Skip to main content

Page of 5
and
  1. Chapter and Conference Paper

    Word Similarity Fails in Multiple Sense Word Embedding

    Word representation is one foundational research in natural language processing which full of challenges compared to other fields such as image and speech processing. It embeds words to a dense low-dimensional...

    Yong Shi, Yuanchun Zheng, Kun Guo, Wei Li, Luyao Zhu in Computational Science – ICCS 2018 (2018)

  2. No Access

    Chapter and Conference Paper

    Impact of Doppler Shift on LTE System in High Speed Train Scenario

    Single Frequency Network (SFN) is considered as a vital deployment method in High Speed Train (HST) scenario. HST channel model is of much importance to LTE performance assessment. And SFN channel models are n...

    Yu Zhang, Lei **ong, Xuelian Yang, Yuanchun Tan in Communications and Networking (2018)

  3. No Access

    Chapter and Conference Paper

    Vulnerability Assessment of Metro Systems Based on Dynamic Network Structure

    Invulnerable metro systems are essential for the safety and efficiency of urban transportation services. Therefore, it is of significant interest to systematically assess the vulnerability of metro systems. To...

    Jun Pu, Chuanren Liu, Jianghua Zhao, Ke Han in Advances in Knowledge Discovery and Data M… (2018)

  4. No Access

    Chapter and Conference Paper

    Research on the Technology Transfer Efficiency Evaluation in Industry-University-Research Institution Collaborative Innovation and Its Affecting Factors Based on the Two-Stage DEA Model

    The traditional technical efficiency measurement the technology transfer system as a “black box” and doesn’t penetrate the internal operation mechanism of the system. This opens the technology transfer sys...

    Yuanchun Yu, **n Gu, Yijun Chen in Proceedings of the Tenth International Con… (2017)

  5. No Access

    Chapter and Conference Paper

    Decentralized Force/Position Fault-Tolerant Control for Constrained Reconfigurable Manipulators with Actuator Faults

    This paper addresses the problems of decentralized force/position fault-tolerant control for constrained reconfigurable manipulators. A novel decentralized force/position control method is proposed for constra...

    Fan Zhou, Bo Dong, Yuanchun Li in Neural Information Processing (2017)

  6. No Access

    Chapter and Conference Paper

    Neuro-control of Nonlinear Systems with Unknown Input Constraints

    This paper establishes an adaptive dynamic programming algorithm based neuro-control scheme for nonlinear systems with unknown input constraints. The control strategy consists of an online nominal optimal cont...

    Bo Zhao, **nliang Liu, Derong Liu, Yuanchun Li in Neural Information Processing (2017)

  7. No Access

    Chapter and Conference Paper

    A Learning-Based Decentralized Optimal Control Method for Modular and Reconfigurable Robots with Uncertain Environment

    This paper presents a novel decentralized control approach for modular and reconfigurable robots (MRRs) with uncertain environment contact under a learning-based optimal compensation strategy. Unlike the known...

    Bo Dong, Ke** Liu, Hui Li, Yuanchun Li in Neural Information Processing (2017)

  8. No Access

    Chapter and Conference Paper

    A Model-Driven Visualization System Based on DVDL

    Though model-driven engineering (MDE) methodology has made significant improvements in terms of efficiency and effectiveness in many areas of software development, the same cannot be said in the development of...

    Yi Du, Lei Ren, Yuanchun Zhou, Jianhui Li in Challenges and Opportunity with Big Data (2017)

  9. No Access

    Chapter and Conference Paper

    Programming IoT Devices by Demonstration Using Mobile Apps

    The revolutionary advances of Internet of Things (IoT) devices and applications have helped IoT emerge as an increasingly important domain for end-user development (EUD). Past research has shown that end users...

    Toby Jia-Jun Li, Yuanchun Li, Fanglin Chen, Brad A. Myers in End-User Development (2017)

  10. No Access

    Chapter and Conference Paper

    Dynamic Contour Matching for Lossy Screen Content Picture Intra Coding

    Video coding was proposed and developed by JCT-VC. Screen content video generally contains some complex texture, such as text, graphics, images and other natural mix and so on. The most popular coding scheme i...

