Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Traffic Flow Forecasting Based on Parallel Neural Network

    In Intelligent Transportation Systems (ITS), traffic flow forecasting is important to Traffic Flow Guidance System (TFGS). However most of the traffic flow forecasting models cannot meet the requirement of TFG...

    Guozhen Tan, Wenjiang Yuan in Advances in Neural Networks - ISNN 2004 (2004)

  2. No Access

    Chapter and Conference Paper

    A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences

    An efficient algorithm for determining the linear complexity and the minimal polynomial of sequence with period p m q ...

    Shimin Wei, Guolong Chen, Guozhen **ao in Information Security and Cryptology (2005)

  3. No Access

    Chapter and Conference Paper

    A Service-Oriented Framework for Traffic Information Grid

    Intelligent Transportation System (ITS) refers to the use of information technologies to address and alleviate transportation problems. The challenges of ITS exist mainly in synthesizing information from geogr...

    Guozhen Tan, Chengxu Li, Jiankun Wu in Scientific Applications of Grid Computing (2005)

  4. No Access

    Chapter and Conference Paper

    Network-Tree Routing Model for Large Scale Networks: Theories and Algorithms

    For the first time, we propose Network-tree Model and its theorem of routing optimization, which greatly narrows the searching space of the routing procedure within much smaller sub-networks. We then show the ...

    Guozhen Tan, Dong Li, **aohui **, Ningning Han, Yi Liu in Networking - ICN 2005 (2005)

  5. No Access

    Chapter and Conference Paper

    Discovering the Most Suitable Web Service in Collaboration Environment

    With the increasing growth in popularity of web services, efficient discovery and matchmaking of relevant web services become significant challenges. Semantic Web provides a promising way to address the challe...

    Guozhen Ren, Qingzhong Li, Lizhen Cui in Computer Supported Cooperative Work in Des… (2008)

  6. No Access

    Chapter and Conference Paper

    Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves

    We investigate an upper bound on the discrepancy and a lower bound on the linear complexity of a class of sequences, derived from elliptic curves by using discrete logarithm in this paper. The results indicate...

    Zhixiong Chen, Ning Zhang, Guozhen **ao in Information Security and Cryptology (2008)

  7. Chapter and Conference Paper

    The Development and Preliminary Application Ofplant Quarantine Remote Teaching System Inchina

    With the development of modern information technology, the traditional teaching mode becomes more deficient for the requirement of modern education. Plant Quarantine has been accepted as the common course for ...

    Zhigang Wu, Zhihong Li, Ding Yang in Computer and Computing Technologies in Agr… (2009)

  8. No Access

    Chapter and Conference Paper

    Algorithm of Multiple Sensitive Attributes Privacy Based on Personal Anonymous

    This paper analyzes the (k, l) - Anonymous model need to address two key questions: re-encoding methods and information loss metrics, and in-depth analysis of the (k, l) - Anonymous model and similar models th...

    Shen Guozhen in Advances in Computer Science, Environment, Ecoinformatics, and Education (2011)

  9. No Access

    Chapter and Conference Paper

    An Integer Programming Approach for the Rural Postman Problem with Time Dependent Travel Times

    The Chinese Postman Problem is a famous and classical problem in graph theory. This paper introduces a new variant of this problem, namely Rural Postman Problem with Time Dependent Travel Times, which is motiv...

    Guozhen Tan, **ghao Sun in Computing and Combinatorics (2011)

  10. No Access

    Chapter and Conference Paper

    Vehicle Speed Estimation Based on Sensor Networks and Signal Correlation Measurement

    This paper proposed a novel method for accurate vehicle speed estimation based on magnetic sensors. The estimation system consists of triple sensors and signals are collected synchronously when vehicles travel...

    Wei Zhang, Guozhen Tan, Nan Ding in Advances in Wireless Sensor Networks (2014)

  11. No Access

    Chapter and Conference Paper

    User Behavioral Context-Aware Service Recommendation for Personalized Mashups in Pervasive Environments

    With the rapid development of mobile Internet and increasing amount of smart devices, Internet services have been integrated into peoples’ daily lives. Due to the features of end-user-oriented mashups in perva...

