Skip to main content

previous disabled Page of 6
and
  1. No Access

    Chapter and Conference Paper

    The Limits of Horn Logic Programs

    It becomes more and more important to discover knowledge in massive information. The knowledge can be taken as a theory. As the information increases, the theories should be updated. Thus we get a sequence of ...

    Shilong Ma, Yuefei Sui, Ke Xu in Logic Programming (2002)

  2. No Access

    Chapter and Conference Paper

    When to Update the Sequential Patterns of Stream Data?

    In this paper, we first define a difference measure between the old and new sequential patterns of stream data, which is proved to be a distance. Then we propose an experimental method, called TPD (Tradeoff be...

    Qingguo Zheng, Ke Xu, Shilong Ma in Advances in Knowledge Discovery and Data Mining (2003)

  3. No Access

    Chapter and Conference Paper

    Implementation and Evaluation of a Novel Parallel SAR Imaging Method on Clustering Systems

    Tremendous computational throughput and real time constrains make sequential computing unable to satisfy requirements of applications. Therefore, attentions are paid to parallel SAR imaging, which can efficien...

    Jizhong Han, Shichao Ma in Advanced Parallel Processing Technologies (2003)

  4. No Access

    Chapter and Conference Paper

    Using Ambient in Computational Reflection Semantics Description

    With the development of wide-area network, distribution and mobility have become the main character of computation. Similarly, reflection systems are mostly like to implement under this environments, as a resu...

    Jianghua Lv, Shilong Ma, Aili Wang, **g Pan in Networking and Mobile Computing (2005)

  5. No Access

    Chapter and Conference Paper

    Analytical Solution for Dynamic of Neuronal Populations

    The population density approach is a viable method to describe the large populations of neurons and has generated considerable interest recently. The evolution in time of the population density is determined b...

    Wentao Huang, Licheng Jiao, Shi** Ma in Artificial Neural Networks: Biological Ins… (2005)

  6. No Access

    Chapter and Conference Paper

    Formalizing a Reasoning Strategy in Symbolic Approach to Differential Equations

    There is a reasoning strategy, which is an incremental computation, used in symbolic and algebraic approach to differential equations. The center-focus problem can be solved by using this reasoning strategy. I...

    Shilong Ma in Differential Equations with Symbolic Computation (2005)

  7. No Access

    Chapter and Conference Paper

    A Layered Semantics for Mobile Computation

    Since mobile computation involves variants information and different behaviors, it is very complicated in mobile computation systems. In order to analysis mobile computation and understand the essential of mob...

    Jianghua Lv, Shilong Ma, **g Pan, Li Ma in Agent Computing and Multi-Agent Systems (2006)

  8. No Access

    Chapter and Conference Paper

    Block-Level Storage Security Architectures

    With the unprecedented growth of storage systems in all of today’s society, threats on stored sensitive information have become the critical issues that need to be addressed. Further, compared to the transient...

    Shichao Ma, Jizhong Han, Zhensong Wang in Computational Science and Its Applications… (2006)

  9. No Access

    Chapter and Conference Paper

    Moving Target Detection and Labeling in Video Sequence Based on Spatial-Temporal Information Fusion

    A novel method of moving target detection based on spatial-temporal information fusion was proposed. It combines the temporal properties within multiple frames and the spatial information in single frame of a ...

    Shiwei Ma, Zhongjie Liu, Banghua Yang in Bio-Inspired Computational Intelligence an… (2007)

  10. No Access

    Chapter and Conference Paper

    Pattern Recognition for Brain-Computer Interfaces by Combining Support Vector Machine with Adaptive Genetic Algorithm

    Aiming at the recognition problem of EEG signals in brain-computer interfaces (BCIs), we present a pattern recognition method. The method combines an adaptive genetic algorithm (GA) with the support vector mac...

    Banghua Yang, Shiwei Ma, Zhihua Li in Life System Modeling and Simulation (2007)

  11. No Access

    Chapter and Conference Paper

    Parametric Time-frequency Modeling of Nonstationary Signals by Adaptive Decomposition Based on Time-shearing Gabor Atoms

    A kind of localized four parameters Gabor atom (dialating, time-shearing, modulating and translating of Gaussian function) was derived. Based on it, a parametric adaptive time-frequency distribution (PAD) is p...

