Skip to main content

previous disabled Page of 5
and
  1. No Access

    Book and Conference Proceedings

    Conceptual Modeling for Advanced Application Domains

    ER 2004 Workshops CoMoGIS, CoMWIM, ECDM, CoMoA, DGOV, and eCOMO, Shanghai, China, November 8-12, 2004. Proceedings

    Shan Wang, Katsumi Tanaka in Lecture Notes in Computer Science (2004)

  2. No Access

    Chapter and Conference Paper

    Maintaining Packet Order for the Parallel Switch

    In the parallel switch high-speed arrived packets (or cells) with same destination will be spread into many low-speed switching fabrics for processing. When these packets are sent to the output, however, their...

    Yuguo Dong, Binqiang Wang, Yunfei Guo, Jiangxing Wu in Grid and Cooperative Computing (2004)

  3. No Access

    Chapter and Conference Paper

    APForecast: An Adaptive Forecasting Method for Data Streams

    This research investigates continuous forecasting queries with alterable forecasting-step over data streams. A novel Adaptive Precision forecasting method to forecasting single attribute value of item in a sin...

    Yong-li Wang, Hong-bing Xu, Yi-sheng Dong in Knowledge-Based Intelligent Information an… (2005)

  4. No Access

    Chapter and Conference Paper

    METS Cataloging Tool for Heterogeneous Collections

    This paper describes the implementation of DRMSCata, an XML Schema driven web-base cataloging subsystem, which helps to produce various METS encoded documents.

    Li Dong, Chunxiao **ng, Kehong Wang in Digital Libraries: Implementing Strategies… (2005)

  5. No Access

    Chapter and Conference Paper

    SmartBoa: Constructing p2p Overlay Network in the Heterogeneous Internet Using Irregular Routing Tables

    The high heterogeneity of large-scale p2p system leads us to the philosophy that the size of a node’s routing table and its updating cost should correspond to the node’s capacity. With this philosophy, we desi...

    **gfeng Hu, Ming Li, Weimin Zheng, Dongsheng Wang, Ning Ning in Peer-to-Peer Systems III (2005)

  6. No Access

    Chapter and Conference Paper

    A Constellation Resource Discovery Model Based on Scalable Multi-tape Universal Turing Machine

    Constellation resource discovery model is a novel model for discovering the dynamic resources in Grid. In constellation model, we propose a new Scalable Multi-tape Universal Turing machine (SMUTM) to present t...

    Yinfeng Wang, **aoshe Dong, Hua Guo in Grid and Cooperative Computing - GCC 2005 (2005)

  7. No Access

    Chapter and Conference Paper

    Orthogonally Rotational Transformation for Naive Bayes Learning

    Naive Bayes is one of the most efficient and effective learning algorithms for machine learning, pattern recognition and data mining. But its conditional independence assumption is rarely true in real-world ap...

    Limin Wang, Chunhong Cao, Haijun Li, Haixia Chen in Computational Intelligence and Security (2005)

  8. No Access

    Chapter and Conference Paper

    Research and Implementation of a Personalized Recommendation System

    Personalized Recommendation System is a necessary part of Personalized Information Service System. In this paper, a personalized recommendation system is implemented and tested with actual website access data....

    Li Dong, Yu Nie, Chunxiao **ng, Kehong Wang in Digital Libraries: Achievements, Challenge… (2006)

  9. No Access

    Chapter and Conference Paper

    A Fast Temporal Texture Synthesis Algorithm Using Segment Genetic Algorithm

    Texture synthesis is a very active research area in computer vision and graphics, and temporal texture synthesis is one subset of it. We present a new temporal texture synthesis algorithm, in which a segment g...

    Li Wen-hui, Meng Yu, Zhang Zhen-hua, Liu Dong-fei in Foundations of Intelligent Systems (2006)

  10. No Access

    Chapter and Conference Paper

    An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events

    To integrate network security devices to make them act as a battle team and efficiently handle the large amount of security events produced by various network applications, Network Security Intelligent Central...

