Search For:

Displaying 1-50 out of 81 total
PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection
Found in: Microarchitecture, IEEE/ACM International Symposium on
By Shan Lu, Pin Zhou, Wei Liu, Yuanyuan Zhou, Josep Torrellas
Issue Date:December 2006
pp. 38-52
Dynamic software bug detection tools are commonly used because they leverage run-time information. However, they suffer from a fundamental limitation, the Path Coverage Problem: they detect bugs only in taken paths but not in non-taken paths. In other word...
 
Determination Freshwater Fish Freshness with Gas Sensor Array
Found in: Computer Science and Information Engineering, World Congress on
By Zhang Jun, Li XiaoYu, Wang Wei, Zhou Zhu, Zhou Wei, Xiao Wu
Issue Date:April 2009
pp. 221-224
Freshness is a key value for access fish quality; fish freshness could be determined by volatile compounds during storage. An electronic nose was constructed with virtual instrument and four commercial tin dioxide-based gas sensors array. Fresh water fish ...
 
CHMasters: A Scalable and Speed-Efficient Metadata Service in Distributed File System
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Min Xu,Junrui Zhou,Wei Zhou,Hong An
Issue Date:October 2011
pp. 394-399
Distributed file system (DFS) is playing important roles of supporting large distributed data-intensive applications to meet storage needs. Typically, the design of DFS, such as GFS in Google, DMS in Cisco and TFS in Alibaba, is driven by observations of s...
 
Evaluating Performance Impacts of Delayed Failure Repairing on Large-Scale Systems
Found in: Cluster Computing, IEEE International Conference on
By Zhou Zhou,Wei Tang,Ziming Zheng,Zhiling Lan,Narayan Desai
Issue Date:September 2011
pp. 532-536
With the fast improvement in technology, we are now moving toward exascale computing. Many experts predict that exascale computers will have millions of nodes, billions of threads of execution, hundreds of petabytes of inner memory and exabytes of persiste...
 
The Design of Automatic Classification System of Integrated Emergency Response System
Found in: Communication Software and Networks, International Conference on
By Yang Cheng, Zhishu Li, Hongjun Wang, Peng Zhou, Wei Zhou
Issue Date:February 2009
pp. 675-678
In this article an alarm information automatic classification system has been designed according to the situation that almost all alarm information in integrated emergency response system have been classified manually. The automatic classification system c...
 
AccMon: Automatically Detecting Memory-Related Bugs via Program Counter-Based Invariants
Found in: Microarchitecture, IEEE/ACM International Symposium on
By Pin Zhou, Wei Liu, Long Fei, Shan Lu, Feng Qin, Yuanyuan Zhou, Samuel Midkiff, Josep Torrellas
Issue Date:December 2004
pp. 269-280
This paper makes two contributions to architectural support for software debugging. First, it proposes a novel statistics-based, on-the-fly bug detection method called PC-based invariant detection. The idea is based on the observation that, in most program...
 
Analytic Double Product Integrals for All-Frequency Relighting
Found in: IEEE Transactions on Visualization and Computer Graphics
By Rui Wang, Minghao Pan, Weifeng Chen, Zhong Ren, Kun Zhou, Wei Hua, Hujun Bao
Issue Date:July 2013
pp. 1133-1142
This paper presents a new technique for real-time relighting of static scenes with all-frequency shadows from complex lighting and highly specular reflections from spatially varying BRDFs. The key idea is to depict the boundaries of visible regions using p...
 
The Tight Error Linear Complexity of Periodic Sequences
Found in: Computational Intelligence and Security, International Conference on
By Jianqin Zhou, Wei Xiong, Zemao Zhao, Lin You
Issue Date:December 2009
pp. 197-201
Based on linear complexity, k-error linear linear complexity, k-error linear complexity profile and minerror, the m-tight error linear complexity is presented to study the stability of the linear complexity of periodic sequences. The m-tight error linear c...
 
A Study of Construction and Share Digital Resources in an Higher Education District in China
Found in: Web-based Learning, International Conference on
By Qinian Zhou, Wei Li, Jihui Yang
Issue Date:August 2008
pp. 73-75
This article includes the digital library experience in Xiasha Education District of Hangzhou city in China. The first part is the necessity to construct the digital library center in the changing trends of the higher education in China. It appears that th...
 
A Flexible Part Library System
Found in: 2012 Third International Conference on Digital Manufacturing and Automation (ICDMA)
By Kun Jiang,Xionghui Zhou,Wei Liu,Qiang Niu
Issue Date:July 2012
pp. 50-53
In mechanical product design, designers usually reuse a large number of standard parts and commonly used typical structures accumulated in long-term industry design practice. In this paper, a flexible part library system is proposed to promote the flexibil...
 
