Qi Li

According to our database1, Qi Li
  • authored at least 512 papers between 1989 and 2017.
  • has a "Dijkstra number"2 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Capability-Based Security Enforcement in Named Data Networking.
IEEE/ACM Trans. Netw., 2017

Analyzing and Identifying Teens' Stressful Periods and Stressor Events From a Microblog.
IEEE J. Biomedical and Health Informatics, 2017

Mandatory Content Access Control for Privacy Protection in Information Centric Networks.
IEEE Trans. Dependable Sec. Comput., 2017

Finite-Time Output Feedback Control for PWM-Based DC-DC Buck Power Converters of Current Sensorless Mode.
IEEE Trans. Contr. Sys. Techn., 2017

Adaptive search range control in H.265/HEVC with error propagation resilience and hierarchical adjustment.
Signal, Image and Video Processing, 2017

Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs.
Sensors, 2017

Event-triggered H ∞ state estimation for discrete-time neural networks with mixed time delays and sensor saturations.
Neural Computing and Applications, 2017

Scale the Internet routing table by generalized next hops of strict partial order.
Inf. Sci., 2017

Thermal Time Shifting: Decreasing Data Center Cooling Costs with Phase-Change Materials.
IEEE Internet Computing, 2017

Optimized linear active disturbance rejection control for pneumatic servo systems via least squares support vector machine.
Neurocomputing, 2017

TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code.
Future Generation Comp. Syst., 2017

Deep Supervised Discrete Hashing.
CoRR, 2017

Adaptive Distributed Software Defined Networking.
Computer Communications, 2017

Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 2.
IEEE Communications Magazine, 2017

Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1.
IEEE Communications Magazine, 2017

The impact of informational incentives and social influence on consumer behavior during Alibaba's online shopping carnival.
Computers in Human Behavior, 2017

An Android Malware Detection Approach Using Community Structures of Weighted Function Call Graphs.
IEEE Access, 2017

Reliable Medical Diagnosis from Crowdsourcing: Discover Trustworthy Answers from Non-Experts.
Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, 2017

Exploring the Impact of Co-Experiencing Stressor Events for Teens Stress Forecasting.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Unsupervised Discovery of Drug Side-Effects from Heterogeneous Data Sources.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

Generic and agile service function chain verification on cloud.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Industrial Oil Pipeline Leakage Detection Based on Extreme Learning Machine Method.
Proceedings of the Advances in Neural Networks - ISNN 2017 - 14th International Symposium, 2017

Urban Trace Utilizing Mobile Sequence.
Proceedings of the Data Science, 2017

Differential privacy data publishing method based on cell merging.
Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control, 2017

Efficient Qp cascading in H.265/HEVC Low-Delay prediction.
Proceedings of the 2017 IEEE International Conference on Multimedia & Expo Workshops, 2017

A Novel Game-Theoretic Model for Content-Adaptive Image Steganography.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Truthful Auctions for User Data Allowance Trading in Mobile Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Sentiment Analysis with Improved Adaboost and Transfer Learning Based on Gaussian Process.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

RealDroid: Large-Scale Evasive Malware Detection on "Real Devices".
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

SPEAKER: Split-Phase Execution of Application Containers.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

Correlating Stressor Events for Social Network Based Adolescent Stress Prediction.
Proceedings of the Database Systems for Advanced Applications, 2017

Sybil Defense in Crowdsourcing Platforms.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Vulnerable Implicit Service: A Revisit.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Integrated Multi-service Handoff Mechanism with QoS-Support Strategy in Mobile Cloud Computing.
Wireless Personal Communications, 2016

Double-Trapezium Cylinder Codebook Model Based on YUV Color Model for Foreground Detection with Shadow and Highlight Suppression.
Signal Processing Systems, 2016

Read Bitline Sensing and Fast Local Write-Back Techniques in Hierarchical Bitline Architecture for Ultralow-Voltage SRAMs.
IEEE Trans. VLSI Syst., 2016

Conflicts to Harmony: A Framework for Resolving Conflicts in Heterogeneous Data by Truth Discovery.
IEEE Trans. Knowl. Data Eng., 2016

Editor's Note.
IEEE Trans. Dependable Sec. Comput., 2016

Resource orchestration for multi-task application in home-to-home cloud.
IEEE Trans. Consumer Electronics, 2016

Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing.
Security and Communication Networks, 2016

Hyperspectral Imagery Classification Using Sparse Representations of Convolutional Neural Network Features.
Remote Sensing, 2016

Transformation invariant subspace clustering.
Pattern Recognition, 2016

Software Defined Resource Orchestration System for Multitask Application in Heterogeneous Mobile Cloud Computing.
Mobile Information Systems, 2016

Alibaba's IT platform and electronic commerce synergy in driving "Singles' Day".
J. Org. Computing and E. Commerce, 2016

The impact and treatment of the Gibbs phenomenon in immersed boundary method simulations of momentum and scalar transport.
J. Comput. Physics, 2016

Direct Resource Hijacking in Android.
IEEE Internet Computing, 2016

Relationship between bus driver characteristics and traffic violations.
IJSS, 2016

Event-triggered H ∞ state estimation for discrete-time stochastic genetic regulatory networks with Markovian jumping parameters and time-varying delays.
Neurocomputing, 2016

Scale invariant representation of imbalanced points.
Neurocomputing, 2016

Ensuring Security and Privacy Preservation for Cloud Data Services.
ACM Comput. Surv., 2016

Robust closed-form estimators for the integer-valued GARCH (1, 1) model.
Computational Statistics & Data Analysis, 2016

Combining Data-driven and Model-driven Methods for Robust Facial Landmark Detection.
CoRR, 2016

Multi-phase Word Sense Embedding Learning Using a Corpus and a Lexical Ontology.
CoRR, 2016

Secure, efficient and revocable multi-authority access control system in cloud storage.
Computers & Security, 2016

Problematic Internet Users' Discounting Behaviors Reflect an Inability to Delay Gratification, Not Risk Taking.
Cyberpsy., Behavior, and Soc. Networking, 2016

Crowdsourcing High Quality Labels with a Tight Budget.
Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, 2016

Analysis of Teens' Chronic Stress on Micro-blog.
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016

Fault diagnosis of gearbox using EMD and cepstrum method based on LABVIEW.
Proceedings of the 13th International Conference on Ubiquitous Robots and Ambient Intelligence, 2016

OpenAtom: Scalable Ab-Initio Molecular Dynamics with Diverse Capabilities.
Proceedings of the High Performance Computing - 31st International Conference, 2016

Query to Knowledge: Unsupervised Entity Extraction from Shopping Queries using Adaptor Grammars.
Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, 2016

Exploiting Android System Services Through Bypassing Service Helpers.
Proceedings of the Security and Privacy in Communication Networks, 2016

Multi-task Learning for Gender and Age Prediction on Chinese Microblog.
Proceedings of the Natural Language Understanding and Intelligent Applications, 2016

