Skip to main content

previous disabled Page of 7
and
  1. No Access

    Chapter and Conference Paper

    A New Genetic Algorithm for the Optimal Communication Spanning Tree Problem

    This paper proposes a new genetic algorithm to solve the Optimal Communication Spanning Tree problem. The proposed algorithm works on a tree chromosome without intermediate encoding and decoding, and uses cros...

    Yu Li, Youcef Bouchebaba in Artificial Evolution (2000)

  2. No Access

    Chapter and Conference Paper

    An Effective Implementation of a Direct Spanning Tree Representation in GAs

    This paper presents an effective implementation based on predecessor vectors of a genetic algorithm using a direct tree representation. The main operations associated with crossovers and mutations can be achie...

    Yu Li in Applications of Evolutionary Computing (2001)

  3. No Access

    Chapter and Conference Paper

    A Two-Level Search Strategy for Packing Unequal Circles into a Circle Container

    We propose a two-level search strategy to solve a two dimensional circle packing problem. At the first level, a good enough packing algorithm called A1.0 uses a simple heuristic to select the next circle to be pa...

    Wen Qi Huang, Yu Li, Bernard Jurkowiak in Principles and Practice of Constraint Prog… (2003)

  4. No Access

    Chapter and Conference Paper

    Human Pacman: A Mobile Entertainment System with Ubiquitous Computing and Tangible Interaction over a Wide Outdoor Area

    Human Pacman is an interactive role-playing game that envisions to bring the computer gaming experience to a new level of emotional and sensory gratification by setting the real world as a playground. This is ...

    Adrian David Cheok, Siew Wan Fong in Human-Computer Interaction with Mobile Dev… (2003)

  5. No Access

    Chapter

    Biometrics for Security in E-Commerce

    The advance of technology is always inspired by the practical applications, and the emergence of automatic biometrics technology is rooted in the requirement for real-world security applications. Whether this ...

    David Zhang, Yu Li in Payment Technologies for E-Commerce (2003)

  6. No Access

    Article

    Human Pacman: a mobile, wide-area entertainment system based on physical, social, and ubiquitous computing

    Human Pacman is a novel interactive entertainment system that ventures to embed the natural physical world seamlessly with a fantasy virtual playground by capitalizing on mobile computing, wireless LAN, ubiqui...

    Adrian David Cheok, Kok Hwee Goh, Wei Liu in Personal and Ubiquitous Computing (2004)

  7. No Access

    Chapter and Conference Paper

    Data Segmentation of Stereo Images with Complicated Background

    With the development of computer science, there is an increasing demand on the object recognition in stereo images. As a binocular image pair contains larger and more complicated information than a monocular i...

    Yi Wei, Shushu Hu, Yu Li in Image Analysis and Recognition (2007)

  8. No Access

    Article

    Fiducial Marker Based on Projective Invariant for Augmented Reality

    Fiducial marker based Augmented Reality has many applications. So far the inner pattern of the fiducial marker is always used to encode the markers. Thus a large portion of the fiducial marker image is used fo...

    Yu Li, Yong-Tian Wang, Yue Liu in Journal of Computer Science and Technology (2007)

  9. No Access

    Chapter and Conference Paper

    Enumerating Unlabeled and Root Labeled Trees for Causal Model Acquisition

    To specify a Bayes net (BN), a conditional probability table (CPT), often of an effect conditioned on its n causes, needs to be assessed for each node. It generally has the complexity exponential on n. The non-im...

    Yang **ang, Zoe **gyu Zhu, Yu Li in Advances in Artificial Intelligence (2009)

  10. No Access

    Chapter and Conference Paper

    Towards Effective Elicitation of NIN-AND Tree Causal Models

    To specify a Bayes net (BN), a conditional probability table (CPT), often of an effect conditioned on its n causes, needs assessed for each node. It generally has the complexity exponential on n. Noisy-OR reduces...

