Skip to main content

previous disabled Page of 6
and
  1. Article

    Open Access

    Analysis and prediction of virtual machine boot time on virtualized computing environments

    Starting a virtual machine (VM) is a common operation in cloud computing platforms. In order to achieve better management of resource provisioning, a cloud platform needs to accurately estimate the VM boot tim...

    Ridlo Sayyidina Auliya, Yen-Lin Lee, Chia-Ching Chen in Journal of Cloud Computing (2024)

  2. No Access

    Chapter and Conference Paper

    Numerical Investigation on Turbulence Models and the Hydrodynamics of a UVMS

    Underwater vehicle-manipulator systems (UVMS) have been widely used in many underwater tasks. In this paper, a numerical investigation of the hydrodynamic performances of a small-size UVMS is carried out by us...

    Hang Xu, Lin Hong, **n Wang, Ming Zhao in Intelligent Robotics and Applications (2022)

  3. No Access

    Chapter and Conference Paper

    Exploring the Role of Culture-Centric Design Guidelines in the Design of mHealth Application for Senior Informal Caregivers: Lessons Learned in a Field Study

    Mobile health (mHealth) applications help reduce the burden of informal caregivers. However, limited mHealth applications are fully adopted by informal caregivers. Research has suggested that cultural tendency...

    Wen-Lin Chiao, Ying-Jia Hong, Hsin-Pei Tsai, Yu-Hsin Wang in HCI International 2022 Posters (2022)

  4. No Access

    Chapter and Conference Paper

    Design and Control of a Bimanual Rehabilitation System for Trunk Impairment Patients

    Stroke is one of the leading causes of severe long-term disability worldwide. Past research has proved the effectiveness and importance of trunk rehabilitation in enhancing the locomotive capacities and balanc...

    Lufeng Chen, **g Qiu, Lin Zhou, Hongwei Wang in Intelligent Robotics and Applications (2022)

  5. No Access

    Chapter and Conference Paper

    Facial Action Unit Detection by Exploring the Weak Relationships Between AU Labels

    In recent years, facial action unit (AU) detection attracts more and more attentions and great progress has been made. However, few approaches solve AU detection problem by applying the emotion information, an...

    Mengke Tian, Hengliang Zhu, Yong Wang in Collaborative Computing: Networking, Appli… (2022)

  6. No Access

    Chapter and Conference Paper

    BIPS: Bi-modal Indoor Panorama Synthesis via Residual Depth-Aided Adversarial Learning

    Providing omnidirectional depth along with RGB information is important for numerous applications. However, as omnidirectional RGB-D data is not always available, synthesizing RGB-D panorama data from limited ...

    Changgyoon Oh, Wonjune Cho, Yujeong Chae, Daehee Park in Computer Vision – ECCV 2022 (2022)

  7. No Access

    Chapter and Conference Paper

    Adaptive Technologies of Hybrid Carrier Based on WFRFT Facing Coverage and Spectral Efficiency Balance

    Adaptive Modulation and Coding (AMC) and power control are adopted to balance spectral efficiency and coverage facing the problem of spectrum shortage in recent years. Considering the Orthogonal Frequency Divi...

    Ning Pan, Lin Mei, Linan Wang, Libin Jiao in Artificial Intelligence for Communications… (2021)

  8. No Access

    Chapter and Conference Paper

    XRR: Explainable Risk Ranking for Financial Reports

    We propose an eXplainable Risk Ranking (XRR) model that uses multilevel encoders and attention mechanisms to analyze financial risks among companies. In specific, the proposed method utilizes the textual infor...

    Ting-Wei Lin, Ruei-Yao Sun, Hsuan-Ling Chang in Machine Learning and Knowledge Discovery i… (2021)

  9. No Access

    Chapter and Conference Paper

    Coverless Image Information Hiding Based on Deep Convolution Features

    The coverless information hiding technology proposed in recent years does not need to modify the carrier image and has good anti-detection ability. However, the existing coverless information hiding technology...

    Jiaohua Qin, **g Wang, Jun Sun, Xuyu **ang, Lin **ang in Theoretical Computer Science (2021)

  10. No Access

    Chapter and Conference Paper

    VTLayout: Fusion of Visual and Text Features for Document Layout Analysis

    Documents often contain complex physical structures, which make the Document Layout Analysis (DLA) task challenging. As a pre-processing step for content extraction, DLA has the potential to capture rich infor...

