CASIA OpenIR

浏览/检索结果: 共12条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Networking, sensing, and control for networked control systems: Architectures, algorithms, and applications 期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2007, 卷号: 37, 期号: 2, 页码: 157-159
作者:  Wang, Fei-Yue;  Liu, Derong;  Yang, Simon X.;  Li, Li
Adobe PDF(89Kb)  |  收藏  |  浏览/下载:274/49  |  提交时间:2015/11/08
Driving into intelligent spaces with pervasive communications 期刊论文
IEEE INTELLIGENT SYSTEMS, 2007, 卷号: 22, 期号: 1, 页码: 12-15
作者:  Yang, Liuqing;  Wang, Fei-Yue
浏览  |  Adobe PDF(371Kb)  |  收藏  |  浏览/下载:238/81  |  提交时间:2015/11/08
Intelligent Spaces  Pervasive Communications  
Smart cars on smart roads: An IEEE Intelligent Transportation Systems Society update 期刊论文
IEEE PERVASIVE COMPUTING, 2006, 卷号: 5, 期号: 4, 页码: 68-69
作者:  Wang, Fei-Yue;  Zeng, Daniel;  Yang, Liuqing
浏览  |  Adobe PDF(602Kb)  |  收藏  |  浏览/下载:448/185  |  提交时间:2015/11/07
Smart Cars  
Analysis of infectious disease data based on evolutionary computation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 179-180
作者:  Zhao, DB;  Yi, JQ;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(118Kb)  |  收藏  |  浏览/下载:229/56  |  提交时间:2015/11/07
Cyberspace community analysis and simulation using complex dynamic social networks 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 177-178
作者:  Xiao, BH;  He, HG;  Li, YD;  Wang, CH;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
收藏  |  浏览/下载:272/0  |  提交时间:2015/11/06
Automated spectral classification of QSOs and galaxies by radial basis function network with dynamic decay adjustment 期刊论文
ADVANCES IN NEURAL NETWORKS - ISNN 2006, PT 2, PROCEEDINGS, 2006, 卷号: 3972, 页码: 361-368
作者:  Zhao, Mei-fang;  Yang, Jin-fu;  Wu, Yue;  Wu, Fu-chao;  Luo, Ali;  Wang, J;  Yi, Z;  Zurada, JM;  Lu, BL;  Yin, H
收藏  |  浏览/下载:211/0  |  提交时间:2015/11/08
One-class strategies for security information detection 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 171-172
作者:  Tao, Q;  Wu, GW;  Wang, J;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
收藏  |  浏览/下载:179/0  |  提交时间:2015/11/06
Applications of homomorphic functions to software obfuscation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 152-153
作者:  Zhu, W;  Thomborson, C;  Wang, FY;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(124Kb)  |  收藏  |  浏览/下载:281/57  |  提交时间:2015/11/07
Hidden Markov model based intrusion detection 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 无, 页码: 169-170
作者:  Liu, ZY;  Qiao, H;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
收藏  |  浏览/下载:172/0  |  提交时间:2015/11/06
Homeland Security  Intelligence  Information  
A novel identity authentication technique without trustworthy third-party based on fingerprint verification 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 2006, 页码: 175-176
作者:  Li, Liang;  Tian, Jie;  Yang, Xin;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
浏览  |  Adobe PDF(109Kb)  |  收藏  |  浏览/下载:358/123  |  提交时间:2015/11/08
Novel Identity Authentication