Skip to main content

previous disabled Page of 20
and
  1. No Access

    Chapter and Conference Paper

    On the operational interpretation of complex types

    Recursive and structured metaprogramming facilities are necessary for large proof development in a generic proof manipulation environment. We show how to define a set of mutually inductive types, abstract theo...

    Qing-** Tan, Huo-Wang Chen in Foundations of Software Technology and The… (1991)

  2. No Access

    Chapter and Conference Paper

    Optimal routing of permutations on rings

    **aojun Shen, Qing Hu, Hao Dai, **angzu Wang in Algorithms and Computation (1994)

  3. No Access

    Chapter and Conference Paper

    Leaf Image Retrieval with Shape Features

    In this paper we present an eficient two-step approach of using a shape characterization function called centroid-contour distance curve and the object eccentricity (or elongation) for leaf image retrieval. Bo...

    Zhiyong Wang, Zheru Chi, Dagan Feng, Qing Wang in Advances in Visual Information Systems (2000)

  4. No Access

    Chapter and Conference Paper

    A Framework for Background Detection in Video

    This paper presents a framework for background detection in video. First, key frames are extracted to capture background change in video and reduce the magnitude of the data. Then we analyze the content of the...

    Laiyun Qing, Weiqiang Wang, Tiejun Huang in Advances in Multimedia Information Process… (2002)

  5. No Access

    Chapter and Conference Paper

    A Gravity-Based Intrusion Detection Method

    It is an important issue for the security of network to detect new intrusions attack. We introduce the idea of the law of gravity to clustering analysis, and present a gravity-based clustering algorithm. At th...

    Sheng-Yi Jiang, Qing-Hua Li in Grid and Cooperative Computing - GCC 2004 Workshops (2004)

  6. No Access

    Chapter and Conference Paper

    Mining Maximal Frequent Itemsets for Intrusion Detection

    It has been the recent research focus and trend to apply data mining techniques in an intrusion detection system for discovering new types of attacks, but it is still in its infancy. This paper presents an inn...

    Hui Wang, Qing-Hua Li, Huanyu **ong in Grid and Cooperative Computing - GCC 2004 … (2004)

  7. No Access

    Chapter and Conference Paper

    Study on a Secure Access Model for the Grid Catalogue

    To solve the security of access to meta-data in computational Grids, by modifying model BLP, a secure access model named GBLP is introduced to support access control to Grid catalogue. In the computational Gri...

    Bing **e, **ao-Lin Gui, Qing-Jiang Wang in Grid and Cooperative Computing (2004)

  8. No Access

    Chapter and Conference Paper

    Coarse-Grained Distributed Parallel Programming Interface for Grid Computing

    In this paper, a practical coarse-grained distributed parallel programming interface for grid computing (PI4GC) is introduced. It provides a group of generic and abstract function prototypes with well-specifie...

    Yongwei Wu, Qing Wang, Guangwen Yang, Weiming Zheng in Grid and Cooperative Computing (2004)

  9. No Access

    Article

    New approach to WLAN security with synchronized pseudo random

    Wireless transmission is becoming increasing ubiquitous, but there is a big black hole in the security of this kind of network. Although IEEE 802.11 provides an optionalWired Equivalent Privacy (WEP), to implemen...

    Qing-Hua Zheng, David L. Pepyne, Qing Wang in Journal of Computer Science and Technology (2004)

  10. No Access

    Article

    Extracting frequent connected subgraphs from large graph sets

    Mining frequent patterns from datasets is one of the key success of data mining research. Currently, most of the studies focus on the data sets in which the elements are independent, such as the items in the m...

    Wei Wang, Qing-Qing Yuan, Hao-Feng Zhou in Journal of Computer Science and Technology (2004)

  11. No Access

    Chapter and Conference Paper

    A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers

    In this paper we present a novel robust coalition-resistant (t, n) threshold signature scheme with anonymous signers. Only t or more group members can generate signatures on behalf of a group with n members, w...

    Ming-wen Wang, Qing-xin Zhu, Li Qing in Parallel and Distributed Processing and Ap… (2005)

  12. No Access

    Chapter and Conference Paper

    Designing Adaptive PI Algorithm Based on Single Neuron

    PI is a newly proposed Active Queue Management algorithm that has many important applications. But in case of heavy congestion its response is sluggish, and because of its static parameter’s setting PI is sens...

    Li Qing, Qingxin Zhu, Mingwen Wang in Networking and Mobile Computing (2005)

  13. No Access

    Chapter and Conference Paper

    A Hybrid Approach to Detect Adult Web Images

    This paper presents a hybrid approach to discriminate benign images from adult images. Different from previously published works, our approach combines face detection and adaptive skin detection. First, face d...

    Qing-Fang Zheng, Ming-Ji Zhang in Advances in Multimedia Information Process… (2005)

  14. No Access

    Chapter and Conference Paper

    A General Criterion of Synchronization Stability in Ensembles of Coupled Systems and Its Application

    Complete synchronization of N coupled systems with symmetric configurations is studied in this paper. The main idea of the synchronization stability criterion is based on stability analysis of zero solution of li...

    Qing-Yun Wang, Qi-Shao Lu, Hai-**a Wang in Advances in Natural Computation (2005)

  15. No Access

    Chapter and Conference Paper

    Constructing Rough Decision Forests

    Decision forests are a type of classification paradigm which combines a collection of decision trees for a classification task, instead of depending on a single tree. Improvement of accuracy and stability is o...

    Qing-Hua Hu, Da-Ren Yu, Ming-Yang Wang in Rough Sets, Fuzzy Sets, Data Mining, and G… (2005)

  16. No Access

    Chapter and Conference Paper

    What Can Expressive Semantics Tell: Retrieval Model for a Flash-Movie Search Engine

    Flash, as a multimedia format, becomes more and more popular on the Web. However, previous works on Flash are unpractical to build a content-based Flash search engine. To address this problem, our paper propos...

    Dawei Ding, Jun Yang, Qing Li, Wenyin Liu, Li** Wang in Image and Video Retrieval (2005)

  17. No Access

    Chapter and Conference Paper

    A Novel Approach to Ocular Image Enhancement with Diffusion and Parallel AOS Algorithm

    This paper suggests a new diffusion method, which based on modified coherence diffusion for the enhancement of ocular fundus images (OFI) and parallel AOS scheme is applied to speed algorithm, which is faster ...

    Lanfeng Yan, Janjun Ma, Wei Wang, Qing Liu in Advances in Intelligent Computing (2005)

  18. No Access

    Chapter and Conference Paper

    Grid Develo** Environment in CGSP System

    Grid computing is becoming a mainstream technology for multi-institutional distributed resources sharing and system integration. Normally, the programmer’s productivity in designing and implementing efficient ...

    Weimin Zheng, Lisen Mu, Qing Wang, Yongwei Wu in Advanced Parallel Processing Technologies (2005)

  19. No Access

    Chapter and Conference Paper

    Possibility Theoretic Clustering

    Based on the exponential possibility model, the possibility theoretic clustering algorithm is proposed in this paper. The new algorithm is distinctive in determining an appropriate number of clusters for a giv...

    Shitong Wang, Fu-lai Chung, Min Xu, Dewen Hu, Lin Qing in Advances in Intelligent Computing (2005)

  20. No Access

    Article

    Research in moisture transport through one and two-layered porous composites

    Research into the moisture transport processes in porous materials is primarily important for theoretical modelling and industrial applications in the design of energy saving buildings and living environments,...

    Qing-Guo Wang, Kemal Ahmet, Yong Yue in International Journal of Automation and Computing (2005)

previous disabled Page of 20