Research on Key Technologies of Vehicle Traffic Accidents Rescue
Found in: 2012 Third International Conference on Digital Manufacturing and Automation (ICDMA)
By Lv Chengxu,Zhou Wei,Cai Fengtian,Zhang Weigong,Li Xu
Issue Date:July 2012
pp. 679-682
The new category of vehicle traffic accidents based on vehicle recovery is proposed in this paper to immediately dispose the accidents. Then, the vehicle recovery equipment and the integrated vehicle rescue equipment are designed as the key technologies of...
 
Top-k keyword search over probabilistic XML data
Found in: Data Engineering, International Conference on
By Jianxin Li,Chengfei Liu,Rui Zhou,Wei Wang
Issue Date:April 2011
pp. 673-684
Despite the proliferation of work on XML keyword query, it remains open to support keyword query over probabilistic XML data. Compared with traditional keyword search, it is far more expensive to answer a keyword query over probabilistic XML data due to th...
 
Component-Based Design of Software for Embedded Control Systems: The Medical Ventilator Case Study
Found in: Embedded Software and Systems, Second International Conference on
By Feng Zhou, Wei Guan, Krzysztof Sierszecki, Christo Angelov
Issue Date:May 2009
pp. 157-163
COMDES-II is a component-based framework for distributed control systems featuring open architecture and predictable operation under hard real-time constraints. It has been experimentally validated in a number of case studies, including the Medical Ventila...
 
Performance Analysis of Multi-hop IEEE 802.11 DCF Backhaul Networks
Found in: Wireless and Mobile Computing, Networking and Communication, IEEE International Conference on
By Puttipong Mahasukhon, Hamid Sharif, Michael Hempel, Ting Zhou, Wei Wang, Tadeusz Wysocki
Issue Date:October 2008
pp. 69-74
Because of the wide deployment of 802.11 equipments in the past decade, current applications are not limited anymore to only single Access Points (AP) deployments for indoor usage, but have been extended to multi-hop networks to fulfill the need of high sp...
 
Power Distribution Reliability Management by Objective Based on GIS Platform
Found in: Information Science and Engineering, International Conference on
By Yingli Cao, Tongyu Xu, Yuncheng Zhou, Wei Zheng, Zailin Piao
Issue Date:December 2009
pp. 2117-2120
In order to achieve meticulous management in reliability of power supply, the system of MBO (management by objective) is studied based on power distribution network GIS platform. First, a new coding method which used GUID (Global Unique Identifier) technol...
 
A Novel Isotropic Scatter Distribution Wideband MIMO M2M Fading Channel Model
Found in: Communication Networks and Services Research, Annual Conference on
By Chen Wei, He Zhiyi, Xie Tao, Zhou Wei
Issue Date:May 2009
pp. 443-445
In this paper, a novel isotropic scatter distribution wideband fading channel model for MIMO mobile-to-mobile (M2M) is proposed. The starting point for the derivation of the model is a new T-intersection geometric street scattering model, where both single...
 
Divide-and-Conquer Anchoring for Near-Separable Nonnegative Matrix Factorization and Completion in High Dimensions
Found in: 2013 IEEE International Conference on Data Mining (ICDM)
By Tianyi Zhou,Wei Bian,Dacheng Tao
Issue Date:December 2013
pp. 917-926
Nonnegative matrix factorization (NMF) becomes tractable in polynomial time with unique solution under separability assumption, which postulates all the data points are contained in the conical hull of a few anchor data points. Recently developed linear pr...
 
Based on the NCGM Method of the Gaussian 3-d Rough Surface Numerical Simulation
Found in: 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)
By Liao Dongri,Tang Jinyuan,Zhou Wei
Issue Date:January 2013
pp. 323-326
This paper uses the time series model and linear matrix transformation method to generate three dimensional rough surface numerically. Assume that the autocorrelation function of the surface is exponential type. In order to reduce the memory requirements a...
 
CloudTPS: Scalable Transactions for Web Applications in the Cloud
Found in: IEEE Transactions on Services Computing
By Zhou Wei,Guillaume Pierre,Chi-Hung Chi
Issue Date:September 2012
pp. 525-539
NoSQL cloud data stores provide scalability and high availability properties for web applications, but at the same time they sacrifice data consistency. However, many applications cannot afford any data inconsistency. CloudTPS is a scalable transaction man...
 
