Skip to main content

previous disabled Page of 23
and
  1. No Access

    Chapter and Conference Paper

    The Application of Photoacoustic Detection in the Primary Diagnosis of Cancer

    By applying the photoacoustic technique to the study of human urine, we have developed a new method in diagnosing cancer, especially cancer of the urinary system. We believe this photoacoustic technique to be ...

    Sun Hong-Wei, Huang Men-Cai, Wang Qing-Hua in Photoacoustic and Photothermal Phenomena II (1990)

  2. No Access

    Chapter and Conference Paper

    On the operational interpretation of complex types

    Recursive and structured metaprogramming facilities are necessary for large proof development in a generic proof manipulation environment. We show how to define a set of mutually inductive types, abstract theo...

    Qing-** Tan, Huo-Wang Chen in Foundations of Software Technology and The… (1991)

  3. No Access

    Chapter and Conference Paper

    Syncronous Visualization of Flow Patterns and Correlative Physical Parameters

    A visualization method — syncronous visualization of flow patterns and correlative physical parameters is introduced. By the principle of image composition the image of flow patterns taken by video cameras and...

    Wei Qing-ding, Wang Wen-bao, Li Chang-Lin, Du **ang-dong in Flow Visualization VI (1992)

  4. No Access

    Chapter and Conference Paper

    Optimal routing of permutations on rings

    **aojun Shen, Qing Hu, Hao Dai, **angzu Wang in Algorithms and Computation (1994)

  5. No Access

    Chapter and Conference Paper

    Leaf Image Retrieval with Shape Features

    In this paper we present an eficient two-step approach of using a shape characterization function called centroid-contour distance curve and the object eccentricity (or elongation) for leaf image retrieval. Bo...

    Zhiyong Wang, Zheru Chi, Dagan Feng, Qing Wang in Advances in Visual Information Systems (2000)

  6. No Access

    Chapter and Conference Paper

    A Framework for Background Detection in Video

    This paper presents a framework for background detection in video. First, key frames are extracted to capture background change in video and reduce the magnitude of the data. Then we analyze the content of the...

    Laiyun Qing, Weiqiang Wang, Tiejun Huang in Advances in Multimedia Information Process… (2002)

  7. No Access

    Chapter and Conference Paper

    A Gravity-Based Intrusion Detection Method

    It is an important issue for the security of network to detect new intrusions attack. We introduce the idea of the law of gravity to clustering analysis, and present a gravity-based clustering algorithm. At th...

    Sheng-Yi Jiang, Qing-Hua Li in Grid and Cooperative Computing - GCC 2004 Workshops (2004)

  8. No Access

    Chapter and Conference Paper

    PKUSpace: A Collaborative Platform for Scientific Researching

    This Paper introduces PKUSpace – a collaborative platform for scientific learning and researching. Supported by efficient automated metadata extraction and powerful text classification modules, PKUSpace provid...

    Ming Zhang, Dong-qing Yang, Zhi-Hong Deng in Advances in Web-Based Learning – ICWL 2004 (2004)

  9. No Access

    Chapter and Conference Paper

    Mining Maximal Frequent Itemsets for Intrusion Detection

    It has been the recent research focus and trend to apply data mining techniques in an intrusion detection system for discovering new types of attacks, but it is still in its infancy. This paper presents an inn...

    Hui Wang, Qing-Hua Li, Huanyu **ong in Grid and Cooperative Computing - GCC 2004 … (2004)

  10. No Access

    Chapter and Conference Paper

    Automatically Generating an e-Textbook on the Web

    Nowadays, people tend to learn from the Web because it is convenient, and rich of free information. One significant means of learning on the Web is by submitting a query to a search engine, and browsing throug...

    **g Chen, Qing Li, Li** Wang, Weijia Jia in Advances in Web-Based Learning – ICWL 2004 (2004)

  11. No Access

    Chapter and Conference Paper

    Study on a Secure Access Model for the Grid Catalogue

    To solve the security of access to meta-data in computational Grids, by modifying model BLP, a secure access model named GBLP is introduced to support access control to Grid catalogue. In the computational Gri...

    Bing **e, **ao-Lin Gui, Qing-Jiang Wang in Grid and Cooperative Computing (2004)

  12. No Access

    Chapter and Conference Paper

    Coarse-Grained Distributed Parallel Programming Interface for Grid Computing

    In this paper, a practical coarse-grained distributed parallel programming interface for grid computing (PI4GC) is introduced. It provides a group of generic and abstract function prototypes with well-specifie...

    Yongwei Wu, Qing Wang, Guangwen Yang, Weiming Zheng in Grid and Cooperative Computing (2004)

  13. No Access

    Chapter and Conference Paper

    A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers

    In this paper we present a novel robust coalition-resistant (t, n) threshold signature scheme with anonymous signers. Only t or more group members can generate signatures on behalf of a group with n members, w...

    Ming-wen Wang, Qing-xin Zhu, Li Qing in Parallel and Distributed Processing and Ap… (2005)

  14. No Access

    Chapter and Conference Paper

    Designing Adaptive PI Algorithm Based on Single Neuron

    PI is a newly proposed Active Queue Management algorithm that has many important applications. But in case of heavy congestion its response is sluggish, and because of its static parameter’s setting PI is sens...

    Li Qing, Qingxin Zhu, Mingwen Wang in Networking and Mobile Computing (2005)

  15. No Access

    Chapter and Conference Paper

    A Hybrid Approach to Detect Adult Web Images

    This paper presents a hybrid approach to discriminate benign images from adult images. Different from previously published works, our approach combines face detection and adaptive skin detection. First, face d...

    Qing-Fang Zheng, Ming-Ji Zhang in Advances in Multimedia Information Process… (2005)

  16. No Access

    Chapter and Conference Paper

    A General Criterion of Synchronization Stability in Ensembles of Coupled Systems and Its Application

    Complete synchronization of N coupled systems with symmetric configurations is studied in this paper. The main idea of the synchronization stability criterion is based on stability analysis of zero solution of li...

    Qing-Yun Wang, Qi-Shao Lu, Hai-**a Wang in Advances in Natural Computation (2005)

  17. No Access

    Chapter and Conference Paper

    Constructing Rough Decision Forests

    Decision forests are a type of classification paradigm which combines a collection of decision trees for a classification task, instead of depending on a single tree. Improvement of accuracy and stability is o...

    Qing-Hua Hu, Da-Ren Yu, Ming-Yang Wang in Rough Sets, Fuzzy Sets, Data Mining, and G… (2005)

  18. No Access

    Chapter and Conference Paper

    What Can Expressive Semantics Tell: Retrieval Model for a Flash-Movie Search Engine

    Flash, as a multimedia format, becomes more and more popular on the Web. However, previous works on Flash are unpractical to build a content-based Flash search engine. To address this problem, our paper propos...

    Dawei Ding, Jun Yang, Qing Li, Wenyin Liu, Li** Wang in Image and Video Retrieval (2005)

  19. No Access

    Chapter and Conference Paper

    A Novel Approach to Ocular Image Enhancement with Diffusion and Parallel AOS Algorithm

    This paper suggests a new diffusion method, which based on modified coherence diffusion for the enhancement of ocular fundus images (OFI) and parallel AOS scheme is applied to speed algorithm, which is faster ...

    Lanfeng Yan, Janjun Ma, Wei Wang, Qing Liu in Advances in Intelligent Computing (2005)

  20. No Access

    Chapter and Conference Paper

    Poster Summaries

    Kang Lihua, Jiang Yegen, Ma Haibin in Biological Nitrogen Fixation, Sustainable … (2005)

previous disabled Page of 23