Skip to main content

previous disabled Page of 2
and
Your search also matched 147 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Study on CORBA-Based Load Balance Algorithm

Include preview-only content
  1. Chapter and Conference Paper

    Tile Percolation: An OpenMP Tile Aware Parallelization Technique for the Cyclops-64 Multicore Processor

    Programming a multicore processor is difficult. It is even more difficult if the processor has software-managed memory hierarchy, e.g. the IBM Cyclops-64 (C64). A widely accepted parallel programming solution ...

    Ge Gan, Xu Wang, Joseph Manzano, Guang R. Gao in Euro-Par 2009 Parallel Processing (2009)

  2. Chapter and Conference Paper

    Analysis of Changes in Agronomic Parameters and Disease Index of Rapeseed Leaf Leukoplakia Based on Spectra

    The non-destructive, rapid and accurate monitoring diagnosis of rapeseed diseases is of significance for sustainable development of rapeseed production and environment protection. The spectrum data of rapeseed...

    Kunya Fu, Hongxin Cao, Wenyu Zhang in Computer and Computing Technologies in Agr… (2016)

  3. Chapter and Conference Paper

    Biomass-Based Leaf Curvilinear Model for Rapeseed (Brassica napus L.)

    Leaf is one of the most important photosynthetic organs of rapeseed (Brassica napus L.). To quantify relationships between the leaf curve and the corresponding leaf biomass for rapeseed on main stem, this paper p...

    Wenyu Zhang, Weixin Zhang, Daokuo Ge in Computer and Computing Technologies in Agr… (2016)

  4. Chapter and Conference Paper

    Rapeseed (Brassica napus L.) Primary Ramification Morphological Structural Model Based on Biomass

    Primary ramification morphogenesis has a significant influence on the yield of rapeseed. In order to quantify the relationship between rapeseed architecture indices and the organ biomass, a rapeseed primary ra...

    Weixin Zhang, Hongxin Cao, Wenyu Zhang in Computer and Computing Technologies in Agr… (2016)

  5. Article

    A consensus model for group decision making under interval type-2 fuzzy environment

    We propose a new consensus model for group decision making (GDM) problems, using an interval type-2 fuzzy environment. In our model, experts are asked to express their preferences using linguistic terms charac...

    **ao-xiong Zhang, Bing-feng Ge, Yue-** Tan in Frontiers of Information Technology & Elec… (2016)

  6. Chapter and Conference Paper

    How Users Distinguish Trees Within a Virtual Environment

    The gaming industry always faces the continual challenges of striking balance between real-time computing performance and graphics presentation quality. This is particularly apparent for a game with vast wildl...

    Ge Gao, Yingjie Chen, Hui Tang in HCI International 2018 – Posters' Extended Abstracts (2018)

  7. Chapter and Conference Paper

    End-to-End Bloody Video Recognition by Audio-Visual Feature Fusion

    With the rapid development of Internet technology, the spread of bloody video has become increasingly serious, causing huge harm to society. In this paper, a bloody video recognition method based on audio-vis...

    Congcong Hou, **aoyu Wu, Ge Wang in Pattern Recognition and Computer Vision (2018)

  8. Chapter and Conference Paper

    Self-Paced Densely Connected Convolutional Neural Network for Visual Tracking

    Convolutional neural networks (CNNs) have achieved surprising results in visual tracking. To address the model drift problem, we propose a novel self-paced densely connected convolutional neural netwrok (SPDCT...

    Daohui Ge, Jianfeng Song, Yutao Qi in Pattern Recognition and Computer Vision (2018)

  9. Chapter and Conference Paper

    A Sparse Substitute for Deconvolution Layers in GANs

    Generative adversarial networks are useful tools in image generation task, but training and running them are relatively slow due to the large amount parameters introduced by their generators. In this paper, S-...

    Juzheng Li, Pengfei Ge, Chuan-**an Ren in Pattern Recognition and Computer Vision (2018)

  10. Chapter and Conference Paper

    Predicting Aesthetic Radar Map Using a Hierarchical Multi-task Network

    The aesthetic quality assessment of images is a challenging work in the field of computer vision because of its complex subjective semantic information. The recent research work can utilize the deep convolutio...

