Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    3D Hand Pose Reconstruction with ISOSOM

    We present an appearance-based 3D hand posture estimation method that determines a ranked set of possible hand posture candidates from an unmarked hand image, based on an analysis by synthesis method and an im...

    Haiying Guan, Matthew Turk in Advances in Visual Computing (2005)

  2. No Access

    Chapter and Conference Paper

    A Probabilistic Model for Music Recommendation Considering Audio Features

    In order to make personalized recommendations, many collaborative music recommender systems (CMRS) focused on capturing precise similarities among users or items based on user historical ratings. Despite the v...

    Qing Li, Sung Hyon Myaeng, Dong Hai Guan in Information Retrieval Technology (2005)

  3. No Access

    Chapter and Conference Paper

    Model-Aided Metadata Management for Wireless Sensor Networks

    Metadata are abstraction and knowledge of wireless sensor networks and are used to provide adequate information for query processing. The purpose of metadata management is to provide adequate information for q...

    Chongqing Zhang, Haibing Guan, Minglu Li in Advances in Grid and Pervasive Computing (2006)

  4. No Access

    Chapter and Conference Paper

    Context-Aware Adaptation for Media Delivery in Pervasive Computing Environment

    A robust solution for context-aware multimedia delivery in the pervasive computing environment remains a challenging problem. Its heterogeneous and dynamic nature demands a more flexible and intelligent framew...

    Wenzhe Zhang, Haibing Guan, Minglu Li in Advances in Grid and Pervasive Computing (2006)

  5. No Access

    Chapter and Conference Paper

    Ant Algorithm Applied in the Minimal Cost Maximum Flow Problem

    The minimal cost maximum flow problem is a classical combinational optimization problem. Based on the characteristic of ant algorithm and the minimal cost maximum flow problem, a graph mode is presented to use...

    Min **e, Lixin Gao, Haiwa Guan in Advanced Intelligent Computing Theories an… (2008)

  6. No Access

    Chapter and Conference Paper

    MTCrossBit: A Dynamic Binary Translation System Using Multithreaded Optimization Framework

    Conventional optimization algorithms which are widely used in static compiler—including peephole, instruction selection, Graph coloring register allocation, and so on—cannot be effectively implemented in DBT (...

    **aolong Li, Deen Zheng, Ruhui Ma in Algorithms and Architectures for Parallel … (2009)

  7. No Access

    Chapter and Conference Paper

    A Novel System for Robust Text Location and Recognition of Book Covers

    Text location and recognition is a vital and fundamental problem of processing images. In this paper we propose a novel system for text location and recognition focused on book covers. Our work consists of two...

    Zhiyuan Zhang, Kaiyue Qi, Kai Chen, Chenxuan Li, Jianbo Chen in Computer Vision – ACCV 2009 (2010)

  8. No Access

    Chapter and Conference Paper

    Flexible Endian Adjustment for Cross Architecture Binary Translation

    Different architectures and/or ISA (Instruction Set Architecture) representations hold different data arranging formats in the memory. Therefore, the adjustment of byte packing order (endianness) is indispensa...

    Tong Zhu, Bo Liu, Haibing Guan, Alei Liang in Advanced Research on Electronic Commerce, … (2011)

  9. No Access

    Chapter and Conference Paper

    Text Localization and Recognition in Complex Scenes Using Local Features

    We describe an approach using local features to resolve problems in text localization and recognition in complex scenes. Low image quality, complex background and variations of text make these problems challen...

    Qi Zheng, Kai Chen, Yi Zhou, Congcong Gu, Haibing Guan in Computer Vision – ACCV 2010 (2011)

  10. No Access

    Chapter and Conference Paper

    A Improved Clustering Analysis Method Based on Fuzzy C-Means Algorithm by Adding PSO Algorithm

    Fuzzy c-means algorithm (FCM) is one of the most widely used clustering methods for modern medical image segmentation applications. However the conventional FCM algorithm has certain possibilities of convergin...

    Liang Pang, Kai **ao, Alei Liang, Haibing Guan in Hybrid Artificial Intelligent Systems (2012)

  11. No Access

    Chapter and Conference Paper

    Fuzzy C-means Clustering with Bilateral Filtering for Medical Image Segmentation

    Fuzzy c-means (FCM) is a widely used unsupervised pattern recognition method for medical image segmentation. The conventional FCM algorithm and some existing variants are either sensitive to noise or prone to ...

