Search Results - "2014 IEEE 17th International Conference on Computational Science and Engineering"

Refine Results
  1. 1

    Classification of Electrocardiogram Signals with Deep Belief Networks by Meng Huanhuan, Zhang Yue

    Published: IEEE 01.12.2014
    “…This paper introduces an electrocardiogram beat classification method based on deep belief networks. This method includes two parts: feature extraction and…”
    Get full text
    Conference Proceeding
  2. 2

    Dolphin: Ultrasonic-Based Gesture Recognition on Smartphone Platform by Yang Qifan, Tang Hao, Zhao Xuebing, Li Yin, Zhang Sanfeng

    Published: IEEE 01.12.2014
    “…User experience of smart mobile devices can be improved in numerous scenarios with the assist of in-air gesture recognition. Most existing methods proposed by…”
    Get full text
    Conference Proceeding
  3. 3

    Performance Comparison and Evaluation of Web Development Technologies in PHP, Python, and Node.js by Kai Lei, Yining Ma, Zhi Tan

    Published: IEEE 01.12.2014
    “…Large scale, high concurrency, and vast amount of data are important trends for the new generation of website. Node.js becomes popular and successful to build…”
    Get full text
    Conference Proceeding
  4. 4

    A Novel Resource Scheduling Approach in Container Based Clouds by Xin Xu, Huiqun Yu, Xin Pei

    Published: IEEE 01.12.2014
    “…Cloud computing is a new paradigm to deliver computing resources to customers in a pay-as-you-go model. In this paper, the recently emerged container-based…”
    Get full text
    Conference Proceeding
  5. 5

    Connectivity Results of Hierarchical Cubic Networks as Associated with Linearly Many Faults by Cheng, Eddie, Ke Qiu, Zhizhang Shen

    Published: IEEE 01.12.2014
    “…We establish a general fault-tolerance property for the interesting hierarchical cubic networks, when a linear number of vertices are removed from such a…”
    Get full text
    Conference Proceeding
  6. 6

    A Novel Routing Algorithm Based on Virtual Topology Snapshot in LEO Satellite Networks by Haichao Tan, Lidong Zhu

    Published: IEEE 01.12.2014
    “…Nowadays, communication technology is changing rapidly and satellite communication, as an important communication pattern, is playing a more and more important…”
    Get full text
    Conference Proceeding
  7. 7

    Vehicle State Estimation Using Cubature Kalman Filter by Xiaoshuai Xin, Jinxi Chen, Jianxiao Zou

    Published: IEEE 01.12.2014
    “…The vehicle state is of significant to examine and control vehicle performance. But some vehicle states such as vehicle velocity and side slip angle which are…”
    Get full text
    Conference Proceeding
  8. 8

    A Smart Home Architecture Based on Resource Name Service by Cui Yang, Bo Yuan, Ye Tian, Zongming Feng, Wei Mao

    Published: IEEE 01.12.2014
    “…Smart home contains centralized controlled lights, Heating, Ventilation and Air Conditioning (HVAC), appliances, security locks of gates and doors and other…”
    Get full text
    Conference Proceeding
  9. 9

    Enabling Query of Frequently Updated Data from Mobile Sensing Sources by Yuchao Zhou, De, Suparna, Wei Wang, Moessner, Klaus

    Published: IEEE 01.12.2014
    “…The Internet of Things (IoT) paradigm connects everyday objects to the Internet and enables a multitude of applications with the real world data collected from…”
    Get full text
    Conference Proceeding
  10. 10

    A Real-Time Hand Gesture Recognition Approach Based on Motion Features of Feature Points by Yingying She, Qian Wang, Yunzhe Jia, Ting Gu, Qun He, Baorong Yang

    Published: IEEE 01.12.2014
    “…Dynamic hand gesture recognition enables people to communicate with computers naturally without any mechanical devices. Due to the spread of depth sensor such…”
    Get full text
    Conference Proceeding
  11. 11

    A Neighbor Discovery Algorithm in Network of Radar and Communication Integrated System by Jinming Li, Laixian Peng, Yilei Ye, Renhui Xu, Wendong Zhao, Chang Tian

    Published: IEEE 01.12.2014
    “…Networking Radar-Communication Integrated System (RCIS) promises an improved performance of radar and communication system platform by expanding scanning range…”
    Get full text
    Conference Proceeding
  12. 12

    Self-Stabilizing Selection of Influential Users in Social Networks by Yihua Ding, Wang, James Z., Srimani, Pradip K.

