CASIA OpenIR

Browse/Search Results:  1-8 of 8 Help

Filters        
Selected(0)Clear Items/Page:    Sort:
Application of a decomposed support vector machine algorithm in pedestrian detection from a moving vehicle 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 期号: 无, 页码: 662-663
Authors:  Qiao, H;  Wang, FY;  Cao, XB;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC
Favorite  |  View/Download:61/0  |  Submit date:2015/11/06
  
A secured mobile phone based ton embedded fingerprint recognition systems 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 期号: 2005, 页码: 549-553
Authors:  Chen, XJ;  Tian, J;  Su, Q;  Yang, X;  Wang, FY;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC;  Tian, Jie
View  |  Adobe PDF(227Kb)  |  Favorite  |  View/Download:97/36  |  Submit date:2015/11/06
Embedded Fingerprint  
A framework for global monitoring and security assistance based on IPv6 and multimedia data mining techniques 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 页码: 658-659
Authors:  Gong, XY;  Gao, HJ;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC
Favorite  |  View/Download:58/0  |  Submit date:2015/11/06
An agent-based framework for a traffic security management system 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 期号: 1, 页码: 660-661
Authors:  Tang, SM;  Gao, HJ;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC;  Tang, Shuming
View  |  Adobe PDF(622Kb)  |  Favorite  |  View/Download:59/9  |  Submit date:2015/11/06
Automatic Incidentdetection  Forecast  Nonparametricregression Algorithms  State Vectors  Traffic Incidents  
Principal component analysis (PCA) for data fusion and navigation of mobile robots 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 页码: 610-611
Authors:  Hou, ZG;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC
Favorite  |  View/Download:43/0  |  Submit date:2015/11/06
Application of cooperative co-evolution in pedestrian detection systems 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 期号: 无, 页码: 664-665
Authors:  Cao, XB;  Qiao, H;  Wang, FY;  Zhang, XZ;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC
Favorite  |  View/Download:54/0  |  Submit date:2015/11/06
  
Some marginal learning algorithms for unsupervised problems 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 页码: 395-401
Authors:  Tao, Q;  Wu, GW;  Wang, FY;  Wang, J;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC
Favorite  |  View/Download:45/0  |  Submit date:2015/11/06
A survey of software watermarking 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 卷号: 3495, 页码: 454-458
Authors:  Zhu, W;  Thomborson, C;  Wang, FY;  Kantor, P;  Muresan, G;  Roberts, F;  Zeng, DD;  Wang, FY;  Chen, H;  Merkle, RC
Favorite  |  View/Download:51/0  |  Submit date:2015/11/06
Software Security  Software Watermarking