Gang Zhao

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Privacy-preserving vertical federated broad learning system for artificial intelligence generated image content.
J. Real Time Image Process., February, 2024

2023
Improved Algorithm for Face Mask Detection Based on YOLO-v4.
Int. J. Comput. Intell. Syst., December, 2023

Time-Delay Active Disturbance Rejection Control of Wet Electrostatic Precipitator in Power Plants.
IEEE Trans Autom. Sci. Eng., October, 2023

AR-based deep learning for real-time inspection of cable brackets in aircraft.
Robotics Comput. Integr. Manuf., October, 2023

Semi-supervised segmentation of coronary DSA using mixed networks and multi-strategies.
Comput. Biol. Medicine, April, 2023

Acquisition method of target leveling height based on machine vision.
Concurr. Comput. Pract. Exp., February, 2023

Fractional order active disturbance rejection control design for non-integer order plus time delay models.
Trans. Inst. Meas. Control, 2023

An Efficient Adaptive Mesh Redistribution Method for Nonlinear Eigenvalue Problems in Bose-Einstein Condensates.
J. Sci. Comput., 2023

A Nonnested Augmented Subspace Method for Elliptic Eigenvalue Problems with Curved Interfaces.
J. Sci. Comput., 2023

K-ESConv: Knowledge Injection for Emotional Support Dialogue Systems via Prompt Learning.
CoRR, 2023

Type-aware Decoding via Explicitly Aggregating Event Information for Document-level Event Extraction.
CoRR, 2023

Drone-based quantum key distribution.
CoRR, 2023

Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

Simple Approach for Aspect Sentiment Triplet Extraction Using Span-Based Segment Tagging and Dual Extractors.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

Driving into Danger: Adversarial Patch Attack on End-to-End Autonomous Driving Systems Using Deep Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Dual-Encoder Attention Fusion Model for Aspect Sentiment Triplet Extraction.
Proceedings of the International Joint Conference on Neural Networks, 2023

Risk Scenario Generation for Autonomous Driving Systems based on Scenario Evaluation Model.
Proceedings of the International Joint Conference on Neural Networks, 2023

From Implicit to Explicit: A Simple Generative Method for Aspect-Category-Opinion-Sentiment Quadruple Extraction.
Proceedings of the International Joint Conference on Neural Networks, 2023

Modeling Zero-Shot Relation Classification as a Multiple-Choice Problem.
Proceedings of the International Joint Conference on Neural Networks, 2023

A Cost Effective FBG Sensor System Based on Narrow Band DBR Laser and FPGA Demodulation Technology.
Proceedings of the 23rd International Conference on Transparent Optical Networks, 2023

Automated Software Vulnerability Detection via Curriculum Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Study on optimization scheme of municipal power data communication network.
Proceedings of the 6th IEEE International Conference on Information Systems and Computer Aided Educatio, 2023

Deep learning based intersection multi-objective detection and congestion guidance.
Proceedings of the 6th International Conference on Big Data Technologies, 2023

DemoSG: Demonstration-enhanced Schema-guided Generation for Low-resource Event Extraction.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

Joint Geometrical and Statistical Domain Adaptation for Cross-domain Code Vulnerability Detection.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

DemoNSF: A Multi-task Demonstration-based Generative Framework for Noisy Slot Filling Task.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

Fine-Grained Software Vulnerability Detection via Neural Architecture Search.
Proceedings of the Database Systems for Advanced Applications, 2023

"Application of BOPPPS Teaching Method Based on the \"Rain Classroom\" Information Systems in the Teaching of Experimental Diagnostics".
Proceedings of the 7th International Conference on Computer Science and Application Engineering, 2023

A Multi-Task Semantic Decomposition Framework with Task-specific Pre-training for Few-Shot NER.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

2022
Comparative Study of the Representative Algorithms for Fitting Spherical Target Based on Point Cloud.
IEEE Trans. Geosci. Remote. Sens., 2022

Improving Satellite Retrieval of Coastal Aquaculture Pond by Adding Water Quality Parameters.
Remote. Sens., 2022

Explainable document-level event extraction via back-tracing to sentence-level event clues.
Knowl. Based Syst., 2022

Multi-objective Optimization Service Function Chain Placement Algorithm Based on Reinforcement Learning.
J. Netw. Syst. Manag., 2022

