Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    Multi-cue-based face and facial feature detection on video segments

    An approach is presented to detect faces and facial features on a video segment based on multi-cues, including gray-level distribution, color, motion, templates, algebraic features and so on. Faces are first d...

    Zhen Yun Peng, HaiZhou Ai, Wei Hong in Journal of Computer Science and Technology (2003)

  2. No Access

    Article

    Integrating mRNA Decay Information into Co-Regulation Study

    Absolute or relative transcript amounts measured through high-throughput technologies (e.g., microarrays) are now commonly used in bioinformatics analysis, such as gene clustering and DNA binding motif finding...

    Liang Chen, Hong-Yu Zhao in Journal of Computer Science and Technology (2005)

  3. No Access

    Article

    Mining fuzzy sequential patterns from quantitative transactions

    Many researchers in database and machine learning fields are primarily interested in data mining because it offers opportunities to discover useful information and important relevant patterns in large database...

    Tzung-Pei Hong, Kuei-Ying Lin, Shyue-Liang Wang in Soft Computing (2006)

  4. No Access

    Article

    Hiding collaborative recommendation association rules

    The concept of Privacy-Preserving has recently been proposed in response to the concerns of preserving personal or sensible information derived from data mining algorithms. For example, through data mining, se...

    Shyue-Liang Wang, Dipen Patel, Ayat Jafari, Tzung-Pei Hong in Applied Intelligence (2007)

  5. No Access

    Article

    A new type of solution method for the generalized linear complementarity problem over a polyhedral cone

    This paper addresses the generalized linear complementarity problem (GLCP) over a polyhedral cone. To solve the problem, we first equivalently convert the problem into an affine variational inequalities proble...

    Hong-Chun Sun, Yan-Liang Dong in International Journal of Automation and Computing (2009)

  6. No Access

    Article

    ArchSim: A System-Level Parallel Simulation Platform for the Architecture Design of High Performance Computer

    High performance computer (HPC) is a complex huge system, of which the architecture design meets increasing difficulties and risks. Traditional methods, such as theoretical analysis, component-level simulation...

    Yong-Qin Huang, Hong-Liang Li, **ang-Hui **e in Journal of Computer Science and Technology (2009)

  7. No Access

    Article

    Physical Implementation of the Eight-Core Godson-3B Microprocessor

    The Godson-3B processor is a powerful processor designed for high performance servers including Dawning Servers. It offers significantly improved performance over previous Godson-3 series CPUs by incorporating...

    Ru Wang, Bao-**a Fan, Liang Yang in Journal of Computer Science and Technology (2011)

  8. No Access

    Article

    Partitioning the Conventional DBT System for Multiprocessors

    Noticeable performance improvement via ever-increasing transistors is gradually trapped into a predicament since software cannot logically and efficiently utilize hardware resource, such as multi-core resource...

    Ru-Hui Ma, Hai-Bing Guan, Er-Zhou Zhu in Journal of Computer Science and Technology (2011)

  9. No Access

    Article

    Risk-neutral evaluation of information security investment on data centers

    Based on given data center network topology and risk-neutral management, this work proposes a simple but efficient probability-based model to calculate the probability of insecurity of each protected resource ...

    Shyue-Liang Wang, Jyun-Da Chen in Journal of Intelligent Information Systems (2011)

  10. No Access

    Article

    Mining Effective Temporal Specifications from Heterogeneous API Data

    Temporal specifications for Application Programming Interfaces (APIs) serve as an important basis for many defect detection tools. As these specifications are often not well documented, various approaches have...

    Qian Wu, Guang-Tai Liang, Qian-**ang Wang in Journal of Computer Science and Technology (2011)

  11. No Access

    Article

    Satisfiability with Index Dependency

    We study the Boolean satisfiability problem (SAT) restricted on input formulas for which there are linear arithmetic constraints imposed on the indices of variables occurring in the same clause. This can be se...

