Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Fixed-Time Control for Cooperative Target Encirclement and Tracking by Multi-UAV

    In the research, a new fixed-time control method is proposed for multiple unmanned aerial vehicles (multi-UAV) to address cooperative target encirclement and tracking. Initially, only the position information ...

    Hong** Liao, **n Chen, Jiangbo Jia in Proceedings of 3rd International Conferenc… (2024)

  2. No Access

    Chapter and Conference Paper

    Immediate Split Trees: Immediate Encoding of Floating Point Split Values in Random Forests

    Random forests and decision trees are increasingly interesting candidates for resource-constrained machine learning models. In order to make the execution of these models efficient under resource limitations, ...

    Christian Hakert, Kuan-Hsun Chen in Machine Learning and Knowledge Discovery i… (2023)

  3. No Access

    Chapter and Conference Paper

    DAEBI: A Tool for Data Flow and Architecture Explorations of Binary Neural Network Accelerators

    Binary Neural Networks (BNNs) are an efficient alternative to traditional neural networks as they use binary weights and activations, leading to significant reductions in memory footprint and computational ene...

    Mikail Yayla, Cecilia Latotzke, Robert Huber in Embedded Computer Systems: Architectures, … (2023)

  4. No Access

    Chapter and Conference Paper

    TREAM: A Tool for Evaluating Error Resilience of Tree-Based Models Using Approximate Memory

    Approximate memories reduce the resource demand of machine learning (ML) systems at the cost of bit errors. ML models have an intrinsic error resilience and are therefore suitable candidates to use with approx...

    Mikail Yayla, Zahra Valipour Dehnoo in Embedded Computer Systems: Architectures, … (2022)

  5. No Access

    Chapter and Conference Paper

    Chinese Spelling Error Detection and Correction Based on Knowledge Graph

    Spelling error correction is a task in which errors in a natural language sentence can be detected and corrected. In this paper, we consider Chinese spelling error correction (CSC) for generality. A previous s...

    **min Sun, **g Zhou, Shuai Wang, Huichao Li in Database Systems for Advanced Applications… (2022)

  6. No Access

    Chapter and Conference Paper

    Profile Consistency Discrimination

    Consistency discrimination between attribute information and generated response is vital to personality-based dialogue. On existing work, few works specially investigates the consistency. In this paper, we pro...

    **g Zhou, **min Sun, Shuai Wang in Database Systems for Advanced Applications… (2022)

  7. No Access

    Chapter and Conference Paper

    Construction and Application of Event Logic Graph: A Survey

    Since being proposed in 2017, event logic graph has attracted more and more researchers’ attention and has been gradually applied in various fields such as finance, health care, transportation, information, po...

    Bin Zhang, **min Sun, **aoming Li, Dan Liu in Database Systems for Advanced Applications… (2022)

  8. No Access

    Chapter and Conference Paper

    SRPAIS: Spectral Matching Algorithm Based on Raman Peak Alignment and Intensity Selection

    Currently, the frequent occurrence of safety incidents involving food counterfeiting has greatly disrupted the normal market order, infringed on the rights and interests of regular manufacturers and consumers,...

    Yundong Sun, Yuchen Tian, **aofang Li, Rongning Qu in Artificial Intelligence and Security (2022)

  9. No Access

    Chapter and Conference Paper

    Using a Set of Triangle Inequalities to Accelerate K-means Clustering

    The k-means clustering is a well-known problem in data mining and machine learning. However, the de facto standard, i.e., Lloyd’s k-mean algorithm, suffers from a large amount of time on the distance calculati...

    Qiao Yu, Kuan-Hsun Chen, Jian-Jia Chen in Similarity Search and Applications (2020)

  10. No Access

    Chapter and Conference Paper

    Resource-Efficient Nanoparticle Classification Using Frequency Domain Analysis

    We present a method for resource-efficient classification of nanoparticles such as viruses in liquid or gas samples by analyzing Surface Plasmon Resonance (SPR) images using frequency domain features. The SPR ...