    Yang-ming Ma, Zhi-tang Li, Jie Lei, Li Wang in Intelligence and Security Informatics (2007)

  11. No Access

    Chapter and Conference Paper

    Towards Identifying True Threat from Network Security Data

    Among the challenges in the field of network security management, one significant problem is the increasing difficulty in identifying the security incidents which pose true threat to the protected network syst...

    Zhi-tang Li, Jie Lei, Li Wang, Dong Li in Intelligence and Security Informatics (2007)

  12. No Access

    Chapter and Conference Paper

    Automatic Generation of Web Service Workflow Using a Probability Based Process-Semantic Repository

    Workflow management system has been utilized in the web service environment to make mass of different web services work cooperatively. In this paper, the authors propose a novel automatic generation method of ...

    Dong Yuan, Miao Du, Haiyang Wang, Lizhen Cui in Advances in Web and Network Technologies, … (2007)

  13. No Access

    Chapter

    Multi-Dimensional Analysis of Data Streams Using Stream Cubes

    Large volumes of dynamic stream data pose great challenges to its analysis. Besides its dynamic and transient behavior, stream data has another important characteristic: multi-dimensionality. Much of stream data ...

    Jiawei Han, Y. Dora Cai, Yixin Chen, Guozhu Dong, Jian Pei, Benjamin W. Wah in Data Streams (2007)

  14. No Access

    Chapter and Conference Paper

    Multiple Ranker Method in Document Retrieval

    In this paper, we propose a multiple-ranker approach to make learning to rank methods more effective for document retrieval application. In traditional learning to rank methods, a ranker is learned from a set ...

    Dong Li, Maoqiang **e, Yang Wang in Advanced Intelligent Computing Theories an… (2008)

  15. No Access

    Chapter and Conference Paper

    Skin Detection from Different Color Spaces for Model-Based Face Detection

    Skin and face detection has many important applications in intelligent human-machine interfaces, reliable video surveillance and visual understanding of human activities. In this paper, we propose an efficient...

    Dong Wang, **chang Ren, Jianmin Jiang in Advanced Intelligent Computing Theories an… (2008)

  16. No Access

    Chapter and Conference Paper

    Easy Flow: New Generation Business Process Model

    Now workflow technique is almost the unique candidate to handle a business process in a software application. But graph based traditional workflow is not enough flexible in software engineer which is well known s...

    Qi Sui, Dong-qing Yang, Teng-jiao Wang in Advances in Web and Network Technologies, … (2009)

  17. No Access

    Chapter and Conference Paper

    Video Summarization with Visual and Semantic Features

    Video summarization aims to provide a condensed yet informative version for original footages so as to facilitate content comprehension, browsing and delivery, where multi-modal features play an important role...

    Pei Dong, Zhiyong Wang, Li Zhuo, Dagan Feng in Advances in Multimedia Information Process… (2010)

  18. No Access

    Chapter and Conference Paper

    Efficient Temporal Segmentation for Sports Programs with Special Cases

    In sports programs, there are many special cases making shot boundary detection difficult. Targeted for these special cases, not be considered by existing work, this paper presents a shot boundary detection sc...

    Shiguo Lian, Yuan Dong, Haila Wang in Advances in Multimedia Information Process… (2010)

  19. No Access

    Article

    Reliability-based citation impact factor and the manipulation of impact factor

    According to the definition of reliability-based citation impact factor (R-impact factor) proposed by KUO & RUPE and the cumulative citation age distribution model, a mathematical expression of the relationshi...

    Guang Yu, Dong-Hui Yang, Wang Liang in Scientometrics (2010)

  20. No Access

    Chapter and Conference Paper

    An Improved Fuzzy Synthetically Evaluation

    In view of the characteristics of evaluation such as subjectivity and fuzziness, the method for evaluation was studied and an improved fuzzy synthetically evaluation model (IFSE) was presented. The model proce...

    Dong-**n Lu, Wen-Yong Weng, Jian Su in High Performance Networking, Computing, an… (2011)

previous disabled Page of 5