CASIA OpenIR

浏览/检索结果: 共25条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Synthesizing cloth wrinkles by CNN-based geometry image superresolution 期刊论文
COMPUTER ANIMATION AND VIRTUAL WORLDS, 2018, 卷号: 29, 期号: 3-4
作者:  Chen, Lan;  Ye, Juntao;  Jiang, Liguo;  Ma, Chengcheng;  Cheng, Zhanglin;  Zhang, Xiaopeng
Adobe PDF(850Kb)  |  收藏  |  浏览/下载:489/124  |  提交时间:2018/10/10
Cloth Animation  Data-driven  Deep Learning  Geometry Image  Wrinkle Synthesis  
A Unified Cloth Untangling Framework Through Discrete Collision Detection 期刊论文
COMPUTER GRAPHICS FORUM, 2017, 卷号: 36, 期号: 7, 页码: 217-228
作者:  Ye, Juntao;  Ma, Guanghui;  Jiang, Liguo;  Chen, Lan;  Li, Jituo;  Xiong, Gang;  Zhang, Xiaopeng;  Tang, Min
浏览  |  Adobe PDF(17210Kb)  |  收藏  |  浏览/下载:598/182  |  提交时间:2017/09/16
Collision Detection  Cloth Simulation  
Tracking control of a mobile robot with kinematic uncertainty using neural networks 期刊论文
NEURAL INFORMATION PROCESSING, PT 3, PROCEEDINGS, 2006, 卷号: 4234, 页码: 721-730
作者:  Zou, An-Min;  Hou, Zeng-Guang;  Tan, Min;  Chen, Xi-Jun;  Zhang, Yun-Chu;  King, I;  Wang, J;  Chan, L;  Wang, DL
收藏  |  浏览/下载:181/0  |  提交时间:2015/11/08
A novel identity authentication technique without trustworthy third-party based on fingerprint verification 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 2006, 页码: 175-176
作者:  Li, Liang;  Tian, Jie;  Yang, Xin;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(109Kb)  |  收藏  |  浏览/下载:357/122  |  提交时间:2015/11/08
Novel Identity Authentication  
Analysis of infectious disease data based on evolutionary computation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 179-180
作者:  Zhao, DB;  Yi, JQ;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(118Kb)  |  收藏  |  浏览/下载:229/56  |  提交时间:2015/11/07
Design of an emergency prediction and prevention platform for societal security decision support using neural networks 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 173-174
作者:  Hou, ZG;  Tan, M;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
收藏  |  浏览/下载:214/0  |  提交时间:2015/11/07
A multiclass classifier to detect pedestrians and acquire their moving styles 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3975, 期号: 无, 页码: 758-759
作者:  Chen, D.;  Cao, X. B.;  Qiao, H.;  Wang, F. Y.;  Mehrotra, S;  Zeng, DD;  Chen, H;  Thuraisingham, B;  Wang, FY;  Chen, D
收藏  |  浏览/下载:197/0  |  提交时间:2015/11/07
  
Applications of homomorphic functions to software obfuscation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 152-153
作者:  Zhu, W;  Thomborson, C;  Wang, FY;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(124Kb)  |  收藏  |  浏览/下载:279/56  |  提交时间:2015/11/07
Fast pedestrian detection using color information 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3975, 期号: 无, 页码: 627-632
作者:  Xu, Y. W.;  Cao, X. B.;  Qiao, H.;  Wang, F. Y.;  Mehrotra, S;  Zeng, DD;  Chen, H;  Thuraisingham, B;  Wang, FY
收藏  |  浏览/下载:205/0  |  提交时间:2015/11/07
  
Covering based granular computing for conflict analysis 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3975, 页码: 566-571
作者:  Zhu, William;  Wang, Fei-Yue;  Mehrotra, S;  Zeng, DD;  Chen, H;  Thuraisingham, B;  Wang, FY
收藏  |  浏览/下载:202/0  |  提交时间:2015/11/07