Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Multi-cue-based face and facial feature detection on video segments

    An approach is presented to detect faces and facial features on a video segment based on multi-cues, including gray-level distribution, color, motion, templates, algebraic features and so on. Faces are first d...

    Zhen Yun Peng, HaiZhou Ai, Wei Hong in Journal of Computer Science and Technology (2003)

  2. No Access

    Chapter

    A Time-Completeness Tradeoff on Fuzzy Web-Browsing Mining

    World-wide-web applications have grown very rapidly and have made a significant impact on computer systems. Among them, web browsing for useful information may be most commonly seen. Due to its tremendous amou...

    Tzung-Pei Hong, Kuei-Ying Lin, Shyue-Liang Wang in Fuzzy Logic and the Internet (2004)

  3. No Access

    Chapter and Conference Paper

    Solving Job-Shop Scheduling Problems by a Novel Artificial Immune System

    The optimization of job-shop scheduling is very important because of its theoretical and practical significance. This paper proposes an efficient scheduling method based on artificial immune systems. In the pr...

    Hong-Wei Ge, Liang Sun, Yan-Chun Liang in AI 2005: Advances in Artificial Intelligence (2005)

  4. No Access

    Chapter and Conference Paper

    A Hidden Markov Model and Immune Particle Swarm Optimization-Based Algorithm for Multiple Sequence Alignment

    Multiple sequence alignment (MSA) is a fundamental and challenging problem in the analysis of biologic sequences. In this paper, an immune particle swarm optimization (IPSO) is proposed, which is based on the ...

    Hong-Wei Ge, Yan-Chun Liang in AI 2005: Advances in Artificial Intelligence (2005)

  5. No Access

    Article

    Integrating mRNA Decay Information into Co-Regulation Study

    Absolute or relative transcript amounts measured through high-throughput technologies (e.g., microarrays) are now commonly used in bioinformatics analysis, such as gene clustering and DNA binding motif finding...

    Liang Chen, Hong-Yu Zhao in Journal of Computer Science and Technology (2005)

  6. No Access

    Chapter and Conference Paper

    Virtual Container Based Consistent Cluster Checkpoint

    Checkpoint can store and recovery applications when faults happen and is becoming critical to large information systems. Unfortunately, existing checkpoint tools have some limitations such as: not transparent ...

    **ao-jia **ang, Hong-liang Yu, Ji-wu Shu in Control and Automation (2009)

  7. No Access

    Article

    ArchSim: A System-Level Parallel Simulation Platform for the Architecture Design of High Performance Computer

    High performance computer (HPC) is a complex huge system, of which the architecture design meets increasing difficulties and risks. Traditional methods, such as theoretical analysis, component-level simulation...

    Yong-Qin Huang, Hong-Liang Li, **ang-Hui **e in Journal of Computer Science and Technology (2009)

  8. No Access

    Chapter and Conference Paper

    Document Classification with Multi-layered Immune Principle

    Automatic document classification is helpful in both organizing and finding information on huge resources. A novel multi-layered immune based document classification algorithm is presented. First, we represent...

    Chunlin Liang, Yindie Hong, Yuefeng Chen, Lingxi Peng in Advances in Swarm Intelligence (2010)

  9. No Access

    Chapter and Conference Paper

    Automated Detection of Major Thoracic Structures with a Novel Online Learning Method

    This paper presents a novel on-line learning method for automatically detecting anatomic structures in medical images. Conventional off-line learning requires collecting all representative samples before the c...

    Nima Tajbakhsh, Hong Wu, Wenzhe Xue, Jianming Liang in Machine Learning in Medical Imaging (2011)

  10. No Access

    Chapter and Conference Paper

    A Heuristic Data-Sanitization Approach Based on TF-IDF

    Data mining technology can help extract useful knowledge from large data sets. The process of data collection and data dissemination may, however, result in an inherent risk of privacy threats. In this paper, ...

