Skip to main content

previous disabled Page of 40
and
  1. No Access

    Chapter and Conference Paper

    Energy-Efficient Dynamic Consolidation of Virtual Machines in Big Data Centers

    There is a rapidly growing demand for computing power driven by big data applications, which is typically met by constructing large-scale data centers provisioning virtualized resources. Such data centers cons...

    Shuting Xu, Chase Q. Wu, Aiqin Hou, Yongqiang Wang in Green, Pervasive, and Cloud Computing (2017)

  2. No Access

    Chapter and Conference Paper

    A Novel Clustering Solution for Wireless Sensor Networks

    Wireless Sensor Network (WSN) deploys a large amount number of nodes into its monitored range, where watchers can monitor the real-time environment parameter by compressing packets transferred by the cluster h...

    Anxi Wang, Shuzhen Pan, Chen Wang, Jian Shen in Green, Pervasive, and Cloud Computing (2017)

  3. Chapter and Conference Paper

    Gazes Induce Similar Sequential Effects as Arrows in a Target Discrimination Task

    Symbolic cueing paradigm has been widely used to investigate the attention orienting induced by centrally-presented gaze or arrow cues. Previous studies have found a sequence effect in this paradigm when arrow...

    Qian Qian, **aoting Wang, Miao Song, Feng Wang in Intelligence Science I (2017)

  4. Chapter and Conference Paper

    Weighting Features Before Applying Machine Learning Methods to Pulsar Search

    In recent years, different Artificial Intelligence methods have been applied to pulsar search, such as Artificial Neural Network method, PEACE Sorting Algorithm, Real-time Classification method. In this paper,...

    Dayang Wang, Qian Yin, Hongfeng Wang in Intelligence Science I (2017)

  5. Chapter and Conference Paper

    Online Shop** Recommendation with Bayesian Probabilistic Matrix Factorization

    Recommendation system plays a crucial role in demand prediction, arousing attention from industry, business, government and academia. Widely employed in recommendation system, matrix factorization can well cap...

    **ming Wu, Zhong Liu, Guangquan Cheng, Qi Wang, **cai Huang in Intelligence Science I (2017)

  6. Chapter and Conference Paper

    Sentiment Analysis of Movie Reviews Based on CNN-BLSTM

    Sentiment analysis has been a hot area in the research field of language understanding, but complex deep neural network used in it is still lacked. In this study, we combine convolutional neural networks (CNNs...

    Qianzi Shen, Zijian Wang, Yaoru Sun in Intelligence Science I (2017)

  7. Chapter and Conference Paper

    Transfer Learning for Music Genre Classification

    Modern music information retrieval system provides high-level features (genre, instrument, mood and so on) for searching and recommending conveniently. Among these music tags, genre is the most widely used in ...

    Guangxiao Song, Zhijie Wang, Fang Han, Shenyi Ding in Intelligence Science I (2017)

  8. Chapter and Conference Paper

    Improved CNN Based on Super-Pixel Segmentation

    Convolutional neural network has unique superiority in images processing, it can effectively extract features and reduce data dimensions by convolution and pooling. But it takes the “violent segmentation” meth...

    Yadong Yang, **aofeng Wang in Intelligence Science I (2017)

  9. Chapter and Conference Paper

    Two Stages Empty Containers Repositioning of Asia-Europe Ship** Routes Under Revenue Maximization

    The problem of empty containers repositioning (ECR) is to dispatch the empty containers coupled with laden containers transportation flow between the surplus ports and the deficit ports according to the fixed ...

    Hengzhen Zhang, Lihua Lu, **aofeng Wang in Intelligence Science I (2017)

  10. Chapter and Conference Paper

    Traffic Parameters Prediction Using a Three-Channel Convolutional Neural Network

    Traffic three elements consisting of flow, speed and occupancy are very important parameters representing the traffic information. Prediction of them is a fundamental problem of Intelligent Transportation Syst...

