Bo Chen

According to our database1, Bo Chen authored at least 323 papers between 1997 and 2018.

Collaborative distances :

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Introduction to the Special Issue on Applications of Mechatronic and Embedded Systems (MESA) in ITS.
IEEE Trans. Intelligent Transportation Systems, 2018

On energy-to-peak filtering for semi-Markov jump singular systems with unideal measurements.
Signal Processing, 2018

Electrical Resistance Tomography for Visualization of Moving Objects Using a Spatiotemporal Total Variation Regularization Algorithm.
Sensors, 2018

Recognizing irregular entities in biomedical text via deep neural networks.
Pattern Recognition Letters, 2018

A Deterministic Sensor Deployment Method for Target Coverage.
J. Sensors, 2018

Quantized asynchronous dissipative state estimation of jumping neural networks subject to occurring randomly sensor saturations.
Neurocomputing, 2018

Mining Individual Similarity by Assessing Interactions with Personally Significant Places from GPS Trajectories.
ISPRS Int. J. Geo-Information, 2018

MnasNet: Platform-Aware Neural Architecture Search for Mobile.
CoRR, 2018

NetAdapt: Platform-Aware Neural Network Adaptation for Mobile Applications.
CoRR, 2018

User-friendly deniable storage for mobile devices.
Computers & Security, 2018

An efficient duality-based approach for PDE-constrained sparse optimization.
Comp. Opt. and Appl., 2018

synchronization for singularly perturbed complex networks with semi-Markov jump topology.
Applied Mathematics and Computation, 2018

XPMFS: A New NVM File System for Vehicle Big Data.
IEEE Access, 2018

SGRS: A sequential gesture recognition system using COTS RFID.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Internet Protocol Cameras with No Password Protection: An Empirical Investigation.
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018

Accurate Text-Enhanced Knowledge Graph Representation Learning.
Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2018

A 253mW/channel 4TX/4RX pulsed chirping phased-array radar TRX in 65nm CMOS for X-band synthetic-aperture radar imaging.
Proceedings of the 2018 IEEE International Solid-State Circuits Conference, 2018

A method of key links identification in command and control network based on bridging coefficient.
Proceedings of the 15th IEEE International Conference on Networking, Sensing and Control, 2018

MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Semi-Supervised Lexicon Learning for Wide-Coverage Semantic Parsing.
Proceedings of the 27th International Conference on Computational Linguistics, 2018

Sequence-to-Action: End-to-End Semantic Graph Generation for Semantic Parsing.
Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018

Elastic Responding Machine for Dialog Generation with Dynamically Mechanism Selecting.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Tree-Structured Neural Machine for Linguistics-Aware Sentence Generation.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Personalized Privacy-Preserving Social Recommendation.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Conversational Model Adaptation via KL Divergence Regularization.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Studying Analysts' Data Triage Operations in Cyber Defense Situational Analysis.
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017

Out-of-Focus Projector Calibration Method with Distortion Correction on the Projection Plane in the Structured Light Three-Dimensional Measurement System.
Sensors, 2017

Study on Finite Element Model Updating in Highway Bridge Static Loading Test Using Spatially-Distributed Optical Fiber Sensors.
Sensors, 2017

Transferability of Economy Estimation Based on DMSP/OLS Night-Time Light.
Remote Sensing, 2017

A unified method to energy-to-peak filter design for networked Markov switched singular systems over a finite-time interval.
J. Franklin Institute, 2017

Remote data integrity checking with server-side repair.
Journal of Computer Security, 2017

Supplier Competition with Option Contracts for Discrete Blocks of Capacity.
Operations Research, 2017

An Improved Identification Code for City Components Based on Discrete Global Grid System.
ISPRS Int. J. Geo-Information, 2017

A hybrid method of optimal sensor placement for dynamic response monitoring of hydro-structures.
IJDSN, 2017

Glider Collisions in Hybrid Cellular Automaton with Memory Rule (43, 74).
I. J. Bifurcation and Chaos, 2017

Zoned elasticity modulus inversion analysis method of a high arch dam based on unconstrained Lagrange support vector regression (support vector regression arch dam).
Eng. Comput. (Lond.), 2017

Quantization and Training of Neural Networks for Efficient Integer-Arithmetic-Only Inference.
CoRR, 2017

MorphNet: Fast & Simple Resource-Constrained Structure Learning of Deep Networks.
CoRR, 2017

