Bo Chen

According to our database1, Bo Chen authored at least 460 papers between 1997 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Land use classification from social media data and satellite imagery.
J. Supercomput., 2020

Analysis and Design of a 1-MHz Bidirectional Multi-CLLC Resonant DC-DC Converter With GaN Devices.
IEEE Trans. Ind. Electron., 2020

A Bidirectional CDT-LC Resonant DC-DC Converter With a Wide Voltage Range.
IEEE Trans. Ind. Electron., 2020

A Robust Adaptive Cancellation of Unknown Sinusoidal Disturbance.
IEEE Trans. Circuits Syst. II Express Briefs, 2020

Entry-Prohibited Effect of kHz Pulsed Magnetic Field Upon Interaction Between SPIO Nanoparticles and Mesenchymal Stem Cells.
IEEE Trans. Biomed. Engineering, 2020

A Space-Interconnection Algorithm for Satellite Constellation Based on Spatial Grid Model.
Remote. Sens., 2020

Generation of two-mode squeezing of mechanical oscillators in the multi-mode optomechanical systems.
Quantum Inf. Process., 2020

Robust hierarchical identification of Wiener systems in the presence of dynamic disturbances.
J. Frankl. Inst., 2020

Learning to Recognize Handwriting Input with Acoustic Features.
IMWUT, 2020

Robust extended recursive least squares identification algorithm for Hammerstein systems with dynamic disturbances.
Digit. Signal Process., 2020

A framework for constructing a huge name disambiguation dataset: algorithms, visualization and human collaboration.
CoRR, 2020

Comparison and Benchmark of Graph Clustering Algorithms.
CoRR, 2020

MobileDets: Searching for Object Detection Architectures for Mobile Accelerators.
CoRR, 2020

Topological Sweep for Multi-Target Detection of Geostationary Space Objects.
CoRR, 2020

Robust Synthesis of Wind Turbine Generators to Support Microgrid Frequency Considering Linearization-Induced Uncertainty.
CoRR, 2020

Towards Designing A Secure Plausibly Deniable System for Mobile Devices against Multi-snapshot Adversaries - A Preliminary Design.
CoRR, 2020

A multi-Internet service provider game: Equilibrium, stability, and characteristics.
Concurr. Comput. Pract. Exp., 2020

Differentiation of soft tissue and bone sarcomas from benign lesions utilizing <sup>18</sup>F-FDG PET/CT-derived parameters.
BMC Medical Imaging, 2020

NNW-GridStar: Interactive structured mesh generation software for aircrafts.
Adv. Eng. Softw., 2020

Context-Specific Heterogeneous Graph Convolutional Network for Implicit Sentiment Analysis.
IEEE Access, 2020

Filter Pruning Without Damaging Networks Capacity.
IEEE Access, 2020

SSDANet: Spectral-Spatial Three-Dimensional Convolutional Neural Network for Hyperspectral Image Classification.
IEEE Access, 2020

FisheyeDet: A Self-Study and Contour-Based Object Detector in Fisheye Images.
IEEE Access, 2020

Rethinking Wireless Network Management Through Sensor-driven Contextual Analysis.
Proceedings of the HotMobile '20: The 21st International Workshop on Mobile Computing Systems and Applications, 2020

Automated Bug Detection and Replay for COTS Linux Kernel Modules with Concolic Execution.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

JarKA: Modeling Attribute Interactions for Cross-lingual Knowledge Alignment.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

BERT-INT: A BERT-based Interaction Model For Knowledge Graph Alignment.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Alleviate Dataset Shift Problem in Fine-grained Entity Typing with Virtual Adversarial Training.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Variational Hetero-Encoder Randomized GANs for Joint Image-Text Modeling.
Proceedings of the 8th International Conference on Learning Representations, 2020

Malicious SIM Cards Identification Method Based on Telecom Big Data Analytics.
Proceedings of the ICCDE 2020: The 6th International Conference on Computing and Data Engineering, 2020

Spherical Color-Shift Keying for Visible Light Communication Systems.
Proceedings of the 54th Annual Conference on Information Sciences and Systems, 2020

Learning Dynamic Hierarchical Topic Graph with Graph Convolutional Network for Document Classification.
Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics, 2020

PEIA: Personality and Emotion Integrated Attentive Model for Music Recommendation on Social Media Platforms.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Learning to Map Frequent Phrases to Sub-Structures of Meaning Representation for Neural Semantic Parsing.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Towards privacy preserving social recommendation under personalized privacy settings.
World Wide Web, 2019

A Robust Adaptive Identification of Sinusoidal Signal With Unknown Frequency.
IEEE Trans. Circuits Syst. II Express Briefs, 2019

Real-time Precise Point Positioning with a Xiaomi MI 8 Android Smartphone.
Sensors, 2019

Image classification towards transmission line fault detection via learning deep quality-aware fine-grained categorization.
J. Vis. Commun. Image Represent., 2019

基于逾渗理论的交通路网通行效率分析 (Traffic Efficiency Analysis of Traffic Road Network Based on Percolation Theory).
计算机科学, 2019

基于加权非局部相似性的视频压缩感知多假设重构算法 (Multi-hypothesis Reconstruction Algorithm of DCVS Based on Weighted Non-local Similarity).
计算机科学, 2019

IoTCache: Toward Data-Driven Network Caching for Internet of Things.
IEEE Internet Things J., 2019

Nonnegative matrix factorization with manifold structure for face recognition.
IJWMIP, 2019

Displacement Analysis of Solar Magnetic Field Images in EUV Wavelengths of Space Solar Telescope.
Int. J. Pattern Recognit. Artif. Intell., 2019

Face recognition using nonnegative matrix factorization with fractional power inner product kernel.
Neurocomputing, 2019

Modelling and fault tolerance analysis of triplex redundancy servo valve.
IJMIC, 2019

Downstream competition and upstream labor market matching.
Int. J. Game Theory, 2019

A Universal Generating Algorithm of the Polyhedral Discrete Grid Based on Unit Duplication.
ISPRS Int. J. Geo-Information, 2019

QRA-Grid: Quantitative Risk Analysis and Grid-based Pre-warning Model for Urban Natural Gas Pipeline.
ISPRS Int. J. Geo-Information, 2019

Welding defect detection based on local image enhancement.
IET Image Process., 2019

Low-Power Computer Vision: Status, Challenges, and Opportunities.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2019

Method for managing and querying geo-spatial data using a grid-code-array spatial index.
Earth Science Informatics, 2019

