Skip to main content

Page of 3
and
  1. No Access

    Article

    FIMI: A Constant Frugal Incentive Mechanism for Time Window Coverage in Mobile Crowdsensing

    Mobile crowdsensing has become an efficient paradigm for performing large-scale sensing tasks. An incentive mechanism is important for a mobile crowdsensing system to stimulate participants and to achieve good...

    Jia Xu, Jian-Ren Fu, De-Jun Yang, Li-Jie Xu in Journal of Computer Science and Technology (2017)

  2. No Access

    Article

    A modified simulated annealing algorithm and an excessive area model for floorplanning using fixed-outline constraints

    Outline-free floorplanning focuses on area and wirelength reductions, which are usually meaningless, since they can hardly satisfy modern design requirements. We concentrate on a more difficult and useful issu...

    De-xuan Zou, Gai-ge Wang, Gai Pan in Frontiers of Information Technology & Elec… (2016)

  3. No Access

    Article

    Intelligent computing budget allocation for on-road trajectory planning based on candidate curves

    In this paper, on-road trajectory planning is solved by introducing intelligent computing budget allocation (ICBA) into a candidate-curve-based planning algorithm, namely, ordinal-optimization-based differenti...

    **ao-xin Fu, Yong-heng Jiang, De-xian Huang in Frontiers of Information Technology & Elec… (2016)

  4. No Access

    Article

    A new method to estimate ages of facial image for large database

    As a common consensus that the appearances of different persons with the same age diverge widely, we have an opinion that the estimated result of a facial image should be a dynamic range or discrete candidate ...

    Ye-Wang Chen, De-He Lai, Han Qi, Jiong-Liang Wang in Multimedia Tools and Applications (2016)

  5. No Access

    Article

    Extracting hand articulations from monocular depth images using curvature scale space descriptors

    We propose a framework of hand articulation detection from a monocular depth image using curvature scale space (CSS) descriptors. We extract the hand contour from an input depth image, and obtain the fingertip...

    Shao-fan Wang, Chun Li, De-hui Kong in Frontiers of Information Technology & Elec… (2016)

  6. No Access

    Article

    Develo** a power monitoring and protection system for the junction boxes of an experimental seafloor observatory network

    A power monitoring and protection system based on an embedded processor was designed for the junction boxes (JBs) of an experimental seafloor observatory network in China. The system exhibits high reliability,...

    Jun Wang, De-jun Li, Can-jun Yang in Frontiers of Information Technology & Elec… (2015)

  7. No Access

    Article

    An Efficient Algorithm for Distributed Outlier Detection in Large Multi-Dimensional Datasets

    The distance-based outlier is a widely used definition of outlier. A point is distinguished as an outlier on the basis of the distances to its nearest neighbors. In this paper, to solve the problem of outlier ...

    **-Te Wang, De-Rong Shen, Mei Bai in Journal of Computer Science and Technology (2015)

  8. No Access

    Article

    SEIP: System for Efficient Image Processing on Distributed Platform

    Nowadays, there exist numerous images in the Internet, and with the development of cloud computing and big data applications, many of those images need to be processed for different kinds of applications by us...

    Tao Liu, Yi Liu, Qin Li, **ang-Rong Wang in Journal of Computer Science and Technology (2015)

  9. Article

    Feature selection and feature learning for high-dimensional batch reinforcement learning: A survey

    Tremendous amount of data are being generated and saved in many complex engineering and social systems every day. It is significant and feasible to utilize the big data to make better decisions by machine lear...

    De-Rong Liu, Hong-Liang Li, Ding Wang in International Journal of Automation and Computing (2015)

  10. No Access

    Article

    High Performance Interconnect Network for Tianhe System

    In this paper, we present the Tianhe-2 interconnect network and message passing services. We describe the architecture of the router and network interface chips, and highlight a set of hardware and software fe...

