Skip to main content

previous disabled Page of 2
and
Your search also matched 440 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Analysis of Significant Cell Differences Between Cancer Patients and Healthy Individuals

Include preview-only content
  1. Chapter and Conference Paper

    AutoQ: An Automata-Based Quantum Circuit Verifier

    We present a specification language and a fully automated tool named AutoQ for verifying quantum circuits symbolically. The tool implements the automata-based algorithm from [14] and extends it with the capabilit...

    Yu-Fang Chen, Kai-Min Chung, Ondřej Lengál, Jyun-Ao Lin in Computer Aided Verification (2023)

  2. Chapter and Conference Paper

    Same Stats, Different Graphs

    Data analysts commonly utilize statistics to summarize large datasets. While it is often sufficient to explore only the summary statistics of a dataset (e.g., min/mean/max), Anscombe’s Quartet demonstrates how...

    Hang Chen, Utkarsh Soni, Yafeng Lu in Graph Drawing and Network Visualization (2018)

  3. Chapter and Conference Paper

    A Novel Learning Algorithm for Büchi Automata Based on Family of DFAs and Classification Trees

    In this paper, we propose a novel algorithm to learn a Büchi automaton from a teacher who knows an \(\omega \) -regula...

    Yong Li, Yu-Fang Chen, Lijun Zhang in Tools and Algorithms for the Construction … (2017)

  4. Chapter and Conference Paper

    A Fast and Better Hybrid Recommender System Based on Spark

    With the rapid development of information technology, recommender systems have become critical components to solve information overload. As an important branch, weighted hybrid recommender systems are widely u...

    Jiali Wang, Hang Zhuang, Changlong Li, Hang Chen, Bo Xu in Network and Parallel Computing (2016)

  5. Chapter and Conference Paper

    CPArec: Verifying Recursive Programs via Source-to-Source Program Transformation

    CPArec is a tool for verifying recursive C programs via source-to-source program transformation. It uses a recursion-free program analyzer CPAChecker as a black box and computes function summar...

    Yu-Fang Chen, Chiao Hsieh, Ming-Hsien Tsai in Tools and Algorithms for the Construction … (2015)

  6. Chapter and Conference Paper

    Multi-modality Gesture Detection and Recognition with Un-supervision, Randomization and Discrimination

    We describe in this paper our gesture detection and recognition system for the 2014 ChaLearn Looking at People (Track 3: Gesture Recognition) organized by ChaLearn in conjunction with the ECCV 2014 conference....

    Guang Chen, Daniel Clarke, Manuel Giuliani in Computer Vision - ECCV 2014 Workshops (2015)

  7. Chapter and Conference Paper

    Commutativity of Reducers

    In the Map-Reduce programming model for data parallel computation, a reducer computes an output from a list of input values associated with a key. The inputs however may not arrive at a reducer in a fixed orde...

    Yu-Fang Chen, Chih-Duo Hong, Nishant Sinha in Tools and Algorithms for the Construction … (2015)

  8. Chapter and Conference Paper

    Improving Log-Based Fault Diagnosis by Log Classification

    In modern computer systems, system event logs have always been the primary source for checking the system status. As computer systems become more complex, such as cloud computing systems, the interaction among...

    Deqing Zou, Hao Qin, Hai **, Weizhong Qiang, Zongfen Han in Network and Parallel Computing (2014)

  9. Chapter and Conference Paper

    Social Communications Assisted Epidemic Disease Influence Minimization

    This work explores the use of social communications for epidemic disease control. Since the most infectious diseases spread through human contacts, we focus on modeling the diffusion of diseases by analyzing t...

    Bowu Zhang, Pei Li, **uzhen Cheng in Wireless Algorithms, Systems, and Applicat… (2013)

  10. Chapter and Conference Paper

    On-Demand Proactive Defense against Memory Vulnerabilities

    Memory vulnerabilities have severely affect system security and availability. Although there are a number of solutions proposed to defense against memory vulnerabilities, most of existing solutions protect the...