An efficient integer coding index algorithm for multi-scale time information management.
Data Knowl. Eng., 2019

SCR-Graph: Spatial-Causal Relationships based Graph Reasoning Network for Human Action Prediction.
CoRR, 2019

MnasFPN: Learning Latency-aware Pyramid Architecture for Object Detection on Mobile Devices.
CoRR, 2019

RAKA: Co-training of Relationships and Attributes for Cross-lingual Knowledge Alignment.
CoRR, 2019

CONNA: Addressing Name Disambiguation on The Fly.
CoRR, 2019

BPnP: Further Empowering End-to-End Learning with Back-Propagatable Geometric Optimization.
CoRR, 2019

Numerical schemes to reconstruct three dimensional time-dependent point sources of acoustic waves.
CoRR, 2019

Capacity Games with Supply Function Competition.
CoRR, 2019

Low-Power Computer Vision: Status, Challenges, Opportunities.
CoRR, 2019

Low Power Inference for On-Device Visual Recognition with a Quantization-Friendly Solution.
CoRR, 2019

MPC for Energy Efficient HVAC Control with Humidity and Latent Heat Considerations.
CoRR, 2019

Research on the status and problems of psychological teaching in colleges and universities based on Diffie-Hellman key exchange algorithm.
Cluster Computing, 2019

RHPCG: a database of the Regulation of the Hippo Pathway in Cancer Genome.
Database, 2019

Memorized Variational Continual Learning for Dirichlet Process Mixtures.
IEEE Access, 2019

Self-Attention-Based BiLSTM Model for Short Text Fine-Grained Sentiment Classification.
IEEE Access, 2019

Latent Space Expanded Variational Autoencoder for Sentence Generation.
IEEE Access, 2019

A Video Streaming Transmission Scheme Based on Frame Priority in Device-to-Device Multicast Networks.
IEEE Access, 2019

Crowd Counting Method Based on Convolutional Neural Network With Global Density Feature.
IEEE Access, 2019

Feature Analysis of Generalized Load Patterns Considering Active Load Response to Real-Time Pricing.
IEEE Access, 2019

Contactless Measurement of Hypervelocity Projectile Wake Velocity Distribution.
IEEE Access, 2019

Resource Allocation for Energy Harvesting-Powered D2D Communications Underlaying NOMA-Based Networks.
IEEE Access, 2019

Obstacle-Avoiding Connectivity Restoration Based on Quadrilateral Steiner Tree in Disjoint Wireless Sensor Networks.
IEEE Access, 2019

Receding Horizon Control for Mode Selection and Powertrain Control of a Multi-mode Hybrid Electric Vehicle.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Generation of Optimal Velocity Trajectory for Real-Time Predictive Control of a Multi-Mode PHEV.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Radar Transceivers for Inverse Synthetic Aperture Radar (ISAR) Imaging of Human Activity in 65nm CMOS.
Proceedings of the 32nd IEEE International System-on-Chip Conference, 2019

A Digital-Enhanced Interferometric Radar Sensor for Physiological Sign Monitoring.
Proceedings of the 32nd IEEE International System-on-Chip Conference, 2019

The B5-Modalized Propositional Logic.
Proceedings of the 15th International Conference on Semantics, Knowledge and Grids, 2019

A User Interaction Demonstration For Exploring Medical Knowledge Graph.
Proceedings of the ISWC 2019 Satellite Tracks (Posters & Demonstrations, 2019

AIRec: Attentive Intersection Model for Tag-Aware Recommendation.
Proceedings of the ISWC 2019 Satellite Tracks (Posters & Demonstrations, 2019

Improving Distantly-supervised Entity Typing with Compact Latent Space Clustering.
Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2019

An Elliptic Curve Based Name Privacy Protection Mechanism for Sensory Data Centric Named Data Networking.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019

ClientMarshal: Regaining Control from Wireless Clients for Better Experience.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

Event-driven stitching for tile-based live 360 video streaming.
Proceedings of the 10th ACM Multimedia Systems Conference, 2019

FIS: Facial Information Segmentation for Video Redaction.
Proceedings of the 2nd IEEE Conference on Multimedia Information Processing and Retrieval, 2019

A Multi-Vehicle Cooperative Routing Method Based on Evolutionary Game Theory.
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019

A Two-Stage Push-Pull Power Amplifier with Electro-Thermal Effects Study in 130 nm SOI CMOS for IEEE 802.11ac Applications.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2019

Surrogate Model Assisted Design of Silicon Anode Considering Lithiation Induced Stresses.
Proceedings of the IEEE International Reliability Physics Symposium, 2019

CFM: Convolutional Factorization Machines for Context-Aware Recommendation.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

End-to-End Multi-Perspective Matching for Entity Resolution.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Using DMSP/OLS Nighttime Light to Estimate Electric Power Consumption: Perspective from Transferability Across Years.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

Open Data Cube (ODC) in Taiwan: The Initiative and Protocol Development.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

Phase Unwrap Using Nonlinear Kalman Filtering for SAR Systems.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

Satellite Pose Estimation with Deep Landmark Regression and Nonlinear Pose Refinement.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019

Searching for MobileNetV3.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

A Multi-agent Simulation for the Research on the Market Equilibrium Phenomena Using Q-Network Algorithm.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

Event-triggered Secure Estimation for Large-scale Interconnected Systems Based on Intermediate Estimator.
Proceedings of the 15th IEEE International Conference on Control and Automation, 2019

Enabling Blockchain Applications Over Named Data Networking.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Data-driven Convex-optimization Method for Estimating Load Changes.
Proceedings of the 2019 IEEE Global Conference on Signal and Information Processing, 2019

EUSP: An Easy-to-Use Semantic Parsing PlatForm.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

MnasNet: Platform-Aware Neural Architecture Search for Mobile.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Deep Sequence-to-Sequence Entity Matching for Heterogeneous Entity Resolution.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

eHIFS: An Efficient History Independent File System.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

An Obfuscated Challenge Design for APUF to Resist Machine Learning Attacks.
Proceedings of the 13th IEEE International Conference on ASIC, 2019

Special Session: 2018 Low-Power Image Recognition Challenge and Beyond.
Proceedings of the IEEE International Conference on Artificial Intelligence Circuits and Systems, 2019

KCAT: A Knowledge-Constraint Typing Annotation Tool.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019

Hierarchical Reinforcement Learning for Course Recommendation in MOOCs.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Introduction to the Special Issue on Applications of Mechatronic and Embedded Systems (MESA) in ITS.
IEEE Trans. Intell. Transp. Syst., 2018

