Skip to main content

previous disabled Page of 18
and
  1. No Access

    Chapter and Conference Paper

    Bi-objective Optimization: An Online Algorithm for Job Assignment

    We study an online problem that occurs when the capacities of machines are heterogeneous and all jobs are identical. Each job is associated with a subset, called feasible set, of the machines that can be used ...

    Chien-Min Wang, **ao-Wei Huang, Chun-Chen Hsu in Advances in Grid and Pervasive Computing (2009)

  2. No Access

    Chapter and Conference Paper

    Engineering Adaptive Multi-Agent Systems with ODAM Methodology

    Agent orientation is believed as an appropriate and powerful paradigm to develop complex systems. In order to engineer complex self-adaptive multi-agent systems, we present dynamic binding mechanism and an age...

    **njun Mao, Jianming Zhao, Ji Wang in Agent Computing and Multi-Agent Systems (2009)

  3. No Access

    Chapter and Conference Paper

    An Activeness-Based Seed Choking Algorithm for Enhancing BitTorrent’s Robustness

    BitTorrent suffers from the free-riding problem induced by selfish peers, hurting the system robustness. Existing research studies have focused on the fairness, performance, and robustness of BitTorrent, resul...

    Kun Huang, Dafang Zhang, Li’e Wang in Advances in Grid and Pervasive Computing (2009)

  4. No Access

    Chapter and Conference Paper

    Cyberaide Virtual Applicance: On-Demand Deploying Middleware for Cyberinfrastructure

    Cyberinfrastructure offers a vision of advanced knowledge infrastructure for research and education. It integrates diverse resources across geographically distributed resources and human communities. Cyberaide...

    Tobias Kurze, Lizhe Wang, Gregor von Laszewski, Jie Tao, Marcel Kunze in Cloud Computing (2010)

  5. No Access

    Chapter and Conference Paper

    Telecommunications User Behaviors Analysis Based on Fuzzy C-Means Clustering

    As the number of telecommunication user close to saturation, operators turn their focus from how to increase the subscriber to how to maintain the existing ones, which need more in-depth analysis of user chara...

    Zhe Guo, Furong Wang in Future Generation Information Technology (2010)

  6. No Access

    Chapter and Conference Paper

    Capacity of Two-Way Relay Channel

    This paper investigates the capacity of a wireless two-way relay channel in which two end nodes exchange information via a relay node. The capacity is defined in the information-theoretic sense as the maximum ...

    Shengli Zhang, Soung Chang Liew, Hui Wang, **aohui Lin in Access Networks (2010)

  7. No Access

    Chapter and Conference Paper

    An Ontology-Based Platform for Scientific Writing and Publishing

    Writing scientific discourses and publishing academic results are integral parts of a researcher’s daily professional life. Although tremendous magic have been brought by advancement of digital library technol...

    Hao Xu, Changhai Zhang, Yang Ai, Ziwen Wang in Future Generation Information Technology (2010)

  8. No Access

    Chapter and Conference Paper

    On Mitigating Packet Reordering in FiWi Networks

    In an integrated fiber and wireless (FiWi) access network, multi-path routing may be applied in the wireless subnetwork to improve throughput. Due to different delays along multiple paths, packets may arrive o...

    Shiliang Li, Jian** Wang, Chunming Qiao, Bei Hua in Access Networks (2010)

  9. No Access

    Chapter and Conference Paper

    Research on Mobile Payment Technology and Business Models in China under e-Commerce Environment

    Mobile payment is one rapidly-adopting alternative payment method especially in Asia such as Japan, Korea. As 3G service gets increasingly popularized in China, Mobile payment business has evolved into its gro...

    Gu Ruijun, Yao Juan, Wang Jiacai in Future Generation Information Technology (2010)

  10. No Access

    Chapter and Conference Paper

    A Frequency-Based Algorithm for Workflow Outlier Mining

    The concept of workflow is critical in the ERP (Enterprise Resources Planning) system. Any workflow that is irrationally and irregularly designed will not only lead to an ineffective operation of enterprise bu...