Learning Word Sense Embeddings from Word Sense Definitions.
Proceedings of the Natural Language Understanding and Intelligent Applications, 2016

Achieving Stable iBGP with Only One Add-Path.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Towards Confidence in the Truth: A Bootstrapping based Truth Discovery Approach.
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016

Mining Reliable Information from Passively and Actively Crowdsourced Data.
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016

Tunneling on demand: A lightweight approach for IP fast rerouting against multi-link failures.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Detecting and defending against inter-app permission leaks in android apps.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

Dynamic resource orchestration for multi-task application in heterogeneous mobile cloud computing.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Monitoring the meteorological drought in the middle reaches of Heihe River basin based on TRMM precipitation data.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Study on crop water requirement in the middle reaches of Heihe river basin based on sebs model.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Interactive Data Visualisation: Facilitate the Accountability Disclosure Through the Lens of Organisational Semiotics.
Proceedings of the Socially Aware Organisations and Technologies. Impact and Challenges, 2016

Pedestrian detection via a leg-driven physiology framework.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

FADE: Detecting forwarding anomaly in software-defined networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Exploring Online Programming-Related Information Seeking Behaviors via Discussion Forums.
Proceedings of the 16th IEEE International Conference on Advanced Learning Technologies, 2016

Polyline-driven stop sign detection.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

Discourse Parsing with Attention-based Hierarchical Neural Networks.
Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, 2016

tPredictor: A Micro-blog Based System for Teenagers' Stress Prediction.
Proceedings of the 19th International Conference on Extending Database Technology, 2016

Integrating Human Mobility and Social Media for Adolescent Psychological Stress Detection.
Proceedings of the Database Systems for Advanced Applications, 2016

Personal Data Management with the Databox: What's Inside the Box?
Proceedings of the 2016 ACM Workshop on Cloud-Assisted Networking, 2016

Improving Chinese Semantic Role Labeling with English Proposition Bank.
Proceedings of the Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data, 2016

Influence-Aware Truth Discovery.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Hey, I know you are moving: producer movement status privacy in information-centric networking.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

A control flow obfuscation method for Android applications.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

Defect trigger model: Analysis method of mobile application defect.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

A method to detect Android ad plugins based on decompiled digital sequence.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

Combination attack of android applications analysis scheme based on privacy leak.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

Comparing the classification performance of Bayesian linear discriminate analysis (BLDA) and support vector machine (SVM) in BCI P300-speller with familiar face paradigm.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

A shape model for contour extraction of Drosophila embryos.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

Psychological Stress Detection from Online Shopping.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

Recognizing Salient Entities in Shopping Queries.
Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, 2016

A study on consumer acceptance of online pharmacies in China.
Proceedings of the 18th Annual International Conference on Electronic Commerce, 2016

What makes social shopping?: re-examining the effects of multi-attributes utility, trust and relationship on social shopping intention.
Proceedings of the 18th Annual International Conference on Electronic Commerce, 2016

Falling in love with online shopping carnival on singles' day in China: An uses and Gratifications perspective.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016

2015
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking.
IEEE Trans. Information Forensics and Security, 2015

Invalidating Idealized BGP Security Proposals and Countermeasures.
IEEE Trans. Dependable Sec. Comput., 2015

A Survey on Truth Discovery.
SIGKDD Explorations, 2015

Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption.
Security and Communication Networks, 2015

Large universe decentralized key-policy attribute-based encryption.
Security and Communication Networks, 2015

Truth Discovery and Crowdsourcing Aggregation: A Unified Perspective.
PVLDB, 2015

Attribute Based Multisignature Scheme for Wireless Communications.
Mobile Information Systems, 2015

An end-to-end hybrid algorithm for automated medication discrepancy detection.
BMC Med. Inf. & Decision Making, 2015

Cross-Layer Aware Routing Protocol for Hybrid Wireless Mesh Networks.
JCM, 2015

Automated detection of medication administration errors in neonatal intensive care.
Journal of Biomedical Informatics, 2015

Automated clinical trial eligibility prescreening: increasing the efficiency of patient identification for clinical trials in the emergency department.
JAMIA, 2015

ANNs on Co-occurrence Matrices for Mobile Malware Detection.
TIIS, 2015

Wireless sensor network reliability modelling based on masked data.
IJSNet, 2015

Event-triggered synchronization control for complex networks with uncertain inner coupling.
Int. J. General Systems, 2015

Privacy Information Security Classification for Internet of Things Based on Internet Data.
IJDSN, 2015

Abnormal Event Detection Method in Multimedia Sensor Networks.
IJDSN, 2015

Approaching system equilibrium with accurate or not accurate feedback information in a two-route system.
Computer Physics Communications, 2015

A Survey on Truth Discovery.
CoRR, 2015

Distributed Parameter Map-Reduce.
CoRR, 2015

Multi-tenancy authorization models for collaborative cloud services.
Concurrency and Computation: Practice and Experience, 2015

Xede: Practical Exploit Early Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Joint optimization of content replication and Traffic Engineering in ICN.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

FaitCrowd: Fine Grained Truth Discovery for Crowdsourced Data Aggregation.
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015

On the Discovery of Evolving Truth.
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015

Thermal time shifting: leveraging phase change materials to reduce cooling costs in warehouse-scale computers.
Proceedings of the 42nd Annual International Symposium on Computer Architecture, 2015

Towards Controller Placement for robust Software-Defined Networks.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Towards adaptive elastic distributed Software Defined Networking.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

An estimate of population exposure to automobile source PM2.5 in Beijing using spatiotemporal analysis.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

A PSO identification algorithm for temperature adaptive adjustment system.
Proceedings of the 2015 IEEE International Conference on Industrial Engineering and Engineering Management, 2015

Recommending a Credible Web Service.
Proceedings of the 2015 IEEE International Conference on Web Services, 2015

Release Adolescent Stress by Virtual Chatting.
Proceedings of the Engineering the Web in the Big Data Era - 15th International Conference, 2015

TAFTA: A Truthful Auction Framework for User Data Allowance Trading in Mobile Networks.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Improved WOW Adaptive Image Steganography Method.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Gallager mapping based constellation shaping for LDPC-coded modulation systems.
Proceedings of the International Workshop on High Mobility Wireless Communications, 2015

TeenChat: A Chatterbot System for Sensing and Releasing Adolescents' Stress.
Proceedings of the Health Information Science - 4th International Conference, 2015

Android Malware Detection Based on Static Analysis of Characteristic Tree.
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015

A geometric framework for stop sign detection.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

A prototype of healthcare big data processing system based on Spark.
Proceedings of the 8th International Conference on Biomedical Engineering and Informatics, 2015

Parallel Accurate Localization from Cellular Network.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

Online Personalized Recommendation Based on Streaming Implicit User Feedback.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

Supervised topology preserving hashing.
Proceedings of the 3rd IAPR Asian Conference on Pattern Recognition, 2015

Float greedy-search-based subspace clustering.
Proceedings of the 3rd IAPR Asian Conference on Pattern Recognition, 2015