PCRED: Zero-shot Relation Triplet Extraction with Potential Candidate Relation Selection and Entity Boundary Detection.
CoRR, 2022

A High Efficiency Transmitarray Using Two-Layer Elements Etched on Compound Substrate.
IEEE Access, 2022

Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.
Proceedings of the 31st USENIX Security Symposium, 2022

Improving Transferability of Adversarial Examples with Virtual Step and Auxiliary Gradients.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Entity-level Interaction via Heterogeneous Graph for Multimodal Named Entity Recognition.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

Code Vulnerability Detection via Nearest Neighbor Mechanism.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

VRust: Automated Vulnerability Detection for Solana Smart Contracts.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

MDF-Net: Multimodal Deep Fusion for Large-Scale Product Recognition.
Proceedings of the Biometric Recognition - 16th Chinese Conference, 2022

Evidential Regression by Synthesizing Feature Selection and Parameters Learning.
Proceedings of the Belief Functions: Theory and Applications, 2022

2021
An Algorithm for Fitting Sphere Target of Terrestrial LiDAR.
Sensors, 2021

An Adaptive Offset-Tracking Method Based on Deformation Gradients and Image Noises for Mining Deformation Monitoring.
Remote. Sens., 2021

NASA's MODIS/VIIRS Global Water Reservoir Product Suite from Moderate Resolution Remote Sensing Data.
Remote. Sens., 2021

High-Performance Server-Based Live Streaming Transmission Optimization for Sports Events in Smart Cities.
Mob. Inf. Syst., 2021

Double level set segmentation model based on mutual exclusion of adjacent regions with application to brain MR images.
Knowl. Based Syst., 2021

Single-image dehazing based on dark channel prior and fast weighted guided filtering.
J. Electronic Imaging, 2021

Towards a physical-world adversarial patch for blinding object detection models.
Inf. Sci., 2021

A discrete cosine transform-based query efficient attack on black-box object detectors.
Inf. Sci., 2021

PYInfer: Deep Learning Semantic Type Inference for Python Variables.
CoRR, 2021

Classification and Design of HIV-1 Integrase Inhibitors Based on Machine Learning.
Comput. Math. Methods Medicine, 2021

Iterative stripe artifact correction framework for TOF-MRA.
Comput. Biol. Medicine, 2021

Not Only the Contextual Semantic Information: A Deep Fusion Sentimental Analysis Model Towards Extremely Short Comments.
Proceedings of the Knowledge Science, Engineering and Management, 2021

A Novel Transmission Line Insulator Detection Method Based on Enhanced YOLO Model.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

Shopping Around: CoSurvey Helps You Make a Wise Choice.
Proceedings of the Database Systems for Advanced Applications, 2021

Comprehensive Management of Sino-British Cooperation in College Ideological and Political Education Considering Unsupervised Outlier Data Mining Algorithm.
Proceedings of the AIAM 2021: 3rd International Conference on Artificial Intelligence and Advanced Manufacture, Manchester, United Kingdom, October 23, 2021

2020
LSEA: Software-Defined Networking-Based QoS-Aware Routing Mechanism for Live-Soccer Event Applications in Smart Cities.
Wirel. Commun. Mob. Comput., 2020

BMOP: Bidirectional Universal Adversarial Learning for Binary OpCode Features.
Wirel. Commun. Mob. Comput., 2020

Disturbance Rejection of Nonlinear Boiler-Turbine Unit Using High-Order Sliding Mode Observer.
IEEE Trans. Syst. Man Cybern. Syst., 2020

An Approach to High Frame Rate Radar Imaging Through Electronically Displaced-Phase-Center Antenna.
IEEE Trans. Geosci. Remote. Sens., 2020

Analytical Calculation of the Tooth Surface Contact Stress of Cylindrical Gear with Variable Hyperbolic Circular-Arc-Tooth-Trace.
Symmetry, 2020

Optimal design of a large dual-polarization microstrip reflectarray with China-coverage patterns for satellite communications.
Frontiers Inf. Technol. Electron. Eng., 2020

A cluster collaborative synchronisation dynamic model of the dissipative coupling supply chain network.
Int. J. Secur. Networks, 2020

A three-dimensional software framework for environmental system monitoring and decision support in Poyang lake basin.
Earth Sci. Informatics, 2020