    Shiwei Ma, Zhongjie Liu, Weibin Liang in Systems Modeling and Simulation (2007)

  12. No Access

    Chapter and Conference Paper

    Optimization Algorithm for Scalar Multiplication in the Elliptic Curve Cryptography over Prime Field

    Elliptic curve cryptography (ECC) is a major public-key cryptosystem standard in data security systems due to its high strength of security. But its application was limited because of the constraint of its spe...

    Yuanling Hao, Shiwei Ma, Guanghua Chen in Advanced Intelligent Computing Theories an… (2008)

  13. No Access

    Chapter and Conference Paper

    Discovering Compatible Top-K Theme Patterns from Text Based on Users’ Preferences

    Discovering a representative set of theme patterns from a large amount of text for interpreting their meaning has always been concerned by researches of both data mining and information retrieval. Recent studi...

    Yongxin Tong, Shilong Ma, Dan Yu, Yuanyuan Zhang in Intelligence and Security Informatics (2009)

  14. No Access

    Chapter and Conference Paper

    Mining Compressed Repetitive Gapped Sequential Patterns Efficiently

    Mining frequent sequential patterns from sequence databases has been a central research topic in data mining and various efficient mining sequential patterns algorithms have been proposed and studied. Recently...

    Yongxin Tong, Li Zhao, Dan Yu, Shilong Ma in Advanced Data Mining and Applications (2009)

  15. No Access

    Chapter and Conference Paper

    Bisexual branching processes with immigration depending on the number of females and males

    In this work, we introduce a class of discrete time bisexual branching processes where, in each generation, it is allowed the immigration of females and males. The immigration depends on the numbers of females...

    Shixia Ma, Yongsheng **ng in Workshop on Branching Processes and Their Applications (2010)

  16. No Access

    Chapter and Conference Paper

    A 3D-Shape Reconstruction Method Based on Coded Structured Light and Projected Ray Intersecting Location

    This paper proposes a 3D-shape reconstruction method based on coded structured light. Projecting color pseudo-random coded pattern on surface of object and using the thought of ray intersecting location, 3D sh...

    Hui Chen, Shiwei Ma, Bo Sun, Zhonghua Hao in Life System Modeling and Intelligent Compu… (2010)

  17. No Access

    Chapter and Conference Paper

    A Feature Points Matching Method Based on Window Unique Property of Pseudo-Random Coded Image

    Proposed a method for object feature points matching used in active machine vision technique. By projecting pseudo-random coded structured light onto the object to add code information, its feature points can ...

    Hui Chen, Shiwei Ma, Hao Zhang, Zhonghua Hao in Life System Modeling and Intelligent Compu… (2010)

  18. No Access

    Chapter and Conference Paper

    Optimal Tracking Performance for Unstable Processes with NMP Zeroes

    This paper has investigated optimal tracking performance for unstable processes with non-minimum phase (NMP) under control energy constraint. Firstly, based on prime factorization of unstable process, a perfor...

    Jianguo Wang, Shiwei Ma, **aowei Gou in Life System Modeling and Intelligent Compu… (2010)

  19. No Access

    Chapter and Conference Paper

    Framework Designing of BOA for the Development of Enterprise Management Information System

    This paper put forward the definition of business oriented architecture (BOA) for the development of enterprise management information system and its technical components, as well as the designing method of re...

    Shiwei Ma, Zhaowen Kong, Xuelin Jiang in Life System Modeling and Intelligent Compu… (2010)

  20. No Access

    Chapter and Conference Paper

    Research of Fault Diagnosis on Numerically-Controlled System

    Based on the cause of fault while the numerical control machine produces, the principle and traditional methods of fault diagnosis were expounded about the numerical control machine. Using sensors and Intellig...

    Qinghua Li, Chunshan He, Shiqiang Ma in Advances in Computer Science, Intelligent … (2011)

previous disabled Page of 6