CASIA OpenIR
(本次检索基于用户作品认领结果)

浏览/检索结果: 共9条,第1-9条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
A novel identity authentication technique without trustworthy third-party based on fingerprint verification 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 2006, 页码: 175-176
作者:  Li, Liang;  Tian, Jie;  Yang, Xin;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
浏览  |  Adobe PDF(109Kb)  |  收藏  |  浏览/下载:408/136  |  提交时间:2015/11/08
Novel Identity Authentication  
Analysis of infectious disease data based on evolutionary computation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 179-180
作者:  Zhao, DB;  Yi, JQ;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(118Kb)  |  收藏  |  浏览/下载:248/65  |  提交时间:2015/11/07
Applications of homomorphic functions to software obfuscation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 152-153
作者:  Zhu, W;  Thomborson, C;  Wang, FY;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(124Kb)  |  收藏  |  浏览/下载:338/75  |  提交时间:2015/11/07
Axiomatic systems of generalized rough sets 期刊论文
ROUGH SETS AND KNOWLEDGE TECHNOLOGY, PROCEEDINGS, 2006, 卷号: 4062, 页码: 216-221
作者:  Zhu, William;  Wang, Feiyue;  Wang, G;  Peters, JF;  Skowron, YY;  Yao, YY
Adobe PDF(414Kb)  |  收藏  |  浏览/下载:358/108  |  提交时间:2015/11/07
Rough Set  Covering  Granular Computing  Data Mining  
A secured mobile phone based ton embedded fingerprint recognition systems 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 期号: 2005, 页码: 549-553
作者:  Chen, XJ;  Tian, J;  Su, Q;  Yang, X;  Wang, FY;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC;  Tian, Jie
浏览  |  Adobe PDF(227Kb)  |  收藏  |  浏览/下载:379/138  |  提交时间:2015/11/06
Embedded Fingerprint  
An agent-based framework for a traffic security management system 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 期号: 1, 页码: 660-661
作者:  Tang, SM;  Gao, HJ;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC;  Tang, Shuming
浏览  |  Adobe PDF(622Kb)  |  收藏  |  浏览/下载:303/88  |  提交时间:2015/11/06
Automatic Incidentdetection  Forecast  Nonparametricregression Algorithms  State Vectors  Traffic Incidents  
A framework for global monitoring and security assistance based on IPv6 and multimedia data mining techniques 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 页码: 658-659
作者:  Gong, XY;  Gao, HJ;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC
收藏  |  浏览/下载:205/0  |  提交时间:2015/11/06
Principal component analysis (PCA) for data fusion and navigation of mobile robots 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 页码: 610-611
作者:  Hou, ZG;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC
收藏  |  浏览/下载:166/0  |  提交时间:2015/11/06
"Rule plus exception" strategies for knowledge management and discovery 期刊论文
ROUGH SETS, FUZZY SETS, DATA MINING, AND GRANULAR COMPUTING, PT 2, PROCEEDINGS, 2005, 卷号: 3642, 页码: 69-78
作者:  Yao, YY;  Wang, FY;  Wang, J;  Slezak, D;  Yao, JT;  Peters, JF;  Ziarko, W;  Hu, X
收藏  |  浏览/下载:165/0  |  提交时间:2015/11/06