×
验证码:
换一张
Forgotten Password?
Stay signed in
China Science and Technology Network Pass Registration
×
China Science and Technology Network Pass Registration
Log In
Chinese
|
English
中国科学院自动化研究所机构知识库
Knowledge Commons of Institute of Automation,CAS
Log In
Register
ALL
ORCID
Title
Creator
Thesis Advisor
Subject Area
Keyword
Funding Project
Document Type
Source Publication
Conference Name
Indexed By
Publisher
Date Issued
Date Accessioned
MOST Discipline Catalogue
Study Hall
Image search
Paste the image URL
Home
Collections
Authors
DocType
Subjects
K-Map
News
Search in the results
Collection
09年以前成果 [19]
Authors
Zeng Daju... [19]
Fei-Yue W... [19]
Qiao Hong [5]
Yang Xin [2]
Tian Jie [2]
Wu Gaowei [2]
More...
Document Type
Journal a... [19]
Date Issued
2006 [11]
2005 [8]
Language
英语 [19]
Source Publication
INTELLIGE... [19]
Funding Project
Indexed By
ISTP [19]
SCI [19]
Thesis Advisor
Funding Organization
×
Knowledge Map
CASIA OpenIR
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
QQ
Weibo
Feedback
Browse/Search Results:
1-10 of 19
Help
Filters
Source Publication:INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Title Ascending
Title Descending
Author Ascending
Author Descending
Submit date Ascending
Submit date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Issue Date Ascending
Issue Date Descending
Cyberspace community analysis and simulation using complex dynamic social networks
期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 177-178
Authors:
Xiao, BH
;
He, HG
;
Li, YD
;
Wang, CH
;
Chen, H
;
Wang, FY
;
Yang, CC
;
Zeng, D
;
Chau, M
;
Chang, K
Favorite
  |  
View/Download:160/0
  |  
Submit date:2015/11/06
CWME: A framework of group support system for emergency responses
期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3975, 页码: 706-707
Authors:
Li, Yaodong
;
He, Huiguang
;
Xiao, Baihua
;
Wang, Chunheng
;
Wang, Feiyue
;
Mehrotra, S
;
Zeng, DD
;
Chen, H
;
Thuraisingham, B
;
Wang, FY
Favorite
  |  
View/Download:125/0
  |  
Submit date:2015/11/06
Applications of homomorphic functions to software obfuscation
期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 152-153
Authors:
Zhu, W
;
Thomborson, C
;
Wang, FY
;
Chen, H
;
Wang, FY
;
Yang, CC
;
Zeng, D
;
Chau, M
;
Chang, K
Adobe PDF(124Kb)
  |  
Favorite
  |  
View/Download:134/22
  |  
Submit date:2015/11/07
A multiclass classifier to detect pedestrians and acquire their moving styles
期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3975, 期号: 无, 页码: 758-759
Authors:
Chen, D.
;
Cao, X. B.
;
Qiao, H.
;
Wang, F. Y.
;
Mehrotra, S
;
Zeng, DD
;
Chen, H
;
Thuraisingham, B
;
Wang, FY
;
Chen, D
Favorite
  |  
View/Download:100/0
  |  
Submit date:2015/11/07
无
One-class strategies for security information detection
期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 171-172
Authors:
Tao, Q
;
Wu, GW
;
Wang, J
;
Chen, H
;
Wang, FY
;
Yang, CC
;
Zeng, D
;
Chau, M
;
Chang, K
Favorite
  |  
View/Download:84/0
  |  
Submit date:2015/11/06
Hidden Markov model based intrusion detection
期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 无, 页码: 169-170
Authors:
Liu, ZY
;
Qiao, H
;
Chen, H
;
Wang, FY
;
Yang, CC
;
Zeng, D
;
Chau, M
;
Chang, K
Favorite
  |  
View/Download:88/0
  |  
Submit date:2015/11/06
Homeland Security
Intelligence
Information
Design of an emergency prediction and prevention platform for societal security decision support using neural networks
期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 173-174
Authors:
Hou, ZG
;
Tan, M
;
Chen, H
;
Wang, FY
;
Yang, CC
;
Zeng, D
;
Chau, M
;
Chang, K
Favorite
  |  
View/Download:114/0
  |  
Submit date:2015/11/07
Fast pedestrian detection using color information
期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3975, 期号: 无, 页码: 627-632
Authors:
Xu, Y. W.
;
Cao, X. B.
;
Qiao, H.
;
Wang, F. Y.
;
Mehrotra, S
;
Zeng, DD
;
Chen, H
;
Thuraisingham, B
;
Wang, FY
Favorite
  |  
View/Download:104/0
  |  
Submit date:2015/11/07
无
Covering based granular computing for conflict analysis
期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3975, 页码: 566-571
Authors:
Zhu, William
;
Wang, Fei-Yue
;
Mehrotra, S
;
Zeng, DD
;
Chen, H
;
Thuraisingham, B
;
Wang, FY
Favorite
  |  
View/Download:105/0
  |  
Submit date:2015/11/07
Analysis of infectious disease data based on evolutionary computation
期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 179-180
Authors:
Zhao, DB
;
Yi, JQ
;
Chen, H
;
Wang, FY
;
Yang, CC
;
Zeng, D
;
Chau, M
;
Chang, K
Adobe PDF(118Kb)
  |  
Favorite
  |  
View/Download:119/19
  |  
Submit date:2015/11/07