On energy-to-peak filtering for semi-Markov jump singular systems with unideal measurements.
Signal Process., 2018

Extended Joint Sparsity Reconstruction for Spatial and Temporal ERT Imaging.
Sensors, 2018

Electrical Resistance Tomography for Visualization of Moving Objects Using a Spatiotemporal Total Variation Regularization Algorithm.
Sensors, 2018

The role of aggregate information in a binary threshold game.
Soc. Choice Welf., 2018

Recognizing irregular entities in biomedical text via deep neural networks.
Pattern Recognit. Lett., 2018

基于灰度共生矩阵的图像自适应分块压缩感知方法 (GLCM-based Adaptive Block Compressed Sensing Method for Image).
计算机科学, 2018

用于图像重构的基于行间支撑集相似度的CoSaMP算法 (Support Similarity between Lines Based CoSaMP Algorithm for Image Reconstruction).
计算机科学, 2018

基于IRWQS与模糊特征的位置预测算法 (Position Prediction Algorithm Based on IRWQS and Fuzzy Features).
计算机科学, 2018

A Deterministic Sensor Deployment Method for Target Coverage.
J. Sensors, 2018

Allocation of emission permits based on DEA and production stability.
INFOR Inf. Syst. Oper. Res., 2018

Quantized asynchronous dissipative state estimation of jumping neural networks subject to occurring randomly sensor saturations.
Neurocomputing, 2018

Mining Individual Similarity by Assessing Interactions with Personally Significant Places from GPS Trajectories.
ISPRS Int. J. Geo-Information, 2018

An effective method for the abnormal monitoring of stage performance based on visual sensor network.
Int. J. Distributed Sens. Networks, 2018

Cyber-physical perspective on smart grid design and operation.
IET Cyper-Phys. Syst.: Theory & Appl., 2018

Ensuring data confidentiality via plausibly deniable encryption and secure deletion - a survey.
Cybersecurity, 2018

On the Secrecy Unicast Throughput Performance of NOMA Assisted Multicast-Unicast Streaming With Partial Channel Information.
CoRR, 2018

2018 Low-Power Image Recognition Challenge.
CoRR, 2018

MnasNet: Platform-Aware Neural Architecture Search for Mobile.
CoRR, 2018

NetAdapt: Platform-Aware Neural Network Adaptation for Mobile Applications.
CoRR, 2018

User-friendly deniable storage for mobile devices.
Comput. Secur., 2018

An efficient duality-based approach for PDE-constrained sparse optimization.
Comput. Optim. Appl., 2018

A novel tool for the modeling, simulation and costing of membrane based gas separation processes using Aspen HYSYS: Optimization of the CO<sub>2</sub>/CH<sub>4</sub> separation process.
Comput. Chem. Eng., 2018

synchronization for singularly perturbed complex networks with semi-Markov jump topology.
Appl. Math. Comput., 2018

XPMFS: A New NVM File System for Vehicle Big Data.
IEEE Access, 2018

SGRS: A sequential gesture recognition system using COTS RFID.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

A Novel Adaptive Segmentation Method Based on Legendre Polynomials Approximation.
Proceedings of the Pattern Recognition and Computer Vision - First Chinese Conference, 2018

RFree-ID: An Unobtrusive Human Identification System Irrespective of Walking Cofactors Using COTS RFID.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications, 2018

Internet Protocol Cameras with No Password Protection: An Empirical Investigation.
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018

Accurate Text-Enhanced Knowledge Graph Representation Learning.
Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2018

ReSPonSe: Real-time, Secure, and Privacy-aware Video Redaction System.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Optimal Map-Based Mode Selection and Powertrain Control for a Multi-Mode Plug-in Hybrid Electric Vehicle.
Proceedings of the 14th IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications, 2018

A 253mW/channel 4TX/4RX pulsed chirping phased-array radar TRX in 65nm CMOS for X-band synthetic-aperture radar imaging.
Proceedings of the 2018 IEEE International Solid-State Circuits Conference, 2018

Wavelet Autoencoder for Radar HRRP Target Recognition with Recurrent Neural Network.
Proceedings of the Intelligence Science and Big Data Engineering, 2018

Radar HRRP Target Recognition with Recurrent Convolutional Neural Networks.
Proceedings of the Intelligence Science and Big Data Engineering, 2018

A DDS-Driven ADPLL Chirp Synthesizer with Ramp-Interpolating Linearization for FMCW Radar Application in 65nm CMOS.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018

High-quality Voice Conversion Using Spectrogram-Based WaveNet Vocoder.
Proceedings of the Interspeech 2018, 2018

Low-Shot Multi-label Incremental Learning for Thoracic Diseases Diagnosis.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

The Classified and Active Caching Strategy for Iterative Application in Spark.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

ReaderTrack: Reader-Book Interaction Reasoning Using RFID and Smartwatch.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Modernizing Distribution System Restoration to Achieve Resiliency Against Extreme Weather Events.
Proceedings of the 2018 IEEE Global Conference on Signal and Information Processing, 2018

A Terrain Classification Method for POLSAR Images Based on Modified Scattering Parameters.
Proceedings of the E-Learning and Games - 12th International Conference, 2018

NetAdapt: Platform-Aware Neural Network Adaptation for Mobile Applications.
Proceedings of the Computer Vision - ECCV 2018, 2018

MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Quantization and Training of Neural Networks for Efficient Integer-Arithmetic-Only Inference.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

MorphNet: Fast & Simple Resource-Constrained Structure Learning of Deep Networks.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

Dimension Reduction Based on Effects of Experienced Users in Recommender Systems.
Proceedings of the Communications, Signal Processing, and Systems, 2018

Semi-Supervised Lexicon Learning for Wide-Coverage Semantic Parsing.
Proceedings of the 27th International Conference on Computational Linguistics, 2018

Multi-perspective Embeddings for Chinese Chunking.
Proceedings of the Chinese Lexical Semantics - 19th Workshop, 2018

Study on Chinese Discourse Semantic Annotation Based on Semantic Dependency Graph.
Proceedings of the Chinese Lexical Semantics - 19th Workshop, 2018

Construction of Chinese Semantic Annotation Resource of Connective Structures.
Proceedings of the Chinese Lexical Semantics - 19th Workshop, 2018

Class-Cone Based Nonnegative Matrix Factorization for Face Recognition.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

A Novel Rician Noise Removal Algorithm Based on Energy Function Minimization Method.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

