Skip to main content

previous disabled Page of 4
and
  1. No Access

    Chapter and Conference Paper

    A Power-Based Clustering Algorithm for Wireless Ad-Hoc Networks

    Energy saving, despite recent advances in extending battery life, is still an important issue in wireless ad hoc networks. An often adopted method is power management, which can help in reducing the transmissi...

    Tsung-Chuan Huang, Liang-Cheng Shiu, Yan-Feng Chen in Embedded and Ubiquitous Computing (2004)

  2. No Access

    Chapter and Conference Paper

    Study on QoS Driven Web Services Composition

    Providing composed Web Services based on the QoS requirements of clients is still an urgent problem to be solved. In this paper, we try to solve this problem. Firstly, we enhanced the current WSDL to describe ...

    Yan-** Chen, Zeng-zhi Li, Qin-xue ** in Frontiers of WWW Research and Development … (2006)

  3. No Access

    Chapter and Conference Paper

    Classifying Unbalanced Pattern Groups by Training Neural Network

    When training set is unbalanced, the conventional least square error (LSE) training strategy is less efficient to train neural network (NN) for classification because it often lead the NN to overcompensate for...

    Bo-Yu Li, **g Peng, Yan-Qiu Chen, Ya-Qiu ** in Advances in Neural Networks - ISNN 2006 (2006)

  4. No Access

    Chapter and Conference Paper

    A Family of Optimization Based Data Mining Methods

    An extensive review for the family of multi-criteria programming data mining models is provided in this paper. These models are introduced in a systematic way according to the evolution of the multi-criteria p...

    Yong Shi, Rong Liu, Nian Yan, Zhenxing Chen in Progress in WWW Research and Development (2008)

  5. No Access

    Article

    Robust Detection of Unauthorized Wireless Access Points

    Unauthorized 802.11 wireless access points (APs), or rogue APs, such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secured. An at...

    Bo Yan, Guanling Chen, Jie Wang, Hongda Yin in Mobile Networks and Applications (2009)

  6. No Access

    Chapter and Conference Paper

    AdContRep: A Privacy Enhanced Reputation System for MANET Content Services

    Mobile ad hoc network (MANET) has become a practical platform for pervasive social networking. In such a system, various content information flows in terms of content query and response. To which extent should...

    Zheng Yan, Yu Chen in Ubiquitous Intelligence and Computing (2010)

  7. No Access

    Chapter and Conference Paper

    Research of the Incentive Mechanism of Organizational Information Resources Sharing under Cloud Computing Environment

    The rapid development of Cloud Computing enables more personalized and more complex information service. Therefore, the demand for higher quality and larger amounts of information becomes inevitable. This pape...

    LongFei Guo, TingJie Lv, **g**g Yan in Advances in Computer Science, Environment,… (2011)

  8. No Access

    Article

    Design and Implementation of a Toolkit for Usability Testing of Mobile Apps

    The usability of mobile applications is critical for their adoption because of the relatively small screen and awkward (sometimes virtual) keyboard, despite the recent advances of smartphones. Traditional labo...

    **aoxiao Ma, Bo Yan, Guanling Chen, Chunhui Zhang in Mobile Networks and Applications (2013)

  9. No Access

    Article

    Fault-Tolerant Energy Efficiency Computing Approach for Sparse Sampling Under Wireless Sensor Smart Grid

    Recently, energy efficiency measurement has been emphasized in China for energy conservation purpose, while there are appealing requirement for plug-and-play measuring manner without long outage time. Differen...

    Bin Li, Bing Qi, Yi Sun, Jun Lu, Gangjun Gong in Wireless Personal Communications (2014)

  10. No Access

    Chapter and Conference Paper

    Improved Separable Reversible Data Hiding in Encrypted Image Based on Neighborhood Prediction

    Recently, separable reversible data hiding in encrypted image attracts more and more attention. Data extraction and image decryption are separable in the separable reversible data hiding method in encrypted im...