    Hu Yuan, Tao Pin, Yuanchun Shi in Advances in Multimedia Information Processing - PCM 2016 (2016)

  11. No Access

    Chapter and Conference Paper

    Decentralized Stabilization for Nonlinear Systems with Unknown Mismatched Interconnections

    This paper establishes a neural network and policy iteration based decentralized control scheme to stabilize large-scale nonlinear systems with unknown mismatched interconnections. For relaxing the common assu...

    Bo Zhao, Ding Wang, Guang Shi, Derong Liu, Yuanchun Li in Neural Information Processing (2016)

  12. No Access

    Chapter and Conference Paper

    How to Use the Social Media Data in Assisting Restaurant Recommendation

    Online social network applications such as Twitter, Weibo, have played an important role in people’s life. There exists tremendous information in the tweets. However, how to mine the tweets and get valuable in...

    Wenjuan Cui, Pengfei Wang, **n Chen, Yi Du in Database Systems for Advanced Applications (2016)

  13. No Access

    Chapter and Conference Paper

    Species Distribution Modeling via Spatial Bagging of Multiple Conditional Random Fields

    Satellite tracking technologies enable scientists to collect data of animal migrations and species habitats on a large scale. Modeling distributions of wild animals is of considerable use. It helps researchers...

    Danhuai Guo, Yuanchun Zhou, Yingqiu Zhu in Database Systems for Advanced Applications (2016)

  14. Chapter and Conference Paper

    Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach

    Recently, code-reuse attack (CRA) is becoming the most prevalent attack vector which reuses fragments of existing code to make up malicious code. Recent studies show that CRAs especially jump-oriented programm...

    Zhijiao Zhang, Yashuai Lü, Yu Chen in ICT Systems Security and Privacy Protection (2015)

  15. No Access

    Chapter and Conference Paper

    Automated Detection for Probable Homologous Foodborne Disease Outbreaks

    Foodborne disease, a rapid-growing public health problem, has become the highest-priority topic for food safety. The threat of foodborne disease has stimulated interest in enhancing public health surveillance ...

    **ao **ao, Yong Ge, Yunchang Guo in Advances in Knowledge Discovery and Data M… (2015)

  16. No Access

    Chapter and Conference Paper

    A Novel APP Recommendation Method Based on SVD and Social Influence

    The market for Mobile Applications (APP for short) is perhaps the most thriving sector nowadays in the software industry with about 4 million APPs around the world. APP recommendation is playing an increasingl...

    Qiudang Wang, **ao Liu, Shasha Zhang in Algorithms and Architectures for Parallel … (2015)

  17. No Access

    Chapter and Conference Paper

    Running Multiple Androids on One ARM Platform

    Smartphones are widely used nowadays. Many users want to separate work and personal use of smartphones for security and privacy consideration, but it is very inconvenient to carry multiple smartphones. Multi-b...

    Zhijiao Zhang, Lei Zhang, Yu Chen, Yuanchun Shi in Information Security and Privacy (2014)

  18. No Access

    Chapter and Conference Paper

    A Research on Linked Data-Based Chinese Semantic Retrieval Model

    The overall objective of this study is to implement the semantic retrieval model, and provide the linked information of retrieval result. The work presented in this paper focuses on the core technique, the met...

    Qingling Chang, Yuanchun Zhou, Shiting Xu, Jianhui Li in Future Information Technology (2014)

  19. No Access

    Chapter and Conference Paper

    Benchmarking Replication and Consistency Strategies in Cloud Serving Databases: HBase and Cassandra

    Databases serving OLTP operations generated by cloud applications have been widely researched and deployed nowadays. Such cloud serving databases like BigTable, HBase, Cassandra, Azure and many others are desi...

    Hua** Wang, Jianhui Li, Haiming Zhang in Big Data Benchmarks, Performance Optimizat… (2014)

  20. No Access

    Chapter and Conference Paper

    Linked Data Platform D2R + 

    The concept of linked data has developed very fast since outlined in 2006 by Tim Berners-Lee, and now it has become a hot topic of web. It connects the traditional isolation data sets, and has become an import...

    Qingling Chang, Shiting Xu, Yuanchun Zhou, **g Shao in Linked Data and Knowledge Graph (2013)

Page of 5