Seed-Based Event Trigger Labeling: How far can event descriptions get us?
Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing, 2015

2014
Safe and Practical Energy-Efficient Detour Routing in IP Networks.
IEEE/ACM Trans. Netw., 2014

A Geometric Framework for Rectangular Shape Detection.
IEEE Trans. Image Processing, 2014

Development of a High Power Density Motor Made of Amorphous Alloy Cores.
IEEE Trans. Industrial Electronics, 2014

A Secure Data Self-Destructing Scheme in Cloud Computing.
IEEE Trans. Cloud Computing, 2014

A Confidence-Aware Approach for Truth Discovery on Long-Tail Data.
PVLDB, 2014

Directional communication with movement prediction in mobile wireless sensor networks.
Personal and Ubiquitous Computing, 2014

An economic analysis of routing conflict and its resolution.
Perform. Eval., 2014

Temporal and spectral profiles of stimulus-stimulus and stimulus-response conflict processing.
NeuroImage, 2014

Tackling representation, annotation and classification challenges for temporal knowledge base population.
Knowl. Inf. Syst., 2014

A Sub-1V High-PSRR Piecewise-Linear Bandgap Reference.
JCP, 2014

Coevolution of Opinions and Directed Adaptive Networks in a Social Group.
J. Artificial Societies and Social Simulation, 2014

Research and applications: Influenza detection from emergency department reports using natural language processing and Bayesian network classifiers.
JAMIA, 2014

Evaluating the impact of pre-annotation on annotation speed and potential bias: natural language processing gold standard development for clinical named entity recognition in clinical trial announcements.
JAMIA, 2014

Research and applications: Phenotyping for patient safety: algorithm development for electronic health record based automated adverse event and medical error detection in neonatal intensive care.
JAMIA, 2014

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud.
TIIS, 2014

Conditions of two methods for estimating missing preference information.
Inf. Sci., 2014

Efficient attribute based sequential aggregate signature for wireless sensor networks.
IJSNet, 2014

A primal sketch based framework for bean-shape contour extraction.
Neurocomputing, 2014

Localisation of Drosophila embryos using active contours in channel spaces.
I. J. Computational Biology and Drug Design, 2014

Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model.
IET Information Security, 2014

Efficient execution of speculative threads and transactions with hardware transactional memory.
Future Generation Comp. Syst., 2014

Towards fast rerouting-based energy efficient routing.
Computer Networks, 2014

Trust-based service composition in multi-domain environments under time constraint.
SCIENCE CHINA Information Sciences, 2014

Distributed open-domain conversational understanding framework with domain independent extractors.
Proceedings of the 2014 IEEE Spoken Language Technology Workshop, 2014

Personal knowledge graph population from user utterances in conversational understanding.
Proceedings of the 2014 IEEE Spoken Language Technology Workshop, 2014

Resolving conflicts in heterogeneous data by truth discovery and source reliability estimation.
Proceedings of the International Conference on Management of Data, 2014

Guarantee IP lookup performance with FIB explosion.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Generalized Decision Aggregation in Distributed Sensing Systems.
Proceedings of the IEEE 35th IEEE Real-Time Systems Symposium, 2014

Green heterogeneous network with load balancing in LTE-A systems.
Proceedings of the 25th IEEE Annual International Symposium on Personal, 2014

Revisiting Node Injection of P2P Botnet.
Proceedings of the Network and System Security - 8th International Conference, 2014

User-level psychological stress detection from social media using deep neural network.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

Comparison of the Impact of Word Segmentation on Name Tagging for Chinese and Japanese.
Proceedings of the Ninth International Conference on Language Resources and Evaluation, 2014

Ontology Based Suggestion Distribution System.
Proceedings of the Semantic Technology - 4th Joint International Conference, 2014

Session-based access control in information-centric networks: Design and analyses.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Privacy Information Security Classification Study in Internet of Things.
Proceedings of the International Conference on Identification, 2014

Bounding the role of domestic heating in haze pollution of Beijing based on satellite and surface observations.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

Multi-dimensional Forwarding Tables.
Proceedings of the Frontiers in Internet Technologies, 2014

Design and performance of spinal codes over fading channels.
Proceedings of the International Workshop on High Mobility Wireless Communications, 2014

Detecting Adolescent Psychological Pressures from Micro-Blog.
Proceedings of the Health Information Science - Third International Conference, 2014

Constructing Information Networks Using One Single Model.
Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, 2014

Helping Teenagers Relieve Psychological Pressures: A Micro-blog Based System.
Proceedings of the 17th International Conference on Extending Database Technology, 2014

Predicting Determinants and Moderating Factors of Mobile Phone Data Flow Service Adoption.
Proceedings of the Seventh International Joint Conference on Computational Sciences and Optimization, 2014

Localization of gene expression regions in Drosophila embryonic images.
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014

Integration of Points of Interest and Regions of Interest.
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014

An Image Thinning Processing Algorithm for Hand Vein Recognition.
Proceedings of the Biometric Recognition - 9th Chinese Conference, 2014

Mechanisms of visual-auditory temporal processing for artificial intelligence.
Proceedings of the 7th International Conference on Biomedical Engineering and Informatics, 2014

Automated Clinical Trial Eligibility Pre-Screening: Increasing the Efficiency of Participant Identification for Clinical Trials.
Proceedings of the AMIA 2014, 2014

Incremental Joint Extraction of Entity Mentions and Relations.
Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, 2014

Crowdsourcing for Multiple-Choice Question Answering.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

Ensemble Learning.
Proceedings of the Data Classification: Algorithms and Applications, 2014

2013
Automatic blur region segmentation approach using image matting.
Signal, Image and Video Processing, 2013

Mining FDA drug labels for medical conditions.
BMC Med. Inf. & Decision Making, 2013

Parallel multitask cross validation for Support Vector Machine using GPU.
J. Parallel Distrib. Comput., 2013

A sequence labeling approach to link medications and their attributes in clinical notes and clinical trial announcements for information extraction.
JAMIA, 2013

Large-scale evaluation of automated clinical note de-identification and its impact on information extraction.
JAMIA, 2013

Analyzing and handling local bias for calibrating parametric cost estimation models.
Information & Software Technology, 2013

Sphere Support Vector Machines for large classification tasks.
Neurocomputing, 2013

A two-layer framework for appearance based recognition using spatial and discriminant influences.
Neurocomputing, 2013

Multimodality image registration using local linear embedding and hybrid entropy.
Neurocomputing, 2013

Access control requirements for structured document in cloud computing.
IJGUC, 2013

A Novel Element Detection Method in Audio Sensor Networks.
IJDSN, 2013

Improving security and efficiency for multi-authority access control system in cloud storage.
IACR Cryptology ePrint Archive, 2013

ESO: An efficient and secure outsourcing scheme for smart grid.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013

Joint Power Reduction and Time-Domain Scheduling for Interference Mitigation in Macro-Pico Heterogeneous Networks with Differential Evolution.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

