![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Face recognition using a face-only database: A new approach
In this paper, a coarse-to-fine, LDA-based face recognition system is proposed. Through careful implementation, we found that the databases adopted by two state-of-the-art face recognition systems[1,2] were in...
-
Article
Multi-cue-based face and facial feature detection on video segments
An approach is presented to detect faces and facial features on a video segment based on multi-cues, including gray-level distribution, color, motion, templates, algebraic features and so on. Faces are first d...
-
Chapter and Conference Paper
Solving Job-Shop Scheduling Problems by a Novel Artificial Immune System
The optimization of job-shop scheduling is very important because of its theoretical and practical significance. This paper proposes an efficient scheduling method based on artificial immune systems. In the pr...
-
Chapter and Conference Paper
A Hidden Markov Model and Immune Particle Swarm Optimization-Based Algorithm for Multiple Sequence Alignment
Multiple sequence alignment (MSA) is a fundamental and challenging problem in the analysis of biologic sequences. In this paper, an immune particle swarm optimization (IPSO) is proposed, which is based on the ...
-
Article
Integrating mRNA Decay Information into Co-Regulation Study
Absolute or relative transcript amounts measured through high-throughput technologies (e.g., microarrays) are now commonly used in bioinformatics analysis, such as gene clustering and DNA binding motif finding...
-
Article
Hiding collaborative recommendation association rules
The concept of Privacy-Preserving has recently been proposed in response to the concerns of preserving personal or sensible information derived from data mining algorithms. For example, through data mining, se...
-
Chapter and Conference Paper
Hiding Predictive Association Rules on Horizontally Distributed Data
In this work, we propose two approaches of hiding predictive association rules where the data sets are horizontally distributed and owned by collaborative but non-trusting parties. In particular, algorithms to...
-
Chapter and Conference Paper
Virtual Container Based Consistent Cluster Checkpoint
Checkpoint can store and recovery applications when faults happen and is becoming critical to large information systems. Unfortunately, existing checkpoint tools have some limitations such as: not transparent ...
-
Chapter and Conference Paper
An English Letter Recognition Algorithm Based Artificial Immune
In the study of letter recognition, the recognition accuracy is impacted by fonts and styles, which is the main bottleneck that the technology is applied. In order to enhance the accuracy, a letter recognition...
-
Article
A new type of solution method for the generalized linear complementarity problem over a polyhedral cone
This paper addresses the generalized linear complementarity problem (GLCP) over a polyhedral cone. To solve the problem, we first equivalently convert the problem into an affine variational inequalities proble...
-
Article
ArchSim: A System-Level Parallel Simulation Platform for the Architecture Design of High Performance Computer
High performance computer (HPC) is a complex huge system, of which the architecture design meets increasing difficulties and risks. Traditional methods, such as theoretical analysis, component-level simulation...
-
Chapter and Conference Paper
Document Classification with Multi-layered Immune Principle
Automatic document classification is helpful in both organizing and finding information on huge resources. A novel multi-layered immune based document classification algorithm is presented. First, we represent...
-
Chapter and Conference Paper
An Integrated Hierarchical Gaussian Mixture Model to Estimate Vigilance Level Based on EEG Recordings
Effective vigilance level estimation can be used to prevent disastrous accident occurred frequently in high-risk tasks. Brain Computer Interface(BCI) based on ElectroEncephalo-Graph(EEG) is a relatively reliab...
-
Chapter and Conference Paper
Heuristic Evolutionary Approach for Weighted Circles Layout
In order to improve lack of GA, we combined it with case-based reasoning(CBR) and constructing non-isomorphic layout pattern (NILP) to solve layout problem in this paper. Its basic idea includes 2 components: ...
-
Chapter and Conference Paper
Automated Detection of Major Thoracic Structures with a Novel Online Learning Method
This paper presents a novel on-line learning method for automatically detecting anatomic structures in medical images. Conventional off-line learning requires collecting all representative samples before the c...
-
Chapter and Conference Paper
A Heuristic Data-Sanitization Approach Based on TF-IDF
Data mining technology can help extract useful knowledge from large data sets. The process of data collection and data dissemination may, however, result in an inherent risk of privacy threats. In this paper, ...
-
Chapter and Conference Paper
Anonymizing Shortest Paths on Social Network Graphs
Social networking is gaining enormous popularity in the past few years. However, the popularity may also bring unexpected consequences for users regarding safety and privacy concerns. To prevent privacy being ...
-
Article
Physical Implementation of the Eight-Core Godson-3B Microprocessor
The Godson-3B processor is a powerful processor designed for high performance servers including Dawning Servers. It offers significantly improved performance over previous Godson-3 series CPUs by incorporating...
-
Article
Partitioning the Conventional DBT System for Multiprocessors
Noticeable performance improvement via ever-increasing transistors is gradually trapped into a predicament since software cannot logically and efficiently utilize hardware resource, such as multi-core resource...
-
Article
Risk-neutral evaluation of information security investment on data centers
Based on given data center network topology and risk-neutral management, this work proposes a simple but efficient probability-based model to calculate the probability of insecurity of each protected resource ...