Wei Jiang

According to our database1, Wei Jiang authored at least 459 papers between 2000 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A Method of Clustering Ensemble Based on Grey Relation Analysis.
Wireless Personal Communications, 2018

Effect of Hazard Identification and Information Amount Calculation in Coal Mine Safety Signs Design.
Wireless Personal Communications, 2018

A Multi-Sensor Positioning Method-Based Train Localization System for Low Density Line.
IEEE Trans. Vehicular Technology, 2018

Efficient Dynamic Evolution of Service Composition.
IEEE Trans. Services Computing, 2018

Energy-constraint rate distortion optimization for compressive sensing-based image coding.
Signal, Image and Video Processing, 2018

An Improved Calibration Method for a Rotating 2D LIDAR System.
Sensors, 2018

Highly efficient randomized authentication in VANETs.
Pervasive and Mobile Computing, 2018

Concept Factorization by Joint Locality-constrained and ℓ 2, 1-norm Regularization for Image Representation.
Multiple-Valued Logic and Soft Computing, 2018

Guided 3D point cloud filtering.
Multimedia Tools Appl., 2018

Iterative guidance normal filter for point cloud.
Multimedia Tools Appl., 2018

Energy-aware page replacement and consistency guarantee for hybrid NVM-DRAM memory systems.
Journal of Systems Architecture - Embedded Systems Design, 2018

Energy optimization of security-sensitive mixed-criticality applications for distributed real-time systems.
J. Parallel Distrib. Comput., 2018

A fine-grained rule partition algorithm in cloud data centers.
J. Network and Computer Applications, 2018

Cell Virtualization with Network Partition for Initial User Association in Software Defined Small-cell Networks.
TIIS, 2018

Fuzzy control-based bolt tightening for power cable maintenance robot.
Industrial Robot, 2018

Unsupervised fault diagnosis of rolling bearings using a deep neural network based on generative adversarial networks.
Neurocomputing, 2018

Distributed consensus of linear MASs with an unknown leader via a predictive extended state observer considering input delay and disturbances.
Neurocomputing, 2018

Joint multicast beamforming and user scheduling in large-scale antenna systems.
IET Communications, 2018

Reception and detection of a wide-band OFDM signal in a Doppler spreading channel.
IET Communications, 2018

Construction of flux-controlled memristor and circuit simulation based on smooth cellular neural networks module.
IET Circuits, Devices & Systems, 2018

Multilevel Thresholding Color Image Segmentation Using a Modified Artificial Bee Colony Algorithm.
IEICE Transactions, 2018

Efficient and Constant-Rounds Secure Comparison through Dynamic Groups and Asymmetric Computations.
IACR Cryptology ePrint Archive, 2018

A Simplified Calibration Methodology for On-Chip Couplers.
J. Electronic Testing, 2018

UFace: Your universal password that no one can see.
Computers & Security, 2018

Privacy-preserving power usage and supply control in smart grid.
Computers & Security, 2018

Medical images fusion by using weighted least squares filter and sparse representation.
Computers & Electrical Engineering, 2018

A network approach to exploring the functional basis of gene-gene epistatic interactions in disease susceptibility.
Bioinformatics, 2018

A distance-based control chart for monitoring multivariate processes using support vector machines.
Annals OR, 2018

A numerical method for solving the time fractional Schrödinger equation.
Adv. Comput. Math., 2018

A New Motor Imagery EEG Classification Method FB-TRCSP+RF Based on CSP and Random Forest.
IEEE Access, 2018

Detecting traffic anomaly in wireless networks, an analytics methodology.
Proceedings of the 2018 Wireless Telecommunications Symposium, 2018

3-D printed X-band Yagi-Uda antenna.
Proceedings of the 2018 IEEE Radio and Wireless Symposium, 2018

Work-in-Progress: RWS - A Roulette Wheel Scheduler for Preventing Execution Pattern Leakage.
Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium, 2018

Deep Forest with Local Experts Based on ELM for Pedestrian Detection.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

Classification of the Structure of Square Hmong Characters and Analysis of Its Statistical Properties.
Proceedings of the Natural Language Processing and Chinese Computing, 2018

Content-Aware Caching in SDN-Enabled Virtualized Wireless D2D Networks to Reduce Visiting Latency.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

VH-HFCN based Parking Slot and Lane Markings Segmentation on Panoramic Surround View.
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018

TiEV: The Tongji Intelligent Electric Vehicle in the Intelligent Vehicle Future Challenge of China.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

Accurate Fiducial Mapping for Pose Estimation Using Manifold Optimization.
Proceedings of the 2018 International Conference on Indoor Positioning and Indoor Navigation, 2018

Efficient D2D content caching using multi-agent reinforcement learning.
Proceedings of the IEEE INFOCOM 2018, 2018

An Insider Threat Detection Method Based on User Behavior Analysis.
Proceedings of the Intelligent Information Processing IX, 2018

A Novel Weighted Boundary Matching Error Concealment Schema for HEVC.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Research on Cloud Storage and Security Strategy of Digital Archives.
Proceedings of the Intelligent Computing Methodologies - 14th International Conference, 2018

Auto Position Control for Unmanned Underwater Vehicle Based on Double Sliding Mode Loops.
Proceedings of the Intelligent Computing Theories and Application, 2018

On Secrecy Performance of Relay Assisted Millimeter Wave C-RAN.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

Design of security-critical distributed real-time applications with fault-tolerant constraint: work-in-progress.
Proceedings of the International Conference on Embedded Software, 2018

Review on Big Data Fusion Methods of Quality Inspection for Consumer Goods.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

Dynamic data management for automotive ECUs with hybrid RAM-NVM memory: work-in-progress.
Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, 2018

Co-design of security-critical real-time systems to prevent fault injection attacks: work-in-progress.
Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, 2018

Privacy-Preserving Watermarking Transformation Technique in a Distributed Environment.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Persistence improvement for distributed cache with NVM based storage system: work-in-progress.
Proceedings of the International Conference on Compilers, 2018

Writing-aware data variable allocation on hybrid SRAM+NVM SPM: work-in-progress.
Proceedings of the International Conference on Compilers, 2018

2017
Effective and efficient trajectory outlier detection based on time-dependent popular route.
World Wide Web, 2017

A feature based method for trajectory dataset segmentation and profiling.
World Wide Web, 2017