The Lithium Battery Charging Management System Based on Wireless Energy Transmission.
Proceedings of the 15th International Conference on Computer Modelling and Simulation, 2013

RPI-BLENDER TAC-KBP2013 Knowledge Base Population System.
Proceedings of the Sixth Text Analysis Conference, 2013

Automatic Polymorphic Exploit Generation for Software Vulnerabilities.
Proceedings of the Security and Privacy in Communication Networks, 2013

Switchable under-actuated finger with multiple grasping modes.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

A study of the joint decision between spatial intelligence and agent intelligence based on multi-source information.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

A multi-tenant RBAC model for collaborative cloud services.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

The study of load balancing based on the network flow theory in LTE-A systems.
Proceedings of the IEEE 24th International Symposium on Personal, 2013

Perfect Snapping.
Proceedings of the Advances in Multimedia Modeling, 19th International Conference, 2013

EventCube: multi-dimensional search and mining of structured and text data.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Improving scenario testing process by adding value-based prioritization: an industrial case study.
Proceedings of the International Conference on Software and System Process, 2013

A Secure Document Self-Destruction Scheme with Identity Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Fully Secure Decentralized Key-Policy Attribute-Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

The Research of the Raptor Fountain Code in Shortwave Communication System.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

An Optimization Model for Advanced Biofuel Production Based on Bio-oil Gasification.
Proceedings of the Advances in Production Management Systems. Sustainable Production and Service Supply Chains, 2013

Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing.
Proceedings of the Internet and Distributed Computing Systems, 2013

Service Composition in Multi-domain Environment under Time Constraint.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Rectangular Shape Detection with an Application to License Plate Detection.
Proceedings of the 2013 IEEE 25th International Conference on Tools with Artificial Intelligence, 2013

A Framework for Bean-Shape Contour Extraction.
Proceedings of the 2013 IEEE 25th International Conference on Tools with Artificial Intelligence, 2013

EEG-channel selection based on difference analysis of mental activities.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2013

A novel thin elongated objects segmentation based on fuzzy connectedness and GMM learning.
Proceedings of the IEEE International Conference on Image Processing, 2013

Multiscale X-ray image contrast enhancement based on limited adaptive histogram equalization.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2013

Topic-Centric Candidate Priors for Expert Finding Models.
Proceedings of the Information Computing and Applications - 4th International Conference, 2013

Recursive Kernel Density Estimation for modeling the background and segmenting moving objects.
Proceedings of the IEEE International Conference on Acoustics, 2013

Towards a micro-blog platform for sensing and easing adolescent psychological pressures.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

A Secure Document Self-Destruction Scheme: An ABE Approach.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Multi-tenancy authorization models for collaborative cloud services.
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

Attribute Based Multi-signature Scheme in the Standard Model.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

PRAM: privacy preserving access management scheme in cloud services.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

Learning Symmetry Features for Face Detection Based on Sparse Group Lasso.
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013

A new method for predicting essential proteins based on topology potential.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013

Services paths planning for Electric Power Communication Network based on improved Ant Colony Optimization.
Proceedings of the 15th Asia-Pacific Network Operations and Management Symposium, 2013

Predicting the Need for Pediatric Intensive Care Unit (PICU) Transfer for Newly Hospitalized Children with Machine Learning.
Proceedings of the AMIA 2013, 2013

Exploiting Multiple Features for Learning to Rank in Expert Finding.
Proceedings of the Advanced Data Mining and Applications - 9th International Conference, 2013

Joint Alignment and Clustering via Low-Rank Representation.
Proceedings of the 2nd IAPR Asian Conference on Pattern Recognition, 2013

Name-aware Machine Translation.
Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, 2013

Joint Event Extraction via Structured Prediction with Global Features.
Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, 2013

2012
A Unified Approach to Routing Protection in IP Networks.
IEEE Trans. Network and Service Management, 2012

The partitioned scheduling of sporadic task systems on multiprocessors.
The Journal of Supercomputing, 2012

Enhancing the Trust of Internet Routing With Lightweight Route Attestation.
IEEE Trans. Information Forensics and Security, 2012

Improving software testing process: feature prioritization to make winners of success-critical stakeholders.
Journal of Software: Evolution and Process, 2012

VegaNet: a virtualized experimentation platform for production networks with connectivity consistency.
IEEE Network, 2012

Ethernet Solutions for Communication of Twin-Arc High Speed Submerged Arc Welding Equipments.
JCP, 2012

Priority-based squash reducing methods in thread level speculation.
IJITCC, 2012

A group priority earliest deadline first scheduling algorithm.
Frontiers of Computer Science, 2012

Do different reputation systems provide consistent signals of seller quality: a canonical correlation investigation of Chinese C2C marketplaces.
Electronic Markets, 2012

Minimum Protection Cost Tree: A tunnel-based IP Fast Reroute Scheme.
Computer Communications, 2012

Network traffic classification via HMM under the guidance of syntactic structure.
Computer Networks, 2012

Selecting shorter alternate paths for tunnel-based IP Fast ReRoute in linear time.
Computer Networks, 2012

Learning Hierarchical Relationships among Partially Ordered Objects with Heterogeneous Attributes and Links.
Proceedings of the Twelfth SIAM International Conference on Data Mining, 2012

A Speculative HMMER Search Implementation on GPU.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

SeTM: Efficient Execution of Speculative Threads with Hardware Transactional Memory.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

Simulation of pedestrian evacuation from room with internal obstacles.
Proceedings of the Eighth International Conference on Natural Computation, 2012

Learning scale ranges for the extraction of regions of interest.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

Localization of Drosophila embryos using connected components in scale space.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

Concealed knowledge identification using facial thermal imaging.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Cheap, Fast, and Good Enough for the Non-biomedical Domain but is It Usable for Clinical Natural Language Processing? Evaluating Crowdsourcing for Clinical Trial Announcement Named Entity Annotations.
Proceedings of the 2012 IEEE Second International Conference on Healthcare Informatics, 2012

Pre-annotating Clinical Notes and Clinical Trial Announcements for Gold Standard Corpus Development: Evaluating the Impact on Annotation Speed and Potential Bias.
Proceedings of the 2012 IEEE Second International Conference on Healthcare Informatics, 2012

Linking Medications and Their Attributes in Clinical Notes and Clinical Trial Announcements for Information Extraction: A Sequence Labeling Approach.
Proceedings of the 2012 IEEE Second International Conference on Healthcare Informatics, 2012

Using Natural Language Processing and the Electronic Health Record for Appendicitis Risk Stratification.
Proceedings of the 2012 IEEE Second International Conference on Healthcare Informatics, 2012

Research of process management on drilling engineering collaborative design system based on workflow.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Application of nonlinear dry friction force of heavy haul freight car using equivalent linearization method.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

A 5.61 pJ, 16 kb 9T SRAM with single-ended equalized bitlines and fast local write-back for cell stability improvement.
Proceedings of the 2012 European Solid-State Device Research Conference, 2012