    Wei He, Guozhen Ren, Lizhen Cui, Hui Li in Web Technologies and Applications (2015)

  12. No Access

    Chapter and Conference Paper

    Adaptive Learning for Efficient Emergence of Social Norms in Networked Multiagent Systems

    This paper investigates how norm emergence can be facilitated by agents’ adaptive learning behaviors in networked multiagent systems. A general learning framework is proposed, in which agents can dynamically a...

    Chao Yu, Hongtao Lv, Sandip Sen, Fenghui Ren in PRICAI 2016: Trends in Artificial Intellig… (2016)

  13. No Access

    Article

    Interactive traffic simulation model with learned local parameters

    In this paper, we present a parameter learning method to reflect the rapidly changing behaviors in the traffic flow simulation process, in which we insert virtual vehicles into the real trajectory data. We com...

    **n Yang, Shuai Li, Yong Zhang, Wanchao Su in Multimedia Tools and Applications (2017)

  14. No Access

    Article

    Blockchain-Based Data Sharing System for AI-Powered Network Operations

    The explosive development of mobile communications and networking has led to the creation of an extremely complex system, which is difficult to manage. Hence, we propose an AI-powered network framework that us...

    Guozhen Zhang, Tong Li, Yong Li, Pan Hui in Journal of Communications and Information … (2018)

  15. No Access

    Chapter and Conference Paper

    Evaluation of Relationship Quality Within Dyads Through the Performance in Dual-Player Cooperative Tasks

    Human beings are influenced widely by relationship among individuals. However, there is still a lack of a systematic, objective and direct way to assess the quality of relationships within dyads. The current s...

    Haijiang Yan, Kai Yu, Guozhen Zhao in Engineering Psychology and Cognitive Ergonomics (2021)

  16. No Access

    Chapter and Conference Paper

    A Reliable Voice Perceptual Hash Authentication Algorithm

    In order to protect the authenticity and integrity of voice, this paper proposes a reliable voice perceptual hash authentication algorithm. This algorithm considers the dynamic characteristics of voice signals...

    Li Li, Yang Li, Zizhen Wang, Xuemei Li, Guozhen Shi in Mobile Multimedia Communications (2021)

  17. No Access

    Article

    Automated detection of retinopathy of prematurity by deep attention network

    Retinopathy of prematurity (ROP) is a retinal vascular proliferative disease principally observed in infants born prematurely with low birth weight. ROP is the leading cause of childhood blindness. Early scree...

    Baiying Lei, **anlu Zeng, Shan Huang, Rugang Zhang in Multimedia Tools and Applications (2021)

  18. No Access

    Chapter and Conference Paper

    Research on Cloud Office Resource Allocation Algorithm Based on Correction Weight PSO

    With the development of science and technology, cloud computing technology has changed people's office methods. People begin to use cloud services to realize remote collaborative office, which can save costs a...

    Guozhen Wang, Chun Wang, Tong Gan in Advances in Artificial Intelligence and Se… (2022)

  19. No Access

    Chapter and Conference Paper

    Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3

    In this work, we focus on collision attacks against instances of SHA-3 hash family in both classical and quantum settings. Since the 5-round collision attacks on SHA3-256 and other variants proposed by Guo et al.

    Jian Guo, Guozhen Liu, Ling Song, Yi Tu in Advances in Cryptology – ASIACRYPT 2022 (2022)

  20. No Access

    Chapter and Conference Paper

    Frame Correlation Knowledge Distillation for Gait Recognition in the Wild

    Recently, large deep models have achieved significant progress on gait recognition in the wild. However, such models come with a high cost of runtime and computational resource consumption. In this paper, we i...

    Guozhen Peng, Shaoxiong Zhang, Yuwei Zhao, Annan Li, Yunhong Wang in Biometric Recognition (2023)

previous disabled Page of 2