A Blockchain-Driven Supply Chain Finance Application for Auto Retail Industry.
Entropy, 2020

Applications of BERT Based Sequence Tagging Models on Chinese Medical Text Attributes Extraction.
CoRR, 2020

A Nonnested Augmented Subspace Method for Eigenvalue Problems with Curved Interfaces.
CoRR, 2020

Statistical modeling and knowledge-based segmentation of cerebral artery based on TOF-MRA and MR-T1.
Comput. Methods Programs Biomed., 2020

Homogeneous Domination Control for Uncertain Nonlinear Systems via Interval Homogeneity With Monotone Degrees.
IEEE Access, 2020

Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Real-Time Audio and Video Streaming Transmission Scheme for Social Media.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

An Android Data Protection Scheme for System-as-Root Architectures.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

An Intelligent File Transfer Optimization for Poor Network Conditions.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Keeping Privacy Data Secure Under Factory Recovery.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

A VirtualXposed-Based Inline Hooking Framework for Android Native Methods.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

An Adaptive Data Protection Scheme for Optimizing Storage Space.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

A File-Level Continuous Data Protection Scheme for Enforcing Security Baseline.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

A Study on Mesh Hybrid Memory Cube Network.
Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software, 2020

Securing unsafe rust programs with XRust.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Non-norm-bounded Attack for Generating Adversarial Examples.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

An Adversarial Machine Learning Method Based on OpCode N-grams Feature in Malware Detection.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

Aspect Category Sentiment Analysis with Self-Attention Fusion Networks.
Proceedings of the Database Systems for Advanced Applications, 2020

2019
Multi-objective optimization of the fiber-reinforced composite injection molding process using Taguchi method, RSM, and NSGA-II.
Simul. Model. Pract. Theory, 2019

The Research on personalized Access Control Scheme Based on User Portrait.
Proceedings of the 18th Wuhan International Conference on E-Business, 2019

Modern Astronomical Surveys for Parameterization of Stars and Interstellar Medium.
Proceedings of the Data Analytics and Management in Data Intensive Domains, 2019

Cross-Matching of Objects in Large Sky Surveys.
Proceedings of the Selected Papers of the XXI International Conference on Data Analytics and Management in Data Intensive Domains (DAMDID/RCDL 2019), 2019

A Device-Independent Novel Statistical Modeling for Cerebral TOF-MRA Data Segmentation.
Proceedings of the Uncertainty for Safe Utilization of Machine Learning in Medical Imaging and Clinical Image-Based Procedures, 2019

DeepWAF: Detecting Web Attacks Based on CNN and LSTM Models.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Inventory Cost Control Model for Fresh Product Retailers Based on DQN.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Centimeter-Level Orbit Determination for TG02 Spacelab Using Onboard GNSS Data.
Sensors, 2018

Adaptively Receding Galerkin Optimal Control for a Nonlinear Boiler-Turbine Unit.
Complex., 2018

A General Testing Framework Based on Veins for Securing VANET Applications.
Proceedings of the 2018 IEEE SmartWorld, 2018

Team Cat-Garfield at TREC 2018 Precision Medicine Track.
Proceedings of the Twenty-Seventh Text REtrieval Conference, 2018

DeepSim: deep learning code functional similarity.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Prediction of the Fourth Industrial Revolution Based on Time Series.
Proceedings of the 2018 International Conference on Intelligent Information Technology, 2018

Security Analysis of Intelligent Transportation Systems Based on Simulation Data.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Remote Protocol Vulnerability Discovery for Intelligent Transportation Systems (ITS).
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

E2CM: An Evolutionary Version of Evidential C-Means Clustering Algorithm.
Proceedings of the Belief Functions: Theory and Applications, 2018

2017
The implication of input data aggregation on up-scaling soil organic carbon changes.
Environ. Model. Softw., 2017

Automatic Problem Understanding from Circuit Schematics.
Proceedings of the Image and Video Technology - 8th Pacific-Rim Symposium, 2017

Power quality analysis based on spatial correlation.
Proceedings of the MIPPR 2017: Remote Sensing Image Processing, 2017

The Reloading and Implementation of Virtual Scene Resources of Tujia Brocade on Multi-terminal.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