    **n **, Le Wu, **nghui Zhou, Geng Zhao in Pattern Recognition and Computer Vision (2018)

  11. Chapter and Conference Paper

    Improving Large-Scale Fingerprint-Based Queries in Distributed Infrastructure

    Fingerprints are often used in a sketching mechanism, which maps elements into concise and representative synopsis using small space. Large-scale fingerprint-based query can be used as an important tool in big...

    Shupeng Wang, Guangjun Wu, Binbin Li, **n **, Ge Fu in Computational Science – ICCS 2018 (2018)

  12. Chapter and Conference Paper

    Blind Deblurring Using Discriminative Image Smoothing

    This paper aims to exploit the full potential of gradient-based methods, attempting to explore a simple, robust yet discriminative image prior for blind deblurring. The specific contributions are three-fold: ...

    Wenze Shao, Yunzhi Lin, Bingkun Bao, Liqian Wang in Pattern Recognition and Computer Vision (2018)

  13. Chapter and Conference Paper

    Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC

    With the rapid development of IoT devices in the direction of multifunction and personalization, All Programmable SoC has been used more and more frequently because of its unrivaled levels of system performanc...

    **gquan Ge, Neng Gao, Chenyang Tu, Ji **ang, Zeyi Liu, Jun Yuan in Computer Security (2018)

  14. Chapter and Conference Paper

    Multi-source Manifold Outlier Detection

    Outlier detection is an important task in data mining, with many practical applications ranging from fraud detection to public health. However, with the emergence of more and more multi-source data in many rea...

    Lei Zhang, Shupeng Wang, Ge Fu, Zhenyu Wang, Lei Cui in Computational Science – ICCS 2019 (2019)

  15. Chapter and Conference Paper

    Spindle: A Write-Optimized NVM Cache for Journaling File System

    Journaling techniques are widely employed in modern file systems to guarantee crash consistency. However, journaling usually leads to system performance decrease due to the frequent storage accesses it entails...

    Ge Yan, Kaixin Huang, Linpeng Huang in Network and Parallel Computing (2019)

  16. Chapter and Conference Paper

    Synchronized Detection and Recovery of Steganographic Messages with Adversarial Learning

    In this work, we mainly study the mechanism of learning the steganographic algorithm as well as combining the learning process with adversarial learning to learn a good steganographic algorithm. To handle the ...

    Haichao Shi, **ao-Yu Zhang, Shupeng Wang, Ge Fu in Computational Science – ICCS 2019 (2019)

  17. Chapter and Conference Paper

    Parallel Strongly Connected Components Detection with Multi-partition on GPUs

    The graph computing is often used to analyze complex relationships in the interconnected world, and the strongly connected components (SCC) detection in digraphs is a basic problem in graph computing. As graph...

    Junteng Hou, Shupeng Wang, Guangjun Wu, Ge Fu in Computational Science – ICCS 2019 (2019)

  18. Chapter and Conference Paper

    A Fast kNN-Based Approach for Time Sensitive Anomaly Detection over Data Streams

    Anomaly detection is an important data mining method aiming to discover outliers that show significant diversion from their expected behavior. A widely used criteria for determining outliers is based on the nu...

    Guangjun Wu, Zhihui Zhao, Ge Fu, Hai** Wang in Computational Science – ICCS 2019 (2019)

  19. Chapter and Conference Paper

    Effects of Recipient Information and Urgency Cues on Phishing Detection

    Phishing causes significant economic damage and erodes consumer trust in business communication. To better filter phishing emails, researchers have paid a substantial amount of attention to the characteristics...

    **nyue Cui, Yan Ge, Weina Qu, Kan Zhang in HCI International 2020 - Posters (2020)

  20. Chapter and Conference Paper

    Managing Information in the Case of Opinion Spamming

    The rapid innovation of information and communication technology (ICT) within the last decades has come along with the development of new opportunities and challenges, new business models, new systems, etc. Co...

    Li** Ge, Stefan Voß in Design, User Experience, and Usability. Interaction Design (2020)

previous disabled Page of 2