Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Prospectus for the Next LAPACK and ScaLAPACK Libraries

    New releases of the widely used LAPACK and ScaLAPACK numerical linear algebra libraries are planned. Based on an on-going user survey (www.netlib.org/lapack-dev) and research by many people, we are proposing t...

    James W. Demmel, Jack Dongarra in Applied Parallel Computing. State of the A… (2007)

  2. No Access

    Chapter and Conference Paper

    Substructuring, Dimension Reduction and Applications: An Introduction

    There are a variety of reasons to go for substructuring and dimension reduction in scientific computations and applications. Substructuring makes it possible to solve large and seemingly intractable computatio...

    Zhaojun Bai, Ren-Cang Li in Applied Parallel Computing. State of the A… (2006)

  3. No Access

    Chapter and Conference Paper

    Algebraic Sub-structuring for Electromagnetic Applications

    Algebraic sub-structuring refers to the process of applying matrix reordering and partitioning algorithms to divide a large sparse matrix into smaller submatrices from which a subset of spectral components are...

    Chao Yang, Weiguo Gao, Zhaojun Bai in Applied Parallel Computing. State of the A… (2006)

  4. No Access

    Chapter and Conference Paper

    Structure-Preserving Model Reduction

    A general framework for structure-preserving model reduction by Krylov subspace projection methods is developed. The goal is to preserve any substructures of importance in the matrices L, G, C, B that define the ...

    Ren-Cang Li, Zhaojun Bai in Applied Parallel Computing. State of the A… (2006)

  5. No Access

    Chapter and Conference Paper

    Performance Analysis of Parallel Right-Looking Sparse LU Factorization on Two Dimensional Grids of Processors

    We investigate performance characteristics for the LU factorization of large matrices with various sparsity patterns. We consider supernodal right-looking parallel factorization on a two dimensional grid of proce...

    Laura Grigori, **aoye S. Li in Applied Parallel Computing. State of the A… (2006)

  6. No Access

    Chapter and Conference Paper

    A Method of Acquiring Ontology Information from Web Documents

    Ontology plays an important role on the Semantic Web. In this paper, we propose a method, AOIWD, of acquiring ontology information from Web documents. The AOIWD method employs data mining techniques combined w...

    Lixin Han, Guihai Chen, Li **e in Computational and Information Science (2005)

  7. No Access

    Chapter and Conference Paper

    Vascular Segmentation Using Level Set Method

    In this paper, we propose a two-stage level set segmentation framework to extract vascular tree from magnetic resonance angiography(MRA). First, we smooth the isosurface of MRA by anisotropic diffusion filter....

    Yongqiang Zhao, Lei Zhang, Minglu Li in Computational and Information Science (2005)

  8. No Access

    Chapter and Conference Paper

    SVM Model Selection with the VC Bound

    Model selection plays a key role in the performance of a support vector machine (SVM). In this paper, we propose two algorithms that use the Vapnik Chervonenkis (VC) bound for SVM model selection. The algorith...

    Huaqing Li, Shaoyu Wang, Feihu Qi in Computational and Information Science (2005)

  9. No Access

    Chapter and Conference Paper

    The Geometric Constraint Solving Based on Mutative Scale Chaos Genetic Algorithm

    The constraint problem can be transformed to an optimization problem. In this paper a new hybrid algorithm—MSCGA was introduced which mixes genetic algorithm with chaos optimization method. The character of th...

    Cao Chunhong, Li Wenhui in Computational and Information Science (2005)

  10. No Access

    Chapter and Conference Paper

    Analysis on Network-Induced Delays in Networked Learning Based Control Systems

    Local controller and remote learning device are connected through communication network in Networked Learning based Control Systems (NLCSs). Network-induced delays are inevitable during data transmission, and ...

