Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Secure Dispersed Computing Scheme for Internet of Mobile Things

    With the rapid development of the Internet of Mobile Things (IoMT) and countless mobile devices connected to the Internet, problems of the IoMT computing paradigm, Mobile Cloud Computing (MCC) and Mobile Edge ...

    Yan Zhao, Ning Hu, **cai Zou, Yuqiang Zhang in Mobile Internet Security (2022)

  2. No Access

    Chapter and Conference Paper

    An Anonymous Communication System Based on Software Defined Architecture

    The existing low-latency anonymous communication networks represented by Tor and I2P networks are mainly composed of voluntary nodes all over the world, and these nodes use onion routing or garlic routing to i...

    **nda Cheng, Yixing Chen, **cai Zou, Yuqiang Zhang, Ning Hu in Mobile Internet Security (2022)

  3. No Access

    Chapter and Conference Paper

    A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks

    The wireless sensor network is a typical distributed system where a standard reference time is prerequisite for all nodes to cooperate with each other. This paper proposes a security cycle clock synchronizatio...

    **g Xu, Yuqiang Zhang, Fei Xu, Lei Zhou in Information Security Practice and Experien… (2018)

  4. No Access

    Chapter and Conference Paper

    Traffic Sign Recognition Using Deep Convolutional Networks and Extreme Learning Machine

    Traffic sign recognition is an important but challenging task, especially for automated driving and driver assistance. Its accuracy depends on two aspects: feature exactor and classifier. Current popular algor...

    Yujun Zeng, **n Xu, Yuqiang Fang, Kun Zhao in Intelligence Science and Big Data Engineer… (2015)

  5. No Access

    Chapter and Conference Paper

    Efficient Vehicle Localization Based on Road-Boundary Maps

    Localization is a critical task of autonomous vehicles, and can provide a foundation for the planning and perception modules. In this paper, we propose a novel vehicle localization method based on road-boundar...

    Dawei Zhao, Tao Wu, Yuqiang Fang, Ruili Wang in PRICAI 2014: Trends in Artificial Intellig… (2014)

  6. No Access

    Chapter and Conference Paper

    Kernel L1 Graph for Image Analysis

    Graph costructing plays an essential role in graph based learning algorithms. Recently, a new kind of graph called L1 graph which was motivated by that each datum can be represented as a sparse combination of ...

    Liang **ao, Bin Dai, Yuqiang Fang, Tao Wu in Pattern Recognition (2012)

  7. No Access

    Chapter and Conference Paper

    Actual Projects for Carriers to Achieve Teaching Model Innovation for Engineering Specialties

    A teaching reform and innovation with actual projects for carriers has been carried out during last years, and the experiences have been summarized in this paper. Quite a few actual projects which are not only...

    Bin Chen, Yingchun Pan, Yuqiang Wang in Information and Management Engineering (2011)

  8. No Access

    Chapter and Conference Paper

    Case Teaching in the Course of Water Economy

    Water Economy course is a professional basic course for the course with the characteristics and the training goal, a detailed analysis of the current situation and the teaching of hydraulic engineering economi...

    Yuqiang Wang, Qunge Hu, Yinghua Wang in Advances in Applied Economics, Business an… (2011)

  9. No Access

    Chapter and Conference Paper

    Optimizational Study on Computing Method of Channel Earthwork Based on MATLAB

    The calculation of channel transition earthwork volume is the basic work of channel design and construction. Traditional calculation is complicated and low precision. The study is based on the strong calculati...

    Yuqiang Wang, Jianqiang Zhang in Intelligent Computing and Information Science (2011)

  10. No Access

    Chapter and Conference Paper

    Catching and Identifying Bugs in Register Allocation

    Although there are many register allocation algorithms that work well, it can be difficult to correctly implement these algorithms. As a result, it is common for bugs to remain in the register allocator, even ...

    Yuqiang Huang, Bruce R. Childers, Mary Lou Soffa in Static Analysis (2006)

  11. No Access

    Chapter and Conference Paper

    A Schedule Algebra Based Approach to Determine the K-Best Solutions of a Knapsack Problem with a Single Constraint

    In this paper, we develop a new and effective schedule algebra based algorithm to determine the K-best solutions of a knapsack problem with a single constraint. Computational experience with this algorithm is ...

    Subhash C. Sarin, Yuqiang Wang, Dae B. Chang in Algorithmic Applications in Management (2005)