Skip to main content

previous disabled Page of 4
and
  1. No Access

    Chapter and Conference Paper

    Face recognition using a face-only database: A new approach

    In this paper, a coarse-to-fine, LDA-based face recognition system is proposed. Through careful implementation, we found that the databases adopted by two state-of-the-art face recognition systems[1,2] were in...

    Hong-Yuan Mark Liaot, Chin-Chuan Hant, Gwo-Joug Yut in Computer Vision — ACCV'98 (1997)

  2. No Access

    Article

    Multi-cue-based face and facial feature detection on video segments

    An approach is presented to detect faces and facial features on a video segment based on multi-cues, including gray-level distribution, color, motion, templates, algebraic features and so on. Faces are first d...

    Zhen Yun Peng, HaiZhou Ai, Wei Hong in Journal of Computer Science and Technology (2003)

  3. No Access

    Chapter and Conference Paper

    Solving Job-Shop Scheduling Problems by a Novel Artificial Immune System

    The optimization of job-shop scheduling is very important because of its theoretical and practical significance. This paper proposes an efficient scheduling method based on artificial immune systems. In the pr...

    Hong-Wei Ge, Liang Sun, Yan-Chun Liang in AI 2005: Advances in Artificial Intelligence (2005)

  4. No Access

    Chapter and Conference Paper

    A Hidden Markov Model and Immune Particle Swarm Optimization-Based Algorithm for Multiple Sequence Alignment

    Multiple sequence alignment (MSA) is a fundamental and challenging problem in the analysis of biologic sequences. In this paper, an immune particle swarm optimization (IPSO) is proposed, which is based on the ...

    Hong-Wei Ge, Yan-Chun Liang in AI 2005: Advances in Artificial Intelligence (2005)

  5. No Access

    Article

    Integrating mRNA Decay Information into Co-Regulation Study

    Absolute or relative transcript amounts measured through high-throughput technologies (e.g., microarrays) are now commonly used in bioinformatics analysis, such as gene clustering and DNA binding motif finding...

    Liang Chen, Hong-Yu Zhao in Journal of Computer Science and Technology (2005)

  6. No Access

    Article

    Hiding collaborative recommendation association rules

    The concept of Privacy-Preserving has recently been proposed in response to the concerns of preserving personal or sensible information derived from data mining algorithms. For example, through data mining, se...

    Shyue-Liang Wang, Dipen Patel, Ayat Jafari, Tzung-Pei Hong in Applied Intelligence (2007)

  7. No Access

    Chapter and Conference Paper

    Hiding Predictive Association Rules on Horizontally Distributed Data

    In this work, we propose two approaches of hiding predictive association rules where the data sets are horizontally distributed and owned by collaborative but non-trusting parties. In particular, algorithms to...

    Shyue-Liang Wang, Ting-Zheng Lai, Tzung-Pei Hong in Next-Generation Applied Intelligence (2009)

  8. No Access

    Chapter and Conference Paper

    Virtual Container Based Consistent Cluster Checkpoint

    Checkpoint can store and recovery applications when faults happen and is becoming critical to large information systems. Unfortunately, existing checkpoint tools have some limitations such as: not transparent ...

    **ao-jia **ang, Hong-liang Yu, Ji-wu Shu in Control and Automation (2009)

  9. No Access

    Chapter and Conference Paper

    An English Letter Recognition Algorithm Based Artificial Immune

    In the study of letter recognition, the recognition accuracy is impacted by fonts and styles, which is the main bottleneck that the technology is applied. In order to enhance the accuracy, a letter recognition...

    Chunlin Liang, Lingxi Peng, Yindie Hong in Advances in Neural Networks – ISNN 2009 (2009)

  10. No Access

    Article

    A new type of solution method for the generalized linear complementarity problem over a polyhedral cone

    This paper addresses the generalized linear complementarity problem (GLCP) over a polyhedral cone. To solve the problem, we first equivalently convert the problem into an affine variational inequalities proble...