    Lixiong Li, Minrui Fei, **aobing Zhou in Computational and Information Science (2005)

  11. No Access

    Chapter and Conference Paper

    Eidolon: Real-Time Performance Evaluation Approach for Distributed Programs Based on Capacity of Communication Links

    In this paper, we propose an approach for the real-time performance analysis of distributed programs, called Eidolon. The approach is based on the capacity of communication links. In Eidolon, some algorithms a...

    Yunfa Li, Hai **, Zongfen Han, Chao **e, Minna Wu in Computational and Information Science (2005)

  12. No Access

    Chapter and Conference Paper

    Knowledge Maintenance on Data Streams with Concept Drifting

    Concept drifting in data streams often occurs unpredictably at any time. Currently many classification mining algorithms deal with this problem by using an incremental learning approach or ensemble classifiers...

    Juggapong Natwichai, Xue Li in Computational and Information Science (2005)

  13. No Access

    Chapter and Conference Paper

    A Numerical Model for Estimating Pedestrian Delays at Signalized Intersections in Develo** Cities

    Considering the traffic situations in develo** cities like **’an, China, a numerical model is developed to estimate pedestrian delays at signalized intersections. In the model, signal cycle is divided into a...

    Qingfeng Li, Zhaoan Wang, Jianguo Yang in Computational and Information Science (2005)

  14. No Access

    Chapter and Conference Paper

    Multi-step Subdivision Algorithm for Chaikin Curves

    A Chaikin curve is a subdivision curve. Subdivision begins from an initial control polygonal curve. For each subdivision step, all corners of the polygonal curve are cut off, and a new polygonal curve is thus ...

    Ling Wu, Jun-Hai Yong, You-Wei Zhang, Li Zhang in Computational and Information Science (2005)

  15. No Access

    Chapter and Conference Paper

    Basic Mathematical Properties of Multiparty Joint Authentication in Grids

    This paper introduces the semantic of Multiparty Joint Authentication (MJA) into the authentication service, which is to find simplified or optimal authentication solutions for all involved principals as a who...

    Hui Liu, Minglu Li in Computational and Information Science (2005)

  16. No Access

    Chapter and Conference Paper

    Binomial-Tree Fault Tolerant Routing in Dual-Cubes with Large Number of Faulty Nodes

    A dual-cube DC(m) has m + 1 links per node where m is the degree of a cluster (m-cube), and one extra link is used for connection between clusters. The dual-cube mitigates the problem of increasing number of link...

    Yamin Li, Shietung Peng, Wanming Chu in Computational and Information Science (2005)

  17. No Access

    Chapter and Conference Paper

    Representation of the Signal Transduction with Aberrance Using Ipi Calculus

    The pi calculus has been applied to modelling biochemical networks. In these applications, the modelling is done without considerations to exceptions. The Ipi calculus, the Interference pi calculus, is introduced...

    Min Zhang, Guoqiang Li, Yuxi Fu, Zhizhou Zhang in Computational and Information Science (2005)

  18. No Access

    Chapter and Conference Paper

    A Survey of Load Balancing in Grid Computing

    Although intensive work has been done in the area of load balancing, the grid computing environment is different from the traditional parallel systems, which prevents existing load balancing schemes from benef...

    Yawei Li, Zhiling Lan in Computational and Information Science (2005)

  19. No Access

    Chapter and Conference Paper

    Analyzing iKP Security in Applied Pi Calculus

    The security for electronic payments is very important in electronic commerce. Many electronic payment protocols have been proposed recently to meet the security requirements. Since the design of a protocol is...

    Yonggen Gu, Guoqiang Li, Yuxi Fu in Computational and Information Science (2005)

  20. No Access

    Chapter and Conference Paper

    An Adaptive Two-Dimensional Mesh Refinement Method for the Problems in Fluid Engineering

    Mesh generation is one of the key issues in Computational Fluid Dynamics. This paper presents an adaptive two-dimensional mesh refinement method based on the law of mass conservation. The method can be used to...

    Zhenquan Li in Computational and Information Science (2005)

previous disabled Page of 2