Yan Chen

According to our database1, Yan Chen
  • authored at least 735 papers between 1984 and 2017.
  • has a "Dijkstra number"2 of three.

Awards

IEEE Fellow

IEEE Fellow 2017, "For contributions to design, measurement, and security of networking systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Results on Energy- and Spectral-Efficiency Tradeoff in Cellular Networks With Full-Duplex Enabled Base Stations.
IEEE Trans. Wireless Communications, 2017

Performance Analysis for Two-Way Network-Coded Dual-Relay Networks With Stochastic Energy Harvesting.
IEEE Trans. Wireless Communications, 2017

Energy-Efficient Noncooperative Power Control in Small-Cell Networks.
IEEE Trans. Vehicular Technology, 2017

Data Trading With Multiple Owners, Collectors, and Users: An Iterative Auction Mechanism.
IEEE Trans. Signal and Information Processing over Networks, 2017

Understanding Popularity Dynamics: Decision-Making With Long-Term Incentives.
IEEE Trans. Signal and Information Processing over Networks, 2017

Hidden Chinese Restaurant Game: Grand Information Extraction for Stochastic Network Learning.
IEEE Trans. Signal and Information Processing over Networks, 2017

RuleScope: Inspecting Forwarding Faults for Software-Defined Networking.
IEEE/ACM Trans. Netw., 2017

Radio Biometrics: Human Recognition Through a Wall.
IEEE Trans. Information Forensics and Security, 2017

Full-Duplex Delay Diversity Relay Transmission Using Bit-Interleaved Coded OFDM.
IEEE Trans. Communications, 2017

Modulated Excitation Imaging System for Intravascular Ultrasound.
IEEE Trans. Biomed. Engineering, 2017

Restricted gene expression programming: a new approach for parameter identification inverse problems of partial differential equation.
Soft Comput., 2017

Improving Super-Resolution Mapping by Combining Multiple Realizations Obtained Using the Indicator-Geostatistics Based Method.
Remote Sensing, 2017

Memory-adaptive high utility sequential pattern mining over data streams.
Machine Learning, 2017

Extraction of the Pavement Permittivity and Thickness From Measured Ground-Coupled GPR Data Using a Ground-Wave Technique.
IEEE Geosci. Remote Sensing Lett., 2017

PoC of SCMA-Based Uplink Grant-Free Transmission in UCNC for 5G.
IEEE Journal on Selected Areas in Communications, 2017

Spectral Efficiency Improvement With 5G Technologies: Results From Field Tests.
IEEE Journal on Selected Areas in Communications, 2017

Introduction on IMT-2020 5G Trials in China.
IEEE Journal on Selected Areas in Communications, 2017

New model and heuristic solution approach for one-dimensional cutting stock problem with usable leftovers.
JORS, 2017

TRIEDS: Wireless Events Detection Through the Wall.
IEEE Internet of Things Journal, 2017

Achieving Centimeter-Accuracy Indoor Localization on WiFi Platforms: A Multi-Antenna Approach.
IEEE Internet of Things Journal, 2017

Achieving Centimeter-Accuracy Indoor Localization on WiFi Platforms: A Frequency Hopping Approach.
IEEE Internet of Things Journal, 2017

Design and Implementation of Wireless Sensor Cellular Network Based on Android Platform.
iJOE, 2017

Variable penalty factors: a new GEP automatic clustering algorithm.
IJCSE, 2017

Introduction to the Special Issue of Games and Economic Behavior in honor of John O. Ledyard.
Games and Economic Behavior, 2017

Does team competition increase pro-social lending? Evidence from online microfinance.
Games and Economic Behavior, 2017

How can a sparse representation be made applicable for very low-dimensional data?
Expert Syst. Appl., 2017

Low Complexity Receiver for Uplink SCMA System via Expectation Propagation.
CoRR, 2017

A Parallel Simulator for Massive Reservoir Models Utilizing Distributed-Memory Parallel Systems.
CoRR, 2017

Continuous use of ERP-based BCIs with different visual angles in ALS patients.
CoRR, 2017

Energy Efficient Non-Cooperative Power Control in Small Cell Networks.
CoRR, 2017

DroidNative: Automating and optimizing detection of Android native code malware variants.
Computers & Security, 2017

Full-Duplex Cellular Networks.
IEEE Communications Magazine, 2017

Memetic algorithm based on sequential variable neighborhood descent for the minmax multiple traveling salesman problem.
Computers & Industrial Engineering, 2017

Auditing National Cancer Institute thesaurus neoplasm concepts in groups of high error concentration.
Applied Ontology, 2017

Low Complexity Receiver for Uplink SCMA System via Expectation Propagation.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Contrast Pattern Based Collaborative Behavior Recommendation for Life Improvement.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2017

Research on Automatic Identification of Rumors in Stock Forum Based on Machine Learning.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

The Antecedents and Consequences of Crowdfunding Investors' Citizenship Behaviors - an Empirical Research on Motivations and Stickiness.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Rich Interaction and Feedback Supported Mammographic Training: A Trial of an Augmented Reality Approach.
Proceedings of the Medical Image Understanding and Analysis - 21st Annual Conference, 2017

A distributed IBFD MAC mechanism and non-saturation throughput analysis for wireless networks.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

An indirect reciprocity based incentive framework for cooperative spectrum sensing.
Proceedings of the IEEE International Conference on Communications, 2017

A robust precoding for RF mismatched massive MIMO transmission.
Proceedings of the IEEE International Conference on Communications, 2017

Time reversal based wireless events detection.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

An iterative auction mechanism for data trading.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

The Impact of International Inter-City Investment on Enterprises Performance: Pluralistic Interpretation of Geographical Death.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Exploring Coordination Models for Ad Hoc Programming Teams.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Codeon: On-Demand Software Development Assistance.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Vehicle safety enhancement through a novel active yaw stabilizer.
Proceedings of the 2017 American Control Conference, 2017

Towards a framework for selection of supervisory control for commercial buildings: HVAC system energy efficiency.
Proceedings of the 2017 American Control Conference, 2017

Estimation and analysis of vehicle lateral stability region.
Proceedings of the 2017 American Control Conference, 2017

AliMe Chat: A Sequence to Sequence and Rerank based Chatbot Engine.
Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, 2017

2016
Wireless Network Association Game With Data-Driven Statistical Modeling.
IEEE Trans. Wireless Communications, 2016

Combating Strong-Weak Spatial-Temporal Resonances in Time-Reversal Uplinks.
IEEE Trans. Wireless Communications, 2016

Time-Reversal Tunneling Effects for Cloud Radio Access Network.
IEEE Trans. Wireless Communications, 2016

Stable Throughput Region and Admission Control for Device-to-Device Cellular Coexisting Networks.
IEEE Trans. Wireless Communications, 2016

Power Waveforming: Wireless Power Transfer Beyond Time Reversal.
IEEE Trans. Signal Processing, 2016

Evolutionary Information Diffusion Over Heterogeneous Social Networks.
IEEE Trans. Signal and Information Processing over Networks, 2016

Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates.
IEEE/ACM Trans. Netw., 2016

Reexamining DNS From a Global Recursive Resolver Perspective.
IEEE/ACM Trans. Netw., 2016

Information Theoretical Limit of Media Forensics: The Forensicability.
IEEE Trans. Information Forensics and Security, 2016

Detectability of the Order of Operations: An Information Theoretic Approach.
IEEE Trans. Information Forensics and Security, 2016

On Outage Probability for Two-Way Relay Networks With Stochastic Energy Harvesting.
IEEE Trans. Communications, 2016

Time-Reversal Massive Multipath Effect: A Single-Antenna "Massive MIMO" Solution.
IEEE Trans. Communications, 2016

Why Time Reversal for Future 5G Wireless? [Perspectives].
IEEE Signal Process. Mag., 2016

Decision Learning: Data analytic learning with strategic decision making.
IEEE Signal Process. Mag., 2016

Indoor Global Positioning System with Centimeter Accuracy Using Wi-Fi [Applications Corner].
IEEE Signal Process. Mag., 2016

Sequential value correction heuristic for the two-dimensional cutting stock problem with three-staged homogenous patterns.
Optimization Methods and Software, 2016

An adjustable multigranulation fuzzy rough set.
Int. J. Machine Learning & Cybernetics, 2016

Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China.
MIS Quarterly, 2016

Improved SNR Optimum Method in POLDINSAR Coherence Optimization.
IEEE Geosci. Remote Sensing Lett., 2016

Influence of Row Wheat on Radar Backscatter for Azimuthal Look Angles at L-, S-, C-, and X-Bands.
IEEE Geosci. Remote Sensing Lett., 2016

Network in network based weakly supervised learning for visual tracking.
J. Visual Communication and Image Representation, 2016

A data analytic approach to quantifying scientific impact.
J. Informetrics, 2016

Recovering uncaptured citations in a scholarly network: A two-step citation analysis to estimate publication importance.
JASIST, 2016

Generating Trading Rules for Stock Markets Using Robust Genetic Network Programming and Portfolio Beta.
JACIII, 2016

Enabling Heterogeneous Connectivity in Internet of Things: A Time-Reversal Approach.
IEEE Internet of Things Journal, 2016

Behavior Recognition Algorithm of Mobile Phone Users Based on Sensor Networks.
iJOE, 2016

Location Optimization Using a Hierarchical Location-Allocation Model for Trauma Centers in Shenzhen, China.
ISPRS Int. J. Geo-Information, 2016

Hybrid MIC/CPU Parallel Implementation of MoM on MIC Cluster for Electromagnetic Problems.
IEICE Transactions, 2016

A test sample oriented two-phase discriminative dictionary learning algorithm for face recognition.
Intell. Data Anal., 2016

