CASIA OpenIR

浏览/检索结果: 共12条,第1-10条 帮助

限定条件        
已选(0)清除 条数/页:   排序方式:
Probabilistic hypergraph matching based on affinity tensor updating 期刊论文
NEUROCOMPUTING, 2017, 卷号: 269, 期号: 0, 页码: 142-147
作者:  Yang, Xu;  Liu, Zhi-Yong;  Qiao, Hong;  Su, Jian-Hua
浏览  |  Adobe PDF(2483Kb)  |  收藏  |  浏览/下载:571/159  |  提交时间:2017/03/09
Hypergraph Matching  Probabilistic Graph Matching  Tensor Decomposition  Structural Pattern Recognition  
Fingerprint enhancement using oriented diffusion filter 期刊论文
AUDIO-AND VIDEO-BASED BIOMETRIC PERSON AUTHENTICATION, PROCEEDINGS, 2003, 卷号: 2688, 期号: 2003, 页码: 164-171
作者:  Cheng, J;  Tian, J;  Chen, H;  Ren, Q;  Yang, X;  Kittler, J;  Nixon, MS;  Tian, Jie
浏览  |  Adobe PDF(295Kb)  |  收藏  |  浏览/下载:252/78  |  提交时间:2015/11/08
Diffusionfilter  
Fingerprint matching with registration pattern inspection 期刊论文
AUDIO-AND VIDEO-BASED BIOMETRIC PERSON AUTHENTICATION, PROCEEDINGS, 2003, 卷号: 2688, 期号: 2003, 页码: 327-334
作者:  Chen, H;  Tian, J;  Yang, X;  Kittler, J;  Nixon, MS;  Tian, Jie
浏览  |  Adobe PDF(660Kb)  |  收藏  |  浏览/下载:264/91  |  提交时间:2015/11/08
Fingerprint Matching  
A novel identity authentication technique without trustworthy third-party based on fingerprint verification 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 2006, 页码: 175-176
作者:  Li, Liang;  Tian, Jie;  Yang, Xin;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
浏览  |  Adobe PDF(109Kb)  |  收藏  |  浏览/下载:369/125  |  提交时间:2015/11/08
Novel Identity Authentication  
Analysis of infectious disease data based on evolutionary computation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 179-180
作者:  Zhao, DB;  Yi, JQ;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(118Kb)  |  收藏  |  浏览/下载:230/57  |  提交时间:2015/11/07
Design of an emergency prediction and prevention platform for societal security decision support using neural networks 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 173-174
作者:  Hou, ZG;  Tan, M;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
收藏  |  浏览/下载:218/0  |  提交时间:2015/11/07
Applications of homomorphic functions to software obfuscation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 152-153
作者:  Zhu, W;  Thomborson, C;  Wang, FY;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(124Kb)  |  收藏  |  浏览/下载:294/61  |  提交时间:2015/11/07
Hidden Markov model based intrusion detection 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 无, 页码: 169-170
作者:  Liu, ZY;  Qiao, H;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
收藏  |  浏览/下载:175/0  |  提交时间:2015/11/06
Homeland Security  Intelligence  Information  
One-class strategies for security information detection 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 171-172
作者:  Tao, Q;  Wu, GW;  Wang, J;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
收藏  |  浏览/下载:183/0  |  提交时间:2015/11/06
Cyberspace community analysis and simulation using complex dynamic social networks 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 177-178
作者:  Xiao, BH;  He, HG;  Li, YD;  Wang, CH;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
收藏  |  浏览/下载:280/0  |  提交时间:2015/11/06