Skip to main content

previous disabled Page of 68
and
  1. No Access

    Chapter and Conference Paper

    Checking hybrid automata for linear duration invariants

    In this paper, we consider the problem of checking hybrid systems modelled by hybrid automata for a class of real-time properties represented by linear duration invariants, which are constructed from linear inequ...

    Li Xuandong, Dang Van Hung, Zheng Tao in Advances in Computing Science — ASIAN'97 (1997)

  2. Chapter

    The Design of Information System in Thin-Client Environment over Intranet

    This paper focuses on discussing the design principles and choices of IS in new model. With the architecture of IS has transit to multi-tier Client/Server and Thin-Client environment from 2-tier Client/Server ...

    Tao Huang, Xu Zhang in Information Systems in the WWW Environment (1998)

  3. Chapter

    X.500 — Information Infrastructure of Distributed Systems in Heterogeneous Environments

    Develo** distributed systems in heterogeneous environments often needs to solve the problem of how to access many different kinds of network resources, and that is a rather difficult task. In this paper, we ...

    Tao Zhang, **ren **e, Ming Chen in Information Systems in the WWW Environment (1998)

  4. No Access

    Chapter and Conference Paper

    New Applications of the Incompressibility Method (Extended Abstract)

    The incompressibility method is an elementary yet powerful proof technique based on Kolmogorov complexity [13]. We show that it is particularly suited to obtain average-case computational complexity lower bounds....

    Harry Buhrman, Paul Vitányi, Tao Jiang, Ming Li in Automata, Languages and Programming (1999)

  5. No Access

    Chapter and Conference Paper

    Average-Case Complexity of Shellsort (Preliminary Version)

    We prove a general lower bound on the average-case complexity of Shellsort: the average number of data-movements (and comparisons) made by a p-pass Shellsort for any incremental sequence is Ω(pn1+1/p) for every p

    Tao Jiang, Ming Li, Paul Vitányi in Automata, Languages and Programming (1999)

  6. No Access

    Chapter and Conference Paper

    Using the SMiLE Monitoring Infrastructure to Detect and Lower the Inefficiency of Parallel Applications

    High computational demands are one of the main reasons for the use of parallel architectures like clusters of PCs. Many parallel programs, however, suffer from severe inefficiencies when executed on such a loo...

    Jie Tao, Wolfgang Karl, Martin Schulz in High Performance Computing and Networking (2000)

  7. No Access

    Chapter and Conference Paper

    The Synthesis of Realistic Human Face

    In this paper, we present new techniques for creating a realistic specific human face based on a general 3D face model and several photos of a human. The morphing technique allows interactive alignment of feat...

    Sining Wang, Baocai Yin, Tao Cai in Advances in Multimodal Interfaces — ICMI 2000 (2000)

  8. No Access

    Chapter and Conference Paper

    Phylogenetic k-Root and Steiner k-Root

    Given a graph G = (V,E) and a positive integer k, the Phylogenetic k-Root Problem asks for a (unrooted) tree T without degree-2 nodes such that its leaves are labeled by V and (u, v)E if and only if d ...

    Guo-Hui Lin, Paul E. Kearney, Tao Jiang in Algorithms and Computation (2000)

  9. Chapter

    The Virtual Bandwidth Based ER Marking Algorithms for Flow Control in ATM Networks

    ABR service is designed for a wide range of applications that do not require bounded delay and loss ratio, but rather prefer low loss ratio and high throughput with only a minimum cell rate guaranteed. In this...

    Tao Yang, ** Wang, Wengang Zhai in Broadband Communications (2000)

  10. No Access

    Chapter and Conference Paper

    Detecting Facial Features on Images with Multiple Faces

    This paper presents an approach to detect facial features of multiple faces on complex background and with variable poses, illumination conditions, expressions, ages, image sizes, etc. First, the skin parts of...