Grant-Free Rateless Multiple Access: A Novel Massive Access Scheme for Internet of Things.
IEEE Communications Letters, 2016

Sample pair based sparse representation classification for face recognition.
Expert Syst. Appl., 2016

Fatiguing Effects on the Multi-Scale Entropy of Surface Electromyography in Children with Cerebral Palsy.
Entropy, 2016

A Low Complexity Detection Algorithm for SCMA.
CoRR, 2016

Energy- and Spectral-Efficiency Tradeoff in Full-Duplex Communications.
CoRR, 2016

The Learning and Prediction of Application-level Traffic Data in Cellular Networks.
CoRR, 2016

Full-Duplex Cellular Networks: It Works!
CoRR, 2016

DroidNative: Semantic-Based Detection of Android Native Code Malware.
CoRR, 2016

Grant-free Rateless Multiple Access: A Novel Massive Access Scheme for Internet of Things.
CoRR, 2016

Advances in Energy Harvesting Communications: Past, Present, and Future Challenges.
IEEE Communications Surveys and Tutorials, 2016

A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining.
IEEE Computer, 2016

Simplification of leaf surfaces from scanned data: Effects of two algorithms on leaf morphology.
Computers and Electronics in Agriculture, 2016

Mentoring female assistant professors enhances their success.
Commun. ACM, 2016

Approximate Parallel High Utility Itemset Mining.
Big Data Research, 2016

CNNTracker: Online discriminative object tracking via deep convolutional neural network.
Appl. Soft Comput., 2016

Study of connectivity probability based on cluster in vehicular Ad Hoc networks.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

Unsupervised Expert Finding in Social Network for Personalized Recommendation.
Proceedings of the Web-Age Information Management - 17th International Conference, 2016

Study of Connectivity Probability of Vehicle-to-Vehicle and Vehicle-to-Infrastructure Communication Systems.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

SCMA: A Promising Non-Orthogonal Multiple Access Technology for 5G Networks.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Exploring Privacy-Accuracy Tradeoffs using DPComp.
Proceedings of the 2016 International Conference on Management of Data, 2016

Principled Evaluation of Differentially Private Algorithms using DPBench.
Proceedings of the 2016 International Conference on Management of Data, 2016

AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management.
Proceedings of the Security and Privacy in Communication Networks, 2016

Binary power control for full-duplex networks.
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016

The effect of Rumor Clarification on Chinese Stock Markets.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016

Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.
Proceedings of the 23nd Annual Network and Distributed System Security Symposium, 2016

Preface.
Proceedings of the 20th Conference on Medical Image Understanding and Analysis, 2016

Eye Tracking Method Compatible with Dual-screen Mammography Workstation.
Proceedings of the 20th Conference on Medical Image Understanding and Analysis, 2016

The International Use of PERFORMS Mammographic Test Sets.
Proceedings of the Breast Imaging, 2016

Phishing susceptibility: The good, the bad, and the ugly.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Is every flow on the right track?: Inspect SDN forwarding with RuleScope.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Feature extraction and classification of ocean oil spill based on SAR image.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Inversion model for the semi-flooded area based on radar backscatter measurements.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Road detection in high-resolution SAR images using Duda and path operators.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

An improved DINSAR method for monitoring the inclination displacement of the power transmission towers using Radarsat-2 spotlight mode images.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Estimation of ground deformation in mountain areas with improved SAR interferometry.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Analysis of the interaction between electromagnetic wave and cereal parameters at row and column directions.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Business Process Reengineering of Road Passenger Transport Based on Unified Modeling Language Method.
Proceedings of the Internet and Distributed Computing Systems, 2016

Urban Traffic Congestion Based on System Dynamics: Taking Wuhan City as an Example.
Proceedings of the Internet and Distributed Computing Systems, 2016

The Performance Appraisal of Port Logistics Informationization.
Proceedings of the Internet and Distributed Computing Systems, 2016

Analysis of customers' electricity consumption behavior based on massive data.
Proceedings of the 12th International Conference on Natural Computation, 2016

Differentially Private Regression Diagnostics.
Proceedings of the IEEE 16th International Conference on Data Mining, 2016

RuleTris: Minimizing Rule Update Latency for TCAM-Based SDN Switches.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Joint codebook assignment and power allocation for SCMA based on capacity with Gaussian input.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

An information theoretic framework for order of operations forensics.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

High accuracy indoor localization: A WiFi-based approach.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Community detection game.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

An Interface Analysis Method of Complex Information System by Introducing Error Factors.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2016

Energy- and Spectral- Efficiency Tradeoff in Full-Duplex Communications.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

Realizing Massive MIMO Effect Using a Single Antenna: A Time-Reversal Approach.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Interference Alleviation for Time-Reversal Cloud Radio Access Network.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Radio shot: Through-the-wall human recognition.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

Time-reversal indoor positioning with centimeter accuracy using multi-antenna WiFi.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

Multi-person breathing rate estimation using time-reversal on WiFi platforms.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

A game-theoretic modeling of popularity dynamics.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

An audiovisual BCI system for assisting clinical communication assessment in patients with disorders of consciousness: A case study.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

SDNShield: Reconciliating Configurable Application Permissions for SDN App Markets.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Modeling User Mobility via User Psychological and Geographical Behaviors Towards Point of-Interest Recommendation.
Proceedings of the Database Systems for Advanced Applications, 2016

Analysis of Stroke Intersection for Overlapping PGF Elements.
Proceedings of the 12th IAPR Workshop on Document Analysis Systems, 2016

HogMap: Using SDNs to Incentivize Collaborative Security Monitoring.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016

Towards Providing On-Demand Expert Support for Software Developers.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Dynamic Fitness Landscape Analysis on Differential Evolution Algorithm.
Proceedings of the Bio-inspired Computing - Theories and Applications, 2016

The Research of Solving Inverse Problems of Complex Differential Equations.
Proceedings of the Bio-inspired Computing - Theories and Applications, 2016

A method of removing Ocular Artifacts from EEG using Discrete Wavelet Transform and Kalman Filtering.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

Indoor GPS with centimeter accuracy using WiFi.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2016

Topological-Pattern-Based Recommendation of UMLS Concepts for National Cancer Institute Thesaurus.
Proceedings of the AMIA 2016, 2016

2015
Exploiting social circle broadness for influential spreaders identification in social networks.
World Wide Web, 2015

Pricing Game for Time Mute in Femto-Macro Coexistent Networks.
IEEE Trans. Wireless Communications, 2015

Scalable Video Multicasting: A Stochastic Game Approach With Optimal Pricing.
IEEE Trans. Wireless Communications, 2015

Cognitive Radio Networks With Heterogeneous Users: How to Procure and Price the Spectrum?
IEEE Trans. Wireless Communications, 2015

A Time-Reversal Paradigm for Indoor Positioning System.
IEEE Trans. Vehicular Technology, 2015

Indian Buffet Game With Negative Network Externality and Non-Bayesian Social Learning.
IEEE Trans. Systems, Man, and Cybernetics: Systems, 2015

Understanding Sequential User Behavior in Social Computing: To Answer or to Vote?
IEEE Trans. Network Science and Engineering, 2015

On Antiforensic Concealability With Rate-Distortion Tradeoff.
IEEE Trans. Image Processing, 2015

Intelligent Fashion Recommender System: Fuzzy Logic in Personalized Garment Design.
IEEE Trans. Human-Machine Systems, 2015

On Cost-Effective Incentive Mechanisms in Microtask Crowdsourcing.
IEEE Trans. Comput. Intellig. and AI in Games, 2015

On Outage Probability for Stochastic Energy Harvesting Communications in Fading Channels.
IEEE Signal Process. Lett., 2015

Maximizing Network Capacity with Optimal Source Selection: A Network Science Perspective.
IEEE Signal Process. Lett., 2015

3D object tracking via image sets and depth-based occlusion detection.
Signal Processing, 2015

A Reliable and Simple Method for Fabricating a Poly(Dimethylsiloxane) Electrospray Ionization Chip with a Corner-Integrated Emitter.
Sensors, 2015

Scientometric analysis of phosphorus research in eutrophic lakes.
Scientometrics, 2015

A Semi-Analytical Model for Remote Sensing Retrieval of Suspended Sediment Concentration in the Gulf of Bohai, China.
Remote Sensing, 2015

Three-Dimensional Electro-Sonic Flow Focusing Ionization Microfluidic Chip for Mass Spectrometry.
Micromachines, 2015

Vessel extraction from non-fluorescein fundus images using orientation-aware detector.
Medical Image Analysis, 2015

New Methods in Multibaseline Polarimetric SAR Interferometry Coherence Optimization.
IEEE Geosci. Remote Sensing Lett., 2015

Pose-invariant face recognition using facial landmarks and Weber local descriptor.
Knowl.-Based Syst., 2015

Privacy or Utility in Data Collection? A Contract Theoretic Approach.
J. Sel. Topics Signal Processing, 2015

On Energy Harvesting Gain and Diversity Analysis in Cooperative Communications.
IEEE Journal on Selected Areas in Communications, 2015

Data-Driven Stochastic Models and Policies for Energy Harvesting Sensor Communications.
IEEE Journal on Selected Areas in Communications, 2015

Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information.
J. of Management Information Systems, 2015

Development of a Construction Quality Supervision Collaboration System Based on a SaaS Private Cloud.
Journal of Intelligent and Robotic Systems, 2015

Structural measures to track the evolution of SNOMED CT hierarchies.
Journal of Biomedical Informatics, 2015

Scalable quality assurance for large SNOMED CT hierarchies using subject-based subtaxonomies.
JAMIA, 2015