    Di Zang, Dehai Wang, Jiujun Cheng, Keshuang Tang, **n Li in Intelligence Science I (2017)

  11. No Access

    Chapter and Conference Paper

    TPS: An Efficient VM Scheduling Algorithm for HPC Applications in Cloud

    Cloud computing platforms are becoming viable alternative for running high performance parallel applications. However, when running these applications in cloud platforms, VMs (virtual machines) are easily affecte...

    Duoqiang Wang, Wei Dai, Chi Zhang, Xuanhua Shi in Green, Pervasive, and Cloud Computing (2017)

  12. Chapter and Conference Paper

    A Functional Model of AIS Data Fusion

    In recent years, maritime situational awareness based on the fusion of AIS (Automatic Identification System) data has attracted more and more researchers. However, the diversity of terms and methodologies hind...

    Yongming Wang, Lin Wu in Intelligence Science I (2017)

  13. Chapter and Conference Paper

    A Coding Efficiency Improvement Algorithm for Future Video Coding

    Motion estimation is critical in motion coding. However, the fixed pattern of search center decision method in HEVC is lack of precision. Taking advantage of the surrounding coding unit information, a universa...

    **antao Jiang, **aofeng Wang, Yadong Yang, Tian Song, Wen Shi in Intelligence Science I (2017)

  14. Chapter and Conference Paper

    Discrete Cuckoo Search with Local Search for Max-cut Problem

    Max-cut problem is a well-known NP-hard problem, in this paper, a hybrid meta-heuristic algorithm is designed to solve it. In this algorithm, the discrete cuckoo search is employed to find the approximate sati...

    Yingying Xu, Zhihua Cui, Lifang Wang in Intelligence Science I (2017)

  15. No Access

    Chapter and Conference Paper

    An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition Control

    Digital signatures, with the properties of data integrity and authenticity authentication, protect a signed message from any alteration. However, appropriate alteration of signed message should be allowed for ...

    **hua Ma, Jianghua Liu, Min Wang, Wei Wu in Green, Pervasive, and Cloud Computing (2017)

  16. No Access

    Chapter and Conference Paper

    Decomposable Relaxation for Concurrent Data Structures

    We propose a relaxation scheme for defining specifications of relaxed data structures. It can produce a relaxed specification parameterized with a specification of a standard data structure, a transition cost ...

    Chao Wang, Yi Lv, Peng Wu in SOFSEM 2017: Theory and Practice of Computer Science (2017)

  17. No Access

    Chapter and Conference Paper

    A Compact In-memory Index for Managing Set Membership Queries on Streaming Data

    Membership query of dynamic sets is essential for applications which generate or process a continuous stream of data items. These applications often require to cache items dynamically and answer membership que...

    Yong Wang, **aochun Yun, Shupeng Wang, ** Wang in Big Data Computing and Communications (2016)

  18. No Access

    Chapter and Conference Paper

    NCFR: Network Coding Fair Routing for Multi-success-rate Wireless Sensor Networks

    Recently network coding has become a promising approach to improve the network throughput in wireless networks. However, the existing network coding-based routing protocols can’t well work at improving the net...

    Lvju Wang, Chun Ma, Anwen Wang, Jun Guo, **aoyan Yin, Wei Wang in Human Centered Computing (2016)

  19. No Access

    Chapter and Conference Paper

    BigDataBench-MT: A Benchmark Tool for Generating Realistic Mixed Data Center Workloads

    Long-running service workloads (e.g. web search engine) and short-term data analysis workloads (e.g. Hadoop MapReduce jobs) co-locate in today’s data centers. Develo** realistic benchmarks to reflect such pr...

    Rui Han, Shulin Zhan, Chenrong Shao in Big Data Benchmarks, Performance Optimizat… (2016)

  20. No Access

    Chapter and Conference Paper

    Maximizing the Spread of Positive Influence Under LT-MLA Model

    Since the steady development of online social networks, it has resulted in wide-spread research works in the social network analytical areas, especially in the area of influence maximization. Previous works st...

    Feng Wang, Guojun Wang, Dongqing **e in Advances in Services Computing (2016)

previous disabled Page of 40