A Novel Hybrid Active Contour Model for Medical Image Segmentation Driven by Legendre Polynomials.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

A Novel Enhanced Nonnegative Feature Extraction Approach.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

MEgo2Vec: Embedding Matched Ego Networks for User Alignment Across Social Networks.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

Sequence-to-Action: End-to-End Semantic Graph Generation for Semantic Parsing.
Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018

Elastic Responding Machine for Dialog Generation with Dynamically Mechanism Selecting.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Tree-Structured Neural Machine for Linguistics-Aware Sentence Generation.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Personalized Privacy-Preserving Social Recommendation.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Conversational Model Adaptation via KL Divergence Regularization.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Studying Analysts' Data Triage Operations in Cyber Defense Situational Analysis.
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017

Spatiotemporal Fuzzy Clustering Strategy for Urban Expansion Monitoring Based on Time Series of Pixel-Level Optical and SAR Images.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2017

Out-of-Focus Projector Calibration Method with Distortion Correction on the Projection Plane in the Structured Light Three-Dimensional Measurement System.
Sensors, 2017

Study on Finite Element Model Updating in Highway Bridge Static Loading Test Using Spatially-Distributed Optical Fiber Sensors.
Sensors, 2017

Transferability of Economy Estimation Based on DMSP/OLS Night-Time Light.
Remote. Sens., 2017

基于PXI平台的MEMS电场传感器自动测试系统的设计 (Design of MEMS Electric-field Sensor Test System Based on PXI).
计算机科学, 2017

A unified method to energy-to-peak filter design for networked Markov switched singular systems over a finite-time interval.
J. Frankl. Inst., 2017

Remote data integrity checking with server-side repair.
J. Comput. Secur., 2017

Supplier Competition with Option Contracts for Discrete Blocks of Capacity.
Oper. Res., 2017

An Improved Identification Code for City Components Based on Discrete Global Grid System.
ISPRS Int. J. Geo-Information, 2017

A hybrid method of optimal sensor placement for dynamic response monitoring of hydro-structures.
Int. J. Distributed Sens. Networks, 2017

Glider Collisions in Hybrid Cellular Automaton with Memory Rule (43, 74).
Int. J. Bifurc. Chaos, 2017

Zoned elasticity modulus inversion analysis method of a high arch dam based on unconstrained Lagrange support vector regression (support vector regression arch dam).
Eng. Comput., 2017

MorphNet: Fast & Simple Resource-Constrained Structure Learning of Deep Networks.
CoRR, 2017

MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications.
CoRR, 2017

Contrary description logic: Gentzen deduction system.
Sci. China Inf. Sci., 2017

Towards efficient detection of sybil attacks in location-based social networks.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

RDS3: Ransomware defense strategy by using stealthily spare space.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

Temporal functional connectomics in schizophrenia and healthy controls.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

The Boolean Algebra Logic: The Soundness and Completeness Theorem.
Proceedings of the 13th International Conference on Semantics, Knowledge and Grids, 2017

Quantified Propositional Logic and Translations.
Proceedings of the 13th International Conference on Semantics, Knowledge and Grids, 2017

Teleconsultant: Communication and Analysis of Wearable Videos in Emergency Medical Environments.
Proceedings of the 2017 ACM on Multimedia Conference, 2017

Design of LDPC Fast Encoding Based on Dynamic Memory Structure of Linked List Queue.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

Comparison of Modeling Target in LSTM-RNN Duration Model.
Proceedings of the Interspeech 2017, 2017

Discrete Duration Model for Speech Synthesis.
Proceedings of the Interspeech 2017, 2017

Measurement-based, practical techniques to improve 802.11ac performance.
Proceedings of the 2017 Internet Measurement Conference, 2017

Geographically weighted regression model for urban traffic black-spot analysis.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

A Novel Real-Time Gesture Recognition Algorithm for Human-Robot Interaction on the UAV.
Proceedings of the Computer Vision Systems - 11th International Conference, 2017

Distributed fusion filtering for stochastic uncertain systems subject to correlated noises, random delays and data losses.
Proceedings of the 13th IEEE International Conference on Control & Automation, 2017

Towards Access Control for Network Coding-Based Named Data Networking.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

On Content Diffusion Modelling in Information-Centric Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Seeing into Darkness: Scotopic Visual Recognition.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, 2017

Study on Chinglish in Web Text for Natural Language Processing.
Proceedings of the Chinese Lexical Semantics - 18th Workshop, 2017

DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

GlobeSen: an open interconnection framework based on named sensory date for IoT.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

Mechanism-Aware Neural Machine for Dialogue Response Generation.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
QoS-Based Blind Spectrum Selection with Multi-armed Bandit Problem in Cognitive Radio Networks.
Wireless Personal Communications, 2016

Vision without the Image.
Sensors, 2016

Error-Component Analysis of TRMM-Based Multi-Satellite Precipitation Estimates over Mainland China.
Remote. Sens., 2016

Using a Kalman Filter to Assimilate TRMM-Based Real-Time Satellite Precipitation Estimates over Jinghe Basin, China.
Remote. Sens., 2016

From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT.
J. Sensors, 2016

Random decentralized market processes for stable job matchings with competitive salaries.
J. Econ. Theory, 2016

Glider Collisions in Hybrid Cellular Automata Rule 168 and 133.
J. Cell. Autom., 2016

A Subdivision Method to Unify the Existing Latitude and Longitude Grids.
ISPRS Int. J. Geo-Information, 2016

A Symbolic Dynamics Perspective of Conway's Game of Life.
Int. J. Bifurc. Chaos, 2016

Packet Header Anomaly Detection Using Bayesian Topic Models.
IACR Cryptol. ePrint Arch., 2016

A Symbolic Dynamics Perspective of the Game of Three-Dimensional Life.
Complex Systems, 2016

The Lifecycle and Cascade of WeChat Social Messaging Groups.
Proceedings of the 25th International Conference on World Wide Web, 2016

What If Routers Are Malicious? Mitigating Content Poisoning Attack in NDN.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Privacy-Preserving Query Log Sharing Based on Prior N-Word Aggregation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Security analysis on InfiniBand protocol implementations.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

BRR-CVR: A Collaborative Caching Strategy for Information-Centric Wireless Sensor Networks.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

13.2 A Ku-band 260mW FMCW synthetic aperture radar TRX with 1.48GHz BW in 65nm CMOS for micro-UAVs.
Proceedings of the 2016 IEEE International Solid-State Circuits Conference, 2016