Tree-Structured Neural Machine for Linguistics-Aware Sentence Generation.
CoRR, 2017

MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications.
CoRR, 2017

Contrary description logic: Gentzen deduction system.
SCIENCE CHINA Information Sciences, 2017

Towards efficient detection of sybil attacks in location-based social networks.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

RDS3: Ransomware defense strategy by using stealthily spare space.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

Temporal functional connectomics in schizophrenia and healthy controls.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

The Boolean Algebra Logic: The Soundness and Completeness Theorem.
Proceedings of the 13th International Conference on Semantics, Knowledge and Grids, 2017

Quantified Propositional Logic and Translations.
Proceedings of the 13th International Conference on Semantics, Knowledge and Grids, 2017

Teleconsultant: Communication and Analysis of Wearable Videos in Emergency Medical Environments.
Proceedings of the 2017 ACM on Multimedia Conference, 2017

Design of LDPC Fast Encoding Based on Dynamic Memory Structure of Linked List Queue.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

Comparison of Modeling Target in LSTM-RNN Duration Model.
Proceedings of the Interspeech 2017, 2017

Discrete Duration Model for Speech Synthesis.
Proceedings of the Interspeech 2017, 2017

Measurement-based, practical techniques to improve 802.11ac performance.
Proceedings of the 2017 Internet Measurement Conference, 2017

Geographically weighted regression model for urban traffic black-spot analysis.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

A Novel Real-Time Gesture Recognition Algorithm for Human-Robot Interaction on the UAV.
Proceedings of the Computer Vision Systems - 11th International Conference, 2017

Distributed fusion filtering for stochastic uncertain systems subject to correlated noises, random delays and data losses.
Proceedings of the 13th IEEE International Conference on Control & Automation, 2017

Towards Access Control for Network Coding-Based Named Data Networking.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

On Content Diffusion Modelling in Information-Centric Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Seeing into Darkness: Scotopic Visual Recognition.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, 2017

Study on Chinglish in Web Text for Natural Language Processing.
Proceedings of the Chinese Lexical Semantics - 18th Workshop, 2017

DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

GlobeSen: an open interconnection framework based on named sensory date for IoT.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

Mechanism-Aware Neural Machine for Dialogue Response Generation.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
QoS-Based Blind Spectrum Selection with Multi-armed Bandit Problem in Cognitive Radio Networks.
Wireless Personal Communications, 2016

Vision without the Image.
Sensors, 2016

Error-Component Analysis of TRMM-Based Multi-Satellite Precipitation Estimates over Mainland China.
Remote Sensing, 2016

Using a Kalman Filter to Assimilate TRMM-Based Real-Time Satellite Precipitation Estimates over Jinghe Basin, China.
Remote Sensing, 2016

From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT.
J. Sensors, 2016

Random decentralized market processes for stable job matchings with competitive salaries.
J. Economic Theory, 2016

Glider Collisions in Hybrid Cellular Automata Rule 168 and 133.
J. Cellular Automata, 2016

A Subdivision Method to Unify the Existing Latitude and Longitude Grids.
ISPRS Int. J. Geo-Information, 2016

A Symbolic Dynamics Perspective of Conway's Game of Life.
I. J. Bifurcation and Chaos, 2016

Packet Header Anomaly Detection Using Bayesian Topic Models.
IACR Cryptology ePrint Archive, 2016

A frequent pattern parallel mining algorithm based on distributed sliding window.
Comput. Syst. Sci. Eng., 2016

Seeing into Darkness: Scotopic Visual Recognition.
CoRR, 2016

A Symbolic Dynamics Perspective of the Game of Three-Dimensional Life.
Complex Systems, 2016

The Lifecycle and Cascade of WeChat Social Messaging Groups.
Proceedings of the 25th International Conference on World Wide Web, 2016

What If Routers Are Malicious? Mitigating Content Poisoning Attack in NDN.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Privacy-Preserving Query Log Sharing Based on Prior N-Word Aggregation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Security analysis on InfiniBand protocol implementations.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

BRR-CVR: A Collaborative Caching Strategy for Information-Centric Wireless Sensor Networks.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

13.2 A Ku-band 260mW FMCW synthetic aperture radar TRX with 1.48GHz BW in 65nm CMOS for micro-UAVs.
Proceedings of the 2016 IEEE International Solid-State Circuits Conference, 2016