    Shu Yan, Fan Chen, Hongjie He in Cloud Computing and Security (2016)

  11. No Access

    Article

    Joint optimization of inventory control and product placement on e-commerce websites using genetic algorithms

    Prior research had shown that the design of product listing pages has significant influence on the sales volume on an e-commerce website. This study focused on product placement in designing product listing pa...

    Yan-Kwang Chen, Fei-Rung Chiu, Hung-Chang Liao in Electronic Commerce Research (2016)

  12. No Access

    Chapter and Conference Paper

    Improving ELM-Based Time Series Classification by Diversified Shapelets Selection

    ELM is an efficient neural network which has extremely fast learning capacity and good generalization capability. However, ELM fails to measure up the task of time series classification because it hard to extr...

    Qifa Sun, Qiuyan Yan, **nming Yan, Wei Chen in Quality, Reliability, Security and Robustn… (2017)

  13. No Access

    Chapter and Conference Paper

    Biclustering Evolutionary Spatiotemporal Community in Global Trading Network

    Detecting evolving communities in dynamic weighted networks are significant for understanding the evolutionary patterns of complex networks. In this paper, a novel algorithm is proposed to detect overlap** e...

    Leiming Yan, Zeyu Chen, ** Zang in Cloud Computing and Security (2017)

  14. No Access

    Chapter and Conference Paper

    Dynamic Relationship Building: Exploitation Versus Exploration on a Social Network

    Interpersonal relations facilitate information flow and give rise to positional advantage of individuals in a social network. We ask the question: How would an individual build relations with members of a dynamic...

    Bo Yan, Yang Chen, Jiamou Liu in Web Information Systems Engineering – WISE 2017 (2017)

  15. No Access

    Article

    Traffic lights detection and recognition based on multi-feature fusion

    Many traffic accidents occurred at intersections are caused by drivers who miss or ignore the traffic signals. In this paper, we present a method dealing with automatic detection of traffic lights that integra...

    Wenhao Wang, Shanlin Sun, Mingxin Jiang, Yunyang Yan in Multimedia Tools and Applications (2017)

  16. No Access

    Article

    Robust tracking of fish schools using CNN for head identification

    Tracking individuals in a fish school with video cameras is one of the most effective ways to quantitatively investigate their behavior which is of great value for biological research. However, tracking large ...

    Shuo Hong Wang, **g Wen Zhao, Yan Qiu Chen in Multimedia Tools and Applications (2017)

  17. No Access

    Book and Conference Proceedings

    Intelligent Robotics and Applications

    11th International Conference, ICIRA 2018, Newcastle, NSW, Australia, August 9–11, 2018, Proceedings, Part II

    Zhiyong Chen, Alexandre Mendes in Lecture Notes in Computer Science (2018)

  18. No Access

    Book and Conference Proceedings

    Intelligent Robotics and Applications

    11th International Conference, ICIRA 2018, Newcastle, NSW, Australia, August 9–11, 2018, Proceedings, Part I

    Zhiyong Chen, Alexandre Mendes in Lecture Notes in Computer Science (2018)

  19. No Access

    Chapter and Conference Paper

    A Fast Algorithm for Image Segmentation Based on Local Chan Vese Model

    Image segmentation plays a very important pole in image processing and computer vision field. Most of the energy minimization of level set methods are based on the steepest descent method and finite difference...

    Le Zou, Liang-Tu Song, **ao-Feng Wang in Intelligent Computing Theories and Applica… (2018)

  20. No Access

    Chapter and Conference Paper

    Using Nonverbal Information for Conversation Partners Inference by Wearable Devices

    In this paper, we propose a framework called conversational partner inference using nonverbal information (abbreviated as CFN). We use the wrist-based wearable device that has an accelerometer sensor to detect...

    Deeporn Mungtavesinsuk, Yan-Ann Chen, Cheng-Wei Wu, Ensa Bajo in IoT as a Service (2018)

previous disabled Page of 4