An analog baseband chain of synthetic aperture radar receiver.
Proceedings of the International Symposium on Integrated Circuits, 2016

A CMOS digital-controlled oscillator for All-digital PLL frequency synthesizer.
Proceedings of the International Symposium on Integrated Circuits, 2016

Millimeter wave transformer coupled low-power and broadband power amplifiers.
Proceedings of the International Symposium on Integrated Circuits, 2016

Live demonstration: A Ku-band FMCW synthetic aperture radar transceiver for micro-UAVs.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016

A high gain decibel-linear programmable gain amplifier of synthetic aperture radar receiver.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016

Design considerations of Ku-band high gain wideband CMOS power amplifier for FMCW radar application.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016

Evaluation of Global Satellite Mapping of precipitation analysis product during torrential rainfall event of 22 July 2010 in Jinghe Basin.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Learning Phrase Representations Based on Word and Character Embeddings.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016

Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public Clouds.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

The construction of teaching interaction platform and teaching practice based on SPOC mode.
Proceedings of the 11th International Conference on Computer Science & Education, 2016

Contrastive topic evolution discovery via nonnegative matrix factorization.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Demo: A Symbolic N-Variant System.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

Sentence Rewriting for Semantic Parsing.
Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, 2016

2015
Introduction to the Special Issue on Mechatronic and Embedded Systems and Applications in ITS.
IEEE Trans. Intell. Transp. Syst., 2015

Impact of Missing Passive Microwave Sensors on Multi-Satellite Precipitation Retrieval Algorithm.
Remote. Sens., 2015

Image Segmentation Based on Constrained Spectral Variance Difference and Edge Penalty.
Remote. Sens., 2015

Weighted classifier ensemble based on quadratic form.
Pattern Recognit., 2015

An Investigation of the Average Bid Mechanism for Procurement Auctions.
Manag. Sci., 2015

A Three-Component Fisher-Based Feature Weighting Method for Supervised PolSAR Image Classification.
IEEE Geosci. Remote. Sens. Lett., 2015

生物事件触发词识别方法研究 (Research on Tagging Biomedical Event Trigger).
计算机科学, 2015

Modified Hybrid Freeman/Eigenvalue Decomposition for Polarimetric SAR Data.
J. Sensors, 2015

A Comparative Study on Frequency Sensitivity of a Transmission Tower.
J. Sensors, 2015

The B<sub>4</sub>-valued propositional Belnap-Dunn logic.
J. Intell. Fuzzy Syst., 2015

Monte Carlo Simulations of HIV Capsid Protein Homodimer.
J. Chem. Inf. Model., 2015

A Symbolic Dynamics Perspective of Elementary Cellular Automaton Rule 12 with Minority Memory.
J. Cell. Autom., 2015

Misreporting behaviour in iterated prisoner's dilemma game with combined trust strategy.
Int. J. Syst. Sci., 2015

Design of a WSN System for Condition Monitoring of the Mechanical Equipment with Energy Harvesting.
Int. J. Online Eng., 2015

The Lifecycle and Cascade of Social Messaging Groups.
CoRR, 2015

HiFlash: A History Independent Flash Device.
CoRR, 2015

Glider Collisions in Hybrid Cellular Automaton Rules.
Complex Systems, 2015

Operating Comfort Prediction Model of Human-Machine Interface Layout for Cabin Based on GEP.
Comput. Intell. Neurosci., 2015

The Variant Gentzen System for the Propositional Logic.
Proceedings of the 11th International Conference on Semantics, Knowledge and Grids, 2015

FlexRadio: Fully Flexible Radios and Networks.
Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, 2015

Tracking Keystrokes Using Wireless Signals.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

AirExpress: Enabling Seamless In-band Wireless Multi-hop Transmission.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

ELDA: Towards efficient and lightweight detection of cache pollution attacks in NDN.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

The Double-Level Default Description Logic <i>D</i> 3 <i>L</i>.
Proceedings of the Knowledge Science, Engineering and Management, 2015

Robust deep feature for spoofing detection - the SJTU system for ASVspoof 2015 challenge.
Proceedings of the INTERSPEECH 2015, 2015

An investigation of context clustering for statistical speech synthesis with deep neural network.
Proceedings of the INTERSPEECH 2015, 2015

Interference alignment using shadow channel.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Deep Learning for Textual Entailment Recognition.
Proceedings of the 27th IEEE International Conference on Tools with Artificial Intelligence, 2015

Scotopic Visual Recognition.
Proceedings of the 2015 IEEE International Conference on Computer Vision Workshop, 2015

Optical OFDM aided enhanced 3-D visible light communication systems.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Design of three-dimensional constellations for wireless communication systems.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

MobiPluto: File System Friendly Deniable Storage for Mobile Devices.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Distributed and Centralized Schemes for Channel Sensing Order Setting in Multi-user Cognitive Radio Networks.
Wireless Personal Communications, 2014

Exploiting Click Constraints and Multi-view Features for Image Re-ranking.
IEEE Trans. Multimedia, 2014

Classification Method for Fully PolSAR Data Based on Three Novel Parameters.
IEEE Geosci. Remote. Sens. Lett., 2014

Adaptive Control based Particle Swarm Optimization and Chebyshev Neural Network for Chaotic Systems.
JCP, 2014

Research on the Structural Characteristics of Transmission Grid Based on Complex Network Theory.
J. Appl. Math., 2014

An Exploration of the Triplet Periodicity in Nucleotide Sequences with a Mature Self-Adaptive Spectral Rotation Approach.
J. Appl. Math., 2014

Modeling of underwater wet welding process based on visual and arc sensor.
Ind. Robot, 2014

Intelligent Supply Chain Integration and Management Based on Cloud of Things.
Int. J. Distributed Sens. Networks, 2014

Building interior layout reconstruction from through-the-wall radar image using MST-based method.
EURASIP J. Adv. Signal Process., 2014

Auditable Version Control Systems.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

In-band wireless cut-through: is it possible?
Proceedings of the 1st ACM workshop on Hot topics in wireless, HotWireless 2014, Maui, 2014

MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices.
Proceedings of the Information Security - 17th International Conference, 2014

Analysis and modelling on CMOS spiral inductor with impact of metal dummy fills.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014

A broadband CMOS LC voltage-controlled oscillator for FMCW synthesizer.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014

A semi-analytical extraction method for transformer model.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014

Characterizing the achievable throughput in wireless networks with two active RF chains.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