The Rate-Distortion Optimized Compressive Sensing for Image Coding.
Signal Processing Systems, 2017

Inferring urban air quality based on social media.
Computers, Environment and Urban Systems, 2017

Semisupervised Incremental Support Vector Machine Learning Based on Neighborhood Kernel Estimation.
IEEE Trans. Systems, Man, and Cybernetics: Systems, 2017

Optimal Cooperative Content Caching and Delivery Policy for Heterogeneous Cellular Networks.
IEEE Trans. Mob. Comput., 2017

A Multisensor Navigation System Based on an Adaptive Fault-Tolerant GOF Algorithm.
IEEE Trans. Intelligent Transportation Systems, 2017

Cramer-Rao Bound for Noncoherent Direction of Arrival Estimation in the Presence of Sensor Location Errors.
IEEE Signal Process. Lett., 2017

A review of algorithms for filtering the 3D point cloud.
Sig. Proc.: Image Comm., 2017

Video fire detection based on Gaussian Mixture Model and multi-color features.
Signal, Image and Video Processing, 2017

Amorphous In-Ga-Zn-O Powder with High Gas Selectivity towards Wide Range Concentration of C2H5OH.
Sensors, 2017

Design optimization for security- and safety-critical distributed real-time applications.
Microprocessors and Microsystems - Embedded Hardware Design, 2017

Design optimization of secure message communication for energy-constrained distributed real-time systems.
J. Parallel Distrib. Comput., 2017

Nonfragile robust model predictive control for uncertain constrained time-delayed system with compensations.
J. Franklin Institute, 2017

Synchronization for chaotic systems via mixed-objective dynamic output feedback robust model predictive control.
J. Franklin Institute, 2017

Dynamic Resource Reservation for Ultra-low Latency IoT Air-Interface Slice.
TIIS, 2017

Big Data Based Dynamic Flow Aggregation over 5G Network Slicing.
TIIS, 2017

User Bandwidth Demand Centric Soft-Association Control in Wi-Fi Networks.
TIIS, 2017

Autonomous location control of a robot manipulator for live maintenance of high-voltage transmission lines.
Industrial Robot, 2017

UFace: Your Universal Password That No One Can See.
IACR Cryptology ePrint Archive, 2017

PAS: policy-based assistance in sensor networks.
Computing, 2017

Controlling the joint local false discovery rate is more powerful than meta-analysis methods in joint analysis of summary statistics from multiple genome-wide association studies.
Bioinformatics, 2017

ncDR: a comprehensive resource of non-coding RNAs involved in drug resistance.
Bioinformatics, 2017

What is the probability of replicating a statistically significant association in genome-wide association studies?
Briefings in Bioinformatics, 2017

Asymptotical stability of Riemann-Liouville fractional singular systems with multiple time-varying delays.
Appl. Math. Lett., 2017

Nonsmooth optimization for joint multicast beamforming and user scheduling in massive MIMO systems.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Energy Efficient Sleep Strategy for Decoupled Uplink#x002F;Downlink Access in HetNets.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

A late fusion approach for harnessing multi-cnn model high-level features.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Poster: A Location-Privacy Approach for Continuous Queries.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Integration of ferromagnetic and ferroelectric films for fully electrically tunable RF devices.
Proceedings of the 2017 IEEE Radio and Wireless Symposium, 2017

Energy-aware page replacement for NVM based hybrid main memory system.
Proceedings of the 23rd IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2017

Experimental results for artificial intelligence-based self-organized 5G networks.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

No one can track you: Randomized authentication in Vehicular Ad-hoc Networks.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications, 2017

On-line memorry defragmentation for NVM-based persistent heaps.
Proceedings of the IEEE 6th Non-Volatile Memory Systems and Applications Symposium, 2017

Multi agent based networking satellite tasks scheduling with department collaborative mechanism.
Proceedings of the 13th International Conference on Natural Computation, 2017

Speeding Up Dilated Convolution Based Pedestrian Detection with Tensor Decomposition.
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017

Energy Efficient MAC Protocol for Wireless Sensor Networks: A Survey.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Face detection and recognition for home service robots with end-to-end deep neural networks.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Proactive Content Caching by Exploiting Transfer Learning for Mobile Edge Computing.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A feature embedding strategy for high-level CNN representations from multiple convnets.
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017

Intelligent network management for 5G systems: The SELFNET approach.
Proceedings of the 2017 European Conference on Networks and Communications, 2017

A Survey of Thermal-Aware Routing Protocols in Wireless Body Area Networks.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Harris corner detection based leaf image segmentation for ancient Chinese books.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

2016
A Nonlinear Prognostic Model for Degrading Systems With Three-Source Variability.
IEEE Trans. Reliability, 2016

Generalization of SPIHT: Set Partition Coding System.
IEEE Trans. Image Processing, 2016

Secure Multiset Intersection Cardinality and its Application to Jaccard Coefficient.
IEEE Trans. Dependable Sec. Comput., 2016

A Hybrid Approach for Forecasting Patient Visits in Emergency Department.
Quality and Reliability Eng. Int., 2016

Rate-distortion optimized image compression based on image inpainting.
Multimedia Tools Appl., 2016

Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control.
J. Medical Systems, 2016

System-Level Design to Detect Fault Injection Attacks on Embedded Real-Time Applications.
JETC, 2016

The effect of service guarantee strength on service quality of online merchants.
IJSTM, 2016

An improved Fisher discriminant vector employing updated between-scatter matrix.
Neurocomputing, 2016

Evaluating Trade Areas Using Social Media Data with a Calibrated Huff Model.
ISPRS Int. J. Geo-Information, 2016

The SELFNET Approach for Autonomic Management in an NFV/SDN Networking Paradigm.
IJDSN, 2016

SELFNET Framework self-healing capabilities for 5G mobile networks.
Trans. Emerging Telecommunications Technologies, 2016

Power estimation and sample size determination for replication studies of genome-wide association studies.
BMC Genomics, 2016

Systematic dissection of dysregulated transcription factor-miRNA feed-forward loops across tumor types.
Briefings in Bioinformatics, 2016

Lyapunov stability analysis of fractional nonlinear systems.
Appl. Math. Lett., 2016

A new constraint-based virtual environment for haptic assembly training.
Advances in Engineering Software, 2016

