CASIA OpenIR

浏览/检索结果: 共160条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Study on Comfort Environment Oriented Building Energy Consumption Intelligent Management System 会议论文
, Qingdao, China, May 23–25, 2015
作者:  Qiang Guan;  Yu Liu
收藏  |  浏览/下载:98/0  |  提交时间:2020/10/28
building energy consumption management  comfort environment  multi-sensor integration  complex event processing  
A Temporal-Topic Model for Friend Recommendations in Chinese Microblogging Systems 期刊论文
IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS, 2015, 卷号: 45, 期号: 9, 页码: 1245-1253
作者:  Nan Zheng;  Shuangyong Song;  Hongyun Bao
Adobe PDF(1072Kb)  |  收藏  |  浏览/下载:94/15  |  提交时间:2020/10/27
Recommendations  Interest Drifts  Microblogging  Sina Weibo  Topic Model.  
A Study of Chinese Character Culture Big Data Platform 会议论文
, Shanghai, China, 4-6 Nov. 2015
作者:  Guigang Zhang;  Jian Wang;  Weixing Huang;  Yi Yang;  Haixia Su;  Yue Ye;  Yichen Zhai;  Manxian Liu;  Lijuan Chen
浏览  |  Adobe PDF(1142Kb)  |  收藏  |  浏览/下载:240/82  |  提交时间:2019/06/12
A unsupervised person re-identification method using model based representation and ranking 会议论文
, 澳大利亚, 2015
作者:  Liang C.;  huang B.;  Hu R.;  zhang chunjie;  jing x.;  xiao j.
Adobe PDF(738Kb)  |  收藏  |  浏览/下载:287/103  |  提交时间:2018/02/02
Survey on Path Planning Algorithms in Robotic Fibre Placement 会议论文
, 青岛, 2015-5-23
作者:  Li, Lina;  Xu, De;  Wang, Xingang
浏览  |  Adobe PDF(2255Kb)  |  收藏  |  浏览/下载:312/116  |  提交时间:2018/01/16
Assessing dynamic brain graphs of time-varying connectivity in fMRI data: application to healthy controls and patients with schizophrenia 期刊论文
Neuroimage, 2015, 期号: 107, 页码: 345-55
作者:  Qingbao Yu;  Erik B. Erhardt;  Sui Jing(隋婧);  Yuhui Du;  Hao H;  Devon Hjelm;  Mustafa S. Cetina;  Srinivas Rachakonda;  Robyn L. Miller;  Godfrey Pearlson;  Vince D. Calhoun
浏览  |  Adobe PDF(2388Kb)  |  收藏  |  浏览/下载:267/65  |  提交时间:2018/01/08
Brain Graph  Dynamic  Ica  R-fmri  Schizophrenia  Time Varying  
An ACP-Based Approach to Intelligence and Security Informatics 专著章节/文集论文
出自: Intelligent Methods for Cyber Warfare, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland:Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, 2015
作者:  Fei-Yue Wang;  Xiaochen Li;  Wenji Mao
浏览  |  Adobe PDF(379Kb)  |  收藏  |  浏览/下载:294/75  |  提交时间:2018/01/08
Impact of Flavor on Electronic Cigarette Marketing in Social Media 会议论文
, USA, 11.17-11.18
作者:  Yunji Liang;  Xiaolong Zheng;  Daniel Zeng;  Xingshe Zhou
浏览  |  Adobe PDF(31064Kb)  |  收藏  |  浏览/下载:525/225  |  提交时间:2018/01/08
Spherical volume-preserving Demons registration 期刊论文
Computer-Aided Design, 2015, 期号: 2015, 页码: 99-104
作者:  Chen,Xuejiao;  Hu,Jiaxi;  He,Huiguang;  Hua,jing
浏览  |  Adobe PDF(793Kb)  |  收藏  |  浏览/下载:279/79  |  提交时间:2018/01/05
Registration  Brain Image  Tetrahedral Mesh  Volume-preserving Parameterization  
Shared Control for Teleoperation Enhanced by Autonomous Obstacle Avoidance of Robot Manipulator 会议论文
, Hamburg, GERMANY, SEP 28-OCT 02, 2015
作者:  Wang, Xinyu;  Yang, Chenguang;  Ma, Hongbin;  Cheng, Long
浏览  |  Adobe PDF(4773Kb)  |  收藏  |  浏览/下载:235/97  |  提交时间:2018/01/05