FastProbe: Malicious user detection in Cognitive Radio Networks through active transmissions.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Crowd Target Positioning under Multiple Cameras Based on Block Correspondence.
Proceedings of the Distributed, Ambient, and Pervasive Interactions, 2014

Learning Fine-Grained Image Similarity with Deep Ranking.
Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition, 2014

Semantic Labeling of Chinese Verb-Complement Structure Based on Feature Structure.
Proceedings of the Chinese Lexical Semantics - 15th Workshop, 2014

Simplified Constraints Rank-SVM for Multi-label Classification.
Proceedings of the Pattern Recognition - 6th Chinese Conference, 2014

Hierarchical Cascade of Classifiers for Efficient Poselet Evaluation.
Proceedings of the British Machine Vision Conference, 2014

2013
Erratum to: Optimal Channel Sensing Order for Various Applications in Cognitive Radio Networks.
Wireless Personal Communications, 2013

Optimal Channel Sensing Order for Various Applications in Cognitive Radio Networks.
Wireless Personal Communications, 2013

A Large Scene Deceptive Jamming Method for Space-Borne SAR.
IEEE Trans. Geosci. Remote. Sens., 2013

Image-Domain Estimation of Wall Parameters for Autofocusing of Through-the-Wall SAR Imagery.
IEEE Trans. Geosci. Remote. Sens., 2013

Deep Learning with Hierarchical Convolutional Factor Analysis.
IEEE Trans. Pattern Anal. Mach. Intell., 2013

Discovering Low-Rank Shared Concept Space for Adapting Text Mining Models.
IEEE Trans. Pattern Anal. Mach. Intell., 2013

Mature HIV-1 capsid structure by cryo-electron microscopy and all-atom molecular dynamics.
Nat., 2013

On the feasible payoff set of two-player repeated games with unequal discounting.
Int. J. Game Theory, 2013

Price of Anarchy for Non-atomic Congestion Games with Stochastic Demands.
CoRR, 2013

Strong Stability of Nash Equilibria in Load Balancing Games.
CoRR, 2013

Open source Ch Control System Toolkit and web-based control system design for teaching automatic control of linear time-invariant systems.
Comp. Applic. in Engineering Education, 2013

Ranking and Benchmarking of the Asian Games Achievements Based on DEA: the Case of Guangzhou 2010.
Asia Pac. J. Oper. Res., 2013

Blind-LMS based digital background calibration for a 14-Bit 200-MS/s pipelined ADC.
Proceedings of the 21st IEEE/IFIP International Conference on VLSI and System-on-Chip, 2013

Multiview triangulation with uncertain data.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Context-Aware Access Control for Resources in the Ubiquitous Learning System Using Ciphertext-Policy Attribute-based Encryption.
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013

A 13-bit 200MS/s PIPELINE ADC in 0.13µm CMOS.
Proceedings of the IEEE 56th International Midwest Symposium on Circuits and Systems, 2013

Symphony: cooperative packet recovery over the wired backbone in enterprise WLANs.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

DISCERN: Cooperative whitespace scanning in practical environments.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Research the Estimated Algorithm of the Doppler Frequency Shift Based on Adaptive Fading EKF with the Innovation Consequence.
Proceedings of the 3rd IFAC International Conference on Intelligent Control and Automation Science, 2013

CUDA Implementation of a Euler Solver for Cartesian Grid.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

MMS-IU Model for Incremental Update of Spatial Database.
Proceedings of the Geo-Informatics in Resource Management and Sustainable Ecosystem, 2013

The design of touch-screen with high resolution infrared based on plastic optical fiber and image processing.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

Defensive strategy of the goalkeeper based on the 3D vision and field division for the middle-size league of robocup.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

Towards self-repairing replication-based storage systems using untrusted clouds.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
A Novel Sensing Scheme for Dynamic Multichannel Access.
IEEE Trans. Veh. Technol., 2012

A high computational power wireless sensor network for distributed structural health monitoring.
IJSNet, 2012

Building a Chinese Semantic Resource Based on Feature Structure.
Int. J. Comput. Process. Orient. Lang., 2012

A web-based structural health monitoring sensor network.
IJCAT, 2012

A folk theorem for repeated games with unequal discounting.
Games Econ. Behav., 2012

Near lossless compression of hyperspectral images based on distributed source coding.
Sci. China Inf. Sci., 2012

From single watermark to dual watermark: A new approach for image watermarking.
Comput. Electr. Eng., 2012

Heuristic and Exact Solution Method for Convex nonlinear Knapsack Problem.
Asia Pac. J. Oper. Res., 2012

Mobile robot action based on QR code identification.
Proceedings of the 2012 IEEE International Conference on Robotics and Biomimetics, 2012

Joint Optimization and Variable Selection of High-dimensional Gaussian Processes.
Proceedings of the 29th International Conference on Machine Learning, 2012

Model Transformation Method for Compensation Events and Tasks from Business Process Model to Flowchart.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

A Real-Time Posture Simulation Method for High-Speed Train.
Proceedings of the Intelligent Computing Technology - 8th International Conference, 2012

Robust Dynamic Provable Data Possession.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

ωF- Compactness in ω-Spaces.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

A new approach of semiregular compactness in L-topological spaces.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Measuring the Semantic Relevance between Term and Short Text: Using the Concepts of Shortest Path Length and Relatively Important Community.
Proceedings of the Chinese Lexical Semantics - 13th Workshop, 2012

Semantic Labeling of Chinese Serial Verb Sentences Based on Feature Structure.
Proceedings of the Chinese Lexical Semantics - 13th Workshop, 2012

Robust dynamic remote data checking for public clouds.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Visualization of the protein-coding regions with a self adaptive spectral rotation approach.
Nucleic Acids Res., 2011

TwigTable: Using Semantics in XML Twig Pattern Query Processing.
J. Data Semantics, 2011

Optimal control of mobile monitoring agents in immune-inspired wireless monitoring networks.
J. Netw. Comput. Appl., 2011

Combined trust model based on evidence theory in iterated prisoner's dilemma game.
Int. J. Syst. Sci., 2011

Agent Recommendation for Agent-Based Urban-Transportation Systems.
IEEE Intell. Syst., 2011

A hybrid immune model for unsupervised structural damage pattern recognition.
Expert Syst. Appl., 2011

Predicting response time and error rates in visual search.
Proceedings of the Advances in Neural Information Processing Systems 24: 25th Annual Conference on Neural Information Processing Systems 2011. Proceedings of a meeting held 12-14 December 2011, 2011