Non-uniform Illumination Representation based on HDR Light Probe Sequences
Found in: 2012 International Conference on Virtual Reality and Visualization (ICVRV)
By Jian Hu,Tao Yu,Lin Wang,Zhong Zhou,Wei Wu
Issue Date:September 2012
pp. 62-68
No summary available.
 
Clustering Based Search Algorithm for Motion Estimation
Found in: 2012 IEEE International Conference on Multimedia and Expo (ICME)
By Ke Chen,Zhong Zhou,Wei Wu
Issue Date:July 2012
pp. 622-627
Motion estimation is the key part of video compression since it removes the temporal redundancy within frames and significantly affects the encoding quality and efficiency. In this paper, a novel fast motion estimation algorithm named Clustering Based Sear...
 
Design of ECG Signal Acquisition and Processing System
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Zeli Gao,Jie Wu,Jianli Zhou,Wei Jiang,Lihui Feng
Issue Date:May 2012
pp. 762-764
In this paper, the electrocardiogram (ECG) signal detecting, amplifying, anti-aliasing filtering circuits were designed and made to get the analog ECG signal, and then make it necessarily conditioned to meet the requirement of data acquisition card USB-600...
 
Real-time PCR and Immunohistochemistry Detecting the Expression of PETA-3 in Breast Cancer and the Clinical Significance
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Ting Liu,Li Zhou,Wei Rong
Issue Date:May 2012
pp. 864-867
Objective: To observe the relationship between the expression of PETA-3 and clinicopathological factors in breast cancer. Methods: 40 breast cancer samples were detected by the real-time PCR and immunohisto chemical staining to analyze the expression of PE...
 
Scalable Join Queries in Cloud Data Stores
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Zhou Wei,Guillaume Pierre,Chi-Hung Chi
Issue Date:May 2012
pp. 547-555
Cloud data stores provide scalability and high availability properties for Web applications, but do not support complex queries such as joins. Web application developers must therefore design their programs according to the peculiarities of No SQL data sto...
 
Combining Shape and Appearance for Automatic Pedestrian Segmentation
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Yanli Li,Zhong Zhou,Wei Wu
Issue Date:November 2011
pp. 369-376
In this paper we present an approach to automatically segmenting non-rigid pedestrians in still images. Inspired by global shape matching as well as interactive figure-ground separation methods, this approach fulfills the task combining shape and appearanc...
 
Multi-feature Method: An Integrated Content Based Image Retrieval System
Found in: Intelligence Information Processing and Trusted Computing, International Symposium on
By Chen Liu,Zhou Wei
Issue Date:October 2011
pp. 43-46
The process of retrieving desired or similar images from a large collection of images on the basis of features is referred as Content Based Image Retrieval (CBIR). In this paper, a integrated CBIR system is proposed using combined features and weighted sim...
 
Multi-sensor Data Acquisition for an Autonomous Mobile Outdoor Robot
Found in: Computational Intelligence and Design, International Symposium on
By Miaolei Zhou,Wei Gao
Issue Date:October 2011
pp. 351-354
Multi-sensors system is designed for realizing autonomous mobile of outdoor robot. GPS, two laser range finders, encode, electronics compass and camera are used to obtain the feeling information for outdoor autonomous mobile robot. Based on multithread tec...
 
Realistic Fire Simulation: A Survey
Found in: Computer-Aided Design and Computer Graphics, International Conference on
By Zhaohui Wu,Zhong Zhou,Wei Wu
Issue Date:September 2011
pp. 333-340
As fire is one of the basic elements of nature, realistic fire simulation plays a significant role in fire control, film special effects, military emulation, and virtual reality. Fire simulation has been being an eternal theme in the field of computer grap...
 
Evaluation of Intrusion Detection System Based on Evaluation Model
Found in: Genetic and Evolutionary Computing, International Conference on
By Xianghui Zhou,Wei Wan
Issue Date:September 2011
pp. 319-322
This paper studies evaluation problem in intrusion detection system. According to the actual situation, we use an evaluation model proposed by us to evaluate the performance of intrusion detection systems. We establish the impact of intrusion detection sys...
 
Combination of interference alignment and beamforming in cellular networks
Found in: Software Maintenance and Reengineering, European Conference on
By Chao Zhou, Wei Chen, Zhi Chen
Issue Date:August 2011
pp. 371-375
In this paper, a new technique is proposed to improve the throughput performance of relay backhaul links in cellular networks for the case of imperfect channel knowledge,which could be implemented with small changes to existing TD-LTE standards. The techni...
 