Joint bilingual name tagging for parallel corpora.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Combining Flat and Structured Approaches for Temporal Slot Filling or: How Much to Compress?
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2012

Building Gold Standard Corpora for Medical Natural Language Processing Tasks.
Proceedings of the AMIA 2012, 2012

Distributed Control Independence for Composable Multi-processors.
Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, Shanghai, China, May 30, 2012

Value Predicted LogSPoTM: Improve the Parallesim of Thread Level System by Using a Value Predictor.
Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, Shanghai, China, May 30, 2012

2011
Parameter Identification for PEM Fuel-Cell Mechanism Model Based on Effective Informed Adaptive Particle Swarm Optimization.
IEEE Trans. Industrial Electronics, 2011

Contour Extraction of Drosophila Embryos.
IEEE/ACM Trans. Comput. Biology Bioinform., 2011

An Auditory-Based Feature Extraction Algorithm for Robust Speaker Identification Under Mismatched Conditions.
IEEE Trans. Audio, Speech & Language Processing, 2011

Novel linear search for support vector machine parameter selection.
Journal of Zhejiang University - Science C, 2011

Image stabilization with support vector machine.
Journal of Zhejiang University - Science C, 2011

Toward a practical approach for BGP stability with root cause check.
J. Parallel Distrib. Comput., 2011

Adaptive set stabilization of the attitude of a rigid spacecraft without angular velocity measurements.
J. Systems Science & Complexity, 2011

Output characteristics of giant magnetostrictive force sensor under the effect of various factors.
IJMA, 2011

Clockwise Collision Analysis - Overlooked Side-Channel Leakage Inside Your Measurements.
IACR Cryptology ePrint Archive, 2011

Fluxgate Magnetometer Array for Geomagnetic Abnormal Phenomena Tracking.
Data Science Journal, 2011

Erratum: Principal Component Analysis of Geomagnetic Data for the Panzhihua Earthquake (Ms 6.1) in August 2008 [Data Science Journal, Volume 10, 30 August 2011. IAGA130- IAGA138].
Data Science Journal, 2011

Principal Component Analysis of Geomagnetic Data for the Panzhihua Earthquake (Ms 6.1) in August 2008.
Data Science Journal, 2011

Fast k-means algorithm clustering
CoRR, 2011

Self-healing routing: failure, modeling and analysis.
SCIENCE CHINA Information Sciences, 2011

GPUSVM: a comprehensive CUDA based support vector machine package.
Central Europ. J. Computer Science, 2011

CUNY BLENDER TAC-KBP2011 Temporal Slot Filling System Description.
Proceedings of the Fourth Text Analysis Conference, 2011

Local bias and its impacts on the performance of parametric estimation models.
Proceedings of the 7th International Conference on Predictive Models in Software Engineering, 2011

Access Path Based Source Address Validation in Mobile IPv6.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011

MPCT: Minimum protection cost tree for IP fast reroute using Tunnel.
Proceedings of the 19th International Workshop on Quality of Service, 2011

A value-based review process for prioritizing artifacts.
Proceedings of the International Conference on Software and Systems Process, 2011

A Non-blocking Programming Framework for Pipeline Application on Multi-core Platform.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

A Priority-Aware NoC to Reduce Squashes in Thread Level Speculation for Chip Multiprocessors.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

Analysis of SRAM hierarchical bitlines for optimal performance and variation tolerance.
Proceedings of the International SoC Design Conference, 2011

Compact Route Computation: Improving Parallel BGP Route Processing for Scalable Routers.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

An efficient parallel TCAM scheme for the forwarding engine of the next-generation router.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Evaluation on consistency between HJ-1 CCD and TM images in monitoring fractional green vegetation cover.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

PS-InSAR monitoring and finite element simulation of geomechanical and hydrogeological responses in sedimentary formations.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

Scale Assignment for Imbalanced Points.
Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011

A hierarchical distributed data mining architecture.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

A Hybrid Representation of Imbalanced Points for Two-Layer Matching.
Proceedings of the Image Analysis and Recognition - 8th International Conference, 2011

A Study on the Application of GPC Implicit PID Algorithm in the Heat Exchanging Station Control System.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

An Algebraic Approach to Computing the Reliability of Internet Routing.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Soft frame margin estimation of Gaussian Mixture Models for speaker recognition with sparse training data.
Proceedings of the IEEE International Conference on Acoustics, 2011

Generation of 2D Conforming Voronoi Diagram in Complex Domain.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

ECF sigma factor-associated regulatory networks in Streptomyces colicolor A3(2).
Proceedings of the 2011 IEEE International Workshop on Genomic Signal Processing and Statistics, 2011

"Is It Really a Defect?" An Empirical Study on Measuring and Improving the Process of Software Defect Reporting.
Proceedings of the 5th International Symposium on Empirical Software Engineering and Measurement, 2011

Study on performance evaluation and frequency characteristic for real-time image stabilization system.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Making winners for both education and research: Verification and validation process improvement practice in a software engineering course.
Proceedings of the 24th IEEE-CS Conference on Software Engineering Education and Training, 2011

An Embedded Software Fusion Power Model Based on Algorithm and Micro-architectural Level.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Joint inference for cross-document information extraction.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

Enhancing the trust of internet routing with lightweight route attestation.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Maneuvering targets state prediction based on robust H INFINITY filtering in opto-electronic tracking system.
Signal Processing, 2010

Voxel-based analysis of postnatal white matter microstructure in mice exposed to immune challenge in early or late pregnancy.
NeuroImage, 2010

Real-time motion deblurring algorithm with robust noise suppression.
Journal of Zhejiang University - Science C, 2010

A Novel Partitioned Scheduling Algorithm of Constrained-deadline Sporadic Task Systems on Multiprocessors.
JCP, 2010

Global uniform asymptotical stability of a class of nonlinear cascaded systems with application to a nonholonomic wheeled mobile robot.
Int. J. Systems Science, 2010

New similarity measures of localities for a two-layer matching scheme and estimation of fundamental matrices.
Neurocomputing, 2010

Using diffusion distances for flexible molecular shape comparison.
BMC Bioinformatics, 2010

Searching for Entities When Retrieval Meets Extraction.
Proceedings of The Nineteenth Text REtrieval Conference, 2010

Research on Data Processing of RFID Middleware Based on Cloud Computing.
Proceedings of the Rough Set and Knowledge Technology - 5th International Conference, 2010

A basic study of Event-Related Potentials (ERPs) on human audiovisual spatial integration for human-machine interface.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010

FACRA: Flexible-Core Architecture Chip Resource Abstractor.
Proceedings of the 2010 International Conference on Parallel and Distributed Computing, 2010

An Improved Control Strategy for Ball Mill Grinding Circuits.
Proceedings of the Life System Modeling and Intelligent Computing, 2010

Efficient searching with parallel TCAM chips.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Efficient parallel searching with TCAMs.
Proceedings of the 18th International Workshop on Quality of Service, 2010