Parameter optimization based two-layer SVM classification model for evaluation of maize breeding.
Proceedings of the 13th International Conference on Natural Computation, 2017

Multi-objective optimization with Proper Orthogonal Decomposition and Gaussian predictive distribution.
Proceedings of the 2017 IEEE Congress on Evolutionary Computation, 2017

Research on underwater scattering acoustic characteristics of corner reflector.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

2016
A high accuracy surface modeling method based on GPU accelerated multi-grid method.
Trans. GIS, 2016

Intensity-Stabilized Fast-Scanned Direct Absorption Spectroscopy Instrumentation Based on a Distributed Feedback Laser with Detection Sensitivity down to 4 × 10<sup>-6</sup>.
Sensors, 2016

一种基于多层拓扑的大规模分布式系统结构脆弱性分析算法 (Multilayer Topology Structural Vulnerability Analysis Algorithm for Large-scale Distributed System).
计算机科学, 2016

Entity disambiguation to Wikipedia using collective ranking.
Inf. Process. Manag., 2016

Evaluating the precision of eight spatial sampling schemes in estimating regional means of simulated yield for two crops.
Environ. Model. Softw., 2016

Robust global sensitivity analysis under deep uncertainty via scenario analysis.
Environ. Model. Softw., 2016

Repeat Buyer Prediction for E-Commerce.
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016

Applying back-propagation neural network to predict bus traffic.
Proceedings of the 12th International Conference on Natural Computation, 2016

Behavior Analysis Based SMS Spammer Detection in Mobile Communication Networks.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
Fuzzy optimization control for NOx emissions from power plant boilers based on nonlinear optimization.
J. Intell. Fuzzy Syst., 2015

A Novel Method for Survivability Test Based on End Nodes in Large Scale Network.
KSII Trans. Internet Inf. Syst., 2015

SDD-matcher: a semantic-driven data matching framework.
Comput. Syst. Sci. Eng., 2015

MSIIPL THU’s Slot-Filling Method for TAC-KBP 2015.
Proceedings of the 2015 Text Analysis Conference, 2015

A Novel Grid Based K-Means Cluster Method for Traffic Zone Division.
Proceedings of the Cloud Computing and Big Data, 2015

Rationalizing the Parameters of K-Nearest Neighbor Classification Algorithm.
Proceedings of the Cloud Computing and Big Data, 2015

2014
Possible Role of Interleukin-1β in Type 2 Diabetes Onset and Implications for Anti-inflammatory Therapy Strategies.
PLoS Comput. Biol., 2014

Color Edge Detection by Using the Centerline Extraction Method.
J. Comput., 2014

Top management support, inter-organizational relationships and external involvement.
Ind. Manag. Data Syst., 2014

Data analysis and evaluation system for resource and environmental attributes in the manufacturing process.
Int. J. Comput. Integr. Manuf., 2014

An image segmentation method based on maximizing fuzzy correlation and its fast recursive algorithm.
Comput. Electr. Eng., 2014

Utilizing Purchase Intervals in Latent Clusters for Product Recommendation.
Proceedings of the 8th Workshop on Social Network Mining and Analysis, 2014

Practice and Research on Construction of Corpus for Natural Sign Language.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

A New Security and Privacy Risk Assessment Model for Information System Considering Influence Relation of Risk Elements.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

2013
Fractional order sliding mode controller design for antilock braking systems.
Neurocomputing, 2013

Large-scale, high-resolution agricultural systems modeling using a hybrid approach combining grid computing and parallel processing.
Environ. Model. Softw., 2013

Celerity Hardware Implementation of the AES with Data Parallel and Pipelining Architecture inside the Round Function.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Research on the Construction of Dynamic Chinese Natural Sign Language Corpus.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

The Nondestructive Testing Approach of Acoustic Emission for Environmentally Hazardous Objects.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Community-based user recommendation in uni-directional social networks.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

2012
Numerical Simulation of Heavy Rail Quenching Process.
J. Comput., 2012

A single-antenna multi-carrier transmission technique for fading channels with selection and combining diversity.
Int. J. Wirel. Mob. Comput., 2012

Competence semantics: engineering and application.
Int. J. Knowl. Learn., 2012

Increasing temporal diversity with purchase intervals.
Proceedings of the 35th International ACM SIGIR conference on research and development in Information Retrieval, 2012