An analog baseband chain of synthetic aperture radar receiver.
Proceedings of the International Symposium on Integrated Circuits, 2016

A CMOS digital-controlled oscillator for All-digital PLL frequency synthesizer.
Proceedings of the International Symposium on Integrated Circuits, 2016

Millimeter wave transformer coupled low-power and broadband power amplifiers.
Proceedings of the International Symposium on Integrated Circuits, 2016

Live demonstration: A Ku-band FMCW synthetic aperture radar transceiver for micro-UAVs.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016

A high gain decibel-linear programmable gain amplifier of synthetic aperture radar receiver.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016

Design considerations of Ku-band high gain wideband CMOS power amplifier for FMCW radar application.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016

Evaluation of Global Satellite Mapping of precipitation analysis product during torrential rainfall event of 22 July 2010 in Jinghe Basin.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Learning Phrase Representations Based on Word and Character Embeddings.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016

Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public Clouds.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Contrastive topic evolution discovery via nonnegative matrix factorization.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Demo: A Symbolic N-Variant System.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Research on human body composition prediction model based on Akaike Information Criterion and improved entropy method.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

Design of the portable instrument for bioelectrical impedance.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

Sentence Rewriting for Semantic Parsing.
Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, 2016

2015
Introduction to the Special Issue on Mechatronic and Embedded Systems and Applications in ITS.
IEEE Trans. Intelligent Transportation Systems, 2015

Impact of Missing Passive Microwave Sensors on Multi-Satellite Precipitation Retrieval Algorithm.
Remote Sensing, 2015

Image Segmentation Based on Constrained Spectral Variance Difference and Edge Penalty.
Remote Sensing, 2015

Weighted classifier ensemble based on quadratic form.
Pattern Recognition, 2015

An Investigation of the Average Bid Mechanism for Procurement Auctions.
Management Science, 2015

A Three-Component Fisher-Based Feature Weighting Method for Supervised PolSAR Image Classification.
IEEE Geosci. Remote Sensing Lett., 2015

Modified Hybrid Freeman/Eigenvalue Decomposition for Polarimetric SAR Data.
J. Sensors, 2015

A Comparative Study on Frequency Sensitivity of a Transmission Tower.
J. Sensors, 2015

The B4-valued propositional Belnap-Dunn logic.
Journal of Intelligent and Fuzzy Systems, 2015

Monte Carlo Simulations of HIV Capsid Protein Homodimer.
Journal of Chemical Information and Modeling, 2015

A Symbolic Dynamics Perspective of Elementary Cellular Automaton Rule 12 with Minority Memory.
J. Cellular Automata, 2015

Misreporting behaviour in iterated prisoner's dilemma game with combined trust strategy.
Int. J. Systems Science, 2015

Design of a WSN System for Condition Monitoring of the Mechanical Equipment with Energy Harvesting.
iJOE, 2015

ELDA: Towards Efficient and Lightweight Detection of Cache Pollution Attacks in NDN.
CoRR, 2015

The Lifecycle and Cascade of Social Messaging Groups.
CoRR, 2015

HiFlash: A History Independent Flash Device.
CoRR, 2015

Glider Collisions in Hybrid Cellular Automaton Rules.
Complex Systems, 2015

Operating Comfort Prediction Model of Human-Machine Interface Layout for Cabin Based on GEP.
Comp. Int. and Neurosc., 2015

The Variant Gentzen System for the Propositional Logic.
Proceedings of the 11th International Conference on Semantics, Knowledge and Grids, 2015

FlexRadio: Fully Flexible Radios and Networks.
Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, 2015

Tracking Keystrokes Using Wireless Signals.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

AirExpress: Enabling Seamless In-band Wireless Multi-hop Transmission.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

ELDA: Towards efficient and lightweight detection of cache pollution attacks in NDN.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

The Double-Level Default Description Logic D 3 L.
Proceedings of the Knowledge Science, Engineering and Management, 2015

Robust deep feature for spoofing detection - the SJTU system for ASVspoof 2015 challenge.
Proceedings of the INTERSPEECH 2015, 2015

An investigation of context clustering for statistical speech synthesis with deep neural network.
Proceedings of the INTERSPEECH 2015, 2015

Interference alignment using shadow channel.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Deep Learning for Textual Entailment Recognition.
Proceedings of the 27th IEEE International Conference on Tools with Artificial Intelligence, 2015

