By Topic

Tsinghua Science and Technology

Issue 1 • Date Feb. 2013

Filter Results

Displaying Results 1 - 15 of 15
  • [Front cover]

    Publication Year: 2013, Page(s): c1
    IEEE is not the copyright holder of this material | PDF file iconPDF (1360 KB)
    Freely Available from IEEE
  • SPECIAL SECTION ON CLOUD COMPUTING 
  • M2M: A simple Matlab-to-MapReduce translator for cloud computing

    Publication Year: 2013, Page(s):1 - 9
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (735 KB)

    MapReduce is a very popular parallel programming model for cloud computing platforms, and has become an effective method for processing massive data by using a cluster of computers. X-to-MapReduce (X is a program language) translator is a possible solution to help traditional programmers easily deploy an application to cloud systems through translating sequential codes to MapReduce codes. Recently... View full abstract»

    Open Access
  • Transparent computing: Spatio-temporal extension on von Neumann architecture for cloud services

    Publication Year: 2013, Page(s):10 - 21
    Cited by:  Papers (6)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (904 KB)

    The rapid advancements in hardware, software, and computer networks have facilitated the shift of the computing paradigm from mainframe to cloud computing, in which users can get their desired services anytime, anywhere, and by any means. However, cloud computing also presents many challenges, one of which is the difficulty in allowing users to freely obtain desired services, such as heterogeneous... View full abstract»

    Open Access
  • GPGPU cloud: A paradigm for general purpose computing

    Publication Year: 2013, Page(s):22 - 23
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1922 KB)

    The Kepler General Purpose GPU (GPGPU) architecture was developed to directly support GPU virtualization and make GPGPU cloud computing more broadly applicable by providing general purpose computing capability in the form of on-demand virtual resources. This paper describes a baseline GPGPU cloud system built on Kepler GPUs, for the purpose of exploring hardware potential while improving task perf... View full abstract»

    Open Access
  • A load balancing model based on cloud partitioning for the public cloud

    Publication Year: 2013, Page(s):34 - 39
    Cited by:  Papers (14)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1757 KB)

    Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. This article introduces a better load balance model for the public cloud based on the cloud partitioning concept with a switch mechanism to choose different strategies for different situations. The algorithm applies t... View full abstract»

    Open Access
  • Cloud computing-based forensic analysis for collaborative network security management system

    Publication Year: 2013, Page(s):40 - 50
    Cited by:  Papers (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (17175 KB)

    Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. New emerging botnet attacks degrade the status of Internet security furthe... View full abstract»

    Open Access
  • REGULAR ARTICLES 
  • C-HMAX: Artificial cognitive model inspired by the color vision mechanism of the human brain

    Publication Year: 2013, Page(s):51 - 56
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (502 KB)

    Artificial cognitive models and computational neuroscience methods have garnered great interest from both neurologist and leading analysts in recent years. Among the cognitive models, HMAX has been widely used in computer vision systems for its robustness shape and texture features inspired by the ventral stream of the human brain. This work presents a Color-HMAX (C-HMAX) model based on the HMAX m... View full abstract»

    Open Access
  • Low complexity LDPC decoder with modified Sum-Product algorithm

    Publication Year: 2013, Page(s):57 - 61
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (565 KB)

    This paper describes an efficient implementation of the Sum-Product Algorithm (SPA) within a Low Density Parity Check (LDPC) code decoder, where a horizontal process correction term is used to improve the decoding performance of the Min-Sum algorithms. The correction term is implemented as a look-up table. The algorithm uses the correction term redundancy by means of a coordinate transformation to... View full abstract»

    Open Access
  • Sparse representation for face recognition based on constraint sampling and face alignment

    Publication Year: 2013, Page(s):62 - 67
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (447 KB)

    Sparse Representation based Classification (SRC) has emerged as a new paradigm for solving recognition problems. This paper presents a constraint sampling feature extraction method that improves the SRC recognition rate. The method combines texture and shape features to significantly improve the recognition rate. Tests show that the combined constraint sampling and facial alignment achieves very h... View full abstract»

    Open Access
  • Knowledge map mining of financial data

    Publication Year: 2013, Page(s):68 - 76
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1230 KB)

    The Knowledge Map (KM) concept, which was derived from the Fuzzy Cognitive Map (FCM), is used to describe and manage knowledge. KM provides insight into the interdependencies and uncertainties contained in the system. This paper uses a model-free method to mine KMs in historical data to analyze component stock corporations of the Shanghai Stock 50 index. The analyses use static and time-domain ana... View full abstract»

    Open Access
  • Ginix: Generalized inverted index for keyword search

    Publication Year: 2013, Page(s):77 - 87
    Cited by:  Papers (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (992 KB)

    Keyword search has become a ubiquitous method for users to access text data in the face of information explosion. Inverted lists are usually used to index underlying documents to retrieve documents according to a set of keywords efficiently. Since inverted lists are usually large, many compression techniques have been proposed to reduce the storage space and disk I/O time. However, these technique... View full abstract»

    Open Access
  • Differential coherent algorithm based on fast navigation-bit correction for airborne GNSS-R software receivers

    Publication Year: 2013, Page(s):88 - 99
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1490 KB)

    Signals from the Global Navigation Satellite System (GNSS) scatter over the sea surface resulting in relatively low Signal-to-Noise Ratios (SNR). A differential coherent algorithm is given here to improve the SNR and reduce the performance degradation due to the Squaring-Loss and the navigation-bit effect. The algorithm uses fast navigation-bit correction for Delay-Doppler Maps (DDM) in airborne G... View full abstract»

    Open Access
  • RISE: A RelIable and SEcure scheme for wireless Machine to Machine communications

    Publication Year: 2013, Page(s):100 - 117
    Cited by:  Papers (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (536 KB)

    Wireless Machine to Machine (M2M) communications enable ubiquitous sensing, controlling, and acting via sensors, actuators, and actors. Reliability and security are of foremost importance in wireless M2M systems. A simple, target distinguishing attack can result in M2M's failure. This paper presents a RelIable and SEcure scheme, RISE, which is a package of policies that guarantee the reliability o... View full abstract»

    Open Access
  • Call for papers

    Publication Year: 2013, Page(s): 108
    IEEE is not the copyright holder of this material | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2013, Page(s): 1
    IEEE is not the copyright holder of this material | PDF file iconPDF (35 KB)
    Freely Available from IEEE

Aims & Scope

Tsinghua Science and Technology (Tsinghua Sci Technol) aims to highlight scientific achievements in computer science, electronic engineering, and other IT fields. Contributions all over the world are welcome.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Professor Jiaguang Sun
School of Software
Tsinghua University
Beijing  100084 China
journal@tsinghua.edu.cn
Phone:86-10-62771385