A tribal abstraction network for SNOMED CT target hierarchies without attribute relationships.
JAMIA, 2015

Fake-Website Detection Tools: Identifying Elements that Promote Individuals' Use and Enhance Their Performance.
J. AIS, 2015

Online learning 3D context for robust visual tracking.
Neurocomputing, 2015

Noise modeling and representation based classification methods for face recognition.
Neurocomputing, 2015

Event detection and popularity prediction in microblogging.
Neurocomputing, 2015

Noise-free representation based classification and face recognition experiments.
Neurocomputing, 2015

Search engine reinforced semi-supervised classification and graph-based summarization of microblogs.
Neurocomputing, 2015

A Method of Power Aware Large Data Download on Smartphone.
IEICE Transactions, 2015

Special Section of Games and Economic Behavior dedicated to the 11th and 12th ACM Conference on Electronic Commerce.
Games and Economic Behavior, 2015

Decentralized matching and social segregation.
Games and Economic Behavior, 2015

A hybrid stock trading system using genetic network programming and mean conditional value-at-risk.
European Journal of Operational Research, 2015

Nanoscale molecular communication networks: a game-theoretic perspective.
EURASIP J. Adv. Sig. Proc., 2015

Principled Evaluation of Differentially Private Algorithms using DPBench.
CoRR, 2015

On the Privacy Properties of Variants on the Sparse Vector Technique.
CoRR, 2015

A Chinese restaurant game for learning and decision making in cognitive radio networks.
Computer Networks, 2015

Network economics in cognitive networks.
IEEE Communications Magazine, 2015

A comparative analysis of the density of the SNOMED CT conceptual content for semantic harmonization.
Artificial Intelligence in Medicine, 2015

Using simulation to examine appointment overbooking schemes for a medical imaging center.
Proceedings of the 2015 Winter Simulation Conference, 2015

Capacity analysis for non-orthogonal overloading transmissions under constellation constraints.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Online model-driven data acquisition for wireless sensor networks.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

A Novel Antenna Selection Scheme for Spatially Correlated Massive MIMO Uplinks with Imperfect Channel Estimation.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Vetting SSL Usage in Applications with SSLINT.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Analysis of complex network in international business literature.
Proceedings of the 9th IEEE International Conference on Semantic Computing, 2015

Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android.
Proceedings of the Security and Privacy in Communication Networks, 2015

Biterm-based multilayer perceptron network for tagging short text.
Proceedings of the 7th International Conference on Cybernetics and Intelligent Systems, 2015

Social boundary of any two nodes in a social network.
Proceedings of the 7th International Conference on Cybernetics and Intelligent Systems, 2015

Uncertainty Analysis of Race Conditions in Real-Time Systems.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Algorithm of protocol header recovery based on iteration between layers.
Proceedings of the 26th IEEE Annual International Symposium on Personal, 2015

I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Determining Accurate User-Indicated Abnormality Location Information in Medical Imaging Studies.
Proceedings of the Medical Image Understanding and Analysis, 2015

A New Ant Colony Classification Mining Algorithm.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

Validation of FY-3B satellite temperature product.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Adaptation of MIMICS model to wheat at multi-band (L, S, C, X).
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Extraction of urban impervious surface from multi-temporal Worldview-2 imagery using spectral mixture analysis: A comparative study.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

The Design and Implementation of an Encrypted U-Disk Based on NFC.
Proceedings of the Intelligent Computation in Big Data Era, 2015

The Monitoring with Video and Alarm System Based on Linux Router.
Proceedings of the Intelligent Computation in Big Data Era, 2015

Prediction of Clinical Drug Response Based on Differential Gene Expression Levels.
Proceedings of the Intelligent Computing Theories and Methodologies, 2015

Common Features Based Volunteer and Voluntary Activity Recommendation Algorithm.
Proceedings of the 12th IEEE International Conference on e-Business Engineering, 2015

Population Behavior Analysis of Chinese University Students via Digital Campus Cards.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

Iterative multiuser receiver in sparse code multiple access systems.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Learning from the past: Improving news summarization with past news articles.
Proceedings of the 2015 International Conference on Asian Language Processing, 2015

A Unified Frequency Reuse Framework for Heterogeneous Cellular Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Multi-Carrier Rateless Multiple Access: A Novel Protocol for Dynamic Massive Access.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Data-Driven Stochastic Scheduling and Dynamic Auction in IaaS.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Optimal pricing for interference control in time-reversal device-to-device uplinks.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015

Interference model and analysis on device-to-device cellular coexist networks.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015

Diversity analysis for two-way multi-relay networks with stochastic energy harvesting.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015

Outage probability for two-way solar-powered relay networks with stochastic scheduling.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015

Accurate carrier frequency offset estimation in time-reversal communications.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015

SafePay: Protecting against credit card forgery with existing magnetic card readers.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Parameter Identification Inverse Problems of Partial Differential Equations Based on the Improved Gene Expression Programming.
Proceedings of the High Performance Computing and Applications, 2015

Joint power control and signature design for time-reversal uplinks.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

The Research of Depression Based on Power Spectrum.
Proceedings of the Brain Informatics and Health - 8th International Conference, 2015

2014
Network Formation Games in Cooperative MIMO Interference Systems.
IEEE Trans. Wireless Communications, 2014

Dynamic Chinese Restaurant Game: Theory and Application to Cognitive Radio Networks.
IEEE Trans. Wireless Communications, 2014

Optimal Pricing Strategy for Operators in Cognitive Femtocell Networks.
IEEE Trans. Wireless Communications, 2014

Multi-Channel Sensing and Access Game: Bayesian Social Learning with Negative Network Externality.
IEEE Trans. Wireless Communications, 2014

Distributed State Estimation With Dimension Reduction Preprocessing.
IEEE Trans. Signal Processing, 2014

Evolutionary Dynamics of Information Diffusion Over Social Networks.
IEEE Trans. Signal Processing, 2014

Constructing Linear Encoders With Good Spectra.
IEEE Trans. Information Theory, 2014

Energy Management and Driving Strategy for In-Wheel Motor Electric Ground Vehicles With Terrain Profile Preview.
IEEE Trans. Industrial Informatics, 2014

Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks.
IEEE Trans. Information Forensics and Security, 2014

Adaptive Energy-Efficient Control Allocation for Planar Motion Control of Over-Actuated Electric Ground Vehicles.
IEEE Trans. Contr. Sys. Techn., 2014

A Digital Multigate Doppler Method for High Frequency Ultrasound.
Sensors, 2014

High Performance Relaxor-Based Ferroelectric Single Crystals for Ultrasonic Transducer Applications.
Sensors, 2014

Combination of linear regression classification and collaborative representation classification.
Neural Computing and Applications, 2014

Crowdsourcing with All-Pay Auctions: A Field Experiment on Taskcn.
Management Science, 2014

Graphical Evolutionary Game for Information Diffusion Over Social Networks.
J. Sel. Topics Signal Processing, 2014

Data-Driven Optimal Throughput Analysis for Route Selection in Cognitive Vehicular Networks.
IEEE Journal on Selected Areas in Communications, 2014

An improved Genetic Algorithm of Bi-level Coding for Flexible Job Shop Scheduling Problems.
JNW, 2014

Time-Reversal Wireless Paradigm for Green Internet of Things: An Overview.
IEEE Internet of Things Journal, 2014

Brand relationship, consumption values and branded app adoption.
Industrial Management and Data Systems, 2014

Structured partial least squares for simultaneous object tracking and segmentation.
Neurocomputing, 2014

Robust tracking via patch-based appearance model and local background estimation.
Neurocomputing, 2014

Modified minimum squared error algorithm for robust classification and face recognition experiments.
Neurocomputing, 2014

Locality and similarity preserving embedding for feature selection.
Neurocomputing, 2014

On the Equivalence of Evolutionary Stable Strategies.
IEEE Communications Letters, 2014

Which hat to wear? Impact of natural identities on coordination and cooperation.
Games and Economic Behavior, 2014

Measuring consistency of two datasets using fuzzy techniques and the concept of indiscernibility: Application to human perceptions on fabrics.
Eng. Appl. of AI, 2014

Differentially Private Algorithms for Empirical Machine Learning.
CoRR, 2014

Data-Driven Stochastic Models and Policies for Energy Harvesting Sensor Communications.
CoRR, 2014

Energy efficient cooperative communications using coalition formation games.
Computer Networks, 2014

Green transmission technologies for balancing the energy efficiency and spectrum efficiency trade-off.
IEEE Communications Magazine, 2014

The Impact of e-commerce on China's Economic Growth.
Proceedings of the Thirteenth Wuhan International Conference on E-Business, 2014

A hybrid fusion scheme for color face recognition.
Proceedings of the International Conference on Smart Computing, 2014

Compiling minimum incremental update for modular SDN languages.
Proceedings of the third workshop on Hot topics in software defined networking, 2014

Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

Toward a non-intrusive, physio- behavioral biometric for smartphones.
Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services, 2014

Massive MIMO architecture for 5G networks: Co-located, or distributed?
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014

On the puncturing patterns for punctured polar codes.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Research of methane emissions of the wetlands with backscattering properties.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

Area retrieval of melting snow in alpine areas.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

Road damage information extraction using high-resolution SAR imagery.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

Anti-cheating prosumer energy exchange based on indirect reciprocity.
Proceedings of the IEEE International Conference on Communications, 2014

Inter-user interference in molecular communication networks.
Proceedings of the IEEE International Conference on Acoustics, 2014

Modeling information diffusion dynamics over social networks.
Proceedings of the IEEE International Conference on Acoustics, 2014

Information theoretical limit of compression forensics.
Proceedings of the IEEE International Conference on Acoustics, 2014