Scotopic Visual Recognition.
Proceedings of the 2015 IEEE International Conference on Computer Vision Workshop, 2015

Optical OFDM aided enhanced 3-D visible light communication systems.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Design of three-dimensional constellations for wireless communication systems.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Prediction model of human body composition based on physiological information entropy.
Proceedings of the 8th International Conference on Biomedical Engineering and Informatics, 2015

MobiPluto: File System Friendly Deniable Storage for Mobile Devices.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Distributed and Centralized Schemes for Channel Sensing Order Setting in Multi-user Cognitive Radio Networks.
Wireless Personal Communications, 2014

A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid.
IEEE Trans. Smart Grid, 2014

Exploiting Click Constraints and Multi-view Features for Image Re-ranking.
IEEE Trans. Multimedia, 2014

Classification Method for Fully PolSAR Data Based on Three Novel Parameters.
IEEE Geosci. Remote Sensing Lett., 2014

Adaptive Control based Particle Swarm Optimization and Chebyshev Neural Network for Chaotic Systems.
JCP, 2014

Research on the Structural Characteristics of Transmission Grid Based on Complex Network Theory.
J. Applied Mathematics, 2014

An Exploration of the Triplet Periodicity in Nucleotide Sequences with a Mature Self-Adaptive Spectral Rotation Approach.
J. Applied Mathematics, 2014

Modeling of underwater wet welding process based on visual and arc sensor.
Industrial Robot, 2014

Intelligent Supply Chain Integration and Management Based on Cloud of Things.
IJDSN, 2014

Building interior layout reconstruction from through-the-wall radar image using MST-based method.
EURASIP J. Adv. Sig. Proc., 2014

Learning Fine-grained Image Similarity with Deep Ranking.
CoRR, 2014

Auditable Version Control Systems.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

In-band wireless cut-through: is it possible?
Proceedings of the 1st ACM workshop on Hot topics in wireless, HotWireless 2014, Maui, 2014

MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices.
Proceedings of the Information Security - 17th International Conference, 2014

Analysis and modelling on CMOS spiral inductor with impact of metal dummy fills.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014

A broadband CMOS LC voltage-controlled oscillator for FMCW synthesizer.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014

A semi-analytical extraction method for transformer model.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014

Characterizing the achievable throughput in wireless networks with two active RF chains.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

FastProbe: Malicious user detection in Cognitive Radio Networks through active transmissions.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Crowd Target Positioning under Multiple Cameras Based on Block Correspondence.
Proceedings of the Distributed, Ambient, and Pervasive Interactions, 2014

Learning Fine-Grained Image Similarity with Deep Ranking.
Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition, 2014

Semantic Labeling of Chinese Verb-Complement Structure Based on Feature Structure.
Proceedings of the Chinese Lexical Semantics - 15th Workshop, 2014

Simplified Constraints Rank-SVM for Multi-label Classification.
Proceedings of the Pattern Recognition - 6th Chinese Conference, 2014

Hierarchical Cascade of Classifiers for Efficient Poselet Evaluation.
Proceedings of the British Machine Vision Conference, 2014

2013
Erratum to: Optimal Channel Sensing Order for Various Applications in Cognitive Radio Networks.
Wireless Personal Communications, 2013

Optimal Channel Sensing Order for Various Applications in Cognitive Radio Networks.
Wireless Personal Communications, 2013

A Large Scene Deceptive Jamming Method for Space-Borne SAR.
IEEE Trans. Geoscience and Remote Sensing, 2013

Image-Domain Estimation of Wall Parameters for Autofocusing of Through-the-Wall SAR Imagery.
IEEE Trans. Geoscience and Remote Sensing, 2013

Deep Learning with Hierarchical Convolutional Factor Analysis.
IEEE Trans. Pattern Anal. Mach. Intell., 2013

Discovering Low-Rank Shared Concept Space for Adapting Text Mining Models.
IEEE Trans. Pattern Anal. Mach. Intell., 2013

Mature HIV-1 capsid structure by cryo-electron microscopy and all-atom molecular dynamics.
Nature, 2013

On the feasible payoff set of two-player repeated games with unequal discounting.
Int. J. Game Theory, 2013

Price of Anarchy for Non-atomic Congestion Games with Stochastic Demands.
CoRR, 2013