Estimating Natural-Ventilation Potential Considering Thermal Mass
Found in: Digital Manufacturing and Automation, International Conference on
By Xiaoqin Sun, Junli Zhou, Wei Shen, Chang Peng, Guoqiang Zhang, Ling Zhang
Issue Date:December 2010
pp. 666-669
The concept of potential for natural ventilation (NVP) is defined as the possibility, or probability, to ensure both indoor air quality and thermal comfort by natural ventilation. NVP value can provide the designers significant information to properly desi...
 
A Hybrid Deformation Model for Virtual Cutting
Found in: Multimedia, International Symposium on
By Xuqiang Shao, Zhong Zhou, Wei Wu
Issue Date:December 2010
pp. 236-241
In this paper, we present a novel hybrid deformation model, which can simulate large deformations and non-linear behaviors of soft tissues in real time. The model partitions a soft tissue into operational and non-operational regions, and simulates the larg...
 
Using PWM Output as a Digital-to-Analog Converter on DSP
Found in: System Science, Engineering Design and Manufacturing Informatization, International Conference on
By Feng Zhou, Wei Xiong
Issue Date:November 2010
pp. 278-281
This paper presents a method for utilizing the on-chip PWM (pulse width modulated) generators on a TMS320C240 DSP for digital-to-analog (D/A) conversion. The method involves analog low-pass filtering the PWM signal to remove high frequency components, leav...
 
Model Based Load Testing of Web Applications
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Xingen Wang, Bo Zhou, Wei Li
Issue Date:September 2010
pp. 483-490
In this paper, a usage model is proposed to simulate users’ behaviors realistically in load testing of web applications, and another relevant workload model is proposed to help generate realistic load for load testing. It also demonstrates an eclipse-based...
 
Real-Time Rollover Propensity Evaluation for Intercity Coach
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Zhou Wei, Wang Jian
Issue Date:September 2010
pp. 1323-1327
Rollover events are one of the most crucial hazards for the safety of passengers and the crew riding in a bus. This paper presents a real time rollover propensity evaluation algorithm based on the estimation of road bank to indicate the rollover risk. Sinc...
 
Integer Promotion Elimination on Abstract Syntax Tree
Found in: Computer and Information Technology, International Conference on
By Qing'an Li, Yanxiang He, Lei Zhou, Wei Wu, Yong Chen
Issue Date:July 2010
pp. 2367-2372
In the C programming language standard, there are rules for implicit type conversions, including integer promotion rules. These rules, as well as the explicit type conversions imposed by the coder, may result in redundant code for 8-bit MCUs. However, code...
 
A Fuzzy Control Algorithm for Collecting Main Pressure Controlling Using Expert Control
Found in: Intelligent Computation Technology and Automation, International Conference on
By Hongjun Zhou, Wei Chen, Kangling Fang
Issue Date:May 2010
pp. 104-107
The disturbance, multi-parameters, and non-linearities are the major difficulties in the collecting main pressures control system. This paper develops a fuzzy control algorithm for the collecting main pressure control based on expert control, in order to s...
 
An Algorithm of Weak Signal's Detection on the Condition of Strong Interfernce
Found in: Computer Modeling and Simulation, International Conference on
By Zhou Wei,Hui Jun-ying,Mei Ji-dan,Sheng Xue-li
Issue Date:January 2010
pp. 230-232
An algorithm which can detect weak signals on the condition of strong correlated interference is designed in the paper. The algorithm based on conventional beam forming (CBF) can put nulls on given directions. And the weights only relating to interference’...
 
Research on the Assessment of Consulting Service
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Hai-bin Zhou, Wei Li
Issue Date:December 2009
pp. 290-293
In this paper, the property right of counseling service assessment is innovatively proposed, which can promote the authority and impartiality of that assessment. Basing on the models of Expectation Gap Model, the Value of Knowledge Evaluation Model and Mul...
 
Highway Pavement Subsurface Layer Detection Using Air-Launched GPR
Found in: Computational Intelligence and Design, International Symposium on
By Hui-lin Zhou, Wei-ping Wang, Qiang Zhang
Issue Date:December 2009
pp. 205-208
Data preprocessing algorithm including clutter suppression, threshold detector, ROI (region of interest) extraction and layer interface smoothing is presented, which is a part of automatic pavement subsurface rating system. The results based on simulation ...
 