On the Analysis of Multi-Channel Neural Spike Data.
Proceedings of the Advances in Neural Information Processing Systems 24: 25th Annual Conference on Neural Information Processing Systems 2011. Proceedings of a meeting held 12-14 December 2011, 2011

Unsupervised classification of POLSAR data based on the polarimetric decomposition and the co-polarization ratio.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

The Hierarchical Beta Process for Convolutional Factor Analysis and Deep Learning.
Proceedings of the 28th International Conference on Machine Learning, 2011

Base on Fluid-Structure Coupling Transient Impact Analysis of Particular Structure.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

Semiregular connectivity in L-topological spaces.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

Chinese semantic parsing based on dependency graph and feature structure.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Predicting coding region candidates in the DNA sequence based on visualization without training.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology, 2011

2010
Towards an Effective XML Keyword Search.
IEEE Trans. Knowl. Data Eng., 2010

A Review of the Applications of Agent Technology in Traffic and Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2010

Description and Verification of Dynamic Software Architectures for Distributed Systems.
JSW, 2010

Agent-based artificial immune system approach for adaptive damage detection in monitoring networks.
J. Netw. Comput. Appl., 2010

Inductive Principles for Restricted Boltzmann Machine Learning.
Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, 2010

A belief-based approach to the repeated prisoners' dilemma with asymmetric private monitoring.
J. Econ. Theory, 2010

A study on application of multi-sensor information fusion in pulsed GTAW.
Ind. Robot, 2010

Mobile Agent Computing Paradigm for Building a Flexible Structural Health Monitoring Sensor Network.
Comput. Aided Civ. Infrastructure Eng., 2010

Bayesian Inference of the Number of Factors in Gene-Expression Analysis: Application to Human Virus Challenge Studies.
BMC Bioinform., 2010

On Tracker Selection for Peer-to-Peer Traffic Locality.
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010

NECLC at Multilingual Opinion Analysis Task in NTCIR8.
Proceedings of the 8th NTCIR Workshop Meeting on Evaluation of Information Access Technologies: Information Retrieval, 2010

A tutorial on stochastic approximation algorithms for training Restricted Boltzmann Machines and Deep Belief Nets.
Proceedings of the Information Theory and Applications Workshop, 2010

Location and Scatter Matching for Dataset Shift in Text Mining.
Proceedings of the ICDM 2010, 2010

Sparse linear regression with beta process priors.
Proceedings of the IEEE International Conference on Acoustics, 2010

A Novel Bayesian Classifcation System Integrated with Mobile Agent Based Modeling Technology.
Proceedings of the 2010 International Conference on Artificial Intelligence, 2010

A New Parallel Method of Smith-Waterman Algorithm on a Heterogeneous Platform.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2010

How about utilizing ordinal information from the distribution of unlabeled data.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

Remote data checking for network coding-based distributed storage systems.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

Reasoning on Formalizing WS-CDL Mobility Using Process Algebra.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010

2009
Binary Activity Chain Modes for Compositional Web Service and Its Compliance Verification.
JSW, 2009

Design and implementation of distributed algorithms for WSN-based structural health monitoring.
IJSNet, 2009

An Efficient LOTOS-Based Framework for Describing and Solving (Temporal) CSPs.
Int. J. Softw. Eng. Knowl. Eng., 2009

Group-Theoretic Partial Matrix Multiplication
CoRR, 2009

Granular Rough Theory: A representation semantics oriented theory of roughness.
Appl. Soft Comput., 2009

Formal Analysis of Fairness in E-Payment Protocol Based on Strand Space.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

Mining employment market via text block detection and adaptive cross-domain information extraction.
Proceedings of the 32nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2009

A Semi-Supervised Framework for Feature Mapping and Multiclass Classification.
Proceedings of the SIAM International Conference on Data Mining, 2009

Emotion Recognition of Pop Music Based on Maximum Entropy with Priors.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

A New Robust-Fragile Double Image Watermarking Algorithm.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Extracting discriminative concepts for domain adaptation in text mining.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

A New Covert Image Communication Approach with HVS and GFCM.
Proceedings of the Fuzzy Information and Engineering, 2009

<i>ωθ</i>-Convergence Theory of Ideals in <i>Lω</i>-Spaces.
Proceedings of the Fuzzy Information and Engineering, 2009

The Skew Correcting Method for Two Dimension Bar Code Based on Least Square Methods.
Proceedings of the 2009 International Conference on Digital Image Processing, 2009

Effective XML Keyword Search with Relevance Oriented Ranking.
Proceedings of the 25th International Conference on Data Engineering, 2009

Unsupervised Structure Damage Classification Based on the Data Clustering and Artificial Immune Pattern Recognition.
Proceedings of the Artificial Immune Systems, 8th International Conference, 2009

Detecting Automotive Exhaust Gas Based on Fuzzy Inference System.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

F-Compactness in L-closure Spaces.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

Demonstrating Effective Ranked XML Keyword Search with Meaningful Result Display.
Proceedings of the Database Systems for Advanced Applications, 2009

The Research and Emulation on PIM-SM Protocol.
Proceedings of the High Performance Computing and Applications, 2009

Extracting the Coronary Artery in Angiographic Image Based on a Trous Wavelet of Rotary Gaussian with Adaptive Space Coefficient.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

An integrated discriminative probabilistic approach to information extraction.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

Mobile 3D graphics compression for progressive transmission over wireless network.
Proceedings of the 11th International Conference on Computer-Aided Design and Computer Graphics, 2009

Research and Design of Human Impedance Measuring Instrument Based on the Method of Multi-Frequency and Multi-Segment.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

Influence on Blood Flow Under Deposited Plaque Size and Interval in Local Curved Vessel.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
XML-based agent communication, migration and computation in mobile agent systems.
J. Syst. Softw., 2008

Constructing Maximum Entropy Language Models for Movie Review Subjectivity Analysis.
J. Comput. Sci. Technol., 2008

Low-complexity and energy efficient image compression scheme for wireless sensor networks.
Comput. Networks, 2008

Human Pose Estimation with Rotated Geometric Blur.
Proceedings of the 9th IEEE Workshop on Applications of Computer Vision (WACV 2008), 2008

A Data-Aided Channel Estimation Method Based on CAZAC.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Spatial Division Multiple Access with Smart Antennas in TD-SCDMA HSDPA.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

System Analysis of Imperfect Adaptive Beam Forming Antenna for TDD HSDPA.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

PRIS in TREC 2008 Blog Track.
Proceedings of The Seventeenth Text REtrieval Conference, 2008

