CASIA OpenIR

Browse/Search Results:  1-10 of 24 Help

Filters    
Selected(0)Clear Items/Page:    Sort:
Finding Leaders from Opinion Networks 会议论文
IEEE International Conference on Intelligence and Security Informatics (ISI), 2009
Authors:  Zhou, HM;  Zeng, D;  Zhang, CL
Favorite  |  View/Download:61/0  |  Submit date:2015/08/19
Topic-based Web Page Recommendation Using Tags 会议论文
IEEE International Conference on Intelligence and Security Informatics (ISI), 2009
Authors:  Peng, J;  Zeng, D
Favorite  |  View/Download:69/0  |  Submit date:2015/08/19
Performance Evaluation of Classification Methods in Cultural Modeling 会议论文
IEEE International Conference on Intelligence and Security Informatics (ISI), 2009
Authors:  Li, XC;  Mao, WJ;  Zeng, D;  Su, P;  Wang, FY
Favorite  |  View/Download:112/0  |  Submit date:2015/08/19
Handling Class Imbalance Problem in Cultural Modeling 会议论文
IEEE International Conference on Intelligence and Security Informatics (ISI), 2009
Authors:  Su, P;  Mao, WJ;  Zeng, D;  Li, XC;  Wang, FY
Favorite  |  View/Download:124/0  |  Submit date:2015/08/19
Propagation of Online News: Dynamic Patterns 会议论文
IEEE International Conference on Intelligence and Security Informatics (ISI), 2009
Authors:  Wang, YZ;  Zeng, D;  Zheng, XL;  Wang, FY
Favorite  |  View/Download:78/0  |  Submit date:2015/08/19
Cyberspace community analysis and simulation using complex dynamic social networks 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 177-178
Authors:  Xiao, BH;  He, HG;  Li, YD;  Wang, CH;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:160/0  |  Submit date:2015/11/06
CWME: A framework of group support system for emergency responses 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3975, 页码: 706-707
Authors:  Li, Yaodong;  He, Huiguang;  Xiao, Baihua;  Wang, Chunheng;  Wang, Feiyue;  Mehrotra, S;  Zeng, DD;  Chen, H;  Thuraisingham, B;  Wang, FY
Favorite  |  View/Download:125/0  |  Submit date:2015/11/06
Applications of homomorphic functions to software obfuscation 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 152-153
Authors:  Zhu, W;  Thomborson, C;  Wang, FY;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Adobe PDF(124Kb)  |  Favorite  |  View/Download:134/22  |  Submit date:2015/11/07
A multiclass classifier to detect pedestrians and acquire their moving styles 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3975, 期号: 无, 页码: 758-759
Authors:  Chen, D.;  Cao, X. B.;  Qiao, H.;  Wang, F. Y.;  Mehrotra, S;  Zeng, DD;  Chen, H;  Thuraisingham, B;  Wang, FY;  Chen, D
Favorite  |  View/Download:100/0  |  Submit date:2015/11/07
  
One-class strategies for security information detection 期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 171-172
Authors:  Tao, Q;  Wu, GW;  Wang, J;  Chen, H;  Wang, FY;  Yang, CC;  Zeng, D;  Chau, M;  Chang, K
Favorite  |  View/Download:84/0  |  Submit date:2015/11/06