Strong Stability of Nash Equilibria in Load Balancing Games.
CoRR, 2013

Open source Ch Control System Toolkit and web-based control system design for teaching automatic control of linear time-invariant systems.
Comp. Applic. in Engineering Education, 2013

Ranking and Benchmarking of the Asian Games Achievements Based on DEA: the Case of Guangzhou 2010.
APJOR, 2013

Blind-LMS based digital background calibration for a 14-Bit 200-MS/s pipelined ADC.
Proceedings of the 21st IEEE/IFIP International Conference on VLSI and System-on-Chip, 2013

Multiview triangulation with uncertain data.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Context-Aware Access Control for Resources in the Ubiquitous Learning System Using Ciphertext-Policy Attribute-based Encryption.
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013

Symphony: cooperative packet recovery over the wired backbone in enterprise WLANs.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

DISCERN: Cooperative whitespace scanning in practical environments.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Research the Estimated Algorithm of the Doppler Frequency Shift Based on Adaptive Fading EKF with the Innovation Consequence.
Proceedings of the 3rd IFAC International Conference on Intelligent Control and Automation Science, 2013

CUDA Implementation of a Euler Solver for Cartesian Grid.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

MMS-IU Model for Incremental Update of Spatial Database.
Proceedings of the Geo-Informatics in Resource Management and Sustainable Ecosystem, 2013

The design of touch-screen with high resolution infrared based on plastic optical fiber and image processing.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

Defensive strategy of the goalkeeper based on the 3D vision and field division for the middle-size league of robocup.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

Towards self-repairing replication-based storage systems using untrusted clouds.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
A Novel Sensing Scheme for Dynamic Multichannel Access.
IEEE Trans. Vehicular Technology, 2012

A high computational power wireless sensor network for distributed structural health monitoring.
IJSNet, 2012

Building a Chinese Semantic Resource Based on Feature Structure.
Int. J. Comput. Proc. Oriental Lang., 2012

A web-based structural health monitoring sensor network.
IJCAT, 2012

A folk theorem for repeated games with unequal discounting.
Games and Economic Behavior, 2012

Near lossless compression of hyperspectral images based on distributed source coding.
SCIENCE CHINA Information Sciences, 2012

From single watermark to dual watermark: A new approach for image watermarking.
Computers & Electrical Engineering, 2012

Heuristic and Exact Solution Method for Convex nonlinear Knapsack Problem.
APJOR, 2012

Mobile robot action based on QR code identification.
Proceedings of the 2012 IEEE International Conference on Robotics and Biomimetics, 2012

Joint Optimization and Variable Selection of High-dimensional Gaussian Processes.
Proceedings of the 29th International Conference on Machine Learning, 2012

Model Transformation Method for Compensation Events and Tasks from Business Process Model to Flowchart.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

A Real-Time Posture Simulation Method for High-Speed Train.
Proceedings of the Intelligent Computing Technology - 8th International Conference, 2012

Robust Dynamic Provable Data Possession.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

ωF- Compactness in ω-Spaces.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

A new approach of semiregular compactness in L-topological spaces.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Measuring the Semantic Relevance between Term and Short Text: Using the Concepts of Shortest Path Length and Relatively Important Community.
Proceedings of the Chinese Lexical Semantics - 13th Workshop, 2012

Semantic Labeling of Chinese Serial Verb Sentences Based on Feature Structure.
Proceedings of the Chinese Lexical Semantics - 13th Workshop, 2012

Robust dynamic remote data checking for public clouds.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Visualization of the protein-coding regions with a self adaptive spectral rotation approach.
Nucleic Acids Research, 2011

TwigTable: Using Semantics in XML Twig Pattern Query Processing.
J. Data Semantics, 2011

Optimal control of mobile monitoring agents in immune-inspired wireless monitoring networks.
J. Network and Computer Applications, 2011

Combined trust model based on evidence theory in iterated prisoner's dilemma game.
Int. J. Systems Science, 2011

Agent Recommendation for Agent-Based Urban-Transportation Systems.
IEEE Intelligent Systems, 2011

A hybrid immune model for unsupervised structural damage pattern recognition.
Expert Syst. Appl., 2011

Predicting response time and error rates in visual search.
Proceedings of the Advances in Neural Information Processing Systems 24: 25th Annual Conference on Neural Information Processing Systems 2011. Proceedings of a meeting held 12-14 December 2011, 2011

