CASIA OpenIR

浏览/检索结果: 共7条,第1-7条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
大数据与社会计算 专著章节/文集论文
出自: 大数据时代的科研活动, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京:科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 2014
作者:  王飞跃;  曾大军;  郑晓龙;  李林静
浏览  |  Adobe PDF(825Kb)  |  收藏  |  浏览/下载:483/144  |  提交时间:2018/03/09
Network-Based Analysis of Beijing SARS Data 专著章节/文集论文
出自: LNCS, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER:Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, 2008
作者:  Xiaolong Zheng;  Daniel Zeng;  Aaron Sun;  Yuan Luo;  Quanyi Wang;  Feiyue Wang
浏览  |  Adobe PDF(358Kb)  |  收藏  |  浏览/下载:251/79  |  提交时间:2018/03/09
Intelligence and Security Informatics 专著章节/文集论文
出自: LNCS, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER:Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, 2011
作者:  Michael Chau;  Alan G. Wang;  Xiaolong Zheng;  Hsinchun Chen;  Daniel Zeng;  Wenji Mao
image/png(73Kb)  |  收藏  |  浏览/下载:201/49  |  提交时间:2018/03/09
Computer-Aided Prognosis: Accurate Prediction of Patients with Neurologic and Psychiatric Diseases via Multi-modal MRI Analysis 专著章节/文集论文
出自: Artificial Intelligence in Decision Support Systems for Diagnosis in Medical Imaging, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham, Cham:Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, 2018
作者:  Huiguang He;  Hongwei Wen;  Dai Dai;  Jieqiong Wang
收藏  |  浏览/下载:307/0  |  提交时间:2018/02/14
An ACP-Based Approach to Intelligence and Security Informatics 专著章节/文集论文
出自: Intelligent Methods for Cyber Warfare, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland:Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, 2015
作者:  Fei-Yue Wang;  Xiaochen Li;  Wenji Mao
浏览  |  Adobe PDF(379Kb)  |  收藏  |  浏览/下载:262/64  |  提交时间:2018/01/08
Vision-based vehicle queue length detection method and embedded platform 专著章节/文集论文
出自: Big Data and Smart Service Systems, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China, China:Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, Elsevier, 2016
作者:  Yanjie Yao;  Kunfeng Wang;  Gang XIONG
浏览  |  Adobe PDF(1232Kb)  |  收藏  |  浏览/下载:296/69  |  提交时间:2017/12/31
Intelligence and Security Informatics 专著章节/文集论文
出自: Lecture Notes in Computer Science, No. 5075, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER:Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, 2008
作者:  Yang, C.;  Chen, H.;  Chau, M.;  Chang, K.;  Lang, S.-D.;  Chen, P.;  Hsieh, R.;  Zeng, D.;  F. Y. Wang;  Carley, K.;  Mao, W.;  Zhan, J.
收藏  |  浏览/下载:220/0  |  提交时间:2017/07/16