Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Resistance Analysis to Intruders’ Evasion of a Novel Algorithm to Detect Step**-Stone

    Most intruders used to make use of step**-stones to launch their attacks for safety reason. Some of them even evade step**-stone detection by conducting manipulations. Most of the approaches proposed to de...

    Yongzhong Zhang, Jianhua Yang, Chunming Ye in Autonomic and Trusted Computing (2006)

  2. No Access

    Chapter and Conference Paper

    Research on Next Generation Grids Using a Fuzzy Assessment Method

    Main issues to be faced by next-generation Grids are the management and exploitation of the overwhelming amount of data produced by applications but also by Grid operation, and the intelligent use of Grid reso...

    Chunyang Ye, Feng **ong, Qi Luo in Modeling Decisions for Artificial Intelligence (2007)

  3. No Access

    Chapter and Conference Paper

    An Enhanced Swarm Intelligence Clustering-Based RBF Neural Network Web Text Classifier

    The central problem in training a radial basis function neural network (RBFNN) is the selection of hidden layer neurons, which includes the selection of the center and width of those neurons. In this paper, we...

    Yong Feng, Zhongfu Wu, Jiang Zhong, Chunxiao Ye in Advances in Neural Networks – ISNN 2009 (2009)

  4. No Access

    Chapter

    Event Exposure for Web Services: A Grey-Box Approach to Compose and Evolve Web Services

    The service-oriented architecture (SOA) is an emerging software engineering paradigm for develo** distributed enterprise applications. In this paradigm,Web services are encapsulated and published as black-bo...

    Chunyang Ye, Hans-Arno Jacobsen in The Smart Internet (2010)

  5. No Access

    Article

    Key parameter estimation for radar rotating object imaging with multi-aspect observations

    Rotating object model is commonly used for imaging analysis in high resolution radars such as the inverse synthetic aperture radar (ISAR). For a rotating object, it is known that multi-aspect observations can ...

    ChunMao Ye, Jia Xu, YingNing Peng, **uTan Wang in Science China Information Sciences (2010)

  6. No Access

    Article

    An enhanced swarm intelligence clustering-based RBFNN classifier and its application in deep Web sources classification

    The central problem in training a radial basis function neural network (RBFNN) is the selection of hidden layer neurons, which includes the selection of the center and width of those neurons. In this paper, we...

    Yong Feng, Zhongfu Wu, Jiang Zhong, Chunxiao Ye in Frontiers of Computer Science in China (2010)

  7. No Access

    Chapter and Conference Paper

    Study on ODMRP Protocols and Its Application

    Ad Hoc network is a multi-hop temporary autonomous system, which consists of a group of mobile terminal with a wireless transceiver device and whose topology structure changes constantly due to the high dynami...

    Jian Chun Ye in Emerging Research in Web Information Systems and Mining (2011)

  8. No Access

    Article

    A Short-Term Forecasting Algorithm for Network Traffic Based on Chaos Theory and SVM

    Recently, the forecasting technologies for network traffic have played a significant role in network management, congestion control and network security. Forecasting algorithms have also been investigated for ...

    **ngwei Liu, Xuming Fang, Zhenhua Qin, Chun Ye in Journal of Network and Systems Management (2011)

  9. No Access

    Chapter and Conference Paper

    Closed Circle DNA Model to QoS Routing for Ad Hoc Networks

    QoS routing problem is typical NP problem, we will adapt closed circle DNA model to resolve this problem. First, use three groups of DNA sequence to encode arc, cost and probe of each path; Second, use purposi...

    Zhi Yin, Mi Wen, Chunming Ye in Network Computing and Information Security (2012)

  10. No Access

    Chapter and Conference Paper

    Runtime Verification of Data-Centric Properties in Service Based Systems

    For service-based systems which are composed of multiple independent stakeholders, correctness cannot be ascertained statically. Continuous monitoring is required to assure that runtime behavior of the systems...

