Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Conversations in the Cloud: Crafting Harmony in AliCloud Computing Interaction Design

    With the rapid development of cloud services, it has become the core driving force for innovation and business development in the digital era. The emerging technology of cloud computing has transformed cloud s...

    **ntong Huang, Yiqi Chen, Dan Qiu, Xuan Zhou in Design, User Experience, and Usability (2024)

  2. No Access

    Chapter and Conference Paper

    Semi-supervised Learning Enabled Fault Analysis Method for Power Distribution Network Based on LSTM Autoencoder and Attention Mechanism

    By upgrading the existing distribution network fault statistical analysis system of Shanghai Institute of Electrical Science and Technology, comprehensive research is needed to investigate the hardware configu...

    Haining **e, Liming Zhuang, **ang Wang in Big Data and Security (2023)

  3. No Access

    Chapter and Conference Paper

    Research on Multi-domain Virtual Resource Map** Method for Aeronautic Swarm Network Supporting Differentiated Services Mechanism

    For the demand on differentiated services for aeronautic swarm networks, how to achieve the efficient allocation of network resources to meet the requirements of deep-level cooperative information transmission...

    **ang Wang, **gpeng Ran, Shanghong Zhao, Yiting Nie in Space Information Network (2021)

  4. No Access

    Chapter and Conference Paper

    A Reversible Watermarking Scheme Based on Adaptive Block Sized Integer Transform

    As the foundation of reversible watermarking technology, the integer transform technique, e.g. difference expansion (DE), has been widely studied. However, most integer transform schemes use the blocks of uni...

    Qianwen Li, **ang Wang, Qingqi Pei in Artificial Intelligence and Security (2020)

  5. No Access

    Chapter and Conference Paper

    Multi-level Temporal Pyramid Network for Action Detection

    Currently, one-stage frameworks have been widely applied for temporal action detection, but they still suffer from the challenge that the action instances span a wide range of time. The reason is that these on...

    **ang Wang, Changxin Gao, Shiwei Zhang in Pattern Recognition and Computer Vision (2020)

  6. No Access

    Chapter and Conference Paper

    A Deep Learning Approach to Radar Extrapolation

    Nowcasting is really important for citizen and industry since it matters to everyone on social and economic activities and is significant for monitoring and forecasting disasters. As the foundation of the task...

    Lei Yi, Wei Tian, **ang Wang, **aolong Xu in Machine Learning for Cyber Security (2020)

  7. No Access

    Chapter and Conference Paper

    Fuzzy Sliding Mode Control Based on RBF Neural Network for AUV Path Tracking

    Aiming at the path tracking problem of AUV (autonomous underwater vehicle) in the process of docking, a fuzzy sliding mode control algorithm based on RBF (radial basis function) neural network is proposed. Fir...

    **ang Wang, Yonglin Zhang, Zhouzhou Xue in Intelligent Robotics and Applications (2019)

  8. No Access

    Chapter and Conference Paper

    Maintaining Boolean Top-K Spatial Temporal Results in Publish-Subscribe Systems

    Nowadays many devices and applications in social networks and location-based services are producing, storing and using description, location and occurrence time of objects. Given a massive number of boolean to...

    Maryam Ghafouri, **ang Wang, Long Yuan, Ying Zhang in Databases Theory and Applications (2018)

  9. No Access

    Chapter and Conference Paper

    Service Customized Software-Defined Airborne Information Networks

    Airborne information networks have drawn the attention of the research community in the recent years. This growing interest can largely be attributed to new civil and military applications. Currently Airborne ...

    **ang Wang, Shanghong Zhao, **g Zhao, Yongjun Li in Space Information Networks (2017)

  10. No Access

    Chapter and Conference Paper

    Detecting Internet Hidden Paid Posters Based on Group and Individual Characteristics

    Online social networks are popular communication tools for billions of users. Unfortunately, they are also effective tools for hidden paid posters (or Internet water army in some literatures) to propagate spam...

    **ang Wang, Bin Zhou, Yan Jia, Shasha Li in Web Information Systems Engineering – WISE 2015 (2015)

  11. No Access

    Chapter and Conference Paper

    On Evaluating Query Performance Predictors

    Query performance prediction (QPP) is to estimate the query difficulty without knowing the relevance assessment information. The quality of predictor is evaluated by the correlation coefficient between the pre...

    Yu Huang, Tiejian Luo, **ang Wang, Kai Hui in Pervasive Computing and the Networked World (2014)

  12. No Access

    Chapter and Conference Paper

    Evaluating Query Performance Predictors Based on Brownian Distance Correlation

    Modern information retrieval system suffers from radical variance performance even though its mean performance is well. In order to solve this problem, the Query Performance Predictor, predicting the performan...

    **ang Wang, Tiejian Luo, Yu Huang in Pervasive Computing and the Networked World (2014)

  13. No Access

    Chapter and Conference Paper

    A New Indexing Technique for Supporting By-attribute Membership Query of Multidimensional Data

    Multidimensional Data indexing and lookup has been widely used in online data-intensive applications involving in data with multiple attributes. However, there remains a long way to go for the high performance...

    Zhu Wang, Tiejian Luo, Guandong Xu, **ang Wang in Web-Age Information Management (2013)

  14. No Access

    Chapter and Conference Paper

    Reversible Image Watermarking Using Hybrid Prediction

    In this paper, a hybrid prediction algorithm is designed to improve the histogram shifting based reversible watermarking method. This algorithm not only uses the local information near a pixel, but also utiliz...

    **ang Wang, Qingqi Pei, **nbo Gao, Zongming Guo in The Era of Interactive Media (2013)

  15. No Access

    Chapter and Conference Paper

    A Fast Indexing Algorithm Optimization with User Behavior Pattern

    Internet users’ access pattern for objects has been observed to follow Zipf’s law. The preference for network resource is showing strong influence on real-time lookup performance in large-scale distributed sys...

    Zhu Wang, Tiejian Luo, Yanxiang Xu in Pervasive Computing and the Networked World (2013)

  16. No Access

    Chapter and Conference Paper

    Real-Time Visualization for Large Scale Terrain Based on Linear Quadtree

    To solve the problem of low frame rate and high memory space cost in large scale terrain visualization, a real-time rendering algorithm based on linear quadtree is proposed in this paper. It consists of three ...

    Qin Li, **ang Wang, Yongjia Zhao, Shuling Dai in AsiaSim 2012 (2012)

  17. No Access

    Chapter and Conference Paper

    On Chip Cache Quantitative Optimization Approach: Study in Chip Multi-processor Design

    The nanoelectroincs era promotes multi-core processor (or chip multiprocessor, CMP) improvements with a good deal of both opportunities and challenges. In CMP systems based on SMP organization, cache is much m...

    Chi Zhang, **ang Wang in High Performance Computing and Applications (2010)

  18. No Access

    Chapter and Conference Paper

    A Reversible Watermarking Scheme for High-Fidelity Applications

    In this paper, we present a reversible watermarking scheme for high-fidelity applications. An improved histogram shifting technique is employed in this method to increase the embedding capacity and ameliorate ...

    **ang Wang, **aolong Li, Bin Yang in Advances in Multimedia Information Process… (2009)