    Shoubin Li, Xuyan Ma, Shuaiqun Pan, Jun Hu in PRICAI 2021: Trends in Artificial Intellig… (2021)

  11. No Access

    Chapter and Conference Paper

    SQKT: A Student Attention-Based and Question-Aware Model for Knowledge Tracing

    The goal of Knowledge Tracing (KT) is to trace student’s knowledge states in relation to different knowledge concepts and make prediction of student’s performance on new exercises. With the growing number of o...

    Qize **e, Li** Wang, Peidong Song, Xuemin Lin in Web and Big Data (2021)

  12. Article

    Open Access

    CNN based lane detection with instance segmentation in edge-cloud computing

    At present, the number of vehicle owners is increasing, and the cars with autonomous driving functions have attracted more and more attention. The lane detection combined with cloud computing can effectively s...

    Wei Wang, Hui Lin, Junshu Wang in Journal of Cloud Computing (2020)

  13. No Access

    Chapter and Conference Paper

    Performance Analysis of QUIC-UDP Protocol Under High Load

    The QUIC protocol is currently recognized as a network pro- tocol that is expected to replace TCP. It is characterized by encryption, multiplexing, and low latency. It was proposed by Google in 2013 and aims t...

    Lin Qi, Zhihong Qiao, Aowei Zhang, Hui Qi in Mobile Wireless Middleware, Operating Syst… (2020)

  14. No Access

    Chapter and Conference Paper

    Double LSTM Structure for Network Traffic Flow Prediction

    The network traffic prediction is important for service quality control in computer network. The performance of the traditional prediction method significantly degrades for the burst short-term flow. In view o...

    Lin Huang, Diangang Wang, **ao Liu, Yongning Zhuo, Yong Zeng in Data Science (2020)

  15. Chapter and Conference Paper

    Mind the Propagation of States

    Impossible differentials cryptanalysis and impossible polytopic cryptanalysis are the most effective approaches to estimate the security of block ciphers. However, the previous automatic search methods of thei...

    **chao Hu, Yongqiang Li, Lin Jiao, Shizhu Tian in Advances in Cryptology – ASIACRYPT 2020 (2020)

  16. Chapter and Conference Paper

    Class Indistinguishability for Outsourcing Equality Conjunction Search

    Searchable symmetric encryption (SSE) enables a remote cloud server...

    Weipeng Lin, Ke Wang, Zhilin Zhang, Ada Waichee Fu in Cloud Computing – CLOUD 2019 (2019)

  17. No Access

    Chapter and Conference Paper

    GparMiner: A System to Mine Graph Pattern Association Rules

    With the rapid development, social network analysis has been receiving significant attention. One popular direction in the filed is to mine graph-pattern association rules (

    **n Wang, Yang Xu, Ruocheng Zhao, Junjie Lin in Database Systems for Advanced Applications (2019)

  18. Chapter and Conference Paper

    Detection of Overlapped Apples in Orchard Scene Using Improved K-means and Distance Least Square

    Automatic detection of mature apples in a complex agricultural condition is still a challenge for an autonomous picking robot due to the influence from overlap**. In order to detecting overlapped apples in t...

    **a Xue, Zhou Guomin, Qiu Yun, Li Zhuang in Computer and Computing Technologies in Agr… (2019)

  19. No Access

    Chapter and Conference Paper

    Mixing Property Tester: A General Framework for Evaluating the Mixing Properties of Initialization of Stream Ciphers

    In this paper, a general framework for evaluating the mixing properties of initialization of stream ciphers, called Mixing Property Tester-MPT, is exploited and formalized. Based on this general framework, we pro...

    Lin Ding, Dawu Gu, Lei Wang in Smart City and Informatization (2019)

  20. Chapter and Conference Paper

    Detection of Young Green Apples in Orchard Environment Using Adaptive Ratio Chromatic Aberration and HOG-SVM

    It is still a challenge for fruit robot to automatic detecting young green apples in a complex grove environment due to color similarity with the background and varying illumination conditions. The purpose of ...

    **a Xue, Zhou Guomin, Qiu Yun, Li Zhuang in Computer and Computing Technologies in Agr… (2019)

previous disabled Page of 6