The Possibility of Human-Better Centered Design.
Proceedings of the HCI International 2014 - Posters' Extended Abstracts, 2014

Sparse code multiple access: An energy efficient uplink approach for 5G wireless systems.
Proceedings of the IEEE Global Communications Conference, 2014

Cognitive femtocell market: How to price?
Proceedings of the IEEE Global Communications Conference, 2014

Evolutionary social information diffusion analysis.
Proceedings of the IEEE Global Communications Conference, 2014

Femto-macro co-channel interference coordination via pricing game.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

User participation game in collaborative filtering.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

On the achievable sum rate for two-way relay networks with stochastic energy harvesting.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

Data-driven stochastic scheduling for solar-powered sensor communications.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

Sequential multi-channel access game in distributed cognitive radio networks.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

Time-reversal with limited signature precision: Tradeoff between complexity and performance.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

Game theoretic Markov decision processes for optimal decision making in social systems.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

Spectrum trading in heterogeneous cognitive radio networks.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

An evolutionary game-theoretic modeling for heterogeneous information diffusion.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

3-Party Loan Contract Based Purchase-Order Financing.
Proceedings of the Seventh International Joint Conference on Computational Sciences and Optimization, 2014

A Case Study of Learning Action and Emotion from a Perspective of Learning Analytics.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Exploit Latent Dirichlet Allocation for One-Class Collaborative Filtering.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

Multi-dimensional scaling and MODELLER-based evolutionary algorithms for protein model refinement.
Proceedings of the IEEE Congress on Evolutionary Computation, 2014

AutoCog: Measuring the Description-to-permission Fidelity in Android Applications.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

A survey on 5G new waveform: From energy efficiency aspects.
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014

Spam ain't as diverse as it seems: throttling OSN spam with templates underneath.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

Exploiting Timelines to Enhance Multi-document Summarization.
Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, 2014

2013
Wireless Access Network Selection Game with Negative Network Externality.
IEEE Trans. Wireless Communications, 2013

Energy-Efficient Design for Downlink OFDMA with Delay-Sensitive Traffic.
IEEE Trans. Wireless Communications, 2013

Joint Spectrum Sensing and Access Evolutionary Game in Cognitive Radio Networks.
IEEE Trans. Wireless Communications, 2013

On the Relation Between Energy Efficiency and Spectral Efficiency of Multiple-Antenna Systems.
IEEE Trans. Vehicular Technology, 2013

Sequential Chinese Restaurant Game.
IEEE Trans. Signal Processing, 2013

Distributed Adaptive Networks: A Graphical Evolutionary Game-Theoretic View.
IEEE Trans. Signal Processing, 2013

Rake: Semantics Assisted Network-Based Tracing Framework.
IEEE Trans. Network and Service Management, 2013

Nonnegative Local Coordinate Factorization for Image Representation.
IEEE Trans. Image Processing, 2013

Image Denoising Games.
IEEE Trans. Circuits Syst. Video Techn., 2013

Energy-Efficient Configuration of Spatial and Frequency Resources in MIMO-OFDMA Systems.
IEEE Trans. Communications, 2013

Non-Cooperative Feedback Control Game for Secondary Transmitter in Cognitive Radio Network.
IEEE Signal Process. Lett., 2013

Time-Reversal Wideband Communications.
IEEE Signal Process. Lett., 2013

Coarse to fine K nearest neighbor classifier.
Pattern Recognition Letters, 2013

Renewal-Theoretical Dynamic Spectrum Access in Cognitive Radio Network with Unknown Primary Behavior.
IEEE Journal on Selected Areas in Communications, 2013

Organizations' Information Security Policy Compliance: Stick or Carrot Approach?
J. of Management Information Systems, 2013

Screen Fingerprints: A Novel Modality for Active Authentication.
IT Professional, 2013

Background subtraction driven seeds selection for moving objects segmentation and matting.
Neurocomputing, 2013

Recent Advance on mean Shift Tracking: a Survey.
Int. J. Image Graphics, 2013

From body measurements to body shape perception: an intelligent tool for garment design.
IJAOM, 2013

Clothing recommendation based on fuzzy mathematics.
IJAOM, 2013

Elicitation and acquisition of knowledge related to clothing colour design.
IJAOM, 2013

Why can't a woman bid more like a man?
Games and Economic Behavior, 2013

Information content in Lagrangian sensor measurements for reservoir characterization.
Computers & Geosciences, 2013

Ensemble Kalman filter for data assimilation.
Computers & Geosciences, 2013

On Cost-Effective Incentive Mechanisms in Microtask Crowdsourcing
CoRR, 2013

Design Elements that Promote the use of Fake Website Detection Tools.
CoRR, 2013

Evolutionary Dynamics of Information Diffusion over Social Networks.
CoRR, 2013

Evolutionary Information Diffusion over Social Networks.
CoRR, 2013

Indian Buffet Game with Negative Network Externality and Non-Bayesian Social Learning.
CoRR, 2013

Anger is More Influential Than Joy: Sentiment Correlation in Weibo.
CoRR, 2013

On functionality separation for green mobile networks: concept study over LTE.
IEEE Communications Magazine, 2013

Data quality evaluation and improvement for prognostic modeling using visual assessment based data partitioning method.
Computers in Industry, 2013

Construction and analysis of the protein-protein interaction network related to essential hypertension.
BMC Systems Biology, 2013

The readiness of SNOMED problem list concepts for meaningful use of electronic health records.
Artificial Intelligence in Medicine, 2013

On the bandwidth-power tradeoff for heterogeneous networks with site sleeping and inter-cell interference.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Spectrum efficiency and energy efficiency tradeoff for heterogeneous wireless networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Energy saving: Scaling network energy efficiency faster than traffic growth.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference Workshops, 2013

Emerging topic detection for organizations from microblogs.
Proceedings of the 36th International ACM SIGIR conference on research and development in Information Retrieval, 2013

Towards a secure controller platform for openflow applications.
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013

An empirical reexamination of global DNS behavior.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Energy efficient coverage planning in cellular networks with sleep mode.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

The Three-Dimensional Modeling of Femur.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

A Novel Worm Drive for Rehabilitation Robot Joint.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

A narrative inquiry into professional identity construction of university EFL teachers in China: A case study of three teachers based in community of practice.
Proceedings of the 2013 12th International Conference on Information Technology Based Higher Education and Training, 2013

Optimal pricing in stochastic scalable video coding multicasting system.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Dynamic Chinese Restaurant Game in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

A contract-based approach for ancillary services in V2G networks: Optimality and learning.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Soil moisture monitoring based on HJ-1C S-band SAR image and experimental data.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013

An intelligent recommender system for personalized fashion design.
Proceedings of the Joint IFSA World Congress and NAFIPS Annual Meeting, 2013

Posterior Probability Based Multi-classifier Fusion in Pedestrian Detection.
Proceedings of the Genetic and Evolutionary Computing, 2013

Image inpainting strategy for Kinect depth maps.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013

Architecture design and performance evaluation for future green small cell wireless networks.
Proceedings of the IEEE International Conference on Communications, 2013

Concealability-rate-distortion tradeoff in image compression anti-forensics.
Proceedings of the IEEE International Conference on Acoustics, 2013

Analysis on Topic Map Oriented E-Learner Behavior and Study Efficiency.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

De-obfuscation and Detection of Malicious PDF Files with High Accuracy.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Simulation and Analysis of Turbulent Optical Wavefront Based on Zernike Polynomials.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

MIMO interference cancelation via network formation game.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Evolutionary game for joint spectrum sensing and access in cognitive radio networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Distributed state estimation with lossy measurement compression in smart grid.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

Diffusion analysis of distributed adaptive networks with graphical evolutionary game.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

Graphical evolutionary game theoretic framework for distributed adaptive filter networks.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

Indian Buffet Game with non-Bayesian social learning.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

Opportunities of innovation under challenges of big data.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

Classification of road safety based on fuzzy clustering.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

Redefining web browser principals with a Configurable Origin Policy.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

AppsPlayground: automatic security analysis of smartphone applications.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Modified binary differential evolution for solving wind farm layout optimization problems.
Proceedings of the IEEE Symposium on Computational Intelligence for Engineering Solutions, 2013

DroidChameleon: evaluating Android anti-malware against transformation attacks.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08, 2013

Scalability of Abstraction-Network-Based Quality Assurance to Large SNOMED Hierarchies.
Proceedings of the AMIA 2013, 2013

Identifying Inconsistencies in SNOMED CT Problem Lists using Structural Indicators.
Proceedings of the AMIA 2013, 2013

Negative Influence Minimizing by Blocking Nodes in Social Networks.
Proceedings of the Late-Breaking Developments in the Field of Artificial Intelligence, 2013

From Interest to Function: Location Estimation in Social Media.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013

2012
A Semantic Relevancy Measure Algorithm of Chinese Sentences.
Proceedings of the Modern Advances in Intelligent Systems and Tools, 2012

An Indirect-Reciprocity Reputation Game for Cooperation in Dynamic Spectrum Access Networks.
IEEE Trans. Wireless Communications, 2012

Design and Evaluation on Electric Differentials for Overactuated Electric Ground Vehicles With Four Independent In-Wheel Motors.
IEEE Trans. Vehicular Technology, 2012

Joint Demosaicing and Subpixel-Based Down-Sampling for Bayer Images: A Fast Frequency-Domain Analysis Approach.
IEEE Trans. Multimedia, 2012

Indirect Reciprocity Security Game for Large-Scale Wireless Networks.
IEEE Trans. Information Forensics and Security, 2012