An Algorithm of Detecting Moving Foreground Based on an Improved Gaussian Mixture Model.
Proceedings of the Advances in Image and Graphics Technologies - 11th Chinese Conference, 2016

Multi-agent based dynamic mission planning for satellite data transmission.
Proceedings of the 12th International Conference on Natural Computation, 2016

Research on collaboration patterns of ICMSE conference coauthors network.
Proceedings of the 12th International Conference on Natural Computation, 2016

Fault Tolerant Algorithm for NVM to Reuse the Error Blocks.
Proceedings of the 13th International Conference on Embedded Software and Systems, 2016

Dynamic Memory Management for Hybrid DRAM-NVM Main Memory Systems.
Proceedings of the 13th International Conference on Embedded Software and Systems, 2016

Data Management for Automotive ECUs Based on Hybrid RAM-NVM Main Memory.
Proceedings of the 13th International Conference on Embedded Software and Systems, 2016

Cramer-Rao bound and approximate maximum likelihood estimation for non-coherent direction of arrival problem.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

Research and Application on Big Data Oriented to Reputation on Collaborative Innovation.
Proceedings of the IEEE Second International Conference on Multimedia Big Data, 2016

Improved methods for static index pruning.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016

GBOOST 2.0: A GPU-based tool for detecting gene-gene interactions with covariates adjustment in genome-wide association studies.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

Energy optimization of stochastic applications with statistical guarantees of deadline and reliability.
Proceedings of the 21st Asia and South Pacific Design Automation Conference, 2016

2015
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data.
IEEE Trans. Knowl. Data Eng., 2015

An Efficient Online Monitoring Method for High-Dimensional Data Streams.
Technometrics, 2015

Privacy-Preserving and Efficient Friend Recommendation in Online Social Networks.
Trans. Data Privacy, 2015

Interest-driven private friend recommendation.
Knowl. Inf. Syst., 2015

Energy Optimization of Security-Critical Real-Time Applications with Guaranteed Security Protection.
Journal of Systems Architecture - Embedded Systems Design, 2015

Adaptive security management of real-time storage applications over NAND based storage systems.
J. Network and Computer Applications, 2015

Do Social Media Matter? Initial Empirical Evidence.
J. Information Systems, 2015

Almost periodic solutions for neutral type BAM neural networks with distributed leakage delays on time scales.
Neurocomputing, 2015

Modeling Wireless Sensor Network Based on Non-Volatile Cellular Automata.
IEICE Transactions, 2015

Robust Motion Detection Based on the Enhanced ViBe.
IEICE Transactions, 2015

System Informatics: From Methodology to Applications.
IEEE Intelligent Systems, 2015

A Comparison of Likelihood-Based Spatiotemporal Monitoring Methods Under Non-Homogenous Population Size.
Communications in Statistics - Simulation and Computation, 2015

A generic implementation of replica exchange with solute tempering (REST2) algorithm in NAMD for complex biophysical simulations.
Computer Physics Communications, 2015

Dynamic security management for real-time embedded applications in industrial networks.
Computers & Electrical Engineering, 2015

PBOOST: a GPU-based tool for parallel permutation tests in genome-wide association studies.
Bioinformatics, 2015

Identifying novel associations between small molecules and miRNAs based on integrated molecular networks.
Bioinformatics, 2015

Analytic study on linear neutral fractional differential equations.
Applied Mathematics and Computation, 2015

An efficient algorithm for solving nonlinear Volterra-Fredholm integral equations.
Applied Mathematics and Computation, 2015

Time-Dependent Popular Routes Based Trajectory Outlier Detection.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

HV: A Feature Based Method for Trajectory Dataset Profiling.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

QoS-aware dynamic spectrum resource allocation scheme in C-RAN based dense femtocell networks.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

LENV: A new light-weighted edge network virtualization framework in software-defined wireless networks.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Uplink traffic cellular-first access scheme in cellular/WLAN integrated networks.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Smart: a MapReduce-like framework for in-situ scientific analytics.
Proceedings of the International Conference for High Performance Computing, 2015

Subband approach for wideband self-interference cancellation in full-duplex transceiver.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Integration of articulatory knowledge and voicing features based on DNN/HMM for Mandarin speech recognition.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

Multiscale collaborative speech denoising based on deep stacking network.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

Cross-domain cooperative deep stacking network for speech separation.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Detecting Fault Injection Attacks on Embedded Real-Time Applications: A System-Level Perspective.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Video stitching with spatial-temporal content-preserving warping.
Proceedings of the 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2015

Design and implementation of precise measuring method for the access time of embedded memory.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015

2014
Modeling and Cost Analysis of an Improved Movement-Based Location Update Scheme in Wireless Communication Networks.
Wireless Personal Communications, 2014

Top K Query for QoS-Aware Automatic Service Composition.
IEEE Trans. Services Computing, 2014

Traffic Information Publication with Privacy Preservation.
ACM TIST, 2014

Comments on "Closed-Form Optimal Power Allocation for Weighted Rate Sum Maximization in Gaussian Broadcast Channel".
IEEE Trans. Communications, 2014

The analysis of the simplification from the ideal ratio to binary mask in signal-to-noise ratio sense.
Speech Communication, 2014

Near Infrared Spectroscopy Calibration for Wood Chemistry: Which Chemometric Technique Is Best for Prediction and Interpretation?
Sensors, 2014

A Personalized Recommendation System for NetEase Dating Site.
PVLDB, 2014

Latent topic model for audio retrieval.
Pattern Recognition, 2014

Secure and threshold-based power usage control in smart grid environments.
IJPEDS, 2014

Fast transcoding from H.264 to HEVC based on region feature analysis.
Multimedia Tools Appl., 2014

Study on Identification of Subjective Sentences in Product Reviews Based on Weekly Supervised Topic Model.
JSW, 2014

Property-Based Anonymous Attestation in Trusted Cloud Computing.
J. Electrical and Computer Engineering, 2014

Toward Experiential Mobile Media Processing.
IEEE MultiMedia, 2014

Performance Analysis of MPSK Phase Detectors for Carrier Synchronization PLLs at Low SNRs.
IEEE Communications Letters, 2014

Randomized and Efficient Authentication in Mobile Environments.
IACR Cryptology ePrint Archive, 2014

Multiple graph regularization constrained nonnegative matrix factorization.
Comput. Syst. Sci. Eng., 2014

