Skip to main content

previous disabled Page of 2
and
  1. Chapter and Conference Paper

    XVERSA: An integrated graphical and textual toolset for the specification and analysis of resource-bound real-time systems

    We present XVERSA, a set of tools for the specification and analysis of resource-bound real-time systems. XVERSA facilitates the use of the Algebra of Communicating Shared Resources (ACSR), a real-time process...

    Duncan Clarke, Hanêne Ben-Abdallah, Insup Lee in Computer Aided Verification (1996)

  2. No Access

    Chapter and Conference Paper

    A Bayesian Approach to Audio-Visual Speaker Identification

    In this paper we describe a text dependent audio-visual speaker identification approach that combines face recognition and audio-visual speech-based identification systems. The temporal sequence of audio and v...

    Ara V. Nefian, Lu Hong Liang, Tieyan Fu in Audio- and Video-Based Biometric Person Au… (2003)

  3. No Access

    Chapter and Conference Paper

    Distributed English Text Chunking Using Multi-agent Based Architecture

    The traditional English text chunking approach identifies phrases by using only one model and phrases with the same types of features. It has been shown that the limitations of using only one model are that: t...

    Ying-Hong Liang, Tie-Jun Zhao in MICAI 2005: Advances in Artificial Intelligence (2005)

  4. Chapter and Conference Paper

    A Secure Global State Routing for Mobile Ad Hoc Networks

    The secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the Mobile Ad Hoc networking (MANET) paradigm. Secure Global State Routing Protocol (SGSR) propose...

    Chen **g, Cui Guo Hua, Hong Liang in Personal Wireless Communications (2006)

  5. No Access

    Chapter and Conference Paper

    Virtual Container Based Consistent Cluster Checkpoint

    Checkpoint can store and recovery applications when faults happen and is becoming critical to large information systems. Unfortunately, existing checkpoint tools have some limitations such as: not transparent ...

    **ao-jia **ang, Hong-liang Yu, Ji-wu Shu in Control and Automation (2009)

  6. No Access

    Chapter and Conference Paper

    Extraction of Chinese-English Phrase Translation Pairs

    Phrase translation pairs are very useful for bilingual lexicography, machine translation system, cross-lingual information retrieval and many applications in natural language processing. In this paper, we alig...

    Chun-**ang Zhang, Ming-Yuan Ren, Zhi-Mao Lu in Computer Science for Environmental Enginee… (2011)

  7. No Access

    Chapter and Conference Paper

    Heuristic Evolutionary Approach for Weighted Circles Layout

    In order to improve lack of GA, we combined it with case-based reasoning(CBR) and constructing non-isomorphic layout pattern (NILP) to solve layout problem in this paper. Its basic idea includes 2 components: ...

    Zi-qiang Li, Hong-liang Zhang, **-hua Zheng, Meng-juan Dong in Information and Automation (2011)

  8. No Access

    Chapter and Conference Paper

    Automatic Image Annotation Based on Relevance Feedback

    An image automatic annotation algorithm based on relevance feedback is proposed. Firstly, images are segmented into regions, and then the regions can generate blobs according to image features using clustering...

    Ke Chen, Ye Liang, Ying-Hong Liang in Intelligent Computing Theories and Applica… (2012)

  9. No Access

    Chapter and Conference Paper

    The English Unknown Term Translation Mining with Improved Bilingual Snippets Collection Strategy

    Traditional bilingual snippets retrieval method is to select the top N snippets returned from web search engine as bilingual corpora. In this paper, an improved bilingual snippets retrieval method is proposed....

    Ying-Hong Liang, **-**ang Li, Liang Ye in Intelligent Computing Theories and Applica… (2012)

  10. No Access

    Chapter and Conference Paper

    SMBSRP: A Search Mechanism Based on Interest Similarity, Query Relevance and Distance Prediction

    In the study of unstructured peer-to-peer networks, due to the lack of network structure, efficient search for resource discovery remains a fundamental challenge. With a combination of the Vector Space Model, ...

    Fen Wang, Changsheng **e, Hong Liang in Advances in Computational Intelligence (2013)

  11. Chapter and Conference Paper

    The Relationship between Preference and Stare Duration on Bicycle

    Take bicycle industry as an example, the purpose of this research is to investigate the preference of consumer. With the using of eye-tracker, we expect to discover the relationship between preference of produ...