On the Analysis of Multi-Channel Neural Spike Data.
Proceedings of the Advances in Neural Information Processing Systems 24: 25th Annual Conference on Neural Information Processing Systems 2011. Proceedings of a meeting held 12-14 December 2011, 2011

Unsupervised classification of POLSAR data based on the polarimetric decomposition and the co-polarization ratio.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

The Hierarchical Beta Process for Convolutional Factor Analysis and Deep Learning.
Proceedings of the 28th International Conference on Machine Learning, 2011

Base on Fluid-Structure Coupling Transient Impact Analysis of Particular Structure.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

Semiregular connectivity in L-topological spaces.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

Chinese semantic parsing based on dependency graph and feature structure.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Predicting coding region candidates in the DNA sequence based on visualization without training.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology, 2011

2010
Towards an Effective XML Keyword Search.
IEEE Trans. Knowl. Data Eng., 2010

A Review of the Applications of Agent Technology in Traffic and Transportation Systems.
IEEE Trans. Intelligent Transportation Systems, 2010

Description and Verification of Dynamic Software Architectures for Distributed Systems.
JSW, 2010

Agent-based artificial immune system approach for adaptive damage detection in monitoring networks.
J. Network and Computer Applications, 2010

Inductive Principles for Restricted Boltzmann Machine Learning.
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010

A belief-based approach to the repeated prisoners' dilemma with asymmetric private monitoring.
J. Economic Theory, 2010

A study on application of multi-sensor information fusion in pulsed GTAW.
Industrial Robot, 2010

Mobile Agent Computing Paradigm for Building a Flexible Structural Health Monitoring Sensor Network.
Comp.-Aided Civil and Infrastruct. Engineering, 2010

Bayesian Inference of the Number of Factors in Gene-Expression Analysis: Application to Human Virus Challenge Studies.
BMC Bioinformatics, 2010

On Tracker Selection for Peer-to-Peer Traffic Locality.
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010

NECLC at Multilingual Opinion Analysis Task in NTCIR8.
Proceedings of the 8th NTCIR Workshop Meeting on Evaluation of Information Access Technologies: Information Retrieval, 2010

A tutorial on stochastic approximation algorithms for training Restricted Boltzmann Machines and Deep Belief Nets.
Proceedings of the Information Theory and Applications Workshop, 2010

Location and Scatter Matching for Dataset Shift in Text Mining.
Proceedings of the ICDM 2010, 2010

Sparse linear regression with beta process priors.
Proceedings of the IEEE International Conference on Acoustics, 2010

A Novel Bayesian Classifcation System Integrated with Mobile Agent Based Modeling Technology.
Proceedings of the 2010 International Conference on Artificial Intelligence, 2010

A New Parallel Method of Smith-Waterman Algorithm on a Heterogeneous Platform.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2010

How about utilizing ordinal information from the distribution of unlabeled data.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

Remote data checking for network coding-based distributed storage systems.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

Reasoning on Formalizing WS-CDL Mobility Using Process Algebra.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010

2009
Binary Activity Chain Modes for Compositional Web Service and Its Compliance Verification.
JSW, 2009

Design and implementation of distributed algorithms for WSN-based structural health monitoring.
IJSNet, 2009

An Efficient LOTOS-Based Framework for Describing and Solving (Temporal) CSPs.
International Journal of Software Engineering and Knowledge Engineering, 2009

Group-Theoretic Partial Matrix Multiplication
CoRR, 2009

Granular Rough Theory: A representation semantics oriented theory of roughness.
Appl. Soft Comput., 2009

Formal Analysis of Fairness in E-Payment Protocol Based on Strand Space.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

Mining employment market via text block detection and adaptive cross-domain information extraction.
Proceedings of the 32nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2009

A Semi-Supervised Framework for Feature Mapping and Multiclass Classification.
Proceedings of the SIAM International Conference on Data Mining, 2009

Emotion Recognition of Pop Music Based on Maximum Entropy with Priors.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

A New Robust-Fragile Double Image Watermarking Algorithm.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Extracting discriminative concepts for domain adaptation in text mining.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

A New Covert Image Communication Approach with HVS and GFCM.
Proceedings of the Fuzzy Information and Engineering, 2009

ωθ-Convergence Theory of Ideals in -Spaces.
Proceedings of the Fuzzy Information and Engineering, 2009

The Skew Correcting Method for Two Dimension Bar Code Based on Least Square Methods.
Proceedings of the 2009 International Conference on Digital Image Processing, 2009

