Skip to main content

Page of 6
and
  1. No Access

    Chapter and Conference Paper

    An Integrated Hierarchical Gaussian Mixture Model to Estimate Vigilance Level Based on EEG Recordings

    Effective vigilance level estimation can be used to prevent disastrous accident occurred frequently in high-risk tasks. Brain Computer Interface(BCI) based on ElectroEncephalo-Graph(EEG) is a relatively reliab...

    **g-Nan Gu, Hong-Jun Liu, Hong-Tao Lu, Bao-Liang Lu in Neural Information Processing (2011)

  2. No Access

    Chapter and Conference Paper

    Heuristic Evolutionary Approach for Weighted Circles Layout

    In order to improve lack of GA, we combined it with case-based reasoning(CBR) and constructing non-isomorphic layout pattern (NILP) to solve layout problem in this paper. Its basic idea includes 2 components: ...

    Zi-qiang Li, Hong-liang Zhang, **-hua Zheng, Meng-juan Dong in Information and Automation (2011)

  3. No Access

    Chapter and Conference Paper

    Automated Detection of Major Thoracic Structures with a Novel Online Learning Method

    This paper presents a novel on-line learning method for automatically detecting anatomic structures in medical images. Conventional off-line learning requires collecting all representative samples before the c...

    Nima Tajbakhsh, Hong Wu, Wenzhe Xue, Jianming Liang in Machine Learning in Medical Imaging (2011)

  4. No Access

    Chapter and Conference Paper

    A Heuristic Data-Sanitization Approach Based on TF-IDF

    Data mining technology can help extract useful knowledge from large data sets. The process of data collection and data dissemination may, however, result in an inherent risk of privacy threats. In this paper, ...

    Tzung-Pei Hong, Chun-Wei Lin, Kuo-Tung Yang in Modern Approaches in Applied Intelligence (2011)

  5. No Access

    Chapter and Conference Paper

    Anonymizing Shortest Paths on Social Network Graphs

    Social networking is gaining enormous popularity in the past few years. However, the popularity may also bring unexpected consequences for users regarding safety and privacy concerns. To prevent privacy being ...

    Shyue-Liang Wang, Zheng-Ze Tsai in Intelligent Information and Database Syste… (2011)

  6. No Access

    Article

    Physical Implementation of the Eight-Core Godson-3B Microprocessor

    The Godson-3B processor is a powerful processor designed for high performance servers including Dawning Servers. It offers significantly improved performance over previous Godson-3 series CPUs by incorporating...

    Ru Wang, Bao-**a Fan, Liang Yang in Journal of Computer Science and Technology (2011)

  7. No Access

    Article

    Partitioning the Conventional DBT System for Multiprocessors

    Noticeable performance improvement via ever-increasing transistors is gradually trapped into a predicament since software cannot logically and efficiently utilize hardware resource, such as multi-core resource...

    Ru-Hui Ma, Hai-Bing Guan, Er-Zhou Zhu in Journal of Computer Science and Technology (2011)

  8. No Access

    Article

    Risk-neutral evaluation of information security investment on data centers

    Based on given data center network topology and risk-neutral management, this work proposes a simple but efficient probability-based model to calculate the probability of insecurity of each protected resource ...

    Shyue-Liang Wang, Jyun-Da Chen in Journal of Intelligent Information Systems (2011)

  9. No Access

    Article

    Mining Effective Temporal Specifications from Heterogeneous API Data

    Temporal specifications for Application Programming Interfaces (APIs) serve as an important basis for many defect detection tools. As these specifications are often not well documented, various approaches have...

    Qian Wu, Guang-Tai Liang, Qian-**ang Wang in Journal of Computer Science and Technology (2011)

  10. No Access

    Chapter and Conference Paper

    A Smart-Phone-Based Health Management System Using a Wearable Ring-Type Pulse Sensor

    In this paper, a mobile e-health-management system is presented which extends authors’ previous works on mobile physiological signal monitoring. This system integrates a wearable ring-type pulse monitoring sen...