Measurement and Analysis of Process Audit: A Case Study.
Proceedings of the New Modeling Concepts for Today's Software Processes, 2010

Improving the ROI of Software Quality Assurance Activities: An Empirical Study.
Proceedings of the New Modeling Concepts for Today's Software Processes, 2010

An intelligent system for accelerating parallel SVM classification problems on large datasets using GPU.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

A Novel Reputation Computing Model - (Work-in-Progress).
Proceedings of the Trusted Systems - Second International Conference, 2010

Disaster mapping from medium spatial resolution alos palsar images.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2010

A Binocular Framework for Face Liveness Verification under Unconstrained Localization.
Proceedings of the Ninth International Conference on Machine Learning and Applications, 2010

Appearance Based Recognition Using Spatial and Discriminant Influence.
Proceedings of the Ninth International Conference on Machine Learning and Applications, 2010

A Chunking Method for Euclidean Distance Matrix Calculation on Large Dataset Using Multi-GPU.
Proceedings of the Ninth International Conference on Machine Learning and Applications, 2010

Achieving Unified Protection for IP Routing.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

Robust control based on linear matrix inequality of fuel cell system with μ analysis.
Proceedings of the 8th IEEE International Conference on Control and Automation, 2010

A Lightweight IP Fast Reroute Algorithm with Tunneling.
Proceedings of IEEE International Conference on Communications, 2010

PCLF: A Practical Cross-Layer Fast Handover Mechanism in IEEE 802.11 WLANs.
Proceedings of IEEE International Conference on Communications, 2010

Robust speaker identification using an auditory-based feature.
Proceedings of the IEEE International Conference on Acoustics, 2010

Analysis of Stakeholder/Value Dependency Patterns and Process Implications: A Controlled Experiment.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

An Embedded Software Power Model Based on Algorithm Complexity Using Back-Propagation Neural Networks.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

IP Fast Reroute: NotVia with Early Decapsulation.
Proceedings of the Global Communications Conference, 2010

A method for modeling drivers' behavior rules in agent-based traffic simulation.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

Development of a pedestrian evacuation model for urban chemical release emergency.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

Visualized emergency planning system based on GIS and scenario analysis technology.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

Study of spacializing social statistical data for carbon management.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

An integrated spatio-temporal modeling and analysis framework for climate change research.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

Crosstalk noise and bit error rate analysis for optical network-on-chip.
Proceedings of the 47th Design Automation Conference, 2010

A 9T subthreshold SRAM bitcell with data-independent bitline leakage for improved bitline swing and variation tolerance.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2010

2009
Interest Pixel Mining.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Interest Points of General Imbalance.
IEEE Trans. Image Processing, 2009

Low complexity channel estimation method for TDS-OFDM based Chinese DTTB system.
IEEE Trans. Consumer Electronics, 2009

Global set stabilisation of the spacecraft attitude using finite-time control technique.
Int. J. Control, 2009

Expert system based adaptive dynamic matrix control for ball mill grinding circuit.
Expert Syst. Appl., 2009

Coupling and Fusion in Modern Geoscience.
Data Science Journal, 2009

Towards secure dynamic collaborations with group-based RBAC model.
Computers & Security, 2009

An auditory-based transfrom for audio signal processing.
Proceedings of the IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, 2009

A Study of Relation Annotation in Business Environments Using Web Mining.
Proceedings of the 3rd IEEE International Conference on Semantic Computing (ICSC 2009), 2009

A Neural Network Based Framework for Audio Scene Analysis in Audio Sensor Networks.
Proceedings of the Advances in Multimedia Information Processing, 2009

GBED: group based event detection method for audio sensor networks.
Proceedings of the 17th International Conference on Multimedia 2009, 2009

Bridge the Gap between Software Test Process and Business Value: A Case Study.
Proceedings of the Trustworthy Software Development Processes, 2009

An Analysis of the Third Party Payment System based on Service Supply Chain.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2009

A Geospatial Information Portal for Emergency Management of Natural Disasters.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2009

Contour Extraction of Drosophila Embryos.
Proceedings of the ICTAI 2009, 2009

Data transformation and attribute subset selection: Do they help make differences in software failure prediction?
Proceedings of the 25th IEEE International Conference on Software Maintenance (ICSM 2009), 2009

A global-to-local scheme for imbalanced point matching.
Proceedings of the International Conference on Image Processing, 2009

Detecting image points of general imbalance.
Proceedings of the International Conference on Image Processing, 2009

Design and Implementation of an Improved C Source-Code Level Program Energy Model.
Proceedings of the International Conference on Embedded Software and Systems, 2009

Handover Latency of Predictive FMIPv6 in IEEE 802.11 WLANs: A Cross Layer Perspective.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

A portable USB-based microphone array device for robust speech recognition.
Proceedings of the IEEE International Conference on Acoustics, 2009

Improving IGP Convergence through Distributed OSPF in Scalable Router.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

Investigation of Factors Impacting Thread-Level Parallelism from Desktop, Multimedia and HPC Applications.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

Productivity trends in incremental and iterative software development.
Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, 2009

A Sensemaking-based Information Foraging and Summarization System in Business Environments.
Proceedings of the 2009 International Conference on E-Learning, 2009

An Algorithm of Quantitative Association Rule on Fuzzy Clustering with Application to Cross-Selling in Telecom Industry.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

The Influence of Noise on the Restoration of Diffraction-Limited Images.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

Multisensory Interaction of Audiovisual Stimuli on the Central and Peripheral Spatial Locations: A Behavioral Study.
Proceedings of the Brain Informatics, International Conference, BI 2009, 2009

2008
A novel method of infrared image denoising and edge enhancement.
Signal Processing, 2008

Interest point detection using imbalance oriented selection.
Pattern Recognition, 2008

Application of Information Technology: "Smart Forms" in an Electronic Medical Record: Documentation-based Clinical Decision Support to Improve Disease Management.
JAMIA, 2008

Multi-focus color image fusion in the HSI space using the sum-modified-laplacian and a coarse edge map.
Image Vision Comput., 2008

An evaluation of identity representability of facial expressions using feature distributions.
Neurocomputing, 2008

Adaptive Appearance Based Face Recognition.
International Journal on Artificial Intelligence Tools, 2008

Supervisory expert control for ball mill grinding circuits.
Expert Syst. Appl., 2008

Analysis and case study on multi-dimensional scalability of the Internet architecture.
Science in China Series F: Information Sciences, 2008

Personalized web exploration with task models.
Proceedings of the 17th International Conference on World Wide Web, 2008

VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

A Flexible Framework for Audio Semantic Content Detection.
Proceedings of the Advances in Multimedia Information Processing, 2008

A Study of Path Protection in Self-Healing Routing.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

Learning subspace kernels for classification.
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2008

Access control in Group Communication Systems.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

A hash-TLB approach for MMU virtualization in xen/IA64.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

A Novel Strategy for Precise Geometric Registration of GIS and Satellite Images.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

A Robust Endpoint Detection Algorithm for Video Caption Generation.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