Fast and Global Optimal Energy-Efficient Control Allocation With Applications to Over-Actuated Electric Ground Vehicles.
IEEE Trans. Contr. Sys. Techn., 2012

Energy-Efficient Power Allocation for Pilots in Training-Based Downlink OFDMA Systems.
IEEE Trans. Communications, 2012

ANLS: Adaptive Non-Linear Sampling Method for Accurate Flow Size Measurement.
IEEE Trans. Communications, 2012

Cooperation Stimulation for Multiuser Cooperative Communications Using Indirect Reciprocity Game.
IEEE Trans. Communications, 2012

Understanding Microeconomic Behaviors in Social Networking: An engineering view.
IEEE Signal Process. Mag., 2012

Chinese Restaurant Game.
IEEE Signal Process. Lett., 2012

Erratum to: Optimization of the resonant frequency servo loop technique in the resonator micro optic gyro.
Journal of Zhejiang University - Science C, 2012

Logistics Service Provider Segmentation Based on Improved FCM Clustering for Mixed Data.
JCP, 2012

Auditing complex concepts of SNOMED using a refined hierarchical abstraction network.
Journal of Biomedical Informatics, 2012

A study of terminology auditors' performance for UMLS semantic type assignments.
Journal of Biomedical Informatics, 2012

Overcoming an obstacle in expanding a UMLS semantic type extent.
Journal of Biomedical Informatics, 2012

Embedded Feature Selection for Multi-label Classification of Music Emotions.
Int. J. Computational Intelligence Systems, 2012

Behavioral spillovers and cognitive load in multiple games: An experimental study.
Games and Economic Behavior, 2012

Supplier selection using axiomatic fuzzy set and TOPSIS methodology in supply chain management.
FO & DM, 2012

Erratum to "Genetic relation algorithm with guided mutation for the large-scale portfolio optimization" [Expert Systems with Applications 38 (4) (2011) 3353-3363].
Expert Syst. Appl., 2012

Distributed Adaptive Networks: A Graphical Evolutionary Game-Theoretic View
CoRR, 2012

"I loan because...": understanding motivations for pro-social lending.
Proceedings of the Fifth International Conference on Web Search and Web Data Mining, 2012

CSI feedback reduction for energy-efficient downlink OFDMA.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Energy Efficiency and Optimal Power Allocation in Virtual-MIMO Systems.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

Power-Delay Tradeoff Improvement with Adaptive Modulation Scheme under Practical Power Model.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

Optimal contract design for ancillary services in vehicle-to-grid networks.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

OSA: An Optical Switching Architecture for Data Center Networks with Unprecedented Flexibility.
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012

Towards Online Spam Filtering in Social Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Development of a fuzzy inclusion measure for investigating relations between visual and tactile perception of textile products.
Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2012

A novel topology based watershed segmentation.
Proceedings of the 11th International Conference on Information Science, 2012

Impact of anti-phishing tool performance on attack success rates.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Consumer Operational Comfort Level based power demand management in the smart grid.
Proceedings of the 3rd IEEE PES Innovative Smart Grid Technologies Europe, 2012

Scalable Name Lookup in NDN Using Effective Name Component Encoding.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

An indirect reciprocity game theoretic framework for dynamic spectrum access.
Proceedings of IEEE International Conference on Communications, 2012

Energy-efficient configuration of spatial and frequency resources in MIMO-OFDMA systems.
Proceedings of IEEE International Conference on Communications, 2012

Indirect reciprocity game modelling for secure wireless networks.
Proceedings of IEEE International Conference on Communications, 2012

Analysis of interference in cognitive radio networks with unknown primary behavior.
Proceedings of IEEE International Conference on Communications, 2012

Delay-power tradeoff of max queue-weighted (MWQ) power control for wireless systems with limited renewable energy storage.
Proceedings of IEEE International Conference on Communications, 2012

Energy-efficient cellular network operation via base station cooperation.
Proceedings of IEEE International Conference on Communications, 2012

A cheat-proof game theoretic demand response scheme for smart grids.
Proceedings of IEEE International Conference on Communications, 2012

Cooperation stimulation in cooperative communications: An indirect reciprocity game.
Proceedings of IEEE International Conference on Communications, 2012

A cheat-proof game-theoretic framework for cooperative peer-to-peer video streaming.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Learning and decision making with negative externality for opportunistic spectrum access.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A renewal-theoretical framework for dynamic spectrum access with unknown primary behavior.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Energy efficiency and deployment efficiency tradeoff for heterogeneous wireless networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A clustering algorithm based on FR-ENN for situation awareness.
Proceedings of the 15th International Conference on Information Fusion, 2012

A topic detection method based on Semantic Dependency Distance and PLSA.
Proceedings of the IEEE 16th International Conference on Computer Supported Cooperative Work in Design, 2012

A Semi-Supervised Bayesian Network Model for Microblog Topic Classification.
Proceedings of the COLING 2012, 2012

Stock trading system based on portfolio beta and evolutionary algorithms.
Proceedings of the 2012 IEEE Conference on Computational Intelligence for Financial Engineering & Economics, 2012

Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Radiological informatics in breast screening: Towards improved radiologists' performance.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

Signals analysis of pulse-diagnosis in TCM by the combination of unsupervised learning and supervised learning.
Proceedings of the 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2012

Mining hub-based protein complexes in massive biological networks.
Proceedings of the 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2012

A Study of Wireless Mobile Node Localization Algorithm Based on MCL and HS.
Proceedings of the AsiaSim 2012, 2012

Distributed state estimation in smart grid with communication constraints.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2012

An optimal dynamic pricing and schedule approach in V2G.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2012

On pending interest table in named data networking.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2012

In-wheel motor electric ground vehicle energy management strategy for maximizing the travel distance.
Proceedings of the American Control Conference, 2012

A branch-and-bound algorithm for energy-efficient control allocation with applications to planar motion control of electric ground vehicles.
Proceedings of the American Control Conference, 2012

Simulation Research on Singularity Detection of Transient Power Disturbance.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012

Research on Topic Segmentation of Chinese Text Based on Lexical Chain.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
Human Action Recognition Based on Radon Transform.
Proceedings of the Multimedia Analysis, Processing and Communications, 2011

Energy-efficient wireless communications: tutorial, survey, and open issues.
IEEE Wireless Commun., 2011

Energy- and Spectral-Efficiency Tradeoff in Downlink OFDMA Networks.
IEEE Trans. Wireless Communications, 2011

Adaptive Vehicle Speed Control With Input Injections for Longitudinal Motion Independent Road Frictional Condition Estimation.
IEEE Trans. Vehicular Technology, 2011

Identification of a Class of Nonlinear Autoregressive Models With Exogenous Inputs Based on Kernel Machines.
IEEE Trans. Signal Processing, 2011

Weight Distributions of Regular Low-Density Parity-Check Codes Over Finite Fields.
IEEE Trans. Information Theory, 2011

Towards Situational Awareness of Large-Scale Botnet Probing Events.
IEEE Trans. Information Forensics and Security, 2011

Indirect Reciprocity Game Modelling for Cooperation Stimulation in Cognitive Networks.
IEEE Trans. Communications, 2011

Contrast enhancement using non-overlapped sub-blocks and local histogram projection.
IEEE Trans. Consumer Electronics, 2011

Serological Thymidine Kinase 1 is a Biomarker for Early Detection of Tumours - A Health Screening Study on 35, 365 People, Using a Sensitive Chemiluminescent Dot Blot Assay.
Sensors, 2011

Measurement and diagnosis of address misconfigured P2P traffic.
IEEE Network, 2011

Optimization of the resonant frequency servo loop technique in the resonator micro optic gyro.
Journal of Zhejiang University - Science C, 2011

Corrigendum to "School choice: An experimental study" [J. Econ. Theory 127 (1) (2006) 202-231].
J. Economic Theory, 2011

Design Method of Product Agile Customization Based on Artificial Neural Network and Its Application.
JCP, 2011

A two step method to identify clinical outcome relevant genes with microarray data.
Journal of Biomedical Informatics, 2011

Security Issues in Online Social Networks.
IEEE Internet Computing, 2011

Error tolerance based support vector machine for regression.
Neurocomputing, 2011

Selection of logistics center location using Axiomatic Fuzzy Set and TOPSIS methodology in logistics management.
Expert Syst. Appl., 2011

An effective TPA-based algorithm for job-shop scheduling problem.
Expert Syst. Appl., 2011

Genetic relation algorithm with guided mutation for the large-scale portfolio optimization.
Expert Syst. Appl., 2011

Chinese Restaurant Game - Part I: Theory of Learning with Negative Network Externality
CoRR, 2011

Chinese Restaurant Game - Part II: Applications to Wireless Networking, Cloud Computing, and Online Social Networking
CoRR, 2011

Renewal-Theoretical Dynamic Spectrum Access in Cognitive Radio Networks with Unknown Primary Behavior
CoRR, 2011

Fundamental Tradeoffs on Green Wireless Networks
CoRR, 2011

Fundamental trade-offs on green wireless networks.
IEEE Communications Magazine, 2011

Energy-Efficient MIMO-OFDMA Systems Based on Switching off RF Chains.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011

Impact of Non-Ideal Efficiency on Bits Per Joule Performance of Base Station Transmissions.
Proceedings of the 73rd IEEE Vehicular Technology Conference, 2011

Application oriented data cleaning For RFID middleware.
Proceedings of the IEEE International Conference on Systems, 2011

WebShield: Enabling Various Web Defense Techniques without Client Side Modifications.
Proceedings of the Network and Distributed System Security Symposium, 2011

Coalition formation games for energy-efficient wireless network cocast.
Proceedings of the MILCOM 2011, 2011