    Published: IEEE 01.12.2014
    “…Selection of Influential Users is an essential task in influence propagation schemes in social networks. Considering the phenomenon of asymmetric influences…”
    Get full text
    Conference Proceeding
  13. 13

    A Two-Phase Context-Sensitive Service Composition Method with the Workflow Model in Cyber-Physical Systems by Tao Wang, Chongli Niu, Lianglun Cheng

    Published: IEEE 01.12.2014
    “…The requirement of integrating a large number of heterogeneous cyber and physical entities in cyber-physical systems (CPSs) motivates the use of a…”
    Get full text
    Conference Proceeding
  14. 14

    Distributed Construction of Connected Dominating Sets Optimized by Minimum-Weight Spanning Tree in Wireless Ad-Hoc Sensor Networks by Sijun Ren, Ping Yi, Dapeng Hong, Yue Wu, Ting Zhu

    Published: IEEE 01.12.2014
    “…A Connected Dominating Set (CDS) is a subset V' of V for the graph G(V,E) and induces a connected subgraph, such that each node in V -V' is at least adjacent…”
    Get full text
    Conference Proceeding
  15. 15

    IoT Information Service Composition Driven by User Requirement by Zhen Yang, Deshi Li

    Published: IEEE 01.12.2014
    “…Several kinds of sensors would be widely deployed with the development of the Internet of things (IoT). Each IoT information service provides individual…”
    Get full text
    Conference Proceeding
  16. 16

    False Target Deceptive Jamming for Countering Missile-Borne SAR by Xiaodong He, Jun Zhu, Jun Wang, Dongping Du, Bin Tang

    Published: IEEE 01.12.2014
    “…A false target deceptive jamming method for countering missile-borne SAR is proposed in this paper, which is on the basis of false target phase template…”
    Get full text
    Conference Proceeding
  17. 17

    A Secret Key Extraction Technique Applied in Vehicular Networks by Abdelgader, Abdeldime M. S., Wu, Lenan

    Published: IEEE 01.12.2014
    “…Vehicular Ad hoc network (VANET) is an emerging technology that supports several applications related to safety and comfort. Its life saving characteristic has…”
    Get full text
    Conference Proceeding
  18. 18

    A Novel Routing Scheme for LEO Satellite Networks Based on Link State Routing by Hongcheng Yan, Qingjun Zhang, Yong Sun

    Published: IEEE 01.12.2014
    “…The low earth orbit (LEO) satellite networks are characterized by their significant dynamics of topology and traffic load which pose huge challenge to the…”
    Get full text
    Conference Proceeding
  19. 19

    Alljoyn Based Direct Proximity Service Development: Overview and Prototype by Yufeng Wang, Li Wei, Qun Jin, Jianhua Ma

    Published: IEEE 01.12.2014
    “…Proximity awareness, the ability to actively (or passively) and continuously search for relevant value in one's physical proximity, is at the core of mobile…”
    Get full text
    Conference Proceeding
  20. 20

    A Novel Slack-Stealing Scheduling Algorithm for Hard-Real-Time Multiple-Processors System by Zhu Ping, Hu Ming, Chen Xuhui

    Published: IEEE 01.12.2014
    “…When a permanent fault occurs in real-time system with multiple-processors, the slack distribution for different instances of the same task is unfair. The task…”
    Get full text
    Conference Proceeding