Skip to main content

previous disabled Page of 8
and
  1. Chapter and Conference Paper

    SuperNBD: An Efficient Network Storage Software for Cluster

    Networked storage has become an increasingly common and essential component for cluster. In this environment, the network storage software through which the client nodes can directly access remote network atta...

    Rongfeng Tang, Dan Meng, ** **ong in Network and Parallel Computing (2004)

  2. Chapter and Conference Paper

    ALiCE: A Scalable Runtime Infrastructure for High Performance Grid Computing

    This paper discusses a Java-based grid computing middleware, ALiCE, to facilitate the development and deployment of generic grid applications on heterogeneous shared computing resources. The ALiCE layered grid...

    Yong-Meng Teo, **anbing Wang in Network and Parallel Computing (2004)

  3. No Access

    Chapter and Conference Paper

    A Constant Time Optimal Routing Algorithm for Undirected Double-Loop Networks

    Undirected double-loop networks G(n; ± s 1, ± s 2), where n is the number of its nodes, s 1 and s 2 are its steps, 1 ≤ s ...

    Bao-**ng Chen, Ji-**ang Meng, Wen-Jun **ao in Mobile Ad-hoc and Sensor Networks (2005)

  4. Chapter and Conference Paper

    Design and Implementation of a SAN Agent for Windows NT Architecture

    In an out-of-band SAN virtualization system, the virtualization appliance maintains metadata, and the agents inside the kernel of servers use that data to supply virtual storage devices and to perform the mapp...

    Ran Meng, Jiwu Shu, Wei Xue in Network and Parallel Computing (2005)

  5. No Access

    Chapter and Conference Paper

    A Dynamic Face and Fingerprint Fusion System for Identity Authentication

    This paper presents a novel dynamic face and fingerprint fusion system for identity authentication. To solve the face pose problem in dynamic authentication system, multi-route detection and parallel processin...

    Jun Zhou, Guangda Su, Yafeng Deng, Kai Meng in Computational Intelligence and Security (2005)

  6. No Access

    Chapter and Conference Paper

    Using Verb Dependency Matching in a Reading Comprehension System

    In this paper, we describe a reading comprehension system. This system can return a sentence in a given document as the answer to a given question. This system applies bag-of-words matching approach as the bas...

    Kui Xu, Helen Meng in Information Retrieval Technology (2005)

  7. No Access

    Chapter and Conference Paper

    Applying Service Composition in Digital Museum Grid

    Digital museum is an effective method of protecting and using resources stored in museums. Digital museum grid was present to efficiently and effectively organize, present and share the resources over heteroge...

    **angxu Meng, Shijun Liu, Rui Wang in Parallel and Distributed Processing and Ap… (2005)

  8. No Access

    Chapter and Conference Paper

    An Authorization Framework Based on Constrained Delegation

    In this paper, we distinguish between authorization problems at management level and request level in open decentralized systems, using delegation for flexible and scalable authorization management. The delega...

    Gang Yin, Meng Teng, Huai-min Wang, Yan Jia in Parallel and Distributed Processing and Ap… (2005)

  9. No Access

    Chapter and Conference Paper

    Study on Application Server Aging Prediction Based on Wavelet Network with Hybrid Genetic Algorithm

    Software aging is an important factor that affects the software reliability. According to the characteristic of performance parameters of application sever middleware, a new model for software aging prediction...

    Meng Hai Ning, Qi Yong, Hou Di, Liu Liang in Parallel and Distributed Processing and Ap… (2006)

  10. No Access

    Chapter and Conference Paper

    A New Precomputation Scheme for MPLS Traffic Engineering Routing

    This paper presents a new precomputation algorithm for Multi Protocol Label Switching (MPLS) traffic engineering routing. The prior MPLS routing algorithms try to minimize the interference between different so...

    Zhaowei Meng, **shu Su, Vittorio Manetti in Distributed Computing and Networking (2006)

  11. No Access

    Chapter and Conference Paper

    Evaluation of the Device Driver Availability in Dawning4000A

    Device drivers were claimed to be the most error prone in kernel source. A lot of error tolerance or error prevention approaches have been developed or suggested after this claim. But after analyzing the event...

