compares the Mobile Social Network Servi...
 
A Community-Centric Model for Service Publication, Discovery, Selection, Binding, and Maintenance
Found in: Service-Oriented System Engineering, IEEE International Workshop on
By Lijun Mei, W. K. Chan, Zhenyu Zhang, Xiaopeng Gao
Issue Date:June 2010
pp. 303-310
Services discovery, selection, composition, verification, and adaptation are important in service-oriented computing. Existing researches often study techniques to maximize the benefits of individual services. However, following the power laws, a small fra...
 
Enhance Fault Localization Using a 3D Surface Representation
Found in: Computer Research and Development, International Conference on
By Qiong Shi, Zhenyu Zhang, Zhifang Liu, Xiaopeng Gao
Issue Date:May 2010
pp. 720-724
Debugging is a difficult and time-consuming task in software engineering. To locate faults in programs, a statistical fault localization technique makes use of program execution statistics and employs a suspiciousness function to assess the relation betwee...
 
Research on Magneto-dependent Sensor Applied to Optical Pumped Magnetometer
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Zhijian Zhou, Zhenyu Zhang, Defu Cheng, Jun Wang
Issue Date:March 2010
pp. 109-111
In this paper we describe the realization of a magneto-dependent sensor applied in the Optical Pumped Magnetometer. Furthermore, a new method of exciting helium light source is put up with which can reduce the time of exciting. Preliminary experiments and ...
 
Adaptive Random Test Case Prioritization
Found in: Automated Software Engineering, International Conference on
By Bo Jiang, Zhenyu Zhang, W. K. Chan, T. H. Tse
Issue Date:November 2009
pp. 233-244
Regression testing assures changed programs against unintended amendments. Rearranging the execution order of test cases is a key idea to improve their effectiveness. Paradoxically, many test case prioritization techniques resolve tie cases using the rando...
 
The Research on the Build of Grain Circulation Modernization Based on E-Business
Found in: Intelligent Computation Technology and Automation, International Conference on
By Yuhua Zhu, Xiuwen Li, Zhenyu Zhang
Issue Date:October 2009
pp. 471-474
In accordance with national policy reform the grain circulation characteristics, combined with e-commerce BtoB technology Carried out grain circulation Trade, the analysis and research on e-commerce BtoB technology, site structure, function and operation m...
 
More Tales of Clouds: Software Engineering Research Issues from the Cloud Application Perspective
Found in: Computer Software and Applications Conference, Annual International
By Lijun Mei, Zhenyu Zhang, W. K. Chan
Issue Date:July 2009
pp. 525-530
Cloud computing is an emerging computing paradigm. It aims to share data, calculations, and services transparently among users of a massive grid. Although the industry has started selling cloud-computing products, the software engineering infrastructure an...
 
How Well Do Test Case Prioritization Techniques Support Statistical Fault Localization
Found in: Computer Software and Applications Conference, Annual International
By Bo Jiang, Zhenyu Zhang, T. H. Tse, T. Y. Chen
Issue Date:July 2009
pp. 99-106
In continuous integration, a tight integration of test case prioritization techniques and fault-localization techniques may both expose failures faster and locate faults more effectively. Statistical fault-localization techniques use the execution informat...
 
Taming coincidental correctness: Coverage refinement with context patterns to improve fault localization
Found in: Software Engineering, International Conference on
By Xinming Wang, S.C. Cheung, W.K. Chan, Zhenyu Zhang
Issue Date:May 2009
pp. 45-55
Recent techniques for fault localization leverage code coverage to address the high cost problem of debugging. These techniques exploit the correlations between program failures and the coverage of program entities as the clue in locating faults. Experimen...
 
Fault Localization with Non-parametric Program Behavior Model
Found in: Quality Software, International Conference on
By Peifeng Hu, Zhenyu Zhang, W. K. Chan, T. H. Tse
Issue Date:August 2008
pp. 385-395
Fault localization is a major activity in software debugging. Many existing statistical fault localization techniques compare feature spectra of successful and failed runs. Some approaches, such as SOBER, test the similarity of the feature spectra through ...
 
Debugging through Evaluation Sequences: A Controlled Experimental Study
Found in: Computer Software and Applications Conference, Annual International
By Zhenyu Zhang, Bo Jiang, W. K. Chan, T. H. Tse
Issue Date:August 2008
pp. 128-135
Predicate-based statistical fault-localization techniques locate fault-relevant predicates in a program by contrasting the statistics of the values of individual predicates between successful and failure-causing runs. While short-circuit evaluations are co...
 
Synthesizing Component-Based WSN Applications via Automatic Combination of Code Optimization Techniques
Found in: Quality Software, International Conference on
By Zhenyu Zhang, W. K. Chan, T. H. Tse
Issue Date:October 2007
pp. 181-190
Wireless sensor network (WSN) applications sense events in-situ and compute results in-network. Their software components should run on platforms with stringent constraints on node resources. Developers often design their programs by trial-and-error with a...
 
Probability-Based Locally Linear Embedding for Classification
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Zhenyue Zhang, Lingxiao Zhao
Issue Date:August 2007
pp. 243-247
We propose a novel dimension reduction method for clas- sification using a probability-based distance and the tech- nique of locally linear embedding (LLE). Logistic Discrim- ination (LD) is adopted for estimating the probability dis- tribution as well as ...
 
