CASIA OpenIR
(Note: the search results are based on claimed items)

Browse/Search Results:  1-10 of 19 Help

Filters            
Selected(0)Clear Items/Page:    Sort:
Covering based granular computing for conflict analysis 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3975, 页码: 566-571
Authors:  Zhu, William;  Wang, Fei-Yue;  Mehrotra, S;  Zeng, DD;  Chen, H;  Thuraisingham, B;  Wang, FY
Favorite  |  View/Download:54/0  |  Submit date:2015/11/07
One-class strategies for security information detection 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 171-172
Authors:  Tao, Q;  Wu, GW;  Wang, J;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:48/0  |  Submit date:2015/11/06
CWME: A framework of group support system for emergency responses 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3975, 页码: 706-707
Authors:  Li, Yaodong;  He, Huiguang;  Xiao, Baihua;  Wang, Chunheng;  Wang, Feiyue;  Mehrotra, S;  Zeng, DD;  Chen, H;  Thuraisingham, B;  Wang, FY
Favorite  |  View/Download:70/0  |  Submit date:2015/11/06
Cyberspace community analysis and simulation using complex dynamic social networks 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 177-178
Authors:  Xiao, BH;  He, HG;  Li, YD;  Wang, CH;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:95/0  |  Submit date:2015/11/06
Hidden Markov model based intrusion detection 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 无, 页码: 169-170
Authors:  Liu, ZY;  Qiao, H;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:59/0  |  Submit date:2015/11/06
Homeland Security  Intelligence  Information  
Design of an emergency prediction and prevention platform for societal security decision support using neural networks 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 173-174
Authors:  Hou, ZG;  Tan, M;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:65/0  |  Submit date:2015/11/07
Analysis of infectious disease data based on evolutionary computation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 179-180
Authors:  Zhao, DB;  Yi, JQ;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(118Kb)  |  Favorite  |  View/Download:61/9  |  Submit date:2015/11/07
A novel identity authentication technique without trustworthy third-party based on fingerprint verification 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 2006, 页码: 175-176
Authors:  Li, Liang;  Tian, Jie;  Yang, Xin;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
View  |  Adobe PDF(109Kb)  |  Favorite  |  View/Download:90/25  |  Submit date:2015/11/08
Novel Identity Authentication  
Fast pedestrian detection using color information 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3975, 期号: 无, 页码: 627-632
Authors:  Xu, Y. W.;  Cao, X. B.;  Qiao, H.;  Wang, F. Y.;  Mehrotra, S;  Zeng, DD;  Chen, H;  Thuraisingham, B;  Wang, FY
Favorite  |  View/Download:56/0  |  Submit date:2015/11/07
  
A multiclass classifier to detect pedestrians and acquire their moving styles 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3975, 期号: 无, 页码: 758-759
Authors:  Chen, D.;  Cao, X. B.;  Qiao, H.;  Wang, F. Y.;  Mehrotra, S;  Zeng, DD;  Chen, H;  Thuraisingham, B;  Wang, FY;  Chen, D
Favorite  |  View/Download:55/0  |  Submit date:2015/11/07