    Guoquan Wu, Jun Wei, Chunyang Ye, **aozhe Shao, Hua Zhong in Runtime Verification (2012)

  11. No Access

    Chapter

    Service Subscription and Consumption for Personal Web Applications

    Web services have played a vital role in our daily life for some time now. A wide spectrum of online applications have been developed in diverse domains such as banking, shop**, gaming, and video streaming. ...

    Chunyang Ye, Young Yoon, Hans-Arno Jacobsen in The Personal Web (2013)

  12. No Access

    Chapter and Conference Paper

    Cake Cutting Algorithms for Piecewise Constant and Piecewise Uniform Valuations

    Cake cutting is one of the most fundamental settings in fair division and mechanism design without money. In this paper, we consider different levels of three fundamental goals in cake cutting: fairness, Paret...

    Haris Aziz, Chun Ye in Web and Internet Economics (2014)

  13. Chapter and Conference Paper

    Orchestrating SOA Using Requirement Specifications and Domain Ontologies

    The composition of web services requires process designers to capture the goals of the service composition in a partial process model. Manually deriving the partial process model from the requirement specifica...

    Manoj Bhat, Chunyang Ye, Hans-Arno Jacobsen in Service-Oriented Computing (2014)

  14. No Access

    Chapter and Conference Paper

    Estimating End-to-End Available Bandwidth for Cyber-Physical Applications in Hybrid Networks

    Available bandwidth estimation is very important for network operators, users, and bandwidth-sensitive applications. In the last 20 years, various techniques and systems have been proposed to estimate end-to-e...

    Hui Zhou, Chunyang Ye, Yucong Duan, Qi Qi, Yu Zhang in Wireless Internet (2018)

  15. No Access

    Chapter and Conference Paper

    Two-Stream Framework for Activity Recognition with 2D Human Pose Estimation

    Two-Stream framework with spatial information and optical flow information have reached the great performance for action recognition task in video. The optical flow information captures the low-level motion ch...

    Wei Chang, Chunyang Ye, Hui Zhou in Image Analysis and Recognition (2020)

  16. No Access

    Article

    OHTMA: an optimized heuristic topology-aware map** algorithm on the Tianhe-3 exascale supercomputer prototype

    With the rapid increase of the size of applications and the complexity of the supercomputer architecture, topology-aware process map** becomes increasingly important. High communication cost has become a dom...

    Yi-shui Li, **n-hai Chen, Jie Liu, Bo Yang in Frontiers of Information Technology & Elec… (2020)

  17. No Access

    Article

    The influences of product similarity on consumer preferences: a study based on eye-tracking analysis

    Product similarity plays an important role in affecting consumer preferences. Although the existing literature discusses consumer preferences or product similarity, there are only a few studies investigating t...

    Chunyao Ye, Yan **ong, Yan Li, Longfan Liu, Mei Wang in Cognition, Technology & Work (2020)

  18. No Access

    Chapter and Conference Paper

    Short-Term Traffic Condition Prediction Based on Multi-source Data Fusion

    Accurate prediction of the short-term traffic condition can help to relieve the pressure of traffic and optimize the intelligent transportation system. Traditional traffic condition prediction is mainly based ...

    **aoru Deng, Hui Zhou, **aoran Yang, Chunyang Ye in Data Mining and Big Data (2021)

  19. Article

    Open Access

    Inversion-free geometric map** construction: A survey

    A geometric map** establishes a correspondence between two domains. Since no real object has zero or negative volume, such a map** is required to be inversion-free. Computing inversion-free map**s is a f...

    **ao-Ming Fu, Jian-** Su, Zheng-Yu Zhao, Qing Fang in Computational Visual Media (2021)

  20. No Access

    Article

    QoS Prediction based on temporal information and request context

    Due to the complex and dynamic nature of the Internet, the status of services and their qualities (QoS) change frequently. It is thus important to predict the service quality accurately at runtime from the use...

    Bingzhuo Li, Chunyang Ye, Xuezhi Yu in Service Oriented Computing and Applications (2021)

previous disabled Page of 2