Rake: Semantics assisted network-based tracing framework.
Proceedings of the 19th International Workshop on Quality of Service, 2011

Research on role-based dynamic access control.
Proceedings of the iConference 2011, 2011

Identification of black spot on traffic accidents and its spatial association analysis based on geographic information system.
Proceedings of the Seventh International Conference on Natural Computation, 2011

Energy- and Spectral-Efficiency Tradeoff in Downlink OFDMA Networks.
Proceedings of IEEE International Conference on Communications, 2011

An evolutionary game-theoretic approach for image interpolation.
Proceedings of the IEEE International Conference on Acoustics, 2011

The Design and Realization of Swabbing Wells Liquid Recovery Interpretation Software.
Proceedings of the Second International Conference on Innovations in Bio-inspired Computing and Applications, 2011

Fighting Detection Based on Optical Flow Context Histogram.
Proceedings of the Second International Conference on Innovations in Bio-inspired Computing and Applications, 2011

Energy-Efficient Power Allocation between Pilots and Data Symbols in Downlink OFDMA Systems.
Proceedings of the Global Communications Conference, 2011

Energy-Efficient Resource Allocation in OFDMA Networks.
Proceedings of the Global Communications Conference, 2011

GrC and ANN based fault diagnosis method of distribution network.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

A parallel GA-BP neural network algorithm for solving inverse heat conduction problem.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Interface Design Elements for Anti-phishing Systems.
Proceedings of the Service-Oriented Perspectives in Design Science Research, 2011

Non-negative local coordinate factorization for image representation.
Proceedings of the 24th IEEE Conference on Computer Vision and Pattern Recognition, 2011

A Topic Partition Algorithm Based on Average Sentence Similarity for Interactive Text.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

An adaptive energy-efficient control allocation on planar motion control of electric ground vehicles.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011

Poster: CUD: crowdsourcing for URL spam detection.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Poster: online spam filtering in social networks.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Poster: a path-cutting approach to blocking XSS worms in social web networks.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Promoting Ranking Diversity for Biomedical Information Retrieval Based on LDA.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2011

From Boston to Shanghai to Deferred Acceptance: Theory and Experiments on a Family of School Choice Mechanisms.
Proceedings of the Auctions, Market Mechanisms, and Their Applications, 2011

2010
Employing Honeynets For Network Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Protocol design and delay analysis of half-duplex buffered cognitive relay systems.
IEEE Trans. Wireless Communications, 2010

Thwarting zero-day polymorphic worms with network-level length-based signature generation.
IEEE/ACM Trans. Netw., 2010

Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game.
IEEE Trans. Image Processing, 2010

Cooperative Peer-to-Peer Streaming: An Evolutionary Game-Theoretic Approach.
IEEE Trans. Circuits Syst. Video Techn., 2010

Spectrum Auction Games for Multimedia Streaming Over Cognitive Radio Networks.
IEEE Trans. Communications, 2010

Successive refinement based Wyner-Ziv video compression.
Sig. Proc.: Image Comm., 2010

Large Scale Application of Vibration Sensors for Fan Monitoring at Commercial Layer Hen Houses.
Sensors, 2010

A Genetic Algorithm for Job-Shop Scheduling.
JSW, 2010

Analysis for gene networks based on logic relationships.
J. Systems Science & Complexity, 2010

System Dynamic Simulation Approach for Supply Chain with Capability Limit.
JCP, 2010

Fuzzy K-Means Incremental Clustering Based on K-Center and Vector Quantization.
JCP, 2010

Fuzzy Clustering Ensemble with Selection of Number of Clusters.
JCP, 2010

Ranked Continuous Visible Nearest Neighbor Search.
JCIT, 2010

From IT deployment capabilities to competitive advantage: An exploratory study in China.
Information Systems Frontiers, 2010

E-business value creation in Small and Medium Enterprises: a US study using the TOE framework.
IJEB, 2010

Multi-object auctions with package bidding: An experimental comparison of Vickrey and iBEA.
Games and Economic Behavior, 2010

Opportunistic Cognitive Relaying: A Win-Win Spectrum Sharing Scheme.
EURASIP J. Wireless Comm. and Networking, 2010

Some results on the spectral radii of bicyclic graphs.
Discrete Mathematics, 2010

Weight Distributions of Regular Low-Density Parity-Check Codes over Finite Fields
CoRR, 2010

Protocol design and stability/delay analysis of half-duplex buffered cognitive relay systems
CoRR, 2010

A model of portfolio optimization using time adapting genetic network programming.
Computers & OR, 2010

HiFIND: A high-speed flow-level intrusion detection approach with DoS resiliency.
Computer Networks, 2010

Improving Energy Efficiency through Bandwidth, Power, and Adaptive Modulation.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

NetShield: massive semantics-based vulnerability signature matching for high-speed networks.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

WebProphet: Automating Performance Prediction for Web Services.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

Reliability study of Sn-Ag-Cu-Ce soldered joints in quad flat packages.
Microelectronics Reliability, 2010

Mammographic Interpretation Training: How Could Low Cost Display Devices Help?
Proceedings of the Digital Mammography, 2010

An Improved Similarity Algorithm Based on Hesitation Degree for User-Based Collaborative Filtering.
Proceedings of the Advances in Computation and Intelligence - 5th International Symposium, 2010

Measurement and Diagnosis of Address Misconfigured P2P Traffic.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Detecting and characterizing social spam campaigns.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

Evolutionary games for cooperative P2P video streaming.
Proceedings of the International Conference on Image Processing, 2010

A game theoretical approach for image denoising.
Proceedings of the International Conference on Image Processing, 2010

Intelligent Computing Applications Based on Eye Gaze: Their Role in Medical Image Interpretation.
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2010

An auction-based framework for multimedia streaming over cognitive radio networks.
Proceedings of the IEEE International Conference on Acoustics, 2010

A new methodology of continuous and noninvasive blood pressure measurement by pulse wave velocity.
Proceedings of the 11th International Conference on Control, 2010

A Novel Algorithm for Faults Acquiring and Locating on Fiber Optic Cable Line.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2010

Cooperation Stimulation in Cognitive Networks Using Indirect Reciprocity Game Modelling.
Proceedings of the Global Communications Conference, 2010

Knowledge-based interactive design for men's suit.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

Replay Debugging for Multi-threaded Embedded Software.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

A word language model based contextual language processing on Chinese character recognition.
Proceedings of the Document Recognition and Retrieval XVII, 2010

Optimization of Stiffened Cantilever Box Girder Based on Data Mining on Simulation.
Proceedings of the Second International Workshop on Database Technology and Applications, 2010

Knowledge element relation extraction using conditional random fields.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

Re-examining price as a predictor of answer quality in an online q&a site.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

A portfolio selection strategy using Genetic Relation Algorithm.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

Vehicle-longitudinal-motion-independent real-time tire-road friction coefficient estimation.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

Detecting and characterizing social spam campaigns.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

A 3D SoC design for H.264 application with on-chip DRAM stacking.
Proceedings of the IEEE International Conference on 3D System Integration, 2010

2009
Delay-optimal power and precoder adaptation for multi-stream MIMO systems.
IEEE Trans. Wireless Communications, 2009

Towards unbiased end-to-end network diagnosis.
IEEE/ACM Trans. Netw., 2009

Multiuser Rate Allocation Games for Multimedia Communications.
IEEE Trans. Multimedia, 2009

Simultaneous MAP-Based Video Denoising and Rate-Distortion Optimized Video Encoding.
IEEE Trans. Circuits Syst. Video Techn., 2009

Wyner-Ziv-based bidirectionally decodable video coding.
J. Visual Communication and Image Representation, 2009

Fuzzy Semantic Retrieval for Traffic Information Based on Fuzzy Ontology and RDF on the Semantic Web.
JSW, 2009

Spectrum Sharing between Cellular and Mobile Ad Hoc Networks: Transmission-Capacity Trade-Off.
IEEE Journal on Selected Areas in Communications, 2009

Structural group auditing of a UMLS semantic type's extent.
Journal of Biomedical Informatics, 2009

Structural group-based auditing of missing hierarchical relationships in UMLS.
Journal of Biomedical Informatics, 2009

Research Paper: Expanding the Extent of a UMLS Semantic Type via Group Neighborhood Auditing.
JAMIA, 2009

Extracting Concepts' Relations and Users' Preferences for Personalizing Query Disambiguation.
Int. J. Semantic Web Inf. Syst., 2009

Dynamic Structural Statistical Model Based Online Signature Verification.
IJDCF, 2009

A personalised query suggestion agent based on query-concept bipartite graphs and Concept Relation Trees.
IJAIP, 2009

Empirical analysis of support vector machine ensemble classifiers.
Expert Syst. Appl., 2009

A portfolio optimization model using Genetic Network Programming with control nodes.
Expert Syst. Appl., 2009

A genetic network programming with learning approach for enhanced stock trading model.
Expert Syst. Appl., 2009

Applications of axiomatic fuzzy set clustering method on management strategic analysis.
European Journal of Operational Research, 2009

Optimisation of garment design using fuzzy logic and sensory evaluation techniques.
Eng. Appl. of AI, 2009

Constructing Linear Codes with Good Spectra
CoRR, 2009

Delay-Optimal Power and Precoder Adaptation for Multi-stream MIMO Systems
CoRR, 2009

FAD and SPA: End-to-end link-level loss rate inference without infrastructure.
Computer Networks, 2009

A prediction model for blood-brain barrier permeation and analysis on its parameter biologically.
Computer Methods and Programs in Biomedicine, 2009

Spectrum sharing between cellular and mobile ad hoc networks: Transmission-capacity tradeoff.
Proceedings of the 7th International Symposium on Modeling and Optimization in Mobile, 2009