Holistic framework of security management for cloud service providers.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012

Analyses about efficiency of reinforcement learning to supply chain ordering management.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012

A Survey of Virtualization Technologies Focusing on Untrusted Code Execution.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Bag of features using sparse coding for gender classification.
Proceedings of the 4th International Conference on Internet Multimedia Computing and Service, 2012

The Simulation Research of the High Power Factor Charger in Vehicle.
Proceedings of the Third International Conference on Digital Manufacturing & Automation, 2012

2011
Wireless Sensor Networks for Industrial Process Monitoring and Control: A Survey.
Netw. Protoc. Algorithms, 2011

Lifetime-aware geographic routing under a realistic link layer model in wireless sensor networks.
Int. J. Inf. Technol. Commun. Convergence, 2011

H-Fuzzing: A New Heuristic Method for Fuzzing Data Generation.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011

Cascade-Based License Plate Localization with Line Segment Features and Haar-Like Features.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

FP-tree algorithm applied in logistics warehousing mining.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Analysis of the bullwhip effect based on different information sharing models.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
Fabrication of cantilevers with high yield for magnetic resonance force microscopy.
Proceedings of the 5th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2010

Energy Efficiency Evaluation for Iron and Steel High Energy Consumption Enterprise.
Proceedings of the Information and Automation - International Symposium, 2010

Application of multi-agent Reinforcement Learning to supply chain ordering management.
Proceedings of the Sixth International Conference on Natural Computation, 2010

Towards Detecting the Interaction Vulnerabilities in Large Distributed System.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Target localization and tracking in noisy binary sensor networks with known spatial topology.
Wirel. Commun. Mob. Comput., 2009

Effects of Anode Flow Field Design on CO<sub>2</sub> Bubble Behavior in μDMFC.
Sensors, 2009

Evalution of bulk titanium DRIE Using SU-8 as soft mask.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

Fabrication of bulk titanium out-of-plane microneedles.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

The Vulnerability Analysis Framework for Java Bytecode.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Fault Diagnosis Based on Covariance Constraint for Complex Control System.
Proceedings of the Fuzzy Information and Engineering, 2009

A Cost-Effective LSH Filter for Fast Pairwise Mining.
Proceedings of the ICDM 2009, 2009

An Emulation Environment for Vulnerability Analysis of Large-Scale Distributed System.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009

The Research of Optimized Torque Control Algorithm for PMSM Based on Grey Prediction Model.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

Incremental similarity joins with edit distance constraints.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

An Heuristic Method for Web-Service Program Security Testing.
Proceedings of the Fourth ChinaGrid Annual Conference, ChinaGrid 2009, Yantai, Shandong, 2009

2008
An Efficient Path Pruning Algorithm for Geographical Routing in Wireless Networks.
IEEE Trans. Veh. Technol., 2008

Energy-efficient geographic routing with virtual anchors based on projection distance.
Comput. Commun., 2008

Monotonicity and stratification.
Proceedings of the 2008 Winter Simulation Conference, Global Gateway to Discovery, 2008

Data-Flow Based Analysis of Java Bytecode Vulnerability.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Geographic Multicast with K-Means Clustering for Wireless Sensor Networks.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

An Ant Colony Optimization Approach to Multi-Objective Supply Chain Model.
Proceedings of the Second International Conference on Secure System Integration and Reliability Improvement, 2008

Toward a Community Vision Driven Topical Ontology in Human Resource Management.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008

Real-Time Lip Contour Extraction and Tracking Using an Improved Active Contour Model.
Proceedings of the Advances in Visual Computing, 4th International Symposium, 2008

Deriving Stellar Parameter Using Radial Basis Function Neural Network.
Proceedings of the Fourth International Conference on Natural Computation, 2008

A Genetic Algorithm Balancing Exploration and Exploitation for the Travelling Salesman Problem.
Proceedings of the Fourth International Conference on Natural Computation, 2008

The Analysis, Design and Implementation of University Teachers Evaluation System Based on UML Technology.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

An Assessment Tool for Assembly Language Programming.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
e<sup>2</sup>-MES: an e-service-driven networked manufacturing platform for extended enterprises.
Int. J. Comput. Integr. Manuf., 2007

