CASIA OpenIR

浏览/检索结果: 共4条,第1-4条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
大数据与社会计算 专著章节/文集论文
出自: 大数据时代的科研活动, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京, 北京:科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 科学出版社, 2014
作者:  王飞跃;  曾大军;  郑晓龙;  李林静
浏览  |  Adobe PDF(825Kb)  |  收藏  |  浏览/下载:461/139  |  提交时间:2018/03/09
Network-Based Analysis of Beijing SARS Data 专著章节/文集论文
出自: LNCS, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER, GER:Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, 2008
作者:  Xiaolong Zheng;  Daniel Zeng;  Aaron Sun;  Yuan Luo;  Quanyi Wang;  Feiyue Wang
浏览  |  Adobe PDF(358Kb)  |  收藏  |  浏览/下载:237/76  |  提交时间:2018/03/09
An ACP-Based Approach to Intelligence and Security Informatics 专著章节/文集论文
出自: Intelligent Methods for Cyber Warfare, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland:Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, 2015
作者:  Fei-Yue Wang;  Xiaochen Li;  Wenji Mao
Adobe PDF(379Kb)  |  收藏  |  浏览/下载:247/57  |  提交时间:2018/01/08
Countermeasures to face photo spoofing attacks by exploiting structure and texture information from rotated face sequences 专著章节/文集论文
出自: Mobile Biometrics, 英国, 英国, 英国, 英国, 英国, 英国, 英国, 英国, 英国, 英国, 英国, 英国, 英国, 英国, 英国, 英国:IET Digital Library, IET Digital Library, IET Digital Library, IET Digital Library, IET Digital Library, IET Digital Library, IET Digital Library, IET Digital Library, IET Digital Library, IET Digital Library, IET Digital Library, IET Digital Library, IET Digital Library, IET Digital Library, IET Digital Library, IET Digital Library, 2017
作者:  Lei Z(雷震);  Wang Tao;  Xiangyu Zhu;  Tianyu Fu;  Stan Z. Li
浏览  |  Adobe PDF(3713Kb)  |  收藏  |  浏览/下载:659/77  |  提交时间:2018/01/05