    Yu-Cheng Chuang, **Yu Hsu, MinTzu Wang in Future Generation Information Technology (2010)

  11. No Access

    Chapter and Conference Paper

    Modeling and Stability Investigation of Single-Ended Forward DC/DC Converter

    This paper present small signal model and compensation network for the analysis and design of single-ended forward DC/DC converter in the average current mode, in order to design and simulate amplitude-frequen...

    YingWu Wang, JunFeng Wang, LiuJun Di in Advanced Research on Computer Science and … (2011)

  12. No Access

    Chapter and Conference Paper

    The Research on Remote Sensing Image Data Sharing Model Based on SOA

    Based upon the in-depth analysis of the remote sensing image sharing demand and the status of the current research on it, this paper points out the existing Web-based sharing-model did not eliminate "Informati...

    Lianbei Wang, **n Wang, Tao Wang in Advances in Computer Science and Education Applications (2011)

  13. No Access

    Chapter and Conference Paper

    Practice and Study of Synergetic Learning Theory in Java Language Teaching

    This article deals with problems of defective teaching effects widely existing in Chinese collage and university Java language teaching courses, and proposes a brand new teaching methodology by introducing two...

    Zhihui Wang, Yuanqiang Wang, Shangfu Hao in Advances in Computer Science and Education… (2011)

  14. No Access

    Chapter and Conference Paper

    Research of Access Authorization Model Based on Trust Negotiation in the P2P Network

    This article constructs the access authorization model under the P2P network, which solves the resource access authorization problem under high security environment. Firstly, it designs the access control stra...

    Junyao Ye, Yanhong Wang, Yinglian Wang in Advances in Information Technology and Education (2011)

  15. No Access

    Chapter and Conference Paper

    Design of Electrostatic Elimination System Based on PIC Microprocessor

    This paper introduces a kind of electrostatic elimination system based on PIC18LF6520 MCU. The equipment with PIC18LF6520 as control core generates high-voltage by Pulse AC Discharge to ionize the air to posit...

    **gzhong Wang, Jian Wang, Fang Yang in Advanced Research on Computer Science and … (2011)

  16. No Access

    Chapter and Conference Paper

    The Security System Analysis of Teaching and Researching Management System Based on Audit Strategy

    By analysis information system security situation and research the requirement of security of Teaching and Researching Management System which was implemented in our projects, a new security system strategy wa...

    Yuanqiang Wang, Zhihui Wang, Shangfu Hao in Advances in Computer Science and Education… (2011)

  17. No Access

    Chapter and Conference Paper

    Internet-Based Electronic Toll Collection System Using WiFi Technology

    The rapid development of road network becomes the basis for economic development, while road network management system becomes the key for improving the operation-efficiency of road network. In recent years, d...

    Li Ru’yuan, Wang Zhi’an, Li’yan, Wang Xuhui in Innovative Computing and Information (2011)

  18. No Access

    Chapter and Conference Paper

    Experimental Simulations of Flow Fields within Air-Conditioning Aircraft Cabin

    With the development of economic and the increasing of human comfortable requirements, it is important for the researchers to design cabin airflow in large passenger aircraft benefit for passengers ‘health and...

    Wang **, Pang Li**, Gong Mengmeng, Cui Yi in Information and Management Engineering (2011)

  19. No Access

    Chapter and Conference Paper

    Research on Network Curriculum Construction and Applications

    In order to resolve the problems about network curriculum construction and application, this paper gives some advices, such as enhancing publicity of network, training the ability of teacher to drive network t...

    **quan Wang, Fuchun Fan, Wei Zu in Advanced Research on Computer Science and … (2011)

  20. No Access

    Chapter and Conference Paper

    The Application of Delay Estimation in Binary Control of Sequence Control in Power Plant Based on ZigBee

    This paper introduces the application of wireless sensor networks (WSNs) based on ZigBee in the binary control of sequence control in power plant. And the process of the chemical water treatment is taken as an...

    Renshu Wang, Yan Bai, Fengzhu Wang in Advances in Computer Science, Environment,… (2011)

previous disabled Page of 18