Prediction of probable Tuna fishing grounds based on Bayesian theorem
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Sufang Zhou, Wei Fan, Jianping Wu
Issue Date:November 2009
pp. 156-162
Highly migratory tuna is one of economically important harvesting objects of the world. It is practically significant to forecast the probable fishing grounds. Based on satellite data of SST supplied by NASA and historical tuna catch data provided by SPC, ...
 
Stress Distributions on the Slider with Different Accommodation Coefficients
Found in: Networking, Architecture, and Storage, International Conference on
By Jincai Chen, Gongye Zhou, Wei Sun, Libang Zhang
Issue Date:July 2009
pp. 227-230
Recently the influence of accommodation coefficient, which determines the behaviors of the reflected molecules at the boundary walls, was studied a lot for exploring the flying characteristics of head-disk interface. However, all of the researches are base...
 
Spherical Mapping Based Motion Recovery for Panoramic Cameras
Found in: Multimedia and Ubiquitous Engineering, International Conference on
By Yanli Li, Zhong Zhou, Wei Wu
Issue Date:June 2009
pp. 70-75
Although motion recovery for limited field-of-view (FOV) cameras has been studied for decades under the pin-hole projection, few attentions have been paid on omni-directional cameras. Omni-directional cameras are usually constituted complicatedly, especial...
 
Application of Synthetic Neural Network for Fault Diagnosis of Steam Turbine Flow Passage
Found in: Computational Intelligence and Natural Computing, International Conference on
By Lihua Cao, Yunlong Zhou, Wei Xu, Yong Li
Issue Date:June 2009
pp. 62-65
It is difficult to determine the normal value for fault diagnosis of steam turbine flow passage, because the flow passage fault or regenerative system fault may result in the decrease of the relative internal efficiency of steam turbine. Based on analyzing...
 
Generalized Discrete W Transform
Found in: Circuits, Communications and Systems, Pacific-Asia Conference on
By Jianqin Zhou,Wei Xiong,Gongli Zhang
Issue Date:May 2009
pp. 446-448
The discrete W transform (DWT), introduced by Wang Z, has been used in many applications of digital signal processing, data compression and information hiding. The unified form of discrete W transform has two parameters. There are four useful types of the ...
 
Study on Development of Pre-processing Program for FLAC^3D and Its Engineering Application of Numerical Simulation Calculation in Underground Cavern Group
Found in: Information and Computing Science, International Conference on
By Rubin Wang, Weiya Xu, Xianqi Zhou, Wei Wang, Zhiliang Zhang
Issue Date:May 2009
pp. 221-224
FLAC3D (Fast Lagrangian Analysis of Continua in 3 Dimensions), developed by Itasca Consulting Group Inc., USA, is widely used as computational package in the world. For some complex geologic problems, numerical models with FLAC3D are difficult to construct...
 
A Fuzzy Reputation Based Ant Algorithm for Grid Scheduling
Found in: Computational Sciences and Optimization, International Joint Conference on
By Zhurong Zhou, Wei Deng, Linrui Lu
Issue Date:April 2009
pp. 102-104
Efficient algorithms for scheduling the resources to successfully execute the tasks submitted by the users are of great importance in dynamic environments like Grid. In this paper, a grid scheduling is proposed using Ant Colony Optimization(ACO) algorithm ...
 
Application of Spatial Data Mining in Accident Analysis System
Found in: Education Technology and Training & Geoscience and Remote Sensing
By Jinlin Wang, Xi Chen, Kefa Zhou, Wei Wang, Dan Zhang
Issue Date:December 2008
pp. 472-475
Traffic accidents cause enormous losses for our country and plenty of national assets drain away every year, and therefore the task of traffic management is weightier than Mount Tai, but the complexity of traffic accident analysis has brought many difficul...
 
A Coordination Control by Sections on the Trunk Line of Urban Traffic Network
Found in: MultiMedia and Information Technology, International Conference on
By Li Zhou, Wei Li
Issue Date:December 2008
pp. 665-668
Aiming at the multi-intersections of the urban traffic trunk line, a coordination control by sections is brought forward. The proposed algorithm includes three key steps. Firstly, according to the relativity of each two or three natural intersections on th...
 
ICT-Based Learning
Found in: Next Generation Mobile Applications, Services and Technologies, International Conference on
By Xu Xinhao, Zhou Wei, Li Min
Issue Date:September 2008
pp. 237-240
Thanks to the rapidly-developing Web, pervasive computing and mobile technologies, learning activities are being shifted to a new era which is characterized by ubiquitous adoption of information and communication technologies (ICT). ICT-based Learning (IBL...
 
 1  2 Next >>