    **ang-Ke Liao, Zheng-Bin Pang, Ke-Fei Wang in Journal of Computer Science and Technology (2015)

  11. No Access

    Article

    Detail-generating geometry completion for point-sampled geometry

    In this paper, we present a novel method for detail-generating geometry completion over point-sampled geometry. The main idea consists of converting the context-based geometry completion into the detail-based ...

    Ren-fang Wang, Yun-peng Liu, De-chao Sun, Hui-xia Xu in Machine Vision and Applications (2014)

  12. No Access

    Article

    Towards Automated Provisioning and Emergency Handling in Renewable Energy Powered Datacenters

    Designing eco-friendly system has been at the forefront of computing research. Faced with a growing concern about the server energy expenditure and the climate change, both industry and academia start to show ...

    Chao Li, Rui Wang, Yang Hu, Rui** Zhou in Journal of Computer Science and Technology (2014)

  13. No Access

    Article

    Parameter estimation for micro-Doppler signals based on cubic phase function

    An estimator for evaluating the parameters from the radar returned multicomponent micro-Doppler (m-D) signals is presented in this paper. While time frequency distribution (TFD) is commonly used to analyze the...

    Po Li, De-Chun Wang, **-Li Chen in Signal, Image and Video Processing (2013)

  14. Article

    Application of Parallel Mechanism in Varistructured Quadruped/Biped Human- carrying Walking Chair Robot

    For the existing problems of walking chair robot such as simple function, lower bearing capacity and not walking in complex environment, a novel varistructured quadruped/biped human-carrying walking chair robo...

    Ling-Feng Sang, Hong-Bo Wang, Dian-Fan Zhang in International Journal of Automation and Co… (2013)

  15. No Access

    Article

    IEEE 1588 based time synchronization system for a seafloor observatory network

    An IEEE 1588 based application scheme was proposed to achieve accurate time synchronization for a deep seafloor observatory network based on the communication topological structure of the Zhejiang University E...

    De-jun Li, Gang Wang, Can-jun Yang, Bo ** in Journal of Zhejiang University SCIENCE C (2013)

  16. No Access

    Article

    Separation of micro-Doppler signals based on time frequency filter and Viterbi algorithm

    Micro-Doppler (m-D) effect is potential useful in radar target detection, recognition, and classification. While the m-D signals are always multicomponent, it is important to separate the m-D signals for featu...

    Po Li, De-Chun Wang, Lu Wang in Signal, Image and Video Processing (2013)

  17. No Access

    Article

    A planar capacitive sensor for 2D long-range displacement measurement

    A planar capacitive sensor (PCS) capable of 2D large-scale measurement is presented in this paper. Displacement interpretation depends on independently measuring the periodic variation in capacitance caused by...

    Jian-** Yu, Wen Wang, Ke-qing Lu, De-qing Mei in Journal of Zhejiang University SCIENCE C (2013)

  18. No Access

    Article

    An application oriented and shape feature based multi-touch gesture description and recognition method

    In order to customize multi-touch gestures for different applications, and facilitate multi-touch gesture recognition, an application oriented and shape feature based multi-touch gesture description and recogn...

    De-xin Wang, Zhi-hui **ong, Mao-jun Zhang in Multimedia Tools and Applications (2012)

  19. No Access

    Article

    A robust content based audio watermarking using UDWT and invariant histogram

    Desynchronization attack is known as one of the most difficult attacks to resist, for it can desynchronize the location of the watermark and hence causes incorrect watermark detection. It is a challenging work...

    Hong-ying Yang, De-wang Bao, **ang-yang Wang in Multimedia Tools and Applications (2012)

  20. No Access

    Article

    Personalized Tag Recommendation Using Social Influence

    Tag recommendation encourages users to add more tags in bridging the semantic gap between human concept and the features of media object, which provides a feasible solution for content-based multimedia informa...

    Jun Hu, Bing Wang, Yu Liu, De-Yi Li in Journal of Computer Science and Technology (2012)

Page of 3