    Mikail Yayla, Anas Toma, Jan Eric Lenssen in Bildverarbeitung für die Medizin 2019 (2019)

  11. No Access

    Chapter and Conference Paper

    Cryptanalysis of an ElGamal-Like Cryptosystem Based on Matrices Over Group Rings

    ElGamal cryptography is one of the most important Public Key Cryptography (PKC) since Diffie-Hellman exchanges was proposed, however these PKCs which are based on the hard problems that discrete logarithm prob...

    Jianwei Jia, Houzhen Wang, Huanguo Zhang in Trusted Computing and Information Security (2019)

  12. No Access

    Chapter and Conference Paper

    An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs

    With the rapid development of Internet of Things (IoT), intelligent transportation systems (ITS) brings more and more intelligent and convenient services to people’s daily lives. Vehicular Ad hoc Networks (VAN...

    **hui Liu, Yong Yu, Yanqi Zhao, Jianwei Jia, Shijia Wang in Network and System Security (2018)

  13. No Access

    Chapter and Conference Paper

    A Linear Algebra Attack on the Non-commuting Cryptography Class Based on Matrix Power Function

    Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solv...

    **hui Liu, Huanguo Zhang, Jianwei Jia in Information Security and Cryptology (2017)

  14. No Access

    Chapter and Conference Paper

    Top-k Similarity Matching in Large Graphs with Attributes

    Graphs have been widely used in social networks to find interesting relationships between individuals. To mine the wealthy information in an attributed graph, effective and efficient graph matching methods are...

    **aofeng Ding, Jianhong Jia, Jiuyong Li in Database Systems for Advanced Applications (2014)

  15. No Access

    Chapter and Conference Paper

    ContactSim: An Efficient Realistic Trace Driven Contact Simulator for Vehicular Opportunistic Networks

    Opportunistic networking is an innovative data delivery solution, which leverages the contact opportunities between mobile terminals to exchange messages. The contact events are highly relevant to human behavi...

    Jianbin Jia, Xu Ming, Chen Yingwen in Internet and Distributed Computing Systems (2013)

  16. No Access

    Chapter and Conference Paper

    Semantic Word Similarity Learned from Heterogenous Knowledge Bases

    Recognition of semantic similarity between words plays an important role in text information management, information retrieval, and natural language processing. There are two major approaches to recognizing th...

    Yiling Liu, Yangsheng Ji, Chong Gu, Shouling Cui in Semantic Web and Web Science (2013)

  17. Chapter and Conference Paper

    Plant Leaf Water Detection Instrument Based on Near Infrared Spectroscopy

    In the near infrared spectral region, a reflection plant water detection instrument was designed by using microcontroller STC12C5A60S2. The instrument consisted of signal acquisition system, microcontroller sy...

    Jiannan Jia, Haiyan Ji in Computer and Computing Technologies in Agriculture V (2012)

  18. No Access

    Chapter and Conference Paper

    Competitive Design and Analysis for Machine-Minimizing Job Scheduling Problem

    We explore the machine-minimizing job scheduling problem, which has a rich history in the line of research, under an online setting. We consider systems with arbitrary job arrival times, arbitrary job deadline...

    Mong-Jen Kao, Jian-Jia Chen, Ignaz Rutter, Dorothea Wagner in Algorithms and Computation (2012)

  19. No Access

    Chapter and Conference Paper

    Using Anisotropic Bivariate Threshold Function for Image Denoising in NSCT Domain

    In this paper, a more stable solving method of anisotropic bivariate Laplacian distribution function and corresponding threshold function is derived from the model using Bayesian estimation theory and extended...

    Jian Jia, Li Chen in Intelligent Science and Intelligent Data Engineering (2012)

  20. No Access

    Chapter and Conference Paper

    Joint Optimization of System Lifetime and Network Performance for Real-Time Wireless Sensor Networks

    Maximizing the aggregate network utility and minimizing the network energy consumption are important but conflict goals in wireless sensor networks. Challenges arise due to the application-specific computing a...

    Lei Rao, Xue Liu, Jian-Jia Chen, Wenyu Liu in Quality of Service in Heterogeneous Networks (2009)

previous disabled Page of 2