Investigating the effects of imperfect DOA estimation on performance of adaptive beamforming antennas in LCR TD-CDMA.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

GMF-BMA: A New Grid Resource Monitoring Model.
Proceedings of the PACIIA 2008, 2008

Attribute Delegation Authorization Based on Subjective Trust Evaluation.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Language Feature Mining for Music Emotion Classification via Supervised Learning from Lyrics.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008

Chinese NER Using CRFs and Logic for the Fourth SIGHAN Bakeoff.
Proceedings of the Third International Joint Conference on Natural Language Processing, 2008

Trusted Transmission Protocol for Content Security.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Using semantics in XML query processing.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Function Finding Using Gene Expression Programming Based Neural Network.
Proceedings of the Fourth International Conference on Natural Computation, 2008

A Novel Measuring Method of Capacitive Current for Ungrounded Distribution Systems.
Proceedings of the Industry Applications Society Annual Meeting, 2008

A Parallel FFT Scheme Based on Multi-Machines Environment.
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2008

Exploiting ID References for Effective Keyword Search in XML Documents.
Proceedings of the Database Systems for Advanced Applications, 2008

SemanticTwig: A Semantic Approach to Optimize XML Query Processing.
Proceedings of the Database Systems for Advanced Applications, 2008

A Trusted Transfer Protocol Based on Property-Based Seal.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A Group-Based Trust Metric for P2P Networks: Protection against Sybil Attack and Collusion.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

New Algorithm of Maximum Frequent Itemsets Based on FP-Tree for Mining Multiple-Level Association Rules.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

<i>ωθ</i> - Convergence Theory of Nets in <i>Lω</i> - Spaces.
Proceedings of the Fuzzy Information and Engineering, 2008

2007
System Layer Evaluation of Joint Detection and Imperfect Adaptive Beam-Forming Antenna for Packet Services in the LCR TD-CDMA System.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007

ITP&SUI-Based Channel Assignment in CAC Procedure for TDD-CDMA System.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007

Distributed Processing in Wireless Sensor Networks for Structural Health Monitoring.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Dual-tree Complex Wavelets Transforms for Image Denoising.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Application of the Rough Set to Image Median Denoising.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Short Text Feature Extraction and Clustering for Web Topic Mining.
Proceedings of the Third International Conference on Semantics, 2007

An Integrated System of Intrusion Detection Based on Rough Set and Wavelet Neural Network.
Proceedings of the Third International Conference on Natural Computation, 2007

Estimating Aging Pattern by Aging Increment Distribution for Re-rendering of Facial Age Effects.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

A Clustering Based Bayesian Network Classifier.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

VERT: A Semantic Approach for Content Search and Content Extraction in XML Query Processing.
Proceedings of the Conceptual Modeling, 2007

On Label Stream Partition for Efficient Holistic Twig Join.
Proceedings of the Advances in Databases: Concepts, 2007

Analysis of Probabilistic Information Flow Security Properties.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Noise rejection using variable-height timing-window technique for pulse signals with variable S/N ratio.
IEEE Trans. Instrum. Meas., 2006

Mobile-C: a mobile agent platform for mobile C/C++ agents.
Softw. Pract. Exp., 2006

BUPT at TREC 2006: Spam Track.
Proceedings of the Fifteenth Text REtrieval Conference, 2006

Supporting Connector in Programming Language.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

A New Component-Oriented Programming Language with the First-Class Connector.
Proceedings of the Modular Programming Languages, 7th Joint Modular Languages Conference, 2006

LBT Based Low Complexity Image Compression Method.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Fast Spectral Clustering of Data Using Sequential Matrix Compression.
Proceedings of the Machine Learning: ECML 2006, 2006

An Approach Based on Question Answering Mechanism for Handling Unexpected Exceptions in Collaborative Design.
Proceedings of the 10th International Conference on CSCW in Design, 2006

Unexpected Exceptions Handling Based on Chinese Question Answering in Collaborative Design.
Proceedings of the Computer Supported Cooperative Work in Design III, 2006

Analysis of Multi-ISPs Game Based on Lotka-Volterra Model.
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006

POC-NLW Template for Chinese Word Segmentation.
Proceedings of the Fifth Workshop on Chinese Language Processing, 2006

2005
Development and field test of a laser-based nonintrusive detection system for identification of vehicles on the highway.
IEEE Trans. Intell. Transp. Syst., 2005

A Generic Formal Framework For Constructing Agent Interaction Protocols.
Int. J. Softw. Eng. Knowl. Eng., 2005

Interpretive OpenGL for computer graphics.
Comput. Graph., 2005

PRIS Kidult Anti-SPAM Solution at the TREC 2005 Spam Track: Improving the Performance of Naive Bayes for Spam Detection.
Proceedings of the Fourteenth Text REtrieval Conference, 2005

A Novel Identity-Based Key Issuing Scheme Based on Interacting Neural Network.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Model and Implement an Agent Oriented E-Learning System.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005

2004
Parallel Scheduling for Early Completion.
Proceedings of the Handbook of Scheduling - Algorithms, Models, and Performance Analysis., 2004

The research of the distributed stripped storage spatial model.
ACM SIGOPS Oper. Syst. Rev., 2004

Specification and Verification of Agent Interaction Protocols.
Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2004), 2004

ODWIS as a Prototype of Knowledge Service Layer in Semantic Grid.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

A New Iris Recognition Approach for Embedded System.
Proceedings of the Embedded Software and Systems, First International Conference, 2004

Security Service Model for RFID Enabled Supply Chain.
Proceedings of the Fourth International Conference on Electronic Business, 2004

2003
A novel packet-pair-based inferring bandwidth congestion control mechanism for layered multicast.
ACM SIGOPS Oper. Syst. Rev., 2003

An Object-Based Software Package for Interactive Control System Design and Analysis.
J. Comput. Inf. Sci. Eng., 2003

Adapting Granular Rough Theory to Multi-agent Context.
Proceedings of the Rough Sets, 2003

A Pure Mereological Approach to Roughness.
Proceedings of the Rough Sets, 2003

A Model for User Management in Grid Computing Environments.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

2002
Data mining aided signature discovery in network-based intrusion detection system.
ACM SIGOPS Oper. Syst. Rev., 2002

1999
Remote Usability Testing Through the Internet.
Proceedings of the Human-Computer Interaction: Ergonomics and User Interfaces, 1999

1997
Internationalization and Localization for Cultural Diversity.
Proceedings of the Design of Computing Systems: Cognitive Considerations, 1997


  Loading...