An empirical analysis on distribution patterns of software maintenance effort.
Proceedings of the 24th IEEE International Conference on Software Maintenance (ICSM 2008), September 28, 2008

Toward A Practical Scheme for IPSec Management.
Proceedings of the 2008 International Conference on Information Networking, 2008

Evaluating Service Scalability of Network Architectures.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

An automatic framework for standardization of drosophila embryonic images.
Proceedings of the International Conference on Image Processing, 2008

Detecting image points of diverse imbalance.
Proceedings of the International Conference on Image Processing, 2008

Towards a Group-Based RBAC Model and Decentralized User-Role Administration.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Educational social linking in example authoring.
Proceedings of the HYPERTEXT 2008, 2008

Reducing biases in individual software effort estimations: a combining approach.
Proceedings of the Second International Symposium on Empirical Software Engineering and Measurement, 2008

University of Pittsburgh at GeoCLEF 2008: Towards Effective Geographic Information Retrieval.
Proceedings of the Working Notes for CLEF 2008 Workshop co-located with the 12th European Conference on Digital Libraries (ECDL 2008) , 2008

Query Expansion for Effective Geographic Information Retrieval.
Proceedings of the Evaluating Systems for Multilingual and Multimodal Information Access, 2008

Usage control platformization via trustworthy SELinux.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

LogSPoTM: a scalable thread level speculation model based on transactional memory.
Proceedings of the 13th Asia-Pacific Computer Systems Architecture Conference, 2008

Global set stabilization of the spacecraft attitude using finite-time control technique.
Proceedings of the IEEE International Conference on Control Applications, 2008

The e-commerce transaction statistics in developing countries.
Proceedings of the 10th International Conference on Electronic Commerce 2008, 2008

2007
Hierarchical Capacity Planning With Reconfigurable Kits in Global Semiconductor Assembly and Test Manufacturing.
IEEE Trans. Automation Science and Engineering, 2007

How Up-to-date should it be? the Value of Instant Profiling and Adaptation in Information Filtering.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007

Empowering Patients to Improve the Quality of Their Care: Design and Implementation of a Shared Health Maintenance Module in a US Integrated Healthcare Delivery Network.
Proceedings of the MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics, 2007

Affine registration of multimodality images by optimization of mutual information using a stochastic gradient approximation technique.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2007

Steerable filter based multiscale registration method for JERS-1 SAR and ASTER images.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2007

Multimodality Image Registration by Particle Swarm Optimization of Mutual Information.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2007

Flexible Authorization with Decentralized Access Control Model for Grid Computing.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

Fuzzy Logic Based On-Line Efficiency Optimization Control of a Ball Mill Grinding Circuit.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Integrating Global and Local Structures: A Least Squares Framework for Dimensionality Reduction.
Proceedings of the 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 2007

A Randomized Trial of Standardized Nursing Patient Assessment Using Wireless Devices.
Proceedings of the AMIA 2007, 2007

A multidimensional scaling approach for representing XML documents.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

2006
Feature Reduction via Generalized Uncorrelated Linear Discriminant Analysis.
IEEE Trans. Knowl. Data Eng., 2006

Spatial interest pixels (SIPs): useful low-level features of visual media data.
Multimedia Tools Appl., 2006

Soft Sensing Based on LS-SVM and Its Application to a Distillation Column.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Design Study of Adaptive Fuzzy PID Controller for LOS Stabilized System.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Simultaneous Perturbation Stochastic Approximation Algorithm for Automated Image Registration Optimization.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2006

Interpolation Effects on Accuracy of Mutual Information Based Image Registration.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2006

Adaptive Appearance Based Face Recognition.
Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), 2006

Identity Representability of Facial Expressions: An Evaluation Using Feature Pixel Distributions.
Proceedings of the Fifth International Conference on Machine Learning and Applications, 2006

Local Image Fusion Using Dispersion Minimisation.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

Integrating Spatial and Discriminant Strength for Feature Selection and Linear Dimensionality Reduction.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2006

Optimal image registration via efficient local stochastic search.
Proceedings of the Computational Modeling of Objects Represented in Images-Fundamentals, 2006

Supporting Ad-hoc Collaboration with Group-based RBAC Model.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

Efficient model selection for regularized linear discriminant analysis.
Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, 2006

Improving EMR Usability: A Method for Both Discovering and Prioritizing Improvements in EMR Workflows Based on Human Factors Engineering.
Proceedings of the AMIA 2006, 2006

Smart Form Framework as a Foundation for Clinical Documentation Platform.
Proceedings of the AMIA 2006, 2006

Weight-based Pediatric Prescribing in Ambulatory Setting.
Proceedings of the AMIA 2006, 2006

Quality Dashboards: Technical and Architectural Considerations of an Actionable Reporting Tool for Population Management.
Proceedings of the AMIA 2006, 2006

Improving Care for Acute and Chronic Problems with Smart Forms and Quality Dashboards.
Proceedings of the AMIA 2006, 2006

Creation of Structured Documentation Templates using Natural Language Processing Techniques.
Proceedings of the AMIA 2006, 2006

Report Central: Quality Reporting Tool in an Electronic Health Record.
Proceedings of the AMIA 2006, 2006

Design and Implementation of a Clinical Rule Editor for Chronic Disease Reminders in an Electronic Medical Record.
Proceedings of the AMIA 2006, 2006

The Feasibility of Digital Pen and Paper Technology for Vital Sign Data Capture in Acute Care Settings.
Proceedings of the AMIA 2006, 2006

Model and method for evaluating creditability of C2C electronic trade.
Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce, 2006

2005
A fuzzy-based approach to remove clock skew and reset from one-way delay measurement.
IEEE Trans. Neural Networks, 2005

IDR/QR: An Incremental Dimension Reduction Algorithm via QR Decomposition.
IEEE Trans. Knowl. Data Eng., 2005

A Two-Stage Linear Discriminant Analysis via QR-Decomposition.
IEEE Trans. Pattern Anal. Mach. Intell., 2005

E-Commerce Education in China: Driving Forces, Status, and Strategies.
JECO, 2005

Using qualitative studies to improve the usability of an EMR.
Journal of Biomedical Informatics, 2005

Primary care physician time utilization before and after implementation of an electronic health record: A time-motion study.
Journal of Biomedical Informatics, 2005

Performance-improving techniques in web-based GIS.
International Journal of Geographical Information Science, 2005

The Use of Complex Contourlet Transform on Fusion Scheme.
Proceedings of the International Enformatika Conference, 2005

Definitions Management: A Semantics-Based Approach for Clinical Documentation in Healthcare Delivery.
Proceedings of the Semantic Web, 2005

Public health emergency management system framework based on digital city.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

An Administration Model of DRBAC on the Web.
Proceedings of the 2005 IEEE International Conference on e-Business Engineering (ICEBE 2005), 2005

An Improved Image Denoising Algorithm based on Weighted Adaptive Local Bounds.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

Multi-factory optimization enables kit reconfiguration in semiconductor manufacturing.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2005

