CASIA OpenIR
(本次检索基于用户作品认领结果)

浏览/检索结果: 共5条,第1-5条 帮助

限定条件                            
已选(0)清除 条数/页:   排序方式:
A novel identity authentication technique without trustworthy third-party based on fingerprint verification 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 2006, 页码: 175-176
作者:  Li, Liang;  Tian, Jie;  Yang, Xin;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
浏览  |  Adobe PDF(109Kb)  |  收藏  |  浏览/下载:362/123  |  提交时间:2015/11/08
Novel Identity Authentication  
Axiomatic systems of generalized rough sets 期刊论文
ROUGH SETS AND KNOWLEDGE TECHNOLOGY, PROCEEDINGS, 2006, 卷号: 4062, 页码: 216-221
作者:  Zhu, William;  Wang, Feiyue;  Wang, G;  Peters, JF;  Skowron, YY;  Yao, YY
Adobe PDF(414Kb)  |  收藏  |  浏览/下载:303/92  |  提交时间:2015/11/07
Rough Set  Covering  Granular Computing  Data Mining  
Binary relation based rough sets 期刊论文
FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2006, 卷号: 4223, 页码: 276-285
作者:  Zhu, William;  Wang, Fei-Yue;  Wang, L;  Jiao, L;  Shi, G;  Li, X;  Liu, J
收藏  |  浏览/下载:203/0  |  提交时间:2015/11/07
Rough Set  Lower Approximation  Upper Approximation  Binary Relation  Fuzzy Set  Granular Computing  
CWME: A framework of group support system for emergency responses 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3975, 页码: 706-707
作者:  Li, Yaodong;  He, Huiguang;  Xiao, Baihua;  Wang, Chunheng;  Wang, Feiyue;  Mehrotra, S;  Zeng, DD;  Chen, H;  Thuraisingham, B;  Wang, FY
收藏  |  浏览/下载:311/0  |  提交时间:2015/11/06
Cyberspace community analysis and simulation using complex dynamic social networks 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 177-178
作者:  Xiao, BH;  He, HG;  Li, YD;  Wang, CH;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
收藏  |  浏览/下载:276/0  |  提交时间:2015/11/06