Efficient estimation of option price and price sensitivities via structured database Monte Carlo (SDMC).
Proceedings of the Winter Simulation Conference, 2007

Energy-Aware Geographic Routing for Sensor Networks with Randomly Shifted Anchors.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Extension Neural Network Based on Immune Algorithm for Fault Diagnosis.
Proceedings of the Advances in Neural Networks, 2007

Early warning monitoring and management of disasters.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2007

Research on Kinematics Simulation of Parameterized Mechanism Based on Visualization in Scientific Computing.
Proceedings of the Computer And Computing Technologies In Agriculture, 2007

Destination Clustering Geographic Multicast forWireless Sensor Networks.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

SEEMP: An Semantic Interoperability Infrastructure for e-Government Services in the Employment Sector.
Proceedings of the Semantic Web: Research and Applications, 2007

SEEMP: Meaningful Service-Based Collaboration Among Labour Market Actors.
Proceedings of the Business Information Systems, 10th International Conference, 2007

2006
A new efficient simulation strategy for pricing path-dependent options.
Proceedings of the Winter Simulation Conference WSC 2006, 2006

Analysis about Efficiency of Indirect Media Communication on Multi-agent Cooperation Learning.
Proceedings of the IEEE International Conference on Systems, 2006

An Efficient Multi-Agent Q-learning Method Based on Observing the Adversary Agent State Change.
Proceedings of the IEEE International Conference on Systems, 2006

Improving Geographical Routing for Wireless Networks with an Efficient Path Pruning Algorithm.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006

Path Shortening for Delivery Rate Enhancement in Geographical Routing via Channel Listening.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Fast variational design of multiresolution curves and surfaces with B-spline wavelets.
Comput. Aided Des., 2005

Application of Fuzzy SOFM Neural Network and Rough Set Theory on Fault Diagnosis for Rotating Machinery.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Group-based Relevance Feedback for Interactive Image Retrieval.
Proceedings of the IASTED International Conference on Databases and Applications, 2005

2004
Wavelet-based multiresolution representation and editing of closed b-spline curves.
Int. J. Comput. Eng. Sci., 2004

Orientation and point inclusion tests for simple polygons.
Int. J. Comput. Eng. Sci., 2004

Target curvature driven fairing algorithm for planar cubic B-spline curves.
Comput. Aided Geom. Des., 2004

Feature-preserving smoothing algorithm for polygons and meshes.
Proceedings of the Proceedings VRCAI 2004, 2004

Application Semiotics Engineering Process.
Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2004), 2004

A Standard Visual Courseware Authoring Tool Based on Content Packaging Specification.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Learning Resource Search System Based on Learning Object Metadata.
Proceedings of the iiWAS'2004, 2004

Learning Resource Registry and Discovery System.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Design and Implementation of a Distributed Learning Resource Registry System.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

2003
Multiagent Cooperating Learning Methods by Indirect Media Communication.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Q-ac: multiagent reinforcement learning with perception-conversion action.
Proceedings of the IEEE International Conference on Systems, 2003

Neural networks based an inverse dynamic model adaptive control.
Proceedings of the IEEE International Conference on Systems, 2003

Detail-Preserving Variational Design of B-Spline Curves and Surfaces.
Proceedings of the 2nd International Conference on Cyberworlds (CW 2003), 2003

2002
Image information retrieval using rough set theory.
Proceedings of the 2002 International Conference on Image Processing, 2002

2001
Multiagent reinforcement learning method with an improved ant colony system.
Proceedings of the IEEE International Conference on Systems, 2001

Cooperative Product Design Process Modeling.
Proceedings of the Sixth International Conference on Computer Supported Cooperative Work in Design, 2001

2000
Convergence of the Q-ae learning under deterministic MDPs and its efficiency under the stochastic environment.
Proceedings of the IEEE International Conference on Systems, 2000

Understanding Chinese in spoken dialogue systems.
Proceedings of the Sixth International Conference on Spoken Language Processing, 2000

1999
Transfer in experience-guided machine translation.
Proceedings of Machine Translation Summit VII, 1999

A Heuristic Q-Learning Architecture for Fully Exploring a World and Deriving an Optimal Policy by Model-Based Planning.
Proceedings of the 1999 IEEE International Conference on Robotics and Automation, 1999


  Loading...