Smart Forms: Building Condition-Specific Documentation and Decision Support Tools for Ambulatory EHR.
Proceedings of the AMIA 2005, 2005

Workflow Analysis in Primary Care: Implications for EHR Adoption.
Proceedings of the AMIA 2005, 2005

Probe into construction of e-commerce major in undergraduate degree: the experience of Xi'an institute of post and telecoms.
Proceedings of the 7th International Conference on Electronic Commerce, 2005

The application of exchange oriented three-dimensional e-commerce model: cases based explanation.
Proceedings of the 7th International Conference on Electronic Commerce, 2005

2004
Recognition of noisy speech using dynamic spectral subband centroids.
IEEE Signal Process. Lett., 2004

LDA/QR: an efficient and effective dimension reduction algorithm and its theoretical foundation.
Pattern Recognition, 2004

Two-Dimensional Linear Discriminant Analysis.
Proceedings of the Advances in Neural Information Processing Systems 17 [Neural Information Processing Systems, 2004

Efficient Kernel Discriminant Analysis via QR Decomposition.
Proceedings of the Advances in Neural Information Processing Systems 17 [Neural Information Processing Systems, 2004

A Patient-Controlled Journal for an Electronic Medical Record: Issues and Challenges.
Proceedings of the MEDINFO 2004, 2004

IDR/QR: an incremental dimension reduction algorithm via QR decomposition.
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2004

GPCA: an efficient dimension reduction scheme for image compression and retrieval.
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2004

An integrated geospatial metadata storing architecture.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004

Feature extraction via generalized uncorrelated linear discriminant analysis.
Proceedings of the Machine Learning, 2004

Discovering relations among discriminative training objectives [speak recognition applications].
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

Linear Projection Methods in Face Recognition under Unconstrained Illuminations: A Comparative Study.
Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2004), with CD-ROM, 27 June, 2004

Three dimensional model: an analyzing sketch for e-commerce theories and applications.
Proceedings of the 6th International Conference on Electronic Commerce, 2004

2003
UMass at TREC 2003: HARD and QA.
Proceedings of The Twelfth Text REtrieval Conference, 2003

A comparative study on content-based music genre classification.
Proceedings of the SIGIR 2003: Proceedings of the 26th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, July 28, 2003

Gene Functional Classification by Semisupervised Learning from Heterogeneous Data.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

A Framework of Individually-Focused Teleconferencing (IFT) via an Efficient 3D Reprojection Technique.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Spatial Interest Pixels (SIPs): Useful Low-Level Features of Visual Media Data.
Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM 2003), 2003

Analysis of different predistortion structures and efficient least-square adaptive algorithms.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

Fast discriminative training for sequential observations with application to speaker identification.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

Influencing factors of securities e-commerce in China.
Proceedings of the 11th European Conference on Information Systems, 2003

From Concept Towards Implementation: E-Government in China.
Proceedings of the 9th Americas Conference on Information Systems, 2003

2002
Robust endpoint detection and energy normalization for real-time speech and speaker recognition.
IEEE Trans. Speech and Audio Processing, 2002

A Survey on Wavelet Applications in Data Mining.
SIGKDD Explorations, 2002

Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices.
Proceedings of the 11th USENIX Security Symposium, 2002

Automatic enrollment for speaker authentication.
Proceedings of the 7th International Conference on Spoken Language Processing, ICSLP2002, 2002

Recognition of noisy speech using normalized moments.
Proceedings of the 7th International Conference on Spoken Language Processing, ICSLP2002, 2002

Bell labs approach to Aurora evaluation on connected digit recognition.
Proceedings of the 7th International Conference on Spoken Language Processing, ICSLP2002, 2002

Improving Medical/Biological Data Classification Performance by Wavelet Preprocessing.
Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), 2002

A new algorithm for fast discriminative training.
Proceedings of the IEEE International Conference on Acoustics, 2002

2001
A detection approach to search-space reduction for HMM state alignment in speaker verification.
IEEE Trans. Speech and Audio Processing, 2001

Cryptographic Key Generation from Voice.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

Using voice to generate cryptographic keys.
Proceedings of the 2001: A Speaker Odyssey, 2001

A real-time Japanese broadcast news closed-captioning system.
Proceedings of the EUROSPEECH 2001 Scandinavia, 2001

An auditory system-based feature for robust speech recognition.
Proceedings of the EUROSPEECH 2001 Scandinavia, 2001

Evaluating the Aurora connected digit recognition task - a bell labs approach.
Proceedings of the EUROSPEECH 2001 Scandinavia, 2001

Robust, real-time endpoint detector with energy normalization for ASR in adverse environments.
Proceedings of the IEEE International Conference on Acoustics, 2001

2000
Automatic verbal information verification for user authentication.
IEEE Trans. Speech and Audio Processing, 2000

A high-performance auditory feature for robust speech recognition.
Proceedings of the Sixth International Conference on Spoken Language Processing, 2000

Search-space reduction for fast, optimal HMM decoding in speaker verification.
Proceedings of the IEEE International Conference on Acoustics, 2000

Ontology acquisition from on-line knowledge sources.
Proceedings of the AMIA 2000, 2000

1999
Recent advancements in automatic speaker authentication.
IEEE Robot. Automat. Mag., 1999

A language-independent personal voice controller with embedded speaker verification.
Proceedings of the Sixth European Conference on Speech Communication and Technology, 1999

Background model design for flexible and portable speaker verification systems.
Proceedings of the 1999 IEEE International Conference on Acoustics, 1999

A fast, sequential decoding algorithm with application to speaker verification.
Proceedings of the 1999 IEEE International Conference on Acoustics, 1999

1998
A fast decoding algorithm based on sequential detection of the changes in distribution.
Proceedings of the 5th International Conference on Spoken Language Processing, Incorporating The 7th Australian International Speech Science and Technology Conference, Sydney Convention Centre, Sydney, Australia, 30th November, 1998

Speaker verification using verbal information verification for automatic enrolment.
Proceedings of the 1998 IEEE International Conference on Acoustics, 1998

1997
Principal feature classification.
IEEE Trans. Neural Networks, 1997

Verbal information verification.
Proceedings of the Fifth European Conference on Speech Communication and Technology, 1997

A fast algorithm for stochastic matching with application to robust speaker verification.
Proceedings of the 1997 IEEE International Conference on Acoustics, 1997

1996
Normalized discriminant analysis with application to a hybrid speaker-verification system.
Proceedings of the 1996 IEEE International Conference on Acoustics, 1996

1995
Spatial Information System and Golden Bridge Engineering.
Annals of GIS, 1995

One-pass vector quantizer design by sequential pruning of the training data.
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995

Improving discriminant neural network (DNN) design by the use of principal component analysis.
Proceedings of the 1995 International Conference on Acoustics, 1995

1989
Großflächige Landnutzungsbestimmung aus Landsat-5-TM-Daten.
Proceedings of the Informatik im Umweltschutz, 1989


  Loading...