    Hong-Yu Liang, **g He in Journal of Computer Science and Technology (2012)

  12. No Access

    Article

    Efficient Time Synchronization Approach for Wireless Communication Systems on GPP-Based Software-Defined Radio Platform

    General purpose processer (GPP) based software-defined radio (SDR) platforms provide wireless communication system engineers with maximal architecture flexibility and versatility to construct a wideband wirele...

    Yi Huang, Chao Tang, Hong-Liang Duan in Journal of Computer Science and Technology (2013)

  13. No Access

    Article

    Using TF-IDF to hide sensitive itemsets

    Data mining technology helps extract usable knowledge from large data sets. The process of data collection and data dissemination may, however, result in an inherent risk of privacy threats. Some sensitive or ...

    Tzung-Pei Hong, Chun-Wei Lin, Kuo-Tung Yang, Shyue-Liang Wang in Applied Intelligence (2013)

  14. No Access

    Article

    Sound Modulation in Singing Katydids Using Ionic Polymer-Metal Composites (IPMCs)

    Many insect families have evolved to produce and detect complex singing patterns for the purposes of mating, display of dominance, predator escape, and other needs. While the mechanisms of sound production by ...

    Yan Zhou, Cheng-Wei Chiu, Carlos J. Sanchez in Journal of Bionic Engineering (2013)

  15. Article

    Open Access

    Feature selection and replacement by clustering attributes

    Feature selection is to find useful and relevant features from an original feature space to effectively represent and index a given dataset. It is very important for classification and clustering problems, whi...

    Tzung-Pei Hong, Yan-Liang Liou, Shyue-Liang Wang in Vietnam Journal of Computer Science (2014)

  16. No Access

    Article

    Detecting network communities using regularized spectral clustering algorithm

    The progressively scale of online social network leads to the difficulty of traditional algorithms on detecting communities. We introduce an efficient and fast algorithm to detect community structure in social...

    Liang Huang, Ruixuan Li, Hong Chen, **wu Gu, Kunmei Wen in Artificial Intelligence Review (2014)

  17. No Access

    Article

    On anonymizing transactions with sensitive items

    K-anonymity (Samarati and Sweeny 1998; Samarati, IEEE Trans Knowl Data Eng, 13(6):1010–1027, 2001; Sweeny, Int J Uncertain, Fuzziness Knowl-Based Syst, 10(5):557–570, 2002) and its variants, l-di...

    Shyue-Liang Wang, Yu-Chuan Tsai, Hung-Yu Kao, Tzung-Pei Hong in Applied Intelligence (2014)

  18. No Access

    Article

    Cooperative Computing Techniques for a Deeply Fused and Heterogeneous Many-Core Processor Architecture

    Due to advances in semiconductor techniques, many-core processors have been widely used in high performance computing. However, many applications still cannot be carried out efficiently due to the memory wall,...

    Fang Zheng, Hong-Liang Li, Hui Lv, Feng Guo in Journal of Computer Science and Technology (2015)

  19. No Access

    Article

    Bionic Leaves Imitating the Transpiration and Solar Spectrum Reflection Characteristics of Natural Leaves

    A novel thin film organic bionic leaf was prepared by a solution-casting method to simulate the thermal effect of transpiration and solar spectrum reflection characteristics of plant leaves. The main component...

    Hong Ye, Ying Gao, Shimin Li, Liang Guo in Journal of Bionic Engineering (2015)

  20. No Access

    Article

    The GA-based algorithms for optimizing hiding sensitive itemsets through transaction deletion

    Data mining technology is used to extract useful knowledge from very large datasets, but the process of data collection and data dissemination may result in an inherent threat to privacy. Some sensitive or pri...

    Chun-Wei Lin, Tzung-Pei Hong, Kuo-Tung Yang, Shyue-Liang Wang in Applied Intelligence (2015)

previous disabled Page of 3