Skip to main content

previous disabled Page of 5
and
  1. No Access

    Chapter and Conference Paper

    A New Genetic Algorithm for the Optimal Communication Spanning Tree Problem

    This paper proposes a new genetic algorithm to solve the Optimal Communication Spanning Tree problem. The proposed algorithm works on a tree chromosome without intermediate encoding and decoding, and uses cros...

    Yu Li, Youcef Bouchebaba in Artificial Evolution (2000)

  2. No Access

    Chapter and Conference Paper

    An Effective Implementation of a Direct Spanning Tree Representation in GAs

    This paper presents an effective implementation based on predecessor vectors of a genetic algorithm using a direct tree representation. The main operations associated with crossovers and mutations can be achie...

    Yu Li in Applications of Evolutionary Computing (2001)

  3. No Access

    Chapter and Conference Paper

    A Two-Level Search Strategy for Packing Unequal Circles into a Circle Container

    We propose a two-level search strategy to solve a two dimensional circle packing problem. At the first level, a good enough packing algorithm called A1.0 uses a simple heuristic to select the next circle to be pa...

    Wen Qi Huang, Yu Li, Bernard Jurkowiak in Principles and Practice of Constraint Prog… (2003)

  4. No Access

    Chapter and Conference Paper

    Human Pacman: A Mobile Entertainment System with Ubiquitous Computing and Tangible Interaction over a Wide Outdoor Area

    Human Pacman is an interactive role-playing game that envisions to bring the computer gaming experience to a new level of emotional and sensory gratification by setting the real world as a playground. This is ...

    Adrian David Cheok, Siew Wan Fong in Human-Computer Interaction with Mobile Dev… (2003)

  5. No Access

    Chapter

    Biometrics for Security in E-Commerce

    The advance of technology is always inspired by the practical applications, and the emergence of automatic biometrics technology is rooted in the requirement for real-world security applications. Whether this ...

    David Zhang, Yu Li in Payment Technologies for E-Commerce (2003)

  6. No Access

    Chapter and Conference Paper

    Data Segmentation of Stereo Images with Complicated Background

    With the development of computer science, there is an increasing demand on the object recognition in stereo images. As a binocular image pair contains larger and more complicated information than a monocular i...

    Yi Wei, Shushu Hu, Yu Li in Image Analysis and Recognition (2007)

  7. No Access

    Chapter and Conference Paper

    Enumerating Unlabeled and Root Labeled Trees for Causal Model Acquisition

    To specify a Bayes net (BN), a conditional probability table (CPT), often of an effect conditioned on its n causes, needs to be assessed for each node. It generally has the complexity exponential on n. The non-im...

    Yang **ang, Zoe **gyu Zhu, Yu Li in Advances in Artificial Intelligence (2009)

  8. No Access

    Chapter and Conference Paper

    Towards Effective Elicitation of NIN-AND Tree Causal Models

    To specify a Bayes net (BN), a conditional probability table (CPT), often of an effect conditioned on its n causes, needs assessed for each node. It generally has the complexity exponential on n. Noisy-OR reduces...

    Yang **ang, Yu Li, Zoe **gyu Zhu in Scalable Uncertainty Management (2009)

  9. No Access

    Chapter and Conference Paper

    Event Recognition from News Webpages through Latent Ingredients Extraction

    We investigate the novel problem of event recognition from news webpages. “Events” are basic text units containing news elements. We observe that a news article is always constituted by more than one event, na...

    Rui Yan, Yu Li, Yan Zhang, **aoming Li in Information Retrieval Technology (2010)

  10. No Access

    Chapter and Conference Paper

    The Application of Disturbance Observer to Propulsion Control of Sub-mini Underwater Robot

    In this paper, the propulsive motility characteristics and the corresponding motion equations of a self-designed sub-mini underwater robot were analyzed. And the disturbance observer was used in propulsive mot...