Generalized scalable multiple copy algorithms for molecular dynamics simulations in NAMD.
Computer Physics Communications, 2014

EpimiR: a database of curated mutual regulation between miRNAs and epigenetic modifications.
Database, 2014

Lattices generated by partial injective maps of finite sets.
Ars Comb., 2014

Lattices associated with partial linear maps of finite vector spaces.
Ars Comb., 2014

Stability criterion for a class of nonlinear fractional differential systems.
Appl. Math. Lett., 2014

A note on the stability criterion for a class of nonlinear fractional differential systems.
Appl. Math. Lett., 2014

Similarity of Private Keyword Search over Encrypted Document Collection.
Advances in Computers, 2014

The Effect of Service Guarantee on Service Qualit of Online Merchants.
Proceedings of the Thirteenth Wuhan International Conference on E-Business, 2014

Rating Aware Route Planning in Road Networks.
Proceedings of the Web-Age Information Management, 2014

Multimodal 3D histogram for moving object detection.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Dual Gaussian mixture model with pixel history for background suppression.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

For User-Driven Software Evolution: Requirements Elicitation Derived from Mining Online Reviews.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

Mobile Photo Album Management with Multiscale Timeline.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

One-Pass Video Stabilization on Mobile Devices.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

Hybrid SVM/HMM architectures for statistical model-based voice activity detection.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

APISynth: a new graph-based API recommender system.
Proceedings of the 36th International Conference on Software Engineering, 2014

Sensor-assisted image deblurring of consumer photos on smartphones.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

Environmental Efficiency Evaluation with Undesirable Outputs-A Study on China's Iron and Steel Industry.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014

Secure k-nearest neighbor query over encrypted data in outsourced environments.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

What, where, and when: keyword search with spatio-temporal ranges.
Proceedings of the 8th Workshop on Geographic Information Retrieval, 2014

Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data.
Proceedings of the Computer Security - ESORICS 2014, 2014

Outsourceable two-party privacy-preserving biometric authentication.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

An Improved Multipitch Tracking Algorithm with Empirical Mode Decomposition.
Proceedings of the Pattern Recognition - 6th Chinese Conference, 2014

A Unified Facial Feature Pointdatabase.
Proceedings of the Biometric Recognition - 9th Chinese Conference, 2014

Energy aware real-time scheduling policy with guaranteed security protection.
Proceedings of the 19th Asia and South Pacific Design Automation Conference, 2014

Analysis of Economic Impact of Online Reviews: An Approach for Market-Driven Requirements Evolution.
Proceedings of the Requirements Engineering, 2014

2013
A Random Beamforming Technique for Omnidirectional Coverage in Multiple-Antenna Systems.
IEEE Trans. Vehicular Technology, 2013

Layered analysis of irregular facades via symmetry maximization.
ACM Trans. Graph., 2013

Incentive Compatible Privacy-Preserving Data Analysis.
IEEE Trans. Knowl. Data Eng., 2013

Feedback vertex sets on restricted bipartite graphs.
Theor. Comput. Sci., 2013

A New Bayesian Method Incorporating With Local Correlation for IBM Estimation.
IEEE Trans. Audio, Speech & Language Processing, 2013

CUSUM Procedures for Health Care Surveillance.
Quality and Reliability Eng. Int., 2013

Inferring Reporting-Related Biases in Hedge Fund Databases from Hedge Fund Equity Holdings.
Management Science, 2013

Measurement-based research on cryptographic algorithms for embedded real-time systems.
Journal of Systems Architecture - Embedded Systems Design, 2013

An Improved PAPR Suppression Algorithm based on Channel Coding in OFDM System.
JNW, 2013

CHARMM-GUI Ligand Binder for Absolute Binding Free Energy Calculations and Its Application.
Journal of Chemical Information and Modeling, 2013

A modified homotopy perturbation method for solving the nonlinear mixed Volterra-Fredholm integral equation.
J. Computational Applied Mathematics, 2013

Reachability and Controllability of Fractional Singular Dynamical Systems with Control Delay.
J. Applied Mathematics, 2013

Controllability Criteria for Linear Fractional Differential Systems with State Delay and Impulses.
J. Applied Mathematics, 2013

Mobile video concept classification.
IJMIR, 2013

Detection of Smell Change of Flue-Cured Tobacco Based on an Electronic Nose.
Intelligent Automation & Soft Computing, 2013

Principal component analysis-based control charts for multivariate nonnormal distributions.
Expert Syst. Appl., 2013

Skeleton-based intrinsic symmetry detection on point clouds.
Graphical Models, 2013

Curve skeleton extraction by coupled graph contraction and surface clustering.
Graphical Models, 2013

Identification and analysis of the regulatory network of Myc and microRNAs from high-throughput experimental data.
Comp. in Bio. and Med., 2013

Walking the interactome to identify human miRNA-disease associations through the functional link between miRNA targets and disease genes.
BMC Systems Biology, 2013

SM2miR: a database of the experimentally validated small molecules' effects on microRNA expression.
Bioinformatics, 2013

Identification of active transcription factor and miRNA regulatory pathways in Alzheimer's disease.
Bioinformatics, 2013

An improved Benders decomposition algorithm for the logistics facility location problem with capacity expansions.
Annals OR, 2013

An efficient Chebyshev-tau method for solving the space fractional diffusion equations.
Applied Mathematics and Computation, 2013

Solving a system of linear Volterra integral equations using the new reproducing kernel method.
Applied Mathematics and Computation, 2013

Energy-aware design of secure multi-mode real-time embedded systems with FPGA co-processors.
Proceedings of the 21st International Conference on Real-Time Networks and Systems, 2013

Online optimization of security-sensitive real-time storage applications for NAND flash memory storage systems.
Proceedings of the 2013 IEEE 19th International Conference on Embedded and Real-Time Computing Systems and Applications, 2013

A Vulnerability Optimization Method for Security-Critical Real-Time Systems.
Proceedings of the IEEE Eighth International Conference on Networking, 2013

Test Cases Generation for Model Transformations from Structural Information.
Proceedings of the First International Workshop on Model-driven Engineering By Example co-located with ACM/IEEE 16th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2013), 2013

A Probabilistic Encryption Based MIN/MAX Computation in Wireless Sensor Networks.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

Design Optimization of Energy- and Security-Critical Distributed Real-Time Embedded Systems.
Proceedings of the 2013 IEEE International Symposium on Parallel & Distributed Processing, 2013