Effective XML Keyword Search with Relevance Oriented Ranking.
Proceedings of the 25th International Conference on Data Engineering, 2009

Unsupervised Structure Damage Classification Based on the Data Clustering and Artificial Immune Pattern Recognition.
Proceedings of the Artificial Immune Systems, 8th International Conference, 2009

Detecting Automotive Exhaust Gas Based on Fuzzy Inference System.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

F-Compactness in L-closure Spaces.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

Demonstrating Effective Ranked XML Keyword Search with Meaningful Result Display.
Proceedings of the Database Systems for Advanced Applications, 2009

Research of Structure Integration Based on Struts and Hibernate.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

The Research and Emulation on PIM-SM Protocol.
Proceedings of the High Performance Computing and Applications, 2009

Extracting the Coronary Artery in Angiographic Image Based on a Trous Wavelet of Rotary Gaussian with Adaptive Space Coefficient.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

An integrated discriminative probabilistic approach to information extraction.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

Mobile 3D graphics compression for progressive transmission over wireless network.
Proceedings of the 11th International Conference on Computer-Aided Design and Computer Graphics, 2009

Research and Design of Human Impedance Measuring Instrument Based on the Method of Multi-Frequency and Multi-Segment.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

Influence on Blood Flow Under Deposited Plaque Size and Interval in Local Curved Vessel.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
XML-based agent communication, migration and computation in mobile agent systems.
Journal of Systems and Software, 2008

Constructing Maximum Entropy Language Models for Movie Review Subjectivity Analysis.
J. Comput. Sci. Technol., 2008

Low-complexity and energy efficient image compression scheme for wireless sensor networks.
Computer Networks, 2008

Human Pose Estimation with Rotated Geometric Blur.
Proceedings of the 9th IEEE Workshop on Applications of Computer Vision (WACV 2008), 2008

A Data-Aided Channel Estimation Method Based on CAZAC.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Spatial Division Multiple Access with Smart Antennas in TD-SCDMA HSDPA.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

System Analysis of Imperfect Adaptive Beam Forming Antenna for TDD HSDPA.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

PRIS in TREC 2008 Blog Track.
Proceedings of The Seventeenth Text REtrieval Conference, 2008

Investigating the effects of imperfect DOA estimation on performance of adaptive beamforming antennas in LCR TD-CDMA.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

GMF-BMA: A New Grid Resource Monitoring Model.
Proceedings of the PACIIA 2008, 2008

Attribute Delegation Authorization Based on Subjective Trust Evaluation.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Language Feature Mining for Music Emotion Classification via Supervised Learning from Lyrics.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008

Chinese NER Using CRFs and Logic for the Fourth SIGHAN Bakeoff.
Proceedings of the Third International Joint Conference on Natural Language Processing, 2008

Trusted Transmission Protocol for Content Security.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Using semantics in XML query processing.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Function Finding Using Gene Expression Programming Based Neural Network.
Proceedings of the Fourth International Conference on Natural Computation, 2008

A Novel Measuring Method of Capacitive Current for Ungrounded Distribution Systems.
Proceedings of the Industry Applications Society Annual Meeting, 2008

A Parallel FFT Scheme Based on Multi-Machines Environment.
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2008

Exploiting ID References for Effective Keyword Search in XML Documents.
Proceedings of the Database Systems for Advanced Applications, 2008

SemanticTwig: A Semantic Approach to Optimize XML Query Processing.
Proceedings of the Database Systems for Advanced Applications, 2008

A Trusted Transfer Protocol Based on Property-Based Seal.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A Group-Based Trust Metric for P2P Networks: Protection against Sybil Attack and Collusion.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

New Algorithm of Maximum Frequent Itemsets Based on FP-Tree for Mining Multiple-Level Association Rules.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Design and Implementation of Quantitative Nutritional Guidance System for Pregnant Woman.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

ωθ - Convergence Theory of Nets in - Spaces.
Proceedings of the Fuzzy Information and Engineering, 2008

2007
System Layer Evaluation of Joint Detection and Imperfect Adaptive Beam-Forming Antenna for Packet Services in the LCR TD-CDMA System.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007

ITP&SUI-Based Channel Assignment in CAC Procedure for TDD-CDMA System.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007