    Yuchen Liu, Kai **ao, Alei Liang, Haibing Guan in Hybrid Artificial Intelligent Systems (2012)

  12. No Access

    Chapter and Conference Paper

    HYBit: A Hybrid Taint Analyzing Framework for Binary Programs

    For the purpose of discovering security flaws in software, many dynamic and static taint analyzing techniques have been proposed. The dynamic techniques can precisely find the security flaws of the software; b...

    Erzhou Zhu, Haibing Guan, Alei Liang, Rongbin Xu in Advances in Swarm Intelligence (2013)

  13. No Access

    Chapter and Conference Paper

    DaSS: Dynamic Time Slice Scheduler for Virtual Machine Monitor

    I/O performance is an important factor in virtualization technology. However, the hypervisor and the scheduler brings impact on the I/O performance, since the scheduler considers I/O-intensive Virtual Machine ...

    Ruhui Ma, Jian Li, Liwei Lin, Haibing Guan in Algorithms and Architectures for Parallel … (2015)

  14. No Access

    Chapter and Conference Paper

    Location Privacy Protected Recommendation System in Mobile Cloud

    As the core of location-based services (LBS), the LBS-oriented recommendation systems, which suggest the points-of-interest (POIs) to users by analyzing the distribution of the user’s previous points-of-intere...

    Haiyan Guan, Hongyan Qian, Yanchao Zhao in Cloud Computing and Security (2016)

  15. No Access

    Chapter and Conference Paper

    Analysis of User’s Abnormal Behavior Based on Behavior Sequence in Enterprise Network

    There are many abnormal user behavior in the enterprise network environment, how to monitor it effectively is a hot research hotspot. At present, the analysis of abnormal behavior is mainly through the means o...

    Haichao Guan, Huakang Li, Guozi Sun in Cloud Computing and Security (2017)

  16. No Access

    Chapter and Conference Paper

    Qualitative Instead of Quantitative: Towards Practical Data Analysis Under Differential Privacy

    Differential privacy (DP) has become the de facto standard in the academic and industrial communities. Although DP can provide strong privacy guarantee, it also brings a major of performance loss for data mini...

    Xuanyu Bai, Jianguo Yao, Mingyuan Yuan in Database Systems for Advanced Applications (2018)

  17. No Access

    Chapter and Conference Paper

    An Integrated Deep Architecture for Lesion Detection in Breast MRI

    Complex nature of medical images and tedious process of data exploration calls for the development of Computer Aided Detection (CADe) methods to ease the process of lesion detection. Recent deep learning-based...

    Ghazal Rouhafzay, Yonggang Li, Haitao Guan in Pattern Recognition and Artificial Intelli… (2020)

  18. No Access

    Chapter and Conference Paper

    Dual Adversarial Network for Deep Active Learning

    Active learning, reducing the cost and workload of annotations, attracts increasing attentions from the community. Current active learning approaches commonly adopted uncertainty-based acquisition functions fo...

    Shuo Wang, Yuexiang Li, Kai Ma, Ruhui Ma, Haibing Guan in Computer Vision – ECCV 2020 (2020)

  19. No Access

    Chapter and Conference Paper

    FTL: A Universal Framework for Training Low-Bit DNNs via Feature Transfer

    Low-bit Deep Neural Networks (low-bit DNNs) have recently received significant attention for their high efficiency. However, low-bit DNNs are often difficult to optimize due to the saddle points in loss surfac...

    Kunyuan Du, Ya Zhang, Haibing Guan, Qi Tian, Yanfeng Wang in Computer Vision – ECCV 2020 (2020)

  20. No Access

    Chapter

    Hydrogenation Reactions Catalyzed by PNP-Type Complexes Featuring a HN(CH2CH2PR2)2 Ligand

    This chapter first provides a brief background of how hydrogenation mechanisms have evolved over the years leading to the blossom of catalytic systems with metal-ligand cooperativity. The main body of the chap...

    Dewmi A. Ekanayake, Hairong Guan in Metal-Ligand Co-operativity (2021)

previous disabled Page of 2