Skip to main content

Page of 8
and
  1. Chapter and Conference Paper

    Time-Oriented Question Answering from Clinical Narratives Using Semantic-Web Techniques

    The ability to answer temporal-oriented questions based on clinical narratives is essential to clinical research. The temporal dimension in medical data analysis enables clinical researches on many areas, such...

    Cui Tao, Harold R. Solbrig, Deepak K. Sharma, Wei-Qi Wei in The Semantic Web – ISWC 2010 (2010)

  2. No Access

    Chapter and Conference Paper

    Constraint-Aware Complex Event Pattern Detection over Streams

    In this paper, we propose a framework for constraint-aware pattern detection over event streams. Given the constraint of the input streams, our proposed framework on the fly checks the query satisfiability / u...

    Ming Li, Murali Mani, Elke A. Rundensteiner in Database Systems for Advanced Applications (2010)

  3. No Access

    Chapter and Conference Paper

    Novel Algorithm for Fast Accessing On-Board Star Catalog

    Fast accessing On-board star catalog is a key research technique in star tracker, which is a high accuracy navigation device on satellite. A novel method to fast retrieve the star data from the On-board star c...

    Jun Yang, Bin Liang, **g Yan Song in Computer Science for Environmental Enginee… (2011)

  4. No Access

    Chapter and Conference Paper

    An Efficient Algorithm of Association Information Mining on Web Pages with Dynamic Scripts

    The hyperlink analysis algorithm is widely used by public search engines. But with the development of the websites with dynamic script, this algorithm is not fit to realize the efficient searching for these re...

    Tao Tan, Leting Tan in Emerging Research in Web Information Systems and Mining (2011)

  5. No Access

    Chapter and Conference Paper

    Study of Tunnel Morphin the Similarity Analysis of Time Series Bio-signal Data

    One similarity measurement strategy for bio-signal waveform is presented in this paper. A tunnel morph is introduced to describe the waveform. It measures the waveform not only by a value, but considers the cu...

    Gang Zheng, Tao Geng, Min Dai, Yuan Gu in Computer Science for Environmental Enginee… (2011)

  6. No Access

    Chapter and Conference Paper

    Research on Electromagnetic Wave Through-The-Earth Wireless Communication for Coal Mine Disaster

    When the coal mine disaster happens, the communications system paralysis causes the fact that the stranded personnel and the rescue groups are unable to relate. This situation is the biggest difficult problem ...

    **yi Tao in Web Information Systems and Mining (2011)

  7. No Access

    Chapter and Conference Paper

    3DES Implementation Based on FPGA

    In order to meet the demand of plenty continuous encrypting-deciphering, and meet the demand of enhancing the security of encrypting-deciphering algorithm, the fundamental technologies such as pipeline technol...

    Fang Ren, Leihua Chen, Tao Zhang in Emerging Research in Web Information Systems and Mining (2011)

  8. No Access

    Chapter and Conference Paper

    Design of Shipborne Underwater Inertial Stabilized Pan-Tilt System Based on Fuzzy PID Controller

    When scanning boat worked in the river, the wave would cause boat’s attitude change which leaded dual-frequency identification sonar instability, so we design a self-adaptive and 3D mechanical pan-tilt system....

    Tao Wang, Hengyu Li, Shaorong **e in Computer Science for Environmental Enginee… (2011)

  9. No Access

    Chapter and Conference Paper

    Empirical Discriminative Tensor Analysis for Crime Forecasting

    Police agencies have been collecting an increasing amount of information to better understand patterns in criminal activity. Recently there is a new trend in using the data collected to predict where and when ...

    Yang Mu, Wei Ding, Melissa Morabito in Knowledge Science, Engineering and Managem… (2011)

  10. No Access

    Chapter and Conference Paper

    Probabilistic Image Tagging with Tags Expanded By Text-Based Search

    Automatic image tagging automatically assigns image with semantic keywords called tags, which significantly facilitates image search and organization. Most of present image tagging approaches assign the query ...

