2015 Ninth International Conference on Frontier of Computer Science and Technology

26-28 Aug. 2015

Filter Results

Displaying Results 1 - 25 of 88
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for reuse | PDF file iconPDF (1054 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for reuse | PDF file iconPDF (272 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - x
    Request permission for reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • Message from FCST 2015 General Chairs

    Publication Year: 2015, Page(s): xi
    Request permission for reuse | PDF file iconPDF (219 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from FCST 2015 Program Chairs

    Publication Year: 2015, Page(s): xii
    Request permission for reuse | PDF file iconPDF (221 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from 3C in ITS 2015 Workshop Chairs

    Publication Year: 2015, Page(s): xiii
    Request permission for reuse | PDF file iconPDF (221 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from LSNS 2015 Workshop Chairs

    Publication Year: 2015, Page(s): xiv
    Request permission for reuse | PDF file iconPDF (234 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from FFCN 2015 Workshop Chairs

    Publication Year: 2015, Page(s): xv
    Request permission for reuse | PDF file iconPDF (230 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from ASGSN 2015 Workshop Chairs

    Publication Year: 2015, Page(s): xvi
    Request permission for reuse | PDF file iconPDF (226 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from NCDM 2015 Workshop Chairs

    Publication Year: 2015, Page(s): xvii
    Request permission for reuse | PDF file iconPDF (121 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2015, Page(s): xviii
    Request permission for reuse | PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2015, Page(s):xix - xx
    Request permission for reuse | PDF file iconPDF (206 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2015, Page(s):xxi - xxii
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Variable-Weight and Multi-index Similarity Measure for Feature Fusion

    Publication Year: 2015, Page(s):1 - 7
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (901 KB) | HTML iconHTML

    The BoW model is a mainstream in image retrieval, and is employed in many state-of-the-art retrieval process. However, there are two main problems in this model: semantic gap caused by image quantification, and insufficient feature discriminative power. Aiming to handle the problems of semantic gap and feature fusion. This paper propose to choose multiple features to describe interest points and m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel Particle Swarm Optimization Algorithm Based on CUDA in the AWS Cloud

    Publication Year: 2015, Page(s):8 - 12
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    The algorithm of Particle Swarm Optimization (PSO) will be very time-consuming when deal with the large-scale problem. A parallel algorithm of PSO based on CUDA in the AWS Cloud is approached to speed up the process and improve the efficiency of the algorithm. The experimental results demonstrate up to 80 times speedup compared to run the PSO algorithm on local CPU. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting Best Answerers for New Questions: An Approach Leveraging Distributed Representations of Words in Community Question Answering

    Publication Year: 2015, Page(s):13 - 18
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (685 KB) | HTML iconHTML

    Community Question Answering (CQA) sites are becoming an increasingly important source of information where users can share knowledge on various topics. Although these sites provide opportunities for users to seek for help or provide answers, they also bring new challenges. One of the challenges is most new questions posted everyday cannot be routed to the appropriate users who can answer them in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cholesky Factorization on Heterogeneous CPU and GPU Systems

    Publication Year: 2015, Page(s):19 - 26
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1811 KB) | HTML iconHTML

    General-purpose graphics processing units (GPGPUs) could bring huge performance improvements in scientific and numerical fields. We presented two approaches utilizing hybrid CPU/GPU system in Cholesky factorization. First, we analyzed the implementation of Cholesky factorization in MAGMA and identified the bottleneck of the current implementation, which is the use of fixed block size without consi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-revision Reasoning without Redundancy in Predicate Logic

    Publication Year: 2015, Page(s):27 - 33
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (188 KB)

    Belief revision is a basic approach to deal with the contradiction in non-monotonic reasoning. It achieves the consistency of the belief base by removing members from it, which causes information loss unavoidably. Compared with belief revision, non-revision reasoning develops new reasoning methods to deal with the contradiction instead of modifying the initial base. This paper is an extending work... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy Consumption Analysis Method of CPS Software Based on Architecture Modeling

    Publication Year: 2015, Page(s):34 - 39
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (548 KB) | HTML iconHTML

    CPS is kinds of networked embedded systems that combine calculating system and physical environment. Because software is the main component of CPS, its energy consumption will directly affect the trustworthiness of CPS. Software architecture can provide design model and guidance for constructing software structure, behavior and key attributes in design phase. So modeling, analyzing and evaluating ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Frequency and Duty Cycle Control Method for Fast Pulse-Charging of Lithium Battery Based on Polarization Curve

    Publication Year: 2015, Page(s):40 - 45
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (461 KB) | HTML iconHTML

    Pulse-based charging method for battery cells has been recognized as a fast and efficient way to overcome the shortcoming of slow charging time in distributed battery cells. The pulse frequency for controlling the battery charge will change within a certain range. The optimal frequency is determined to achieve the minimized battery impedance. The adaptation of a duty cycle of the pulse by decreasi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SDN over IP: Enabling Internet to Provide Better QoS Guarantee

    Publication Year: 2015, Page(s):46 - 51
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (632 KB) | HTML iconHTML

    Many multimedia applications and online services have risen on the Internet, and they demand high quality of service for their real-time interaction. Although DiffServ has been employed in the network core, it neither provide end-to-end QoS guarantee, nor realize fine-grained flow control, which decrease the effect. To address these issues, we propose an incremental deployed approach, namely SoIP,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FC-WiFi: An OpenFlow Based WiFi Network with Free Configuration

    Publication Year: 2015, Page(s):52 - 58
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    Aiming at the urgent demands on constructing WiFi communication networks under emergency environments such as rescue and relief work, FC-WiFi, a WiFi network based on OpenFlow was proposed. FC-WiFi employs name-based routing algorithm, and has the characteristics as follows: (i) supporting free configuration access for mobile hosts, (ii) sharing information among mobile hosts and servers, (iii) ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Single Access Point Based Traffic Control System with Passive Measurement

    Publication Year: 2015, Page(s):59 - 64
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (839 KB) | HTML iconHTML

    The nature of wireless radio enables the unwanted anomaly users beyond the service area grabbing the bandwidth and lowering the throughput of the normal users in the service area. Conventional cryptographic solutions such as WPA and WPA2 have been cracked by many means. Existed non-cryptographic solutions require non-trivial costs such as multiple APs, special antenna, or fingerprint server. This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.