Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Diffusion-Based Data Augmentation for Nuclei Image Segmentation

    Nuclei segmentation is a fundamental but challenging task in the quantitative analysis of histopathology images. Although fully-supervised deep learning-based methods have made significant progress, a large nu...

    **nyi Yu, Guanbin Li, Wei Lou, Siqi Liu in Medical Image Computing and Computer Assis… (2023)

  2. No Access

    Article

    Towards centralized transmission coordination in WLANs: a cross-layer approach

    The world is becoming more dependent on wireless networks for ubiquitous computing. Wireless local area network (WLAN) is one kind of widely-deployed wireless networks used in this context. Its network perform...

    Junmei Yao, Wei Lou, Chao Yang, Kaishun Wu in CCF Transactions on Pervasive Computing an… (2020)

  3. No Access

    Chapter and Conference Paper

    The Research on Association Rules Mining with Co-evolution Algorithm in High Dimensional Data

    This paper adopts a co-evolution algorithm, which utilizes improved genetic algorithm and particle swarm optimization algorithm to iterate two populations simultaneously. Meanwhile, the mechanism of informatio...

    Wei Lou, Lei Zhu, Limin Yan in AsiaSim 2012 (2012)

  4. No Access

    Chapter and Conference Paper

    Interference-Aware Gossi** Scheduling in Uncoordinated Duty-Cycled Multi-hop Wireless Networks

    Gossi** is to broadcast the message of every node to all the other nodes in multi-hop wireless networks (MWNs). This operation plays an important role and is widely used in MWNs. Interference-aware gossi**...

    **anlong Jiao, Wei Lou, **aodong Wang in Wireless Algorithms, Systems, and Applicat… (2010)

  5. No Access

    Chapter and Conference Paper

    A Novel Mobility Management Scheme for Target Tracking in Cluster-Based Sensor Networks

    Target tracking is a typical and important application of wireless sensor networks (WSNs). In the consideration of scalability and energy efficiency for target tracking in large scale WSNs, it has been employe...

    Zhibo Wang, Wei Lou, Zhi Wang, Junchao Ma in Distributed Computing in Sensor Systems (2010)

  6. No Access

    Chapter and Conference Paper

    A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs

    Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sniffs packets at one point in t...

    Honglong Chen, Wei Lou, Zhi Wang in Wireless Algorithms, Systems, and Applications (2009)

  7. No Access

    Chapter and Conference Paper

    Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks

    The wormhole attack sniffs packets in one point in the network, tunnels them through a wired or wireless link to another point to cause severe influence on the localization process or routing process in the ne...

    Honglong Chen, Wei Lou, Zhi Wang in Ubiquitous Intelligence and Computing (2009)

  8. No Access

    Chapter and Conference Paper

    A Lightweight Scheme for Node Scheduling in Wireless Sensor Networks

    The coverage problem in wireless sensor networks (WSNs) is to determine the number of active sensor nodes needed to cover the sensing area. The purpose is to extend the lifetime of the WSN by turning off redun...

    Ming Liu, Yuan Zheng, Jiannong Cao, Wei Lou in Ubiquitous Intelligence and Computing (2007)

  9. No Access

    Chapter and Conference Paper

    Coverage Analysis for Wireless Sensor Networks

    The coverage problem in wireless sensor networks (WSNs) is to determine the number of active sensor nodes needed to cover the sensing area. The purpose is to extend the lifetime of the WSN by turning off redun...

    Ming Liu, Jiannong Cao, Wei Lou, Li-jun Chen, **e Li in Mobile Ad-hoc and Sensor Networks (2005)

  10. No Access

    Chapter and Conference Paper

    An Enhanced Message Exchange Mechanism in Cluster-Based Mobile Ad Hoc Networks,

    In mobile ad hoc networks (MANETs), networks can be partitioned into clusters. Clustering algorithms are localized algorithms that have the property of creating an upper bounded clusterheads in any networks ev...

    Wei Lou, Jie Wu in Parallel and Distributed Processing and Applications (2005)