    **aoming Zhang, Zi Huang, Heng Tao Shen in Database Systems for Advanced Applications (2011)

  11. No Access

    Chapter and Conference Paper

    Efficient Histogram-Based Similarity Search in Ultra-High Dimensional Space

    Recent development in image content analysis has shown that the dimensionality of an image feature can reach thousands or more for satisfactory results in some applications such as face recognition. Although h...

    Jiajun Liu, Zi Huang, Heng Tao Shen in Database Systems for Advanced Applications (2011)

  12. No Access

    Chapter and Conference Paper

    Reliability-Based Route Optimization of a Transportation Network with Random Arc Capacities and Time Threshold

    The classical route optimization problem of a network focuses on the shortest or fastest route mainly under the assumption that all roads will not fail. In fact, the capacities of roads in a transportation net...

    Tao Zhang, Bo Guo, Yue** Tan in Integrated Uncertainty in Knowledge Modell… (2011)

  13. No Access

    Chapter and Conference Paper

    Optimization of N-Queens Solvers on Graphics Processors

    While graphics processing units (GPUs) show high performance for problems with regular structures, they do not perform well for irregular tasks due to the mismatches between irregular problem structures and SI...

    Tao Zhang, Wei Shu, Min-You Wu in Advanced Parallel Processing Technologies (2011)

  14. No Access

    Chapter and Conference Paper

    Querying Business Process Models Based on Semantics

    In recent years, the technology of business process management is being more widely used, so that there are more and more business process models (graphs). How to manage such a large number of business process...

    Tao **, Jianmin Wang, Lijie Wen in Database Systems for Advanced Applications (2011)

  15. No Access

    Chapter and Conference Paper

    RGH: An Efficient RSU-Aided Group-Based Hierarchical Privacy Enhancement Protocol for VANETs

    VANETs are gaining significant prominence from both academia and industry in recent years. In this paper, we introduce an Efficient RSU-aided Group-based Hierarchical Privacy Enhancement Protocol for VANETs. T...

    Tao Yang, Lingbo Kong, Liangwen Yu, Jianbin Hu in Web-Age Information Management (2012)

  16. No Access

    Chapter and Conference Paper

    Exemplars-Constraints for Semi-supervised Clustering

    Semi-supervised clustering aims at incorporating the known prior knowledge into the clustering process to achieve better performance. Recently, semi-supervised clustering with pairwise constraints has emerged ...

    Hongjun Wang, Tao Li, Tianrui Li, Yan Yang in Advanced Data Mining and Applications (2012)

  17. No Access

    Chapter and Conference Paper

    Path-Based Constrained Nearest Neighbor Search in a Road Network

    Nearest Neighbor (NN) queries are frequently used for location-dependent information services. In this paper, we study a new NN query called Path-based Constrained Nearest Neighbor (PCNN) query, which involves...

    Yingyuan **ao, Yan Shen, Tao Jiang, Heng Wang in Database and Expert Systems Applications (2012)

  18. No Access

    Chapter and Conference Paper

    A Novel Approach for Finding Alternative Clusterings Using Feature Selection

    Alternative clustering algorithms target finding alternative grou**s of a dataset, on which traditional clustering algorithms can find only one even though many alternatives could exist. In this research, we...

    Vinh Thanh Tao, JongHyeok Lee in Database Systems for Advanced Applications (2012)

  19. No Access

    Chapter and Conference Paper

    Efficient Retrieval of Similar Workflow Models Based on Behavior

    With the workflow technology being more widely used, there are more and more workflow models. How to retrieve the similar models efficiently from a large model repository is challenging. Since dynamic behavior...

    Tao **, Jianmin Wang, Lijie Wen in Web Technologies and Applications (2012)

  20. No Access

    Chapter and Conference Paper

    Discovery of Regularities in the Use of Herbs in Traditional Chinese Medicine Prescriptions

    Traditional Chinese medicine (TCM) is a discipline with its own distinct methodologies and philosophical principles. The main method of treatment in TCM is to use herb prescriptions. Typically, a number of her...

    Nevin L. Zhang, Runsun Zhang, Tao Chen in New Frontiers in Applied Data Mining (2012)

Page of 8