Skip to main content

and
  1. No Access

    Article

    Some modifications of the parallel Halley iteration method and their convergence

    In this paper we derive five kinds of algorithms for simultaneously finding the zeros of a complex polynomial. The convergence and the convergence rate with higher order are obtained. The algorithms are numeri...

    Prof. De-ren Wang, Yu-jiang Wu in Computing (1987)

  2. No Access

    Article

    Context-Based 2D-VLC Entropy Coder in AVS Video Coding Standard

    In this paper, a Context-based 2D Variable Length Coding (C2DVLC) method for coding the transformed residuals in AVS video coding standard is presented. One feature in C2DVLC is the usage of multiple 2D-VLC ta...

    Qiang Wang, De-Bin Zhao, Wen Gao in Journal of Computer Science and Technology (2006)

  3. No Access

    Article

    Performance Comparison of AVS and H.264/AVC Video Coding Standards

    A new audio and video compression standard of China, known as advanced Audio Video coding Standard (AVS), is emerging. This standard provides a technical solution for many applications within the information i...

    **n-Fu Wang, De-Bin Zhao in Journal of Computer Science and Technology (2006)

  4. No Access

    Article

    Adaptive Call Admission Control Based on Reward-Penalty Model in Wireless/Mobile Network

    A dynamic threshold-based Call Admission Control (CAC) scheme used in wireless/mobile network for multi-class services is proposed. In the scheme, each class’s CAC thresholds are solved through establishing a ...

    Jian-Hui Huang, De-Pei Qian, Sheng-Ling Wang in Journal of Computer Science and Technology (2007)

  5. No Access

    Chapter and Conference Paper

    An Quadtree Coding in E-chart

    With the development of IT and traffic logistics in sea, more function and performance of electronic chart (E-chart) in the navigation is needed. In the meantime, the requirement for high performance E-chart, ...

    Zhong-jie Zhang, **an Wu, De-peng Zhao in Information Computing and Applications (2010)

  6. No Access

    Chapter and Conference Paper

    Bioinformatics Analysis of the Complete Nucleotide Sequence of Duck Plague Virus UL22 Gene

    UL22 gene, also named gH gene(GenBank accession No. EU195089) from duck plague virus (DPV) CHv strain which was isolated in our laboratory, is a 2505bp segment. The analysis about the characteristics of this g...

    Li-Sha Yang, An-Chun Cheng, Ming-Shu Wang in Information Computing and Applications (2012)

  7. No Access

    Chapter and Conference Paper

    The Study and Application of the Distribution Ratios Model of Passenger Flows in Regional Transportation Corridor

    By studying modes of transport properties such as economy, rapid, comfort, convenient, direct access, safety, this paper established a generalized cost function based on the factors of passenger choose transpo...

    Wang De-jun, Hou **g-**g, Xu Zong-fang in Software Engineering and Knowledge Enginee… (2012)

  8. No Access

    Article

    Personalized Tag Recommendation Using Social Influence

    Tag recommendation encourages users to add more tags in bridging the semantic gap between human concept and the features of media object, which provides a feasible solution for content-based multimedia informa...

    Jun Hu, Bing Wang, Yu Liu, De-Yi Li in Journal of Computer Science and Technology (2012)

  9. No Access

    Chapter and Conference Paper

    A Survey on the Security of Multihop Ad Hoc Network

    With the development of wireless network, mobile Ad Hoc networks have been applied in many fields. But the security problem of Ad Hoc network has not been solved very well, and the security system of Ad Hoc ne...

    Yuan De-yu, Liu Tong, Wei Geng-yu, Wang Zhi-zhao in Trustworthy Computing and Services (2013)

  10. No Access

    Article

    Towards Automated Provisioning and Emergency Handling in Renewable Energy Powered Datacenters

    Designing eco-friendly system has been at the forefront of computing research. Faced with a growing concern about the server energy expenditure and the climate change, both industry and academia start to show ...

    Chao Li, Rui Wang, Yang Hu, Rui** Zhou in Journal of Computer Science and Technology (2014)

  11. No Access

    Article

    High Performance Interconnect Network for Tianhe System

    In this paper, we present the Tianhe-2 interconnect network and message passing services. We describe the architecture of the router and network interface chips, and highlight a set of hardware and software fe...

    **ang-Ke Liao, Zheng-Bin Pang, Ke-Fei Wang in Journal of Computer Science and Technology (2015)

  12. No Access

    Article

    An Efficient Algorithm for Distributed Outlier Detection in Large Multi-Dimensional Datasets

    The distance-based outlier is a widely used definition of outlier. A point is distinguished as an outlier on the basis of the distances to its nearest neighbors. In this paper, to solve the problem of outlier ...

    **-Te Wang, De-Rong Shen, Mei Bai in Journal of Computer Science and Technology (2015)

  13. No Access

    Article

    SEIP: System for Efficient Image Processing on Distributed Platform

    Nowadays, there exist numerous images in the Internet, and with the development of cloud computing and big data applications, many of those images need to be processed for different kinds of applications by us...

    Tao Liu, Yi Liu, Qin Li, **ang-Rong Wang in Journal of Computer Science and Technology (2015)

  14. No Access

    Article

    FIMI: A Constant Frugal Incentive Mechanism for Time Window Coverage in Mobile Crowdsensing

    Mobile crowdsensing has become an efficient paradigm for performing large-scale sensing tasks. An incentive mechanism is important for a mobile crowdsensing system to stimulate participants and to achieve good...

    Jia Xu, Jian-Ren Fu, De-Jun Yang, Li-Jie Xu in Journal of Computer Science and Technology (2017)

  15. No Access

    Article

    Defocus Hyperspectral Image Deblurring with Adaptive Reference Image and Scale Map

    Defocus blur is one of the primary problems among hyperspectral imaging systems equipped with simple lenses. Most of the previous deblurring methods focus on how to utilize structure information of a single ch...

    De-Wang Li, Lin-**g Lai, Hua Huang in Journal of Computer Science and Technology (2019)

  16. Article

    Preface

    Yi Pan, De-Shuang Huang, Jian-**n Wang in Journal of Computer Science and Technology (2021)

  17. No Access

    Article

    Accelerating Data Transfer in Dataflow Architectures Through a Look-Ahead Acknowledgment Mechanism

    The dataflow architecture, which is characterized by a lack of a redundant unified control logic, has been shown to have an advantage over the control-flow architecture as it improves the computational perform...

    Yu-**g Feng, De-Jian Li, Xu Tan in Journal of Computer Science and Technology (2022)

  18. No Access

    Article

    A Survey of Non-Volatile Main Memory File Systems

    Non-volatile memories (NVMs) provide lower latency and higher bandwidth than block devices. Besides, NVMs are byte-addressable and provide persistence that can be used as memory-level storage devices (non-vola...

    Ying Wang, Wen-Qing Jia, De-Jun Jiang in Journal of Computer Science and Technology (2023)