    Yu-Chi Wu, Wei-Hong Hsu, Chao-Shu Chang in Mobile and Ubiquitous Systems: Computing, … (2012)

  11. No Access

    Chapter and Conference Paper

    Discussion on Digital Storytelling in Comprehensive Practice Courses Application

    The increasing development of computer and information technology has brought new challenges as well as opportunities to education. As a way of personal multimedia storytelling, digital storytelling is very po...

    JiangYan Zheng, Hao Zhang, Liang Hong in Advances in Computer Science and Education (2012)

  12. No Access

    Chapter and Conference Paper

    The Research of Serially Concatenated FQPSK Demodulation Based on LDPC Codes

    As a kind of modulation with high degree of both power and bandwidth efficiency, Filtered QPSK (FQPSK) has been widely applied in the satellite and deep space communication. This paper first investigates the M...

    Gao Yuan Zhang, Hong Wen, Liang Zhou, Ling Yang in Communication and Networking (2012)

  13. No Access

    Article

    Satisfiability with Index Dependency

    We study the Boolean satisfiability problem (SAT) restricted on input formulas for which there are linear arithmetic constraints imposed on the indices of variables occurring in the same clause. This can be se...

    Hong-Yu Liang, **g He in Journal of Computer Science and Technology (2012)

  14. No Access

    Chapter and Conference Paper

    Edge Selection for Degree Anonymization on K Shortest Paths

    Privacy preserving network publishing has been studied extensively in recent years. Although more works have adopted un-weighted graphs to model network relationships, weighted graph modeling can provide deepe...

    Shyue-Liang Wang, Ching-Chuan Shih in The 3rd International Workshop on Intellig… (2013)

  15. No Access

    Chapter and Conference Paper

    K-Neighborhood Shortest Path Privacy in the Cloud

    Preserving privacy on various forms of published data has been studied extensively in recent years. In particular, shortest distance computing in the cloud, while maintaining neighborhood privacy, attracts lat...

    Shyue-Liang Wang, Jia-Wei Chen, I-Hsien Ting in The 3rd International Workshop on Intellig… (2013)

  16. No Access

    Chapter and Conference Paper

    SMBSRP: A Search Mechanism Based on Interest Similarity, Query Relevance and Distance Prediction

    In the study of unstructured peer-to-peer networks, due to the lack of network structure, efficient search for resource discovery remains a fundamental challenge. With a combination of the Vector Space Model, ...

    Fen Wang, Changsheng **e, Hong Liang in Advances in Computational Intelligence (2013)

  17. No Access

    Chapter and Conference Paper

    Information Technology Education Based on Cloud Computing

    Cloud computing era has brought new development ideas for the education information of our country. This paper has summarized and analyzed the definition and computing features of cloud computing combined with...

    Jiangyan Zheng, Shijie Cao, Jianhui Zheng in Information Computing and Applications (2013)

  18. No Access

    Chapter

    Emergence of Specialization in a Swarm of Robots

    We investigate the emergence of specialized groups in a swarm of robots, using a simplified version of the stick-pulling problem [5], where the basic task requires the collaboration of two robots in asymmetric...

    Ádám M. Halász, Yanting Liang, M. Ani Hsieh in Distributed Autonomous Robotic Systems (2013)

  19. No Access

    Article

    Efficient Time Synchronization Approach for Wireless Communication Systems on GPP-Based Software-Defined Radio Platform

    General purpose processer (GPP) based software-defined radio (SDR) platforms provide wireless communication system engineers with maximal architecture flexibility and versatility to construct a wideband wirele...

    Yi Huang, Chao Tang, Hong-Liang Duan in Journal of Computer Science and Technology (2013)

  20. No Access

    Article

    Using TF-IDF to hide sensitive itemsets

    Data mining technology helps extract usable knowledge from large data sets. The process of data collection and data dissemination may, however, result in an inherent risk of privacy threats. Some sensitive or ...

    Tzung-Pei Hong, Chun-Wei Lin, Kuo-Tung Yang, Shyue-Liang Wang in Applied Intelligence (2013)

Page of 6