A design of degree distribution for systematic fountain codes.
Proceedings of the 19th IEEE International Conference on Networks, 2013

A random access scheme based on device-to-device communications for machine-type communications.
Proceedings of the 15th IEEE International Conference on Communication Technology, 2013

Optimal power allocation policy over two identical Gilbert-Elliott channels.
Proceedings of IEEE International Conference on Communications, 2013

Argument placement recommendation and relevancy assessment in an intelligent argumentation system.
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

An efficient and probabilistic secure bit-decomposition.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

A Simplified Active Shape Model for Speeding-Up Facial Features Detection.
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013

A dynamical search space harmony search for unconstrained optimization problems.
Proceedings of the 9th Asian Control Conference, 2013

QoS-Based Service Composition under Various QoS Requirements.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

Control-based high-speed direct mask fabrication for lithography via mechanical plowing.
Proceedings of the American Control Conference, 2013

Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Multi-scale partial intrinsic symmetry detection.
ACM Trans. Graph., 2012

t-Plausibility: Generalizing Words to Desensitize Text.
Trans. Data Privacy, 2012

Integrating Binary Mask Estimation With MRF Priors of Cochleagram for Speech Separation.
IEEE Signal Process. Lett., 2012

HYBP_PSSP: a hybrid back propagation method for predicting protein secondary structure.
Neural Computing and Applications, 2012

FMCW Radar Range Performance Improvement With Modified Adaptive Sampling Method.
IEEE Geosci. Remote Sensing Lett., 2012

Chebyshev collocation method for solving singular integral equation with cosecant kernel.
Int. J. Comput. Math., 2012

Influence of Sampling Length and Sampling Interval on calculating the Fractal Dimension of Chaotic attractors.
I. J. Bifurcation and Chaos, 2012

Comparing improvement strategies for inventory inaccuracy in a two-echelon supply chain.
European Journal of Operational Research, 2012

Evaluation of exponentially weighted moving variance control chart subject to linear drifts.
Computational Statistics & Data Analysis, 2012

Impulsive fractional functional differential equations.
Computers & Mathematics with Applications, 2012

Dissection of human MiRNA regulatory influence to subpathway.
Briefings in Bioinformatics, 2012

An approximate solution for a mixed linear Volterra-Fredholm integral equation.
Appl. Math. Lett., 2012

A data mining framework for product and service migration analysis.
Annals OR, 2012

Adaptive synchronization in complex dynamical networks with coupling delays for general graphs.
Applied Mathematics and Computation, 2012

Low-Complexity Spectral Precoding for Rectangularly Pulsed OFDM.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

Design of Real Time Multimedia Platform and Protocol to the Internet of Things.
Proceedings of the 11th IEEE International Conference on Trust, 2012

SAFCM: A Security-Aware Feedback Control Mechanism for Distributed Real-Time Embedded Systems.
Proceedings of the 2012 IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2012

Resource Allocation of Security-Critical Tasks with Statistically Guaranteed Energy Constraint.
Proceedings of the 2012 IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2012

An enhanced random beamforming scheme for signal broadcasting in multi-antenna systems.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

ARCSM: A Distributed Feedback Control Mechanism for Security-critical Real-time System.
Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2012

Distributing Power Grid State Estimation on HPC Clusters - A System Architecture Prototype.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

MATE-CG: A Map Reduce-Like Framework for Accelerating Data-Intensive Computations on Heterogeneous Clusters.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium, 2012

A new noise-tracking algorithm for generalizing binary time-frequency (T-F) masking to ratio masking.
Proceedings of the INTERSPEECH 2012, 2012

Combining frame and segment based models for environmental sound classification.
Proceedings of the INTERSPEECH 2012, 2012

Privacy-Preserving Power Usage Control in the Smart Grid.
Proceedings of the Critical Infrastructure Protection VI, 2012

Large-Scale Longitudinal Analysis of SOAP-Based and RESTful Web Services.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

Continuous Query for QoS-Aware Automatic Service Composition.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

Active Shape Model with random forest for facial features detection.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Very Large-Scale Image Retrieval Based on Local Features.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2012

Research on Cryptographic Algorithms for Embedded Real-time Systems: A Perspective of Measurement-based Analysis.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

Suppressing the out-of-band power radiation in multi-carrier systems: A comparative study.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Online reviews sentiment analysis applying mutual information.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Curve Skeleton Extraction by Graph Contraction.
Proceedings of the Computational Visual Media - First International Conference, 2012

Identification of faction groups and leaders in Web-based intelligent argumentation system for collaborative decision support.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

Feedback Vertex Sets on Tree Convex Bipartite Graphs.
Proceedings of the Combinatorial Optimization and Applications, 2012

Speech Fragment Decoding Techniques Using Silent Pause Detection.
Proceedings of the Pattern Recognition - Chinese Conference, 2012

Monaural Voiced Speech Separation with Multipitch Tracking.
Proceedings of the Pattern Recognition - Chinese Conference, 2012

Latent Topic Model Based on Gaussian-LDA for Audio Retrieval.
Proceedings of the Pattern Recognition - Chinese Conference, 2012

SciMATE: A Novel MapReduce-Like Framework for Multiple Scientific Data Formats.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

Scheduling Concurrent Applications on a Cluster of CPU-GPU Nodes.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

Structural and Message Based Private Friend Recommendation.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

An Adaptive Risk Control and Security Management for Embedded Real-Time System.
Proceedings of the Seventh International Conference on Availability, 2012

Hardware Layer Trusted Channel Model Based on the Trusted Platform Control Module.
Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, Shanghai, China, May 30, 2012

2011
Recent Research and Developments in Temporal and Spatiotemporal Surveillance for Public Health.
IEEE Trans. Reliability, 2011

Coordinate Model for Text Categorization.
Trans. Edutainment, 2011

A LASSO-Based Diagnostic Framework for Multivariate Statistical Process Control.
Technometrics, 2011

Privacy-Preserving Updates to Anonymous and Confidential Databases.
IEEE Trans. Dependable Sec. Comput., 2011

Pattern-Mining for Behavioral Synthesis.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2011

The Application of the Fuzzy Theory in the Design of Intelligent Building Control of Water Tank.
JSW, 2011

QoS-Aware Automatic Service Composition: A Graph View.
J. Comput. Sci. Technol., 2011