Distributed Processing in Wireless Sensor Networks for Structural Health Monitoring.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Dual-tree Complex Wavelets Transforms for Image Denoising.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Application of the Rough Set to Image Median Denoising.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Short Text Feature Extraction and Clustering for Web Topic Mining.
Proceedings of the Third International Conference on Semantics, 2007

An Integrated System of Intrusion Detection Based on Rough Set and Wavelet Neural Network.
Proceedings of the Third International Conference on Natural Computation, 2007

Estimating Aging Pattern by Aging Increment Distribution for Re-rendering of Facial Age Effects.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

A Clustering Based Bayesian Network Classifier.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

VERT: A Semantic Approach for Content Search and Content Extraction in XML Query Processing.
Proceedings of the Conceptual Modeling, 2007

On Label Stream Partition for Efficient Holistic Twig Join.
Proceedings of the Advances in Databases: Concepts, 2007

Analysis of Probabilistic Information Flow Security Properties.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Noise rejection using variable-height timing-window technique for pulse signals with variable S/N ratio.
IEEE Trans. Instrumentation and Measurement, 2006

Mobile-C: a mobile agent platform for mobile C/C++ agents.
Softw., Pract. Exper., 2006

BUPT at TREC 2006: Spam Track.
Proceedings of the Fifteenth Text REtrieval Conference, 2006

Supporting Connector in Programming Language.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

A New Component-Oriented Programming Language with the First-Class Connector.
Proceedings of the Modular Programming Languages, 7th Joint Modular Languages Conference, 2006

LBT Based Low Complexity Image Compression Method.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Fast Spectral Clustering of Data Using Sequential Matrix Compression.
Proceedings of the Machine Learning: ECML 2006, 2006

An Approach Based on Question Answering Mechanism for Handling Unexpected Exceptions in Collaborative Design.
Proceedings of the 10th International Conference on CSCW in Design, 2006

Unexpected Exceptions Handling Based on Chinese Question Answering in Collaborative Design.
Proceedings of the Computer Supported Cooperative Work in Design III, 2006

Analysis of Multi-ISPs Game Based on Lotka-Volterra Model.
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006

POC-NLW Template for Chinese Word Segmentation.
Proceedings of the Fifth Workshop on Chinese Language Processing, 2006

2005
Development and field test of a laser-based nonintrusive detection system for identification of vehicles on the highway.
IEEE Trans. Intelligent Transportation Systems, 2005

A Generic Formal Framework For Constructing Agent Interaction Protocols.
International Journal of Software Engineering and Knowledge Engineering, 2005

Interpretive OpenGL for computer graphics.
Computers & Graphics, 2005

PRIS Kidult Anti-SPAM Solution at the TREC 2005 Spam Track: Improving the Performance of Naive Bayes for Spam Detection.
Proceedings of the Fourteenth Text REtrieval Conference, 2005

A Novel Identity-Based Key Issuing Scheme Based on Interacting Neural Network.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Model and Implement an Agent Oriented E-Learning System.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005

2004
Parallel Scheduling for Early Completion.
Proceedings of the Handbook of Scheduling - Algorithms, Models, and Performance Analysis., 2004

The research of the distributed stripped storage spatial model.
Operating Systems Review, 2004

Specification and Verification of Agent Interaction Protocols.
Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2004), 2004

ODWIS as a Prototype of Knowledge Service Layer in Semantic Grid.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

A New Iris Recognition Approach for Embedded System.
Proceedings of the Embedded Software and Systems, First International Conference, 2004

Security Service Model for RFID Enabled Supply Chain.
Proceedings of the Fourth International Conference on Electronic Business, 2004

2003
A novel packet-pair-based inferring bandwidth congestion control mechanism for layered multicast.
Operating Systems Review, 2003

An Object-Based Software Package for Interactive Control System Design and Analysis.
J. Comput. Inf. Sci. Eng., 2003

Adapting Granular Rough Theory to Multi-agent Context.
Proceedings of the Rough Sets, 2003

A Pure Mereological Approach to Roughness.
Proceedings of the Rough Sets, 2003

A Model for User Management in Grid Computing Environments.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

2002
Data mining aided signature discovery in network-based intrusion detection system.
Operating Systems Review, 2002

1999
Remote Usability Testing Through the Internet.
Proceedings of the Human-Computer Interaction: Ergonomics and User Interfaces, 1999

1997
Internationalization and Localization for Cultural Diversity.
Proceedings of the Design of Computing Systems: Cognitive Considerations, 1997


  Loading...