On Weight Design of Maximum Weighted Likelihood and an Extended EM Algorithm
Found in: IEEE Transactions on Knowledge and Data Engineering
By Zhenyue Zhang, Yiu-ming Cheung
Issue Date:October 2006
pp. 1429-1434
The recent Maximum Weighted Likelihood (MWL) [18], [19] has provided a general learning paradigm for density-mixture model selection and learning, in which weight design, however, is a key issue. This paper will therefore explore such a design, and through...
 
Local Smoothing for Manifold Learning
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By JinHyeong Park, Zhenyue Zhang, Hongyuan Zha, Rangachar Kasturi
Issue Date:July 2004
pp. 452-459
We propose methods for outlier handling and noise reduction using weighted local linear smoothing for a set of noisy points sampled from a nonlinear manifold. Weighted PCA is used as a building block for our methods and we suggest an iterative weight selec...
 
Automatic Document Metadata Extraction Using Support Vector Machines
Found in: Digital Libraries, Joint Conference on
By Hui Han, C. Lee Giles, Eren Manavoglu, Hongyuan Zha, Zhenyue Zhang, Edward A. Fox
Issue Date:May 2003
pp. 37
Automatic metadata generation provides scalability and usability for digital libraries and their collections. Machine learning methods offer robust and adaptable automatic metadata extraction. We describe a Support Vector Machine classification-based metho...
 
Web-based collaboration system to improve the interactivity for mobile education through smart devices
Found in: 2013 IEEE Frontiers in Education Conference (FIE)
By Tao Zhang, Shiyu Lu, Zhenyu Zhang, Jun Li
Issue Date:October 2013
pp. 184-189
Mobile education is a term that describes a relatively new way of education. Generally speaking, mobile education is aimed to facilitate teachers, students, and parents to interact with each other through mobile devices. This term gains much popularity esp...
   
A Subsumption Hierarchy of Test Case Prioritization for Composite Services
Found in: IEEE Transactions on Services Computing
By Lijun Mei,Yan Cai,Changjiang Jia,Bo Jiang,W.K. Chan,Zhenyu Zhang,T.H. Tse
Issue Date:June 2014
pp. 1
Many composite workflow services utilize non-imperative XML technologies such as WSDL, XPath, XML schema, and XML messages. Regression testing should assure the services against regression faults that appear in both the workflows and these artifacts. In th...
 
Low-Rank Matrix Approximation with Manifold Regularization
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Zhenyue Zhang, Keke Zhao
Issue Date:July 2013
pp. 1717-1729
This paper proposes a new model of low-rank matrix factorization that incorporates manifold regularization to the matrix factorization. Superior to the graph-regularized nonnegative matrix factorization, this new regularization model has globally optimal a...
 
Collaborative Intelligence for Intelligent Diagnosis Systems in Hospital Environment
Found in: International Workshop on Knowledge Discovery and Data Mining
By Sung Ho Ha, Zhenyu Zhang
Issue Date:January 2010
pp. 532-535
Emergency Departments (ED) in a hospital is a complex unit where the fight between life and death is always in a breathing time. The ED has been frustrated by the problem of overcrowding and long time waiting for over decades. With the development of compu...
 
A General Trust Model Based on Trust Algebra
Found in: Multimedia Information Networking and Security, International Conference on
By Wenzhong Yang, Cuanhe Huang, Bo Wang, Tong Wang, Zhenyu Zhang
Issue Date:November 2009
pp. 125-129
The growing importance of Trust in the realm of open network environment introduces further research on it, due to the special significance of trust to whole system. We view trust as a relation among entities that participate in an action meeting the trust...
 
Capturing propagation of infected program states
Found in: Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering on European software engineering conference and foundations of software engineering symposium (ESEC/FSE '09)
By Bo Jiang, T. H. Tse, W. K. Chan, Xinming Wang, Zhenyu Zhang
Issue Date:August 2009
pp. 171-172
Coverage-based fault-localization techniques find the fault-related positions in programs by comparing the execution statistics of passed executions and failed executions. They assess the fault suspiciousness of individual program entities and rank the sta...
     
Where to adapt dynamic service compositions
Found in: Proceedings of the 18th international conference on World wide web (WWW '09)
By Bo Jiang, T. H. Tse, W. K. Chan, Zhenyu Zhang
Issue Date:April 2009
pp. 66-66
Peer services depend on one another to accomplish their tasks, and their structures may evolve. A service composition may be designed to replace its member services whenever the quality of the composite service fails to meet certain quality-of-service (QoS...
     
Test case prioritization for regression testing of service-oriented business applications
Found in: Proceedings of the 18th international conference on World wide web (WWW '09)
By Lijun Mei, T. H. Tse, W. K. Chan, Zhenyu Zhang
Issue Date:April 2009
pp. 66-66
Regression testing assures the quality of modified service-oriented business applications against unintended changes. However, a typical regression test suite is large in size. Earlier execution of those test cases that may detect failures is attractive. M...
     
 1