A Cluster-Based Context-Tree Model for Multivariate Data Streams with Applications to Anomaly Detection.
INFORMS Journal on Computing, 2011

A Threshold Signature Scheme Based on TPM.
IJCNS, 2011

A Study on Conjugate Quadrature Filters.
EURASIP J. Adv. Sig. Proc., 2011

Monaural voiced speech segregation based on elaborate harmonic grouping strategies.
SCIENCE CHINA Information Sciences, 2011

Positive solutions for boundary value problem of nonlinear fractional functional differential equations.
Applied Mathematics and Computation, 2011

Piecewise homotopy perturbation method for solving linear and nonlinear weakly singular VIE of second kind.
Applied Mathematics and Computation, 2011

The exact solution of a class of Volterra integral equation with weakly singular kernel.
Applied Mathematics and Computation, 2011

A Random Beamforming Technique for Broadcast Channels in Multiple Antenna Systems.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011

A Secure and Distributed Framework to Identify and Share Needed Information.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

An offer evaluation system based on buyers' interests.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Tongue verification with manifold learning.
Proceedings of the Seventh International Conference on Natural Computation, 2011

Effects of Air Flow Disturbance of Spool Valve on Vibration Control of Active Pneumatic Vibration Isolation System.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

Design Convenience Stores for Chinese Teenagers.
Proceedings of the Internationalization, Design and Global Development, 2011

Energy Measurement and Analysis of Security Algorithms for Embedded Systems.
Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications (GreenCom), 2011

N-Gram Based Secure Similar Document Detection.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

k-out-of-n oblivious transfer based on homomorphic encryption and solvability of linear equations.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Tractable Feedback Vertex Sets in Restricted Bipartite Graphs.
Proceedings of the Combinatorial Optimization and Applications, 2011

Ex-MATE: Data Intensive Computing with Large Reduction Objects and Its Application to Graph Mining.
Proceedings of the 11th IEEE/ACM International Symposium on Cluster, 2011

Modeling spectral smoothness principle for monaural voiced speech separation.
Proceedings of the First Asian Conference on Pattern Recognition, 2011

Two Hardness Results on Feedback Vertex Sets.
Proceedings of the Frontiers in Algorithmics and Algorithmic Aspects in Information and Management, 2011

NestCloud: Towards practical nested virtualization.
Proceedings of the 2011 International Conference on Cloud and Service Computing, 2011

2010
The Completeness Problem of Ordered Relational Databases.
PhD thesis, 2010

Efficient privacy-preserving similar document detection.
VLDB J., 2010

Active Current Sharing and Source Management in Fuel Cell-Battery Hybrid Power System.
IEEE Trans. Industrial Electronics, 2010

Sketch-Based 3D Face Modeling for Virtual Character.
Trans. Edutainment, 2010

A dynamic collision model for improved over-range protection of cantilever-mass micromechanical accelerometers.
Microelectronics Journal, 2010

Panoramic 3D Reconstruction Using Stereo Multi-Perspective Panorama.
IJPRAI, 2010

Solving nonlinear singular pseudoparabolic equations with nonlocal mixed conditions in the reproducing kernel space.
Int. J. Comput. Math., 2010

Approximate solution of the fractional advection-dispersion equation.
Computer Physics Communications, 2010

A thick-restarted block Arnoldi algorithm with modified Ritz vectors for large eigenproblems.
Computers & Mathematics with Applications, 2010

A generalized Conforming Run Length control chart for monitoring the mean of a variable.
Computers & Industrial Engineering, 2010

Adjusted support vector machines based on a new loss function.
Annals OR, 2010

A framework of irregularity enlightenment for data pre-processing in data mining.
Annals OR, 2010

Two-phase graph search algorithm for QoS-aware automatic service composition.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2010

Non-rigid Registration in 3D Implicit Vector Space.
Proceedings of the SMI 2010, 2010

Supporting fault tolerance in a data-intensive computing middleware.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

Improving prosodic phrase prediction by unsupervised adaptation and syntactic features extraction.
Proceedings of the INTERSPEECH 2010, 2010

QSynth: A Tool for QoS-aware Automatic Service Composition.
Proceedings of the IEEE International Conference on Web Services, 2010

An economic early warning approach based on Bayesian Networks mechanism?
Proceedings of the Sixth International Conference on Natural Computation, 2010

Modelling and control of hybrid vibration isolation system for high-precision equipment.
Proceedings of the 8th IEEE International Conference on Control and Automation, 2010

Accelerating Monte Carlo based SSTA using FPGA.
Proceedings of the ACM/SIGDA 18th International Symposium on Field Programmable Gate Arrays, 2010

Periodic Real-Time Message Scheduling for Confidentiality-Aware Cyber-Physical System in Wireless Networks.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

A generalized control-flow-aware pattern recognition algorithm for behavioral synthesis.
Proceedings of the Design, Automation and Test in Europe, 2010

Privacy-Preserving Location Publishing under Road-Network Constraints.
Proceedings of the Database Systems for Advanced Applications, 2010

A Map-Reduce System with an Alternate API for Multi-core Environments.
Proceedings of the 10th IEEE/ACM International Conference on Cluster, 2010

2009
Convolutional Multiplexing for Multicarrier Transmission: System Performance and Code Design.
Wireless Personal Communications, 2009

Iterative Single-Antenna Interference Cancellation: Algorithms and Results.
IEEE Trans. Vehicular Technology, 2009

Synthesis Algorithm for Application-Specific Homogeneous Processor Networks.
IEEE Trans. VLSI Syst., 2009

Efficient Edge Detection Using Simplified Gabor Wavelets.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2009

Special issue devoted to papers presented at the second INFORMS workshop on artificial intelligence and data mining, Seattle, November 3, 2007.
Information Technology and Management, 2009

Special issue devoted to papers presented at the second INFORMS workshop on artificial intelligence and data mining, Seattle, November 3, 2007.
Information Technology and Management, 2009

Formal anonymity models for efficient privacy-preserving joins.
Data Knowl. Eng., 2009

Parallelization and optimization of electrostatic Particle-in-Cell/Monte-Carlo Coupled codes as applied to RF discharges.
Computer Physics Communications, 2009

Principle of designing slope compensation in PFC Boost converter.
Science in China Series F: Information Sciences, 2009