    Yuanxia You, Dan Meng, Gang Xue, Jie Ma in Advances in Grid and Pervasive Computing (2006)

  12. No Access

    Chapter and Conference Paper

    An Efficient K-Coverage Eligibility Algorithm on Sensor Networks

    Wireless sensor networks are employed in many critical applications. The K-coverage configuration is usually adopted to guarantee the quality of surveillance. A sensor node can be determined to be ineligible to s...

    Meng-Chun Wueng, Shyh-In Hwang in Parallel and Distributed Processing and Applications (2006)

  13. No Access

    Chapter and Conference Paper

    A New Hybrid Traffic Engineering Routing Algorithm for Bandwidth Guaranteed Traffic

    This paper presents a new hybrid traffic engineering routing algorithm for bandwidth guaranteed traffic. Former traffic engineering routing algorithms mainly optimize one of the three objectives: minimizing th...

    Zhaowei Meng, **shu Su, Stefano Avallone in Technologies for Advanced Heterogeneous Ne… (2006)

  14. No Access

    Chapter and Conference Paper

    A Centralized Network Design Problem with Genetic Algorithm Approach

    A centralized network is a network where all communication is to and from a single site. In the combinatorial optimization literature, this problem is formulated as the capacitated minimum spanning tree proble...

    Gengui Zhou, Zhenyu Cao, Jian Cao, Zhiqing Meng in Computational Intelligence and Security (2007)

  15. No Access

    Chapter and Conference Paper

    A Multi-classification Method of Temporal Data Based on Support Vector Machine

    This paper studies a multi-classification method based on support vector machine for temporal data. First, we give classic classification model of support vector machine. Then, we present a support vector mach...

    Zhiqing Meng, Lifang Peng, Gengui Zhou in Computational Intelligence and Security (2007)

  16. No Access

    Chapter and Conference Paper

    Small-World Network Inspired Trustworthy Web Service Evaluation and Management Model

    The trustworthiness between anonymous web service client and provider influences service stability and collaboration. Trustworthiness includes some aspects such as service’s security, controllability and survi...

    Qinghua Meng, Yongsheng Ding in Advances in Grid and Pervasive Computing (2007)

  17. No Access

    Chapter and Conference Paper

    Online Speed Profile Generation for Industrial Machine Tool Based on Neuro-fuzzy Approach

    The paper presents the online smooth speed profile generator used in trajectory interpolation in milling machines. Smooth kinematics profile is obtained by imposing limit on the jerk - which is the first deriv...

    Leszek Rutkowski, Andrzej Przybył in Artifical Intelligence and Soft Computing (2010)

  18. No Access

    Chapter and Conference Paper

    Global Exponential Stability Analysis of a General Class of Hopfield Neural Networks with Distributed Delays

    In this paper, based on contraction map** principle and differential inequality technique, we investigate global exponential stability of a general class of Hopfield neural networks with distributed delays. ...

    Chao** Fu, Wei Liu, Meng Yang in Advances in Swarm Intelligence (2010)

  19. No Access

    Chapter and Conference Paper

    A Non-dominated Sorting Bit Matrix Genetic Algorithm for P2P Relay Optimization

    Cooperative caching and relaying content in ISPs can decrease the bandwidth costs and distribution time. The relay resources installed at ISP are limited and the upload rates of relay servers are various. Afte...

    Qian He, Junliang Chen, **angwu Meng, Yanlei Shang in Advances in Swarm Intelligence (2010)

  20. No Access

    Chapter and Conference Paper

    On Automatic Design of Neuro-fuzzy Systems

    In this paper we propose a new approach for automatic design of neuro-fuzzy systems. We apply evolutionary strategy to determine the number of rules, number of antecedents, number of inputs, and number of disc...

    Krzysztof Cpałka, Leszek Rutkowski in Artificial Intelligence and Soft Computing (2010)

previous disabled Page of 8