    Zhenyun Peng, Linmi Tao, Guangyou Xu in Advances in Multimodal Interfaces — ICMI 2… (2000)

  11. No Access

    Chapter and Conference Paper

    The Incompressibility Method

    Kolmogorov complexity is a modern notion of randomness dealing with the quantity of information in individual objects; that is, pointwise randomness rather than average randomness as produced by a random sourc...

    Tao Jiang, Ming Li, Paul Vitányi in SOFSEM 2000: Theory and Practice of Informatics (2000)

  12. No Access

    Chapter and Conference Paper

    The Longest Common Subsequence Problem for Sequences with Nested Arc Annotations

    Arc-annotated sequences are useful in representing the structural information of RNA and protein sequences. The LONGEST ARC- PRESERVING COMMON SUBSEQUENCE (LAPCS) Problem has been introduced in [11] as a framewor...

    Guo-Hui Lin, Zhi-Zhong Chen, Tao Jiang, Jianjun Wen in Automata, Languages and Programming (2001)

  13. No Access

    Chapter and Conference Paper

    Soft Mobile Ad-Hoc Networking

    Today’s mobile ad-hoc networking approaches require nodes to maintain network topology and routing tables, which limits network scalability. This paper proposes soft mobile ad-hoc networks in which nodes do not m...

    Tao Zhang, Wai Chen in Mobile Data Management (2001)

  14. No Access

    Chapter and Conference Paper

    Enterprise Alliance and Virtue Enterprise: A Systematic Analysis and Theoretical Explanation

    Internet enterprise organization (“EO”) with representation of enterprise alliance (“EA”) and virtue enterprise (VE) is now a prevailing form of organization in developed countries. This paper attempts to put ...

    Tao Meng, Ning Ding in The Human Society and the Internet Interne… (2001)

  15. No Access

    Chapter and Conference Paper

    Validating an Access Cost Model for Wide Area Applications

    In this paper, we describe a case study in develo** an access cost model for WebSources in the context of a wrapper mediator architecture. We document our experiences in validating this model, and note succe...

    Vladimir Zadorozhny, Louiqa Raschid, Tao Zhan in Cooperative Information Systems (2001)

  16. No Access

    Chapter and Conference Paper

    Estimating Joint Probabilities from Marginal Ones*

    Estimating joint probabilities plays an important role in many data mining and machine learning tasks. In this paper we introduce two methods, minAB and prodAB, to estimate joint probabilities. Both methods are b...

    Tao Li, Shenghuo Zhu, Mitsunori Ogihara in Data Warehousing and Knowledge Discovery (2002)

  17. No Access

    Chapter and Conference Paper

    CoFD: An Algorithm for Non-distance Based Clustering in High Dimensional Spaces*

    The clustering problem, which aims at identifying the distribution of patterns and intrinsic correlations in large data sets by partitioning the data points into similarity clusters, has been widely studied. T...

    Shenghuo Zhu, Tao Li, Mitsuonri Ogihara in Data Warehousing and Knowledge Discovery (2002)

  18. No Access

    Chapter and Conference Paper

    A Group Signature Scheme Committing the Group

    In this paper, a group signature scheme committing the group itself is proposed. In normal group signature schemes, a group member can anonymously sign a message on behalf of a group, and the anonymity of the ...

    Toru Nakanishi, Masayuki Tao, Yuji Sugiyama in Information and Communications Security (2002)

  19. Chapter and Conference Paper

    Improving Data Locality Using Dynamic Page Migration Based on Memory Access Histograms

    This Paper presents an approach which dynamically and transparently improves the data locality of memory references in Non-Uniform Memory Access (NUMA) characterized systems. The approach is based on run-time ...

    Jie Tao, Martin Schulz, Wolfgang Karl in Computational Science — ICCS 2002 (2002)

  20. Chapter and Conference Paper

    Adjusted Probabilistic Packet Marking for IP Traceback

    Distributed denial-of-service attack is one of the greatest threats to the Internet today. One of the biggest difficulties in defending against this attack is that attackers always use incorrect, or “spoofed” ...

    Tao Peng, Christopher Leckie in NETWORKING 2002: Networking Technologies, … (2002)

previous disabled Page of 68