    Tzung-Pei Hong, Chun-Wei Lin, Kuo-Tung Yang in Modern Approaches in Applied Intelligence (2011)

  11. No Access

    Chapter and Conference Paper

    Anonymizing Shortest Paths on Social Network Graphs

    Social networking is gaining enormous popularity in the past few years. However, the popularity may also bring unexpected consequences for users regarding safety and privacy concerns. To prevent privacy being ...

    Shyue-Liang Wang, Zheng-Ze Tsai in Intelligent Information and Database Syste… (2011)

  12. No Access

    Article

    Physical Implementation of the Eight-Core Godson-3B Microprocessor

    The Godson-3B processor is a powerful processor designed for high performance servers including Dawning Servers. It offers significantly improved performance over previous Godson-3 series CPUs by incorporating...

    Ru Wang, Bao-**a Fan, Liang Yang in Journal of Computer Science and Technology (2011)

  13. No Access

    Article

    Partitioning the Conventional DBT System for Multiprocessors

    Noticeable performance improvement via ever-increasing transistors is gradually trapped into a predicament since software cannot logically and efficiently utilize hardware resource, such as multi-core resource...

    Ru-Hui Ma, Hai-Bing Guan, Er-Zhou Zhu in Journal of Computer Science and Technology (2011)

  14. No Access

    Article

    Mining Effective Temporal Specifications from Heterogeneous API Data

    Temporal specifications for Application Programming Interfaces (APIs) serve as an important basis for many defect detection tools. As these specifications are often not well documented, various approaches have...

    Qian Wu, Guang-Tai Liang, Qian-**ang Wang in Journal of Computer Science and Technology (2011)

  15. No Access

    Chapter and Conference Paper

    A Smart-Phone-Based Health Management System Using a Wearable Ring-Type Pulse Sensor

    In this paper, a mobile e-health-management system is presented which extends authors’ previous works on mobile physiological signal monitoring. This system integrates a wearable ring-type pulse monitoring sen...

    Yu-Chi Wu, Wei-Hong Hsu, Chao-Shu Chang in Mobile and Ubiquitous Systems: Computing, … (2012)

  16. No Access

    Chapter and Conference Paper

    The Research of Serially Concatenated FQPSK Demodulation Based on LDPC Codes

    As a kind of modulation with high degree of both power and bandwidth efficiency, Filtered QPSK (FQPSK) has been widely applied in the satellite and deep space communication. This paper first investigates the M...

    Gao Yuan Zhang, Hong Wen, Liang Zhou, Ling Yang in Communication and Networking (2012)

  17. No Access

    Article

    Satisfiability with Index Dependency

    We study the Boolean satisfiability problem (SAT) restricted on input formulas for which there are linear arithmetic constraints imposed on the indices of variables occurring in the same clause. This can be se...

    Hong-Yu Liang, **g He in Journal of Computer Science and Technology (2012)

  18. No Access

    Chapter and Conference Paper

    Information Technology Education Based on Cloud Computing

    Cloud computing era has brought new development ideas for the education information of our country. This paper has summarized and analyzed the definition and computing features of cloud computing combined with...

    Jiangyan Zheng, Shijie Cao, Jianhui Zheng in Information Computing and Applications (2013)

  19. No Access

    Article

    Efficient Time Synchronization Approach for Wireless Communication Systems on GPP-Based Software-Defined Radio Platform

    General purpose processer (GPP) based software-defined radio (SDR) platforms provide wireless communication system engineers with maximal architecture flexibility and versatility to construct a wideband wirele...

    Yi Huang, Chao Tang, Hong-Liang Duan in Journal of Computer Science and Technology (2013)

  20. No Access

    Chapter and Conference Paper

    Bayesian Regularization BP Neural Network Model for the Stock Price Prediction

    It is an important research issue to improve the generalization ability of the neural network in the research of artificial neural network. This paper proposes the Bayesian regularization method to optimize th...

    Qi Sun, Wen-Gang Che in Foundations and Applications of Intelligent Systems (2014)

previous disabled Page of 2