×
验证码:
换一张
Forgotten Password?
Stay signed in
China Science and Technology Network Pass Registration
×
China Science and Technology Network Pass Registration
Log In
Chinese
|
English
中国科学院自动化研究所机构知识库
Knowledge Commons of Institute of Automation,CAS
Log In
Register
ALL
ORCID
Title
Creator
Thesis Advisor
Subject Area
Keyword
Funding Project
Document Type
Source Publication
Conference Name
Indexed By
Publisher
Date Issued
Date Accessioned
MOST Discipline Catalogue
Study Hall
Image search
Paste the image URL
Home
Collections
Authors
DocType
Subjects
K-Map
News
Search in the results
Collection
09年以前成果 [7]
复杂系统管理与控制国... [3]
Authors
Zeng Dajun [7]
Fei-Yue Wa... [7]
Li En [3]
Yang Guodo... [3]
Liang Zize [3]
Qiao Hong [1]
More...
Document Type
Journal ar... [7]
Conference... [3]
Date Issued
2011 [2]
2009 [1]
2006 [7]
Language
英语 [7]
Source Publication
INTELLIGEN... [7]
INTERNATIO... [2]
INTELLIGEN... [1]
Funding Project
Indexed By
ISTP [10]
SCI [7]
Thesis Advisor
Funding Organization
×
Knowledge Map
CASIA OpenIR
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
QQ
Weibo
Feedback
Browse/Search Results:
1-10 of 10
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Journal Impact Factor Ascending
Journal Impact Factor Descending
Title Ascending
Title Descending
Submit date Ascending
Submit date Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Simulation for Decentralized Motion Control of Multi-agent Flocking and Collaboration
会议论文
INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE), 2011
Authors:
Fan, CC
;
Yang, GD
;
Li, E
;
Liang, ZZ
Favorite
  |  
View/Download:99/0
  |  
Submit date:2015/08/19
Image-Based Visual Servoing of an Inspection Robot for Power Transmission Lines
会议论文
INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE), 2011
Authors:
Yang, GD
;
Fan, CC
;
Zhao, DZ
;
Li, E
;
Liang, ZZ
Favorite
  |  
View/Download:97/0
  |  
Submit date:2015/08/19
An Embedded Vision System for a Power Transmission Line Inspection Robot
会议论文
INTELLIGENT ROBOTICS AND APPLICATIONS, PROCEEDINGS, 2009
Authors:
Lei, WY
;
Li, E
;
Yang, GD
;
Fan, CC
;
Jing, FS
;
Liang, ZZ
Favorite
  |  
View/Download:96/0
  |  
Submit date:2015/08/19
Cyberspace community analysis and simulation using complex dynamic social networks
期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 177-178
Authors:
Xiao, BH
;
He, HG
;
Li, YD
;
Wang, CH
;
Chen, H
;
Wang, FY
;
Yang, CC
;
Zeng, D
;
Chau, M
;
Chang, K
Favorite
  |  
View/Download:148/0
  |  
Submit date:2015/11/06
Applications of homomorphic functions to software obfuscation
期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 152-153
Authors:
Zhu, W
;
Thomborson, C
;
Wang, FY
;
Chen, H
;
Wang, FY
;
Yang, CC
;
Zeng, D
;
Chau, M
;
Chang, K
Adobe PDF(124Kb)
  |  
Favorite
  |  
View/Download:125/22
  |  
Submit date:2015/11/07
One-class strategies for security information detection
期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 171-172
Authors:
Tao, Q
;
Wu, GW
;
Wang, J
;
Chen, H
;
Wang, FY
;
Yang, CC
;
Zeng, D
;
Chau, M
;
Chang, K
Favorite
  |  
View/Download:81/0
  |  
Submit date:2015/11/06
Hidden Markov model based intrusion detection
期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 无, 页码: 169-170
Authors:
Liu, ZY
;
Qiao, H
;
Chen, H
;
Wang, FY
;
Yang, CC
;
Zeng, D
;
Chau, M
;
Chang, K
Favorite
  |  
View/Download:85/0
  |  
Submit date:2015/11/06
Homeland Security
Intelligence
Information
Design of an emergency prediction and prevention platform for societal security decision support using neural networks
期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 173-174
Authors:
Hou, ZG
;
Tan, M
;
Chen, H
;
Wang, FY
;
Yang, CC
;
Zeng, D
;
Chau, M
;
Chang, K
Favorite
  |  
View/Download:100/0
  |  
Submit date:2015/11/07
Analysis of infectious disease data based on evolutionary computation
期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 页码: 179-180
Authors:
Zhao, DB
;
Yi, JQ
;
Chen, H
;
Wang, FY
;
Yang, CC
;
Zeng, D
;
Chau, M
;
Chang, K
Adobe PDF(118Kb)
  |  
Favorite
  |  
View/Download:113/19
  |  
Submit date:2015/11/07
A novel identity authentication technique without trustworthy third-party based on fingerprint verification
期刊论文
INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 卷号: 3917, 期号: 2006, 页码: 175-176
Authors:
Li, Liang
;
Tian, Jie
;
Yang, Xin
;
Chen, H
;
Wang, FY
;
Yang, CC
;
Zeng, D
;
Chau, M
;
Chang, K
View
  |  
Adobe PDF(109Kb)
  |  
Favorite
  |  
View/Download:148/43
  |  
Submit date:2015/11/08
Novel Identity Authentication