Skip to main content

previous disabled Page of 26
and
  1. No Access

    Chapter and Conference Paper

    Control of bottlenecks in a network database machine

    An analysis of various response times for a proposed network multiprocessor database machine is given in this paper. The insights gained should lead to better database machine designs. Our systems is based on ...

    T. A. Marsland, L. Meng in Advances in Computing and Information — ICCI '90 (1990)

  2. No Access

    Chapter and Conference Paper

    Hamiltonian cycles in 2-generated Cayley digraphs of abelian groups

    We give a necessary and sufficient condition for 2-generated Cayley digraphs of abelian groups to be hamiltonian or to be hamiltonian decomposable. As applications, we derive the counting formula for the numbe...

    Jixiang Meng in Computing and Combinatorics (1995)

  3. No Access

    Chapter and Conference Paper

    Superconnectivity for minimal multi-loop networks

    We show that the minimal multi-loop networks are super-k except for undirected cycles.

    Jixiang Meng in Computing and Combinatorics (1996)

  4. No Access

    Chapter and Conference Paper

    A Framework for Exploiting Object Parallelism in Distributed Systems

    To support parallel computing in a distributed object-based computing platform, a uniform high performance distributed object architecture layer is necessary. In this paper, we propose a distributed object-bas...

    Chen Wang, Yong Meng Teo in High Performance Computing and Networking (2000)

  5. No Access

    Chapter and Conference Paper

    A Faster Genetic Clustering Algorithm

    This paper presents a novel genetic clustering algorithm combining a genetic algorithm (GA) with the classical hard c-means clustering algorithm (HCMCA). It processes partition matrices rather than sets of center...

    L Meng, Q H Wu, Z Z Yong in Real-World Applications of Evolutionary Computing (2000)

  6. No Access

    Chapter and Conference Paper

    Camera Models and Optical Systems Used in Computer Graphics: Part I, Object-Based Techniques

    Images rendered with traditional computer graphics techniques, such as scanline rendering and ray tracing, appear focused at all depths. However, there are advantages to having blur, such as adding realism to ...

    Brian A. Barsky, Daniel R. Horn in Computational Science and Its Applications… (2003)

  7. No Access

    Chapter and Conference Paper

    Camera Models and Optical Systems Used in Computer Graphics: Part II, Image-Based Techniques

    In our companion paper [5], we described the optics underlying camera models that have been used in computer graphics, and presented object space techniques for rendering with those models. In this paper, we surv...

    Brian A. Barsky, Daniel R. Horn in Computational Science and Its Applications… (2003)

  8. No Access

    Chapter and Conference Paper

    Space-Economical Reassembly for Intrusion Detection System

    The reassembly of IP fragments and TCP streams are very important in Intrusion Detection Systems (IDS). However, existing reassembly algorithms that cache fragments entirely are memory-greedy. It is vulnerable...

    Meng Zhang, Jiu-bin Ju in Information and Communications Security (2003)

  9. Chapter and Conference Paper

    Life Cycle Modeling of News Events Using Aging Theory

    In this paper, an adaptive news event detection method is proposed. We consider a news event as a life form and propose an aging theory to model its life span. A news event becomes popular with a burst of news...

    Chien Chin Chen, Yao-Tsung Chen, Yeali Sun, Meng Chang Chen in Machine Learning: ECML 2003 (2003)

  10. No Access

    Chapter and Conference Paper

    The Design and Implementation of Chinese Question and Answering System

    Information retrieval has been proven effective in discovering specific passages within large collections of documents in response to a user query. Users frequently obtain brief answers to specific questions i...

    I.-Heng Meng, Wei-Pang Yang in Computational Science and Its Applications — ICCSA 2003 (2003)

  11. No Access

    Chapter and Conference Paper

    Solution to the Fixed Airbase Problem for Autonomous URAV Site Visitation Sequencing

    In [1], we modeled the problem of safe site visitation sequencing for an unmanned reconnaissance aerial vehicle (URAV) in graph-theoretic language. Our goal was to uncover several alternative flight paths alon...