Constructive proof for existence of nonlinear two-point boundary value problems.
Applied Mathematics and Computation, 2009

Effective Pruning Algorithm for QoS-Aware Service Composition.
Proceedings of the 2009 IEEE Conference on Commerce and Enterprise Computing, 2009

Analysis and design of the early-warning satellite scheduling simulation system.
Proceedings of the IEEE International Conference on Virtual Environments, 2009

An Artificial Immune Network approach for Pinyin-to-character conversion.
Proceedings of the IEEE International Conference on Virtual Environments, 2009

Compatibility Checking of Heterogeneous Web Service Policies Using VDM++.
Proceedings of the 2009 IEEE Congress on Services, Part I, 2009

Fairness and Interactivity of Three CPU Schedulers in Linux.
Proceedings of the 15th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2009

Location sensitive indexing for image-based advertising.
Proceedings of the 17th International Conference on Multimedia 2009, 2009

Optimal Network Security Strengthening Using Attack-Defense Game Model.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Designing Variation-tolerance in Mixed-signal Components of a System-on-chip.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

Kalman Filtering Design Based on Real-Time Updating of Noise Matrix.
Proceedings of the International Joint Conferences on Bioinformatics, 2009

CFS Optimizations to KVM Threads on Multi-Core Environment.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Applying the Word Acquiring Algorithm to the Pinyin-to-Character Conversion.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Visiads: A vision-based advertising platform for camera phones.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

An online advertisement platform based on image content bidding.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Automatic memory partitioning and scheduling for throughput and power optimization.
Proceedings of the 2009 International Conference on Computer-Aided Design, 2009

Monitoring and Forecast Method of Mine External Fire.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

Efficiency of Winnow Protocol in Secret Key Reconciliation.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

An Implementation of Post-Processing Software in Quantum Key Distribution.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

t-Plausibility: Semantic Preserving Text Sanitization.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Comparing map-reduce and FREERIDE for data-intensive applications.
Proceedings of the 2009 IEEE International Conference on Cluster Computing, August 31, 2009

Disparity Estimation in a Layered Image for Reflection Stereo.
Proceedings of the Computer Vision, 2009

Single-Camera Multi-baseline Stereo Using Fish-Eye Lens and Mirrors.
Proceedings of the Computer Vision, 2009

Predicting the Impact of Climate Change on U.S. Power Grids and Its Wider Implications on National Security.
Proceedings of the Technosocial Predictive Analytics, 2009

2008
A Survey of Quantification of Privacy Preserving Data Mining Algorithms.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008

A Cryptographic Approach to Securely Share and Query Genomic Sequences.
IEEE Trans. Information Technology in Biomedicine, 2008

PinKDD'08: privacy, security, and trust in KDD post workshop report.
SIGKDD Explorations, 2008

An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems.
Manufacturing & Service Operations Management, 2008

Transforming semi-honest protocols to ensure accountability.
Data Knowl. Eng., 2008

Optimization designs of the combined Shewhart-CUSUM control charts.
Computational Statistics & Data Analysis, 2008

Adaptive CUSUM procedures with Markovian mean estimation.
Computational Statistics & Data Analysis, 2008

Constructing disease-specific gene networks using pair-wise relevance metric: Application to colon cancer identifies interleukin 8, desmin and enolase 1 as the central elements.
BMC Systems Biology, 2008

The exact solution and stability analysis for integral equation of third or first kind with singular kernel.
Applied Mathematics and Computation, 2008

IBM Research TRECVID-2008 Video Retrieval System.
Proceedings of the TRECVID 2008 workshop participants notebook papers, 2008

ASCSS: An Automatic Service Composition Approach Based on Service Similarity.
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008

A Privacy-Preserving Framework for Integrating Person-Specific Databases.
Proceedings of the Privacy in Statistical Databases, 2008

Built-in Self-Calibration of On-chip DAC and ADC.
Proceedings of the 2008 IEEE International Test Conference, 2008

Energy-Saving Service Scheduling for Low-End Cyber-Physical Systems.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Compression Framework for Personal Image Used in Mobile RFID System.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Information Reconciliation Protocol in Quantum Key Distribution System.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Research on Methodology of Classification Mining for Tumor Markers.
Proceedings of the Workshops Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

Privately Updating Suppression and Generalization based k-Anonymous Databases.
Proceedings of the 24th International Conference on Data Engineering, 2008

Similar Document Detection with Limited Information Disclosure.
Proceedings of the 24th International Conference on Data Engineering, 2008

Analysis of Overlapped Code Division Multiple Access System in Gaussian Multiple Access Channel.
Proceedings of IEEE International Conference on Communications, 2008

Pattern-based behavior synthesis for FPGA resource reduction.
Proceedings of the ACM/SIGDA 16th International Symposium on Field Programmable Gate Arrays, 2008

Guidelines to Determine Quality for Web-Based Software Applications.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008

Scheduling with integer time budgeting for low-power optimization.
Proceedings of the 13th Asia South Pacific Design Automation Conference, 2008

2007
Design of spreading codes with high diversity gain for multicarrier CDMA systems.
Wireless Communications and Mobile Computing, 2007

Block-Based Neural Networks for Personalized ECG Signal Classification.
IEEE Trans. Neural Networks, 2007

Omnidirectional 3D reconstruction using rotating camera with mirrors.
Systems and Computers in Japan, 2007

Universality and semicomputability for nondeterministic programming languages over abstract algebras.
J. Log. Algebr. Program., 2007

Linguistic Decision Analysis Based Technology Project Assessment.
JDIM, 2007

A hybrid data mining anomaly detection technique in ad hoc networks.
IJWMC, 2007

An Improved Population Based Optimization Solution Method by Combining Local and Global Searching.
International Journal on Artificial Intelligence Tools, 2007

A One-Sided EWMA Control Chart for Monitoring Process Means.
Communications in Statistics - Simulation and Computation, 2007

Convolutional Multiplexing for Multicarrier Systems.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Protecting source privacy in federated search.
Proceedings of the SIGIR 2007: Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2007

Procuring Requirements for ERP Software Based on Semantic Similarity.
Proceedings of the First IEEE International Conference on Semantic Computing (ICSC 2007), 2007

AC-Framework for Privacy-Preserving Collaboration.
Proceedings of the Seventh SIAM International Conference on Data Mining, 2007