    Hong-Chun Sun, Yan-Liang Dong in International Journal of Automation and Computing (2009)

  11. No Access

    Article

    ArchSim: A System-Level Parallel Simulation Platform for the Architecture Design of High Performance Computer

    High performance computer (HPC) is a complex huge system, of which the architecture design meets increasing difficulties and risks. Traditional methods, such as theoretical analysis, component-level simulation...

    Yong-Qin Huang, Hong-Liang Li, **ang-Hui **e in Journal of Computer Science and Technology (2009)

  12. No Access

    Chapter and Conference Paper

    Document Classification with Multi-layered Immune Principle

    Automatic document classification is helpful in both organizing and finding information on huge resources. A novel multi-layered immune based document classification algorithm is presented. First, we represent...

    Chunlin Liang, Yindie Hong, Yuefeng Chen, Lingxi Peng in Advances in Swarm Intelligence (2010)

  13. No Access

    Chapter and Conference Paper

    An Integrated Hierarchical Gaussian Mixture Model to Estimate Vigilance Level Based on EEG Recordings

    Effective vigilance level estimation can be used to prevent disastrous accident occurred frequently in high-risk tasks. Brain Computer Interface(BCI) based on ElectroEncephalo-Graph(EEG) is a relatively reliab...

    **g-Nan Gu, Hong-Jun Liu, Hong-Tao Lu, Bao-Liang Lu in Neural Information Processing (2011)

  14. No Access

    Chapter and Conference Paper

    Heuristic Evolutionary Approach for Weighted Circles Layout

    In order to improve lack of GA, we combined it with case-based reasoning(CBR) and constructing non-isomorphic layout pattern (NILP) to solve layout problem in this paper. Its basic idea includes 2 components: ...

    Zi-qiang Li, Hong-liang Zhang, **-hua Zheng, Meng-juan Dong in Information and Automation (2011)

  15. No Access

    Chapter and Conference Paper

    Automated Detection of Major Thoracic Structures with a Novel Online Learning Method

    This paper presents a novel on-line learning method for automatically detecting anatomic structures in medical images. Conventional off-line learning requires collecting all representative samples before the c...

    Nima Tajbakhsh, Hong Wu, Wenzhe Xue, Jianming Liang in Machine Learning in Medical Imaging (2011)

  16. No Access

    Chapter and Conference Paper

    A Heuristic Data-Sanitization Approach Based on TF-IDF

    Data mining technology can help extract useful knowledge from large data sets. The process of data collection and data dissemination may, however, result in an inherent risk of privacy threats. In this paper, ...

    Tzung-Pei Hong, Chun-Wei Lin, Kuo-Tung Yang in Modern Approaches in Applied Intelligence (2011)

  17. No Access

    Chapter and Conference Paper

    Anonymizing Shortest Paths on Social Network Graphs

    Social networking is gaining enormous popularity in the past few years. However, the popularity may also bring unexpected consequences for users regarding safety and privacy concerns. To prevent privacy being ...

    Shyue-Liang Wang, Zheng-Ze Tsai in Intelligent Information and Database Syste… (2011)

  18. No Access

    Article

    Physical Implementation of the Eight-Core Godson-3B Microprocessor

    The Godson-3B processor is a powerful processor designed for high performance servers including Dawning Servers. It offers significantly improved performance over previous Godson-3 series CPUs by incorporating...

    Ru Wang, Bao-**a Fan, Liang Yang in Journal of Computer Science and Technology (2011)

  19. No Access

    Article

    Partitioning the Conventional DBT System for Multiprocessors

    Noticeable performance improvement via ever-increasing transistors is gradually trapped into a predicament since software cannot logically and efficiently utilize hardware resource, such as multi-core resource...

    Ru-Hui Ma, Hai-Bing Guan, Er-Zhou Zhu in Journal of Computer Science and Technology (2011)

  20. No Access

    Article

    Risk-neutral evaluation of information security investment on data centers

    Based on given data center network topology and risk-neutral management, this work proposes a simple but efficient probability-based model to calculate the probability of insecurity of each protected resource ...

    Shyue-Liang Wang, Jyun-Da Chen in Journal of Intelligent Information Systems (2011)

previous disabled Page of 4