Exploiting buffers in cognitive multi-relay systems for delay-sensitive applications.
Proceedings of the 7th International Symposium on Modeling and Optimization in Mobile, 2009

A Query Substitution-Search Result Refinement Approach for Long Query Web Searches.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

Low complexity precoder design for delay sensitive multi-stream MIMO systems.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Neural Network and Genetic Algorithm-based Hybrid Approach to Dynamic Job Shop Scheduling Problem.
Proceedings of the IEEE International Conference on Systems, 2009

A Portfolio Selection Model using Genetic Relation Algorithm and Genetic Network Programming.
Proceedings of the IEEE International Conference on Systems, 2009

Using Failure Information Analysis to Detect Enterprise Zombies.
Proceedings of the Security and Privacy in Communication Networks, 2009

Exploring Concepts' Semantic Relations for Clustering-Based Query Senses Disambiguation.
Proceedings of the Rough Sets and Knowledge Technology, 4th International Conference, 2009

BotGraph: Large Scale Spamming Botnet Detection.
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009

A frequency-shift CMOS magnetic biosensor array with single-bead sensitivity and no external magnet.
Proceedings of the IEEE International Solid-State Circuits Conference, 2009

Information Integration Approach to Vendor Selection Group Decision Making under Multiple Criteria.
Proceedings of the Advances in Neural Networks, 2009

Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Knowledge Acquisition Approach Based on Rough Set and Artificial Neural Network in Product Design Process.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Study on the Problem of Assessment Level of Experts in Multi-attribute Group Decision Making.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Real-Time Simulation System of Virtual Picking Manipulator Based on Parametric Design.
Proceedings of the Intelligent Robotics and Applications, Second International Conference, 2009

Study of Modeling and Simulating for Picking Manipulator Based on Modelica.
Proceedings of the Intelligent Robotics and Applications, Second International Conference, 2009

A Genetic Algorithm Based Approach for Event Synchronization Analysis in Real-Time Embedded Systems.
Proceedings of the International Conference on Embedded Software and Systems, 2009

Simultaneous and orthogonal decomposition of data using Multimodal Discriminant Analysis.
Proceedings of the IEEE 12th International Conference on Computer Vision, ICCV 2009, Kyoto, Japan, September 27, 2009

A game-theoretic framework for multi-user multimedia rate allocation.
Proceedings of the IEEE International Conference on Acoustics, 2009

Risk-distortion analysis for video collusion attack.
Proceedings of the IEEE International Conference on Acoustics, 2009

Computer-Based Learning to Improve Breast Cancer Detection Skills.
Proceedings of the Human-Computer Interaction. Interacting in Various Application Domains, 2009

Definition of Management Zones of Soil Nutrients Based on Spatial Analysis in Cotton Field.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

Exception triggered DoS attacks on wireless networks.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Web Service Selection Algorithm Based on Particle Swarm Optimization.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Trade Surplus Analysis Using Self-Organizing Data Mining Based on GMDH Principle.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

Constructing portfolio investment strategy based on Time Adapting Genetic Network Programming.
Proceedings of the IEEE Congress on Evolutionary Computation, 2009

Automating analysis of large-scale botnet probing events.
Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, 2009

A Monte Carlo Reliability Study of the Assessment of Chemotherapy Responses in Ovarian Cancer Treatment.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

Fuzzy Clustering Ensemble Algorithm for Partitioning Categorical Data.
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009

Auditing SNOMED Relationships Using a Converse Abstraction Network.
Proceedings of the AMIA 2009, 2009

Research on Numerical Module Identification Approaches.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

Fabric Database and Fuzzy Logic Models for Evaluating Fabric Performance.
Proceedings of the Database Technologies: Concepts, 2009

2008
Information Fusion using the Kalman Filter based on Karhunen-Loève Decomposition.
Proceedings of the Quantitative Information Fusion for Hydrological Sciences, 2008

Honeynet-based Botnet Scan Traffic Analysis.
Proceedings of the Botnet Detection: Countering the Largest Security Threat, 2008

On cognitive radio networks with opportunistic power control strategies in fading channels.
IEEE Trans. Wireless Communications, 2008

Video Error Concealment Using Spatio-Temporal Boundary Matching and Partial Differential Equation.
IEEE Trans. Multimedia, 2008

Comparing and consolidating two heuristic metaschemas.
Journal of Biomedical Informatics, 2008

Trading Rules on Stock Markets Using Genetic Network Programming with Sarsa Learning.
JACIII, 2008

An Effective GML Documents Compressor.
IEICE Transactions, 2008

Spectrum Sharing Between Cellular and Mobile Ad Hoc Networks: Transmission-Capacity Trade-Off
CoRR, 2008

Overlaid Cellular and Mobile Ad Hoc Networks
CoRR, 2008

Constructing Linear Codes with Good Joint Spectra
CoRR, 2008

Pollution attacks and defenses for Internet caching systems.
Computer Networks, 2008

Scheduling jobs on parallel machines with setup times and ready times.
Computers & Industrial Engineering, 2008

Semantic information retrieval based on fuzzy ontology for intelligent transportation systems.
Proceedings of the IEEE International Conference on Systems, 2008

Load Balanced and Efficient Hierarchical Data-Centric Storage in Sensor Networks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

An Embedded Intrusion Detection System Model for Application Program.
Proceedings of the PACIIA 2008, 2008

Pedestrian detection using hybrid statistical feature.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

Extracting key postures in a human action video sequence.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

A Hybrid MCDM Method for Route Selection of Multimodal Transportation Network.
Proceedings of the Advances in Neural Networks, 2008

Bidirectionally decodable Wyner-Ziv video coding.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

Accurate and Efficient Traffic Monitoring Using Adaptive Non-Linear Sampling Method.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Study on Detection Technology of Pesticideresidues in Vegetables Based on Nir.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 3, 2008

Definition of Management Zones of Soil Nutrientsbased on Fcm Algorithm in Oasis Field.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 1, 2008

Dynamic Modeling of Large Scale Heavy Duty Grippers Based on the Response Dead Zone of Counteracting Force.
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008

Human Action Recognition by Radon Transform.
Proceedings of the Workshops Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

Simultaneous RD-optimized rate control and video de-noising.
Proceedings of the IEEE International Conference on Acoustics, 2008

Using dynamic programming to match human behavior sequences.
Proceedings of the 10th International Conference on Control, 2008

Nonrestrictive Concept-Acquisition by Representational Redescription.
Proceedings of the 2008 International Conference on Artificial Intelligence, 2008

Solving Sum and Product Riddle via BDD-Based Model Checking.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2008

Filtering Spam by Using Factors Hyperbolic Tree.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Varying portfolio construction of stocks using genetic network programming with control nodes.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Stock trading strategies by genetic network programming with flag nodes.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Construction of portfolio optimization system using genetic network programming with control nodes.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

A Weight Entropy k-Means Algorithm for Clustering Dataset with Mixed Numeric and Categorical Data.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Subspace Analysis Methods plus Motion History Image for Human Action Recognition.
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2008

Biomedical Image Processing: A Cross-Discipline Course for Undergraduate Computer Science and Technology Major.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Fuzzy ontology models using intuitionistic fuzzy set for knowledge sharing on the semantic web.
Proceedings of the 12th International Conference on CSCW in Design, 2008

Botnet Research Survey.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Real Time Updating Genetic Network Programming for adapting to the change of stock prices.
Proceedings of the IEEE Congress on Evolutionary Computation, 2008

Auditing Complex Concepts in Overlapping Subsets of SNOMED.
Proceedings of the AMIA 2008, 2008

A bank customer credit evaluation based on the decision tree and the simulated annealing algorithm.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

Fabric Database and Fuzzy Logic Models for Evaluating Fabric Performance.
Proceedings of the Handbook of Research on Fuzzy Information Processing in Databases, 2008

2007
Reversible sketches: enabling monitoring and analysis over high-speed data streams.
IEEE/ACM Trans. Netw., 2007

Algebra-based scalable overlay network monitoring: algorithms, evaluation, and applications.
IEEE/ACM Trans. Netw., 2007

Security Analysis of Multimedia Encryption Schemes Based on Multiple Huffman Table.
IEEE Signal Process. Lett., 2007

Sealed bid auctions with ambiguity: Theory and experiments.
J. Economic Theory, 2007

Structural methodologies for auditing SNOMED.
Journal of Biomedical Informatics, 2007

Analysis of a Study of the Users, Uses, and Future Agenda of the UMLS.
JAMIA, 2007

Efficient processing of XPath queries using indexes.
Inf. Syst., 2007

Partial Channel State Information Based Cooperative Relaying and Partner Selection.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Optimal Partner Selection Strategies in Wireless Cooperative Networks with Fixed and Variable Transmit Power.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Data Fusion based on RBF Neural Network for Error Compensation in Resistance Strain Gauge Force Transducers.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Shake it up baby: scheduling with package auctions.
Proceedings of the Proceedings 8th ACM Conference on Electronic Commerce (EC-2007), 2007

Social Comparisons to Motivate Contributions to an Online Community.
Proceedings of the Persuasive Technology, 2007

Detecting Stealthy Spreaders Using Online Outdegree Histograms.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

Local Binary Patterns for Human Detection on Hexagonal Structure.
Proceedings of the Ninth IEEE International Symposium on Multimedia, 2007

study on human behaviour retrieval.
Proceedings of the 2007 International Conference on Image Processing, 2007

A Suite of Schemes for User-Level Network Diagnosis without Infrastructure.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Automated Promotion Machine: Emerging IS for the Retail Industry in China.
Proceedings of the Research and Practical Issues of Enterprise Information Systems II, 2007