Research of Sludge Compost Maturity Degree Modeling Method Based on Wavelet Neural Network for Sewage Treatment.
Proceedings of the Bio-Inspired Computational Intelligence and Applications, 2007

A Spam Filter approach with the Improved Machine Learning Technology.
Proceedings of the Third International Conference on Natural Computation, 2007

An Enhanced Text Analysis Approach in Text-to-Speech Synthesis for Mandarin Chinese.
Proceedings of the Third International Conference on Natural Computation, 2007

A Rate-distortion Based Quantization Level Adjustment Algorithm in Block-based Video Compression.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Rate-distortion Optimized Trellis-Coded Quantization.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Secure Content Validation.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Convolutional Multi-Code Multiplexing for OFDM Systems.
Proceedings of IEEE International Conference on Communications, 2007

A Data Classifier Based on TOPSIS Method.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Skin Detection Using Color, Texture and Space Information.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Synthesis of an application-specific soft multiprocessor system.
Proceedings of the ACM/SIGDA 15th International Symposium on Field Programmable Gate Arrays, 2007

Identifying Rare Classes with Sparse Training Data.
Proceedings of the Database and Expert Systems Applications, 18th International Conference, 2007

A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

A Sketch-Based Cooperative Diagramming Tool for Conceptual Design.
Proceedings of the 10th International Conference on Computer-Aided Design and Computer Graphics, 2007

2006
A secure distributed framework for achieving k-anonymity.
VLDB J., 2006

On improved confidence bounds for system reliability.
IEEE Trans. Reliability, 2006

Confidence bounds for the reliability of binary capacitated two-terminal networks.
Rel. Eng. & Sys. Safety, 2006

A Comparative Study of Joint Monitoring Schemes for APC Processes.
Quality and Reliability Eng. Int., 2006

A Pragmatic Chinese Word Segmentation Approach Based on Mixing Models.
IJCLCLP, 2006

Discovery of time-delayed gene regulatory networks based on temporal gene expression profiling.
BMC Bioinformatics, 2006

Platform-Based Behavior-Level and System-Level Synthesis.
Proceedings of the 2006 IEEE International SOC Conference, Austin, Texas, USA, 2006

A Gesture Model and Its Applications in Risk Assessment for Misrecognition.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2006

Panoramic 3D Reconstruction by Fusing Color Intensity and Laser Range Data.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2006

Palmprint Recognition Based on Improved 2DPCA.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006

An Improved Unknown Word Recognition Model based on Multi-Knowledge Source Method.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Continuous Heartbeat Monitoring Using Evolvable Block-based Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2006

The Production Algorithm of Pseudo-Random Number Generator Based on Compound Non-Linear Chaos System.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Semi-Supervised Image Classification in Likelihood Space.
Proceedings of the International Conference on Image Processing, 2006

Palmprint Recognition Based on 2-Dimension PCA.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Prediction of Equipment Maintenance Using Optimized Support Vector Machine.
Proceedings of the Computational Intelligence, 2006

Association Research on Potassium Channel Subtypes and Functional Sites.
Proceedings of the Computational Intelligence and Bioinformatics, 2006

Analysis of Sib-Pair IBD Profiles Using Ensemble Decision Tree Approach: Application to Alcoholism.
Proceedings of the Computational Intelligence and Bioinformatics, 2006

Conditional Random Fields Based Label Sequence and Information Feedback.
Proceedings of the Computational Intelligence, 2006

Transforming Semi-Honest Protocols to Ensure Accountability.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

Secure Distributed k-Anonymous Pattern Mining.
Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

Platform-based resource binding using a distributed register-file microarchitecture.
Proceedings of the 2006 International Conference on Computer-Aided Design, 2006

A Tracking Algorithm in RFID Reader Network.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2006

Behavior and communication co-optimization for systems with sequential communication media.
Proceedings of the 43rd Design Automation Conference, 2006

Panoramic 3D Reconstruction Using Rotational Stereo Camera with Simple Epipolar Constraints.
Proceedings of the 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2006), 2006

COSINE: A Sketch-Based Interactive Environment for Cooperative Design.
Proceedings of the 10th International Conference on CSCW in Design, 2006

A Framework for Sketch-Based Cooperative Design.
Proceedings of the Computer Supported Cooperative Work in Design III, 2006

Robust Adjusted Likelihood Function for Image Analysis.
Proceedings of the 35th Applied Image Pattern Recognition Workshop (AIPR 2006), 2006

A Pragmatic Chinese Word Segmentation System.
Proceedings of the Fifth Workshop on Chinese Language Processing, 2006

2005
Adaptive Online Multi-stroke Sketch Recognition Based on Hidden Markov Model.
Proceedings of the Advances in Machine Learning and Cybernetics, 2005

Knowledge Discovery from Transportation Network Data.
Proceedings of the 21st International Conference on Data Engineering, 2005

A Novel Ensemble Decision Tree Approach for Mining Genes Coding Ion Channels for Cardiopathy Subtype.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

Large-Scale Ensemble Decision Analysis of Sib-Pair IBD Profiles for Identification of the Relevant Molecular Signatures for Alcoholism.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

Privacy-Preserving Distributed k-Anonymity.
Proceedings of the Data and Applications Security XIX, 2005

Mapping Low-Level Features to High-Level Semantic Concepts in Region-Based Image Retrieval.
Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005), 2005

Chinese Word Segmentation based on Mixing Model.
Proceedings of the Fourth SIGHAN Workshop on Chinese Language Processing, 2005

E-procurement and market evolution: an evolutionary game approach.
Proceedings of the 7th International Conference on Electronic Commerce, 2005

2004
Multiuser detection algorithm based on belief propagation in multiple-input multiple-output systems.
Science in China Series F: Information Sciences, 2004

On-line outlier detection and data cleaning.
Computers & Chemical Engineering, 2004

Reverse Engineering of Multiple Time-delayed Gene Regulatory Networks.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004

Feature Gene Selection Based on a Hybrid between Genetic Algorithm and Support Vector Machine.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004

Relevance feedback using random subspace method.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

Online feature selection based on generalized feature contrast model.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

2003
The Mahalanobis-Taguchi Strategy.
Technometrics, 2003

2002
Proportional Integral Derivative Charts for Process Monitoring.
Technometrics, 2002

2000
A New SPC Monitoring Method: The ARMA Chart.
Technometrics, 2000


  Loading...