    Gang Chen, Hai **, Deqing Zou, Weiqi Dai in Network and Parallel Computing (2013)

  11. Chapter and Conference Paper

    BULL: A Library for Learning Algorithms of Boolean Functions

    We present the tool BULL (Boolean fUnction Learning Library), the first publicly available implementation of learning algorithms for Boolean functions. The tool is implemented in C with interfaces to C++, JAVA...

    Yu-Fang Chen, Bow-Yaw Wang in Tools and Algorithms for the Construction … (2013)

  12. Chapter and Conference Paper

    Memorax, a Precise and Sound Tool for Automatic Fence Insertion under TSO

    We introduce Memorax, a tool for the verification of control state reachability (i.e., safety properties) of concurrent programs manipulating finite range and integer variables and running on top of weak memory m...

    Parosh Aziz Abdulla, Mohamed Faouzi Atig in Tools and Algorithms for the Construction … (2013)

  13. Chapter and Conference Paper

    UKCF: A New Graphics Driver Cross-Platform Translation Framework for Virtual Machines

    Virtual machine with dynamic binary translation system is the key technology to solve software compatibility problem. But traditional user space binary translation systems can’t translate hardware drivers such...

    Haitao Jiang, Yun Xu, Yin Liao, Guojie **, Guoliang Chen in Network and Parallel Computing (2012)

  14. Chapter and Conference Paper

    Object-Layout-Aware Image Retrieval for Personal Album Management

    This demo shows a real-time object-layout-aware image retrieval system for personal album management. The query of the system is image’s object layout and the system retrieves images based on the layout simila...

    Mengyou Li, Zheng Song, Qiang Chen in Computer Vision – ECCV 2012. Workshops and… (2012)

  15. Chapter and Conference Paper

    Displacement Template with Divide-&-Conquer Algorithm for Significantly Improving Descriptor Based Face Recognition Approaches

    This paper proposes a displacement template structure for improving descriptor based face recognition approaches. With this template structure, a face is represented by a template consisting of a set of piled ...

    Liang Chen, Ling Yan, Yonghuai Liu, Lixin Gao, **aoqin Zhang in Computer Vision – ECCV 2012 (2012)

  16. Chapter and Conference Paper

    A Theoretical Analysis of Camera Response Functions in Image Deblurring

    Motion deblurring is a long standing problem in computer vision and image processing. In most previous approaches, the blurred image is modeled as the convolution of a latent intensity image with a blur kernel...

    **aogang Chen, Feng Li, Jie Yang, **gyi Yu in Computer Vision – ECCV 2012 (2012)

  17. Chapter and Conference Paper

    EFD: An Efficient Low-Overhead Scheduler

    Size-based scheduling methods receive a lot of attention as they can greatly enhance the responsiveness perceived by the users. In effect, they give higher priority to small interactive flows which are the imp...

    **bang Chen, Martin Heusse, Guillaume Urvoy-Keller in NETWORKING 2011 (2011)

  18. Chapter and Conference Paper

    Adaptive On-The-Go Scheduling for End-to-End Delay Control in TDMA-Based Wireless Mesh Networks

    Providing end-to-end delay bound for real-time applications is a major challenge in wireless mesh networks (WMNs) because the bandwidth requirements of flows are time-varied and the channel condition is unstab...

    Yung-Cheng Tu, Meng Chang Chen, Yeali S. Sun in NETWORKING 2011 (2011)

  19. Chapter and Conference Paper

    Reorder the Write Sequence by Virtual Write Buffer to Extend SSD’s Lifespan

    The limited lifespan is the Achilles’s heel of Solid State Drive (SSD) based on NAND flash memory. NAND flash has two drawbacks that degrade SSD’s lifespan. One is the out-of-place update. Another is the seque...

    Zhiguang Chen, Fang Liu, Yimo Du in Network and Parallel Computing (2011)

  20. Chapter and Conference Paper

    Efficient Pipelining Parallel Methods for Image Compositing in Sort-Last Rendering

    It is well known that image compositing is the bottleneck in Sort-Last rendering. Many methods have been developed to reduce the compositing time. In this paper, we present a series of pipeline methods for ima...

    Wei Fang, Guangzhong Sun, Peng Zheng, Tiening He in Network and Parallel Computing (2010)

previous disabled Page of 2