The Research and Application of Web Services in Enterprise Application Integration.
Proceedings of the Research and Practical Issues of Enterprise Information Systems II, 2007

A Study on Self-adaptive Heterogeneous Data Integration Systems.
Proceedings of the Research and Practical Issues of Enterprise Information Systems II, 2007

Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms.
Proceedings of the IEEE International Conference on Network Protocols, 2007

Wyner-Ziv Successive Refinement of Video and Rate Distortion Analysis.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Maximum a Posteriori Based (MAP-Based) Video Denoising VIA Rate Distortion Optimization.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

The Need for Technology to Support Creative Information Sharing Whilst Mobile: Identified Activities and Relationship Groups.
Proceedings of the Online Communities and Social Computing, 2007

The Experimental Approaches of Assessing the Consistency of User Interface.
Proceedings of the Human-Computer Interaction. Interaction Design and Usability, 2007

Genetic network programming with actor-critic and its application to stock trading model.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

Trading rules on stock markets using genetic network programming with sarsa learning.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

Pixel Structure Based on Hausdorff Distance for Human Detection in Outdoor Environments.
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2007

Social Comparisons and Contributions to Online Communities: A Field Experiment on MovieLens.
Proceedings of the Computational Social Systems and the Internet, 1.7. - 6.7.2007, 2007

Stock trading rules using genetic network programming with actor-critic.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

Genetic network programming with sarsa learning and its application to creating stock trading rules.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

Analysis of Error Concentrations in SNOMED.
Proceedings of the AMIA 2007, 2007

Evaluation of a UMLS Auditing Process of Semantic Type Assignments.
Proceedings of the AMIA 2007, 2007

Updating the Genomic Component of the UMLS Semantic Network.
Proceedings of the AMIA 2007, 2007

Development of NeuronBank: A Federation of Customizable Knowledge Bases of Neuronal Circuitry.
Proceedings of the 2007 IEEE International Conference on Services Computing, 2007

2006
Classifying image texture with statistical landscape features.
Pattern Anal. Appl., 2006

School choice: an experimental study.
J. Economic Theory, 2006

Research Paper: Auditing as Part of the Terminology Design Life Cycle.
JAMIA, 2006

Tumor classification based on independent component analysis.
IJPRAI, 2006

IDGraphs: Intrusion Detection and Analysis Using Stream Compositing.
IEEE Computer Graphics and Applications, 2006

Subcarrier and bit allocation for OFDMA systems with proportional fairness.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

A Novel Resource Allocation Algorithm for Real-time Services in Multiuser OFDM Systems.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Abox Inference for Large Scale OWL-Lite Data.
Proceedings of the 2006 International Conference on Semantics, 2006

Towards deterministic network diagnosis.
Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, 2006

Towards unbiased end-to-end network diagnosis.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

Power-Aware Cooperative Relay Selection Strategies in Wireless Ad Hoc Networks.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

Heegard-Berger Video Coding Using LMMSE Estimator.
Proceedings of the Advances in Multimedia Information Processing, 2006

The Research on RBF Network Structure Optimization and the Application in Transportation Prediction.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Spatio-temporal boundary matching algorithm for temporal error concealment.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006

Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Internet Cache Pollution Attacks and Countermeasures.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

Appearance-Based Gait Recognition Using Independent Component Analysis.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006

On the Security of Multimedia Encryption Schemes Based on Multiple Huffman Table (MHT).
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Adaptively Switching Between Directional Interpolation and Region Matching for Spatial Error Concealment Based on DCT Coefficients.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Sketch-Guided Texture-Based Image Inpainting.
Proceedings of the International Conference on Image Processing, 2006

Design and Implementation of Flash File System in S3C44B0X Embedded System.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Penalized Independent Component Discriminant Method for Tumor Classification.
Proceedings of the Computational Intelligence and Bioinformatics, 2006

A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

An Efficient Resource Allocation Algorithm for OFDMA Systems with Multiple Services.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

The Fuzzy Clustering Algorithm Based on AFS Topology.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006

An Adaptive Distributed Simulation Framework for a Server Fulfillment Supply Chain.
Proceedings of the 2006 IEEE International Conference on Automation Science and Engineering, 2006

HStar - A Semantic Repository for Large Scale OWL Documents.
Proceedings of the Semantic Web, 2006

An efficient search algorithm for partially ordered sets.
Proceedings of the IASTED International Conference on Advances in Computer Science and Technology, 2006

A Method of Adaptive Neuron Model (AUILS) and Its Application.
Proceedings of the Firth IEEE International Conference on Cognitive Informatics, 2006

2005
DSP Approach to the Design of Nonlinear Optical Devices.
EURASIP J. Adv. Sig. Proc., 2005

IDGraphs: Intrusion Detection and Analysis Using Histographs.
Proceedings of the IEEE Workshop on Visualization for Computer Security (VizSEC 2005), 2005

An Economic Model of User Rating in an Online Recommender System.
Proceedings of the User Modeling 2005, 2005

Spatio-temporal video error concealment using priority-ranked region-matching.
Proceedings of the 2005 International Conference on Image Processing, 2005

A Study of Secure Communications between Mobile Objects.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

Independent Component Analysis Segmentation Algorithm.
Proceedings of the Eighth International Conference on Document Analysis and Recognition (ICDAR 2005), 29 August, 2005

Active Link: Status Detection Mechanism for Distributed Service Based on Active Networks.
Proceedings of the Distributed and Parallel Computing, 2005

Sequence-matching-based feature extraction with applications to signature verification.
Proceedings of the Document Recognition and Retrieval XII, 2005

SHUM-uCOS: A RTOS using multi-task model to reduce migration cost between SW/HW tasks.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005

Reduce SW/HW Migration Efforts by a RTOS in Multi-FPGA Systems.
Proceedings of the Computer Supported Cooperative Work in Design II, 2005

ESIDE - embedded system integrated design environment based on Eclipse platform.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005

Fast on-line real-time scheduling algorithm for reconfigurable computing.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005

Active Network Approach for Web Caching.
Proceedings of the Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, 2005

A Request-Based Approach to Maintain Object Consistency in Content Distribution Network.
Proceedings of the Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, 2005

ACDN: Active Content Distribution Network.
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005

Research on dynamic supply chain network.
Proceedings of the 7th International Conference on Electronic Commerce, 2005

2004
QoS Requirements of Network Applications on the Internet.
Information, Knowledge, Systems Management, 2004

Web Pre-fetching Using Adaptive Weight Hybrid-Order Markov Model.
Proceedings of the Web Information Systems, 2004

XSeq: An Index Infrastructure for Tree Pattern Queries.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2004

An algebraic approach to practical and scalable overlay network monitoring.
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004

Data Redundancy and Compression Methods for a Disk-Based Network Backup System.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Reversible sketches for efficient and accurate change detection over network data streams.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

The Multistage Approach to Information Extraction in Degraded Document Images.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

Automated Seeded Region Growing Method for Document Image Binarization Based on Topographic Features.
Proceedings of the Image Analysis and Recognition: International Conference, 2004

Decompose-threshold approach to handwriting extraction in degraded historical document images.
Proceedings of the Ninth International Workshop on Frontiers in Handwriting Recognition, 2004

Real-Time Gene-Expression Extraction with Fast Classification (FC) Networks.
Proceedings of the International Conference on Artificial Intelligence, 2004

DiffXML: Change Detection in XML Data.
Proceedings of the Database Systems for Advances Applications, 2004

An Automatic Coverage Analysis for SystemC Using UML and Aspect-Oriented Technology.
Proceedings of the Computer Supported Cooperative Work in Design I, 2004

2003
Aggressive region growing for speckle reduction in ultrasound images.
Pattern Recognition Letters, 2003

Efficient and adaptive Web replication using content clustering.
IEEE Journal on Selected Areas in Communications, 2003

Learning under limited information.
Games and Economic Behavior, 2003

Sketch-based change detection: methods, evaluation, and applications.
Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference, 2003

Tomography-based overlay network monitoring.
Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference, 2003

Comparison of Some Thresholding Algorithms for Text/Background Segmentation in Difficult Document Images.
Proceedings of the 7th International Conference on Document Analysis and Recognition (ICDAR 2003), 2003

Online Data Mining in Franchising Supply Chain Management: A Demonstration in the Apparel Industry.
Proceedings of the 9th Americas Conference on Information Systems, 2003

2002
On the stability of network distance estimation.
SIGMETRICS Performance Evaluation Review, 2002


SCAN: A Dynamic, Scalable, and Efficient Content Distribution Network.
Proceedings of the Pervasive Computing, 2002

Dynamic Replica Placement for Scalable Content Delivery.
Proceedings of the Peer-to-Peer Systems, First International Workshop, 2002

Clustering Web Content for Efficient Replication.
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP 2002), 2002

Efficient Processing of XPath Queries Using Indexes.
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002

2001
Quantifying Network Denial of Service: A Location Service Case Study.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
OceanStore: An Architecture for Global-Scale Persistent Storage.
Proceedings of the ASPLOS-IX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 2000

1998
Real-time Biomechanically-based Muscle Volume Deformation using FEM.
Comput. Graph. Forum, 1998

Physically-based Animation of Volumetric Objects.
Proceedings of the Computer Animation 1998, 1998

1997
An Open Agent Architecture for Integrating Multimedia Services.
Agents, 1997

1992
Experiences: Overcoming Data Transfer Bottlenecks across SUN-Transputer Interfaces.
Computing Systems, 1992

1984
Stable time- and order-recursive algorithm for the adaptive lattice filter.
Proceedings of the IEEE International Conference on Acoustics, 1984


  Loading...