    Amit Agarwal, Meng-Hiot Lim, Chan Yee Chew in Genetic and Evolutionary Computation – GEC… (2004)

  12. No Access

    Chapter and Conference Paper

    Inflight Rerouting for an Unmanned Aerial Vehicle

    The availability of new information can often necessitate rerouting of a vehicle. In [1], the set of nonoverlap** useful vicinities of the reconnaissance sites, S, and the 3D space over them was represented usi...

    Amit Agarwal, Meng-Hiot Lim in Genetic and Evolutionary Computation – GEC… (2004)

  13. No Access

    Chapter and Conference Paper

    The Study on Crack Diagnosis Based on Fuzzy Neural Networks Using Different Indexes

    Fuzzy neural networks fault diagnosis technology and diagnosis mode are used to diagnose cracks. It is trained with promoted BP arithmetic. The faults of cracked cantilever plate are diagnosed. Firstly the mod...

    **gfen Zhang, Guang Meng, Deyou Zhao in Advances in Neural Networks - ISNN 2004 (2004)

  14. No Access

    Chapter and Conference Paper

    Investigations into the Use of Supervised Multi-agents for Web Documents Categorization

    The self-organization behavior exhibited by ants may be modeled to solve real world clustering problems. The general idea of artificial ants walking around in search space to pick up, or drop an item based upo...

    Siok Lan Ong, Weng Kin Lai, Tracy S. Y. Tai, Choo Hau Ooi in Neural Information Processing (2004)

  15. No Access

    Chapter and Conference Paper

    A New Neural Network for Nonlinear Constrained Optimization Problems

    In this paper we introduce a new neural network for solving nonlinear constrained optimization problems. The energy function for the neural network with its neural dynamics is obtained from an application of t...

    Zhiqing Meng, Chuangyin Dang, Gengui Zhou in Advances in Neural Networks – ISNN 2004 (2004)

  16. Chapter and Conference Paper

    SuperNBD: An Efficient Network Storage Software for Cluster

    Networked storage has become an increasingly common and essential component for cluster. In this environment, the network storage software through which the client nodes can directly access remote network atta...

    Rongfeng Tang, Dan Meng, ** **ong in Network and Parallel Computing (2004)

  17. No Access

    Chapter and Conference Paper

    A Neural Network Model on Solving Multiobjective Conditional Value-at-Risk

    Conditional Value-at-Risk (CVaR) is a new approach for credit risk optimization in the field of finance engineering. This paper introduces the concept of α-CVaR for the case of multiple losses under the confidenc...

    Min Jiang, Zhiqing Meng, Qiying Hu in Advances in Neural Networks - ISNN 2004 (2004)

  18. Chapter and Conference Paper

    ALiCE: A Scalable Runtime Infrastructure for High Performance Grid Computing

    This paper discusses a Java-based grid computing middleware, ALiCE, to facilitate the development and deployment of generic grid applications on heterogeneous shared computing resources. The ALiCE layered grid...

    Yong-Meng Teo, **anbing Wang in Network and Parallel Computing (2004)

  19. No Access

    Chapter and Conference Paper

    The Algorithm for Detecting Hiding Information Based on SVM

    Steganographic messages can be embedded into digital image while most methods in use today are invisible to an observer’s senses. Mathematical analysis may reveal statistical anomalies in the stego images. Sin...

    JiFeng Huang, JiaJun Lin, **aoFu He, Meng Dai in Advances in Neural Networks - ISNN 2004 (2004)

  20. No Access

    Chapter and Conference Paper

    Learning to Fuse 3D+2D Based Face Recognition at Both Feature and Decision Levels

    2D intensity images and 3D shape models are both useful for face recognition, but in different ways. While algorithms have long been developed using 2D or 3D data, recently has seen work on combining both into...

    Stan Z. Li, ChunShui Zhao, Meng Ao in Analysis and Modelling of Faces and Gestures (2005)

previous disabled Page of 26