    **-Han Tseng, Ding-Bang Luh, Zhi-Hong Liang in Design, User Experience, and Usability. We… (2013)

  12. No Access

    Chapter and Conference Paper

    Effects of Straw and Simulated Root Exudates on Aggregate Dynamics and Aggregate-Associated Carbon in Consideration of FACE Condition

    In order to investigate the role of residue and root carbon inputs in soil carbon changes due to elevated CO2, soil sample weighted 500 g collected from field under elevated CO2 and ambient CO2 condition, respect...

    Hong-liang Ma, Jian-guo Zhu, Zu-bin **e in Geo-Informatics in Resource Management and… (2013)

  13. No Access

    Chapter and Conference Paper

    Modeling and Simulating the Walking Behavior of Small Pedestrian Groups

    In the virtual environment, the current methods can simulate some virtual human behaviors realistically. However, these methods take the crowd as a collection of separate individuals, which is difficult to gen...

    Yue-Wen Fu, Meng Li, Jia-Hong Liang, **ao-Qian Hu in AsiaSim 2014 (2014)

  14. No Access

    Chapter and Conference Paper

    A Novel Capacity-Aware SIC-Based Protocol for Wireless Networks

    Successive interference cancellation (SIC) enables a receiver to receive multiple frames concurrently, thereby improving the physical-layer (PHY) capacity significantly. However, a larger PHY capacity does not...

    Fangxin Xu, Qinglin Zhao, Shumin Yao in Wireless Algorithms, Systems, and Applicat… (2018)

  15. No Access

    Chapter and Conference Paper

    A Data Integrity Verification Scheme Based on Blockchain and Blind Homomorphic Tags

    With the advent of big data, users’ data is usually outsourced to the cloud. However, users will lose the absolute control over the data and its integrity is hard to be guaranteed. Currently, the most effectiv...

    Shuai Huang, **g **ao, Hong-liang Mao, Mu-ran Su in Blockchain and Trustworthy Systems (2020)

  16. No Access

    Chapter and Conference Paper

    Persistent Feature Analysis of Multimodal Brain Networks Using Generalized Fused Lasso for EMCI Identification

    Early Mild Cognitive Impairment (EMCI) involves very subtle changes in brain pathological process, and thus identification of EMCI can be challenging. By jointly analyzing cross-information among different neu...

    ** Li, Chenyuan Bian, Dandan Chen in Medical Image Computing and Computer Assis… (2020)

  17. No Access

    Chapter and Conference Paper

    Wi-Sector - A Novel Sector-Based WiFi Scheduling

    In dense WiFi networks, transmission collisions become more and more serious. Conventional mechanisms only have limited performance improvement. In this paper, we borrow the hard-disk sector idea to sectorize ...

    Jie Yang, Li Feng, Hong Liang, Tong ** in Cyberspace Data and Intelligence, and Cybe… (2020)

  18. No Access

    Chapter and Conference Paper

    Identifying Spammers by Completing the Ratings of Low-Degree Users

    Along with the rapid development of e-commerce, a large number of spammers disrupt the fair order of the e-commerce platform. The false ratings rated by these spammers do not match the quality of items, confus...

    Guo-Hua Li, Jun Wu, Hong-Liang Sun in Big Data and Social Computing (2022)

  19. No Access

    Chapter and Conference Paper

    Research on Cost-Benefit Evaluation Model of Social Security Project Based on Fuzzy Entropy

    At present, there is no uniform standard for the cost estimation of social security projects for reference, and the cost composition and estimation contents of projects under the self-management mode of all re...

    yi-huo Jiang, Wen-bing Jiang, Hong-liang Ni in Advanced Hybrid Information Processing (2022)

  20. No Access

    Chapter and Conference Paper

    Research on Evaluation Model of Social Network Information Management Based on Asymmetric Fuzzy Algorithm

    The existing evaluation model of the index system and the weight of each index is not perfect, leading ...

    yi-huo Jiang, Wen-bing Jiang, Hong-liang Ni in Advanced Hybrid Information Processing (2022)

previous disabled Page of 2