    Yuyi Zhai, Liang Liu, Wenjie Lu, Yu Li in Computational Science and Its Applications… (2010)

  11. No Access

    Chapter and Conference Paper

    DigestJoin: Expediting Joins on Solid-State Drives

    This demonstration presents a recently proposed join algorithm called DigestJoin. Optimized for solid-state drives (SSDs), DigestJoin aims at reducing intermediate join results and hence expensive write operation...

    Shen Gao, Yu Li, Jianliang Xu, Byron Choi in Database Systems for Advanced Applications (2010)

  12. No Access

    Chapter and Conference Paper

    A Petri Net-Based Software Process Model for Develo** Process-Oriented Information Systems

    Aiming at increasing flexibility, efficiency, effectiveness, and transparency of information processing and resource deployment in organizations to ensure customer satisfaction and high quality of products and...

    Yu Li, Andreas Oberweis in Information Systems Development (2011)

  13. No Access

    Chapter and Conference Paper

    Research of Ecological Landscape Assessment Systems of Road Based on GIS and ES

    With rapid development of China’s road construction, road construction and its surrounding ecological landscape is not harmonious. The evaluation of the analysis, recovery and development is increasingly impor...

    Fengling Wang, Yu Li in Innovative Computing and Information (2011)

  14. No Access

    Chapter and Conference Paper

    Libraries in a Digital Frontier: Preserving Chinese Canadian Cultural Heritage

    As a three-year community-based research project at the University of British Columbia, Chinese Canadian Stories: Uncommon Histories from a Common Past is government grant-funded project by the Community Historic...

    Allan Cho, Yu Li in Digital Libraries: For Cultural Heritage, … (2011)

  15. No Access

    Chapter and Conference Paper

    Study of Adaptive Cone Taper Measuring Device

    A kind of simple practical adaptive quantitative detection taper cone measuring devices is developed in this paper, which can resolve the qualitative measurement which cannot obtain concrete error problem, and...

    **qu Chen, Yu Li, Jianxiu Su, Zhankui Wang in Applied Informatics and Communication (2011)

  16. No Access

    Chapter and Conference Paper

    Exploiting Historical Relationships of Clauses and Variables in Local Search for Satisfiability

    Variable properties such as score and age are used to select a variable to flip. The score of a variable x refers to the decrease in the number of unsatisfied clauses if x is flipped. The age of x refers to the n...

    Chu Min Li, Wanxia Wei, Yu Li in Theory and Applications of Satisfiability … (2012)

  17. No Access

    Chapter and Conference Paper

    Scorpio: A Simple, Convenient, Microsoft Excel Macro Based Program for Privacy-Preserving Logrank Test

    Survival analysis is frequently used for dealing with survival outcomes in biological organisms. However it is a tedious process to compare survival curves step by step. In this study, we designed and develope...

    Yu Li, Sheng Zhong in Computer Applications for Database, Educat… (2012)

  18. No Access

    Chapter and Conference Paper

    Satisfying versus Falsifying in Local Search for Satisfiability

    During local search, clauses may frequently be satisfied or falsified. Modern SLS algorithms often exploit the falsifying history of clauses to select a variable to flip, together with variable properties such...

    Chu Min Li, Yu Li in Theory and Applications of Satisfiability Testing – SAT 2012 (2012)

  19. No Access

    Chapter and Conference Paper

    Improved Approximation Algorithms for the Facility Location Problems with Linear/submodular Penalty

    We consider the facility location problem with submodular penalty (FLPSP) and the facility location problem with linear penalty (FLPLP), two extensions of the classical facility location problem (FLP). First, we ...

    Yu Li, Donglei Du, Naihua **u, Dachuan Xu in Computing and Combinatorics (2013)

  20. No Access

    Chapter and Conference Paper

    Multi-Level Genetic-Fuzzy Mining with a Tuning Mechanism

    In this paper, a two-stage multi-level genetic-fuzzy mining approach is proposed. In the first stage, the multi-level genetic-fuzzy mining (MLGFM) is utilized to derive membership functions of generalized item...

    Chun-Hao Chen, Yu Li, Tzung-Pei Hong in Intelligent Information and Database Systems (2014)

previous disabled Page of 5