    Yang **ang, Yu Li, Zoe **gyu Zhu in Scalable Uncertainty Management (2009)

  11. No Access

    Chapter and Conference Paper

    Event Recognition from News Webpages through Latent Ingredients Extraction

    We investigate the novel problem of event recognition from news webpages. “Events” are basic text units containing news elements. We observe that a news article is always constituted by more than one event, na...

    Rui Yan, Yu Li, Yan Zhang, **aoming Li in Information Retrieval Technology (2010)

  12. No Access

    Chapter and Conference Paper

    The Application of Disturbance Observer to Propulsion Control of Sub-mini Underwater Robot

    In this paper, the propulsive motility characteristics and the corresponding motion equations of a self-designed sub-mini underwater robot were analyzed. And the disturbance observer was used in propulsive mot...

    Yuyi Zhai, Liang Liu, Wenjie Lu, Yu Li in Computational Science and Its Applications… (2010)

  13. No Access

    Chapter and Conference Paper

    DigestJoin: Expediting Joins on Solid-State Drives

    This demonstration presents a recently proposed join algorithm called DigestJoin. Optimized for solid-state drives (SSDs), DigestJoin aims at reducing intermediate join results and hence expensive write operation...

    Shen Gao, Yu Li, Jianliang Xu, Byron Choi in Database Systems for Advanced Applications (2010)

  14. No Access

    Article

    Dynamic memory paravirtualization transparent to guest OS

    This paper introduces dynamic paravirtualization, which imitates paravirtualization and aims at reducing VM exits of full virtualization with hardware support. In dynamic paravirtualization, VMM (virtual machi...

    **aoLin Wang, YiFeng Sun, YingWei Luo in Science in China Series F: Information Sci… (2010)

  15. No Access

    Article

    Flash-Optimized B+-Tree

    With the rapid increasing capacity of flash memory, flash-aware indexing techniques are highly desirable for flash devices. The unique features of flash memory, such as the erase-before-write constraint and th...

    Sai Tung On, Haibo Hu, Yu Li, Jianliang Xu in Journal of Computer Science and Technology (2010)

  16. No Access

    Article

    Combined invariants to blur and rotation using Zernike moment descriptors

    Moment invariants that are not affected by geometric transform have been utilized as pattern features in a number of applications. But in most cases, images are processed subject to blur degradations. The trad...

    Hongqing Zhu, Min Liu, Hanjie Ji, Yu Li in Pattern Analysis and Applications (2010)

  17. No Access

    Chapter and Conference Paper

    A Petri Net-Based Software Process Model for Develo** Process-Oriented Information Systems

    Aiming at increasing flexibility, efficiency, effectiveness, and transparency of information processing and resource deployment in organizations to ensure customer satisfaction and high quality of products and...

    Yu Li, Andreas Oberweis in Information Systems Development (2011)

  18. No Access

    Chapter and Conference Paper

    Research of Ecological Landscape Assessment Systems of Road Based on GIS and ES

    With rapid development of China’s road construction, road construction and its surrounding ecological landscape is not harmonious. The evaluation of the analysis, recovery and development is increasingly impor...

    Fengling Wang, Yu Li in Innovative Computing and Information (2011)

  19. No Access

    Chapter and Conference Paper

    Libraries in a Digital Frontier: Preserving Chinese Canadian Cultural Heritage

    As a three-year community-based research project at the University of British Columbia, Chinese Canadian Stories: Uncommon Histories from a Common Past is government grant-funded project by the Community Historic...

    Allan Cho, Yu Li in Digital Libraries: For Cultural Heritage, … (2011)

  20. No Access

    Chapter and Conference Paper

    Study of Adaptive Cone Taper Measuring Device

    A kind of simple practical adaptive quantitative detection taper cone measuring devices is developed in this paper, which can resolve the qualitative measurement which cannot obtain concrete error problem, and...

    **qu Chen, Yu Li, Jianxiu Su, Zhankui Wang in Applied Informatics and Communication (2011)

previous disabled Page of 7