CASIA OpenIR

浏览/检索结果: 共13条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Analysis of infectious disease data based on evolutionary computation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 179-180
作者:  Zhao, DB;  Yi, JQ;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(118Kb)  |  收藏  |  浏览/下载:229/56  |  提交时间:2015/11/07
Robot planning with artificial potential field guided ant colony optimization algorithm 期刊论文
ADVANCES IN NATURAL COMPUTATION, PT 2, 2006, 卷号: 4222, 页码: 222-231
作者:  Zhao, Dongbin;  Yi, Jianqiang;  Jiao, L;  Wang, L;  Gao, X;  Liu, J;  Wu, F
Adobe PDF(296Kb)  |  收藏  |  浏览/下载:392/154  |  提交时间:2015/11/06
Applications of homomorphic functions to software obfuscation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 152-153
作者:  Zhu, W;  Thomborson, C;  Wang, FY;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(124Kb)  |  收藏  |  浏览/下载:277/56  |  提交时间:2015/11/07
A novel identity authentication technique without trustworthy third-party based on fingerprint verification 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 2006, 页码: 175-176
作者:  Li, Liang;  Tian, Jie;  Yang, Xin;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
浏览  |  Adobe PDF(109Kb)  |  收藏  |  浏览/下载:356/122  |  提交时间:2015/11/08
Novel Identity Authentication  
Affective computing: A review 期刊论文
AFFECTIVE COMPUTING AND INTELLIGENT INTERACTION, PROCEEDINGS, 2005, 卷号: 3784, 期号: 0, 页码: 981-995
作者:  Tao, JH;  Tan, TN;  Tao, J;  Picard, RW
浏览  |  Adobe PDF(214Kb)  |  收藏  |  浏览/下载:781/473  |  提交时间:2015/11/06
Acreview  
A framework for global monitoring and security assistance based on IPv6 and multimedia data mining techniques 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 页码: 658-659
作者:  Gong, XY;  Gao, HJ;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC
收藏  |  浏览/下载:166/0  |  提交时间:2015/11/06
An agent-based framework for a traffic security management system 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 期号: 1, 页码: 660-661
作者:  Tang, SM;  Gao, HJ;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC;  Tang, Shuming
浏览  |  Adobe PDF(622Kb)  |  收藏  |  浏览/下载:247/72  |  提交时间:2015/11/06
Automatic Incidentdetection  Forecast  Nonparametricregression Algorithms  State Vectors  Traffic Incidents  
A fingerprint authentication mobile phone based on sweep sensor 期刊论文
PATTERN RECOGNITION AND IMAGE ANALYSIS, PT 2, PROCEEDINGS, 2005, 卷号: 3687, 期号: 2005, 页码: 295-301
作者:  Su, Q;  Tian, J;  Chen, XJ;  Yang, X;  Singh, S;  Singh, M;  Apte, C;  Perner, P;  Tian, Jie
浏览  |  Adobe PDF(1186Kb)  |  收藏  |  浏览/下载:326/78  |  提交时间:2015/11/06
Authentication Mobile Phone  
A new learning algorithm based on lever principle 期刊论文
ADVANCES IN NATURAL COMPUTATION, PT 1, PROCEEDINGS, 2005, 卷号: 3610, 期号: 2005, 页码: 187-198
作者:  He, XG;  Tian, J;  Yang, X;  Wang, L;  Chen, K;  Ong, YS;  Tian, Jie
浏览  |  Adobe PDF(1186Kb)  |  收藏  |  浏览/下载:253/58  |  提交时间:2015/11/06
Lever Principle  
Principal component analysis (PCA) for data fusion and navigation of mobile robots 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 页码: 610-611
作者:  Hou, ZG;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC
收藏  |  浏览/下载:146/0  |  提交时间:2015/11/06