The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "IITSI"( http://dblp.L3S.de/Venues/IITSI )

URL (DBLP): http://dblp.uni-trier.de/db/conf/iitsi

Publication years (Num. hits)
2009 (49) 2010 (177)
Publication types (Num. hits)
inproceedings(224) proceedings(2)
Venues (Conferences, Journals, ...)
IITSI(226)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 493 occurrences of 396 keywords

Results
Found 226 publication records. Showing 226 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jianjun Huang 0002 A PSO Based Array Shape Calibration Utilizing Cyclostationarity. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Cyclic MUSIC, shape calibration, PSO, sensor array
1Weixing Zhu, Fangkui Zhong, Xiangping Li Automated Monitoring System of Pig Behavior Based on RFID and ARM-LINUX. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF pig, embedded system, machine vision, GPRS, behavior detection
1Jiayin Tian, Cheng Yang, Yichun Zhang, Jianbo Liu Distributed Key Management Scheme for Large Scale Pay-TV Application. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF key management scheme, rekey path method, key distribution, Pay-TV
1ShanGuo Lv, Hongli Chen Study on Incremental Data Mining Based on Rough Set Theory. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF rough set theory, decision rule, incremental mining
1Kun Wang, Jin-dong Wang, Liu-qing Shen, Zhen-hua Han An Intelligent Security Defensive Software Scheme and Realization. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security components, decision-making, reconstruction, sense
1Yanbin Liu, Ping Yuan A Study of User Downloading Behavior in Mobile Internet Using Clickstream Data. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF downloading behavior, visit frequency, Mobile Internet, clickstream data
1Xin Yu, Zhiguang Wei Research on Logistics System Architecture Based on SOA. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF modern logistics, security, SOA, E-commerce, informationization
1Mingyin Yao, Muhua Liu, Jinhui Zhao, Lin Huang Identification of Nutrition Elements in Orange Leaves by Laser Induced Breakdown Spectroscopy. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF LIBS, orange leaves, nutrition elements
1Youqin Chen, Zhide Chen, Li Xu 0002 RFID System Security Using Identity-Based Cryptography. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Secure Two-way Authentication Protocol, Learning Parity in the Presence of Noise, HB, HB+, HB++, RFID
1Xuyan Zhou, Bing Tan 0003, Bing Zhu 0002, Xuange Peng, Xuemou Liu On the Way to Design an Optical Camera Lens for River Sediment in Underwater Imaging. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF underwater optic imaging, underwater optical system design, focal length, Depth of Field, light source
1Hailin Liu A Mixture Conjugate Gradient Method for Unconstrained Optimization. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Wolve condition, sufficient descent, fixed point, conjugate gradient method, unconstrained optimization
1Jinbiao Wang, Shu Qin The Research on Two Important Counter-Examples of Four-Color Problem. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Tait conjecture, Kempe's chains, Heawood-counterexample, Tutte-counterexample, two-level Hamilton cycle
1Bing Zhang, Li Chen An Improved Key Management of ZigBee Protocol. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF ZigBee protocol, LEAP, Resistance to attacks, Key management
1Feng Wang 0039, Hui Deng, Wei Dai, Sheng Zheng, Bo Liang The Security Issues of Scientific-Workflow Technique in Network Grid Computing. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF scientific workflow technique, security, web service, grid computing, network, distributed data
1Chang-jin Jiang, Hong Peng, Qian-Li Ma, Jian-chao Chen Automatic Summarization for Chinese Text Based on Combined Words Recognition and Paragraph Clustering. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF paragraph clustering, Chinese combined word, weight computation, automatic summarization
1Wu Wang, Zheng-min Bai Performance Analysis of an Improved Single Neuron Adaptive PID Control. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF single neuron network, simulation, adaptive, BP neural networks, PID control
1Wen-Huan Chine, Hsiao-Ping Wei, Keh-Chia Yeh, Li Chen, Gin-Rong Liu, Chang-Hung Chiu Estimating Typhoon Rainfall over Sea from SSM/I Satellite Data Using a Back-Propagated Network. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF meteorological satellite, SSM/I, back-propagated
1Jianjun Huang 0002, Jiali Zhong, Pengfei Li A Cloud Model Inference System Based Alpha-Beta Filter for Tracking of Maneuvering Target. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF maneuvering target tracking, cloud mode inference, alpha-beta filter
1Bowei Yang, Guanghua Song, Yao Zheng The Analysis and Enhancement of Voting Behaviors in P2P Networks. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Voting Model, Incentive, P2P network, Information Asymmetry
1Yukang Tian, Huy Quan Vu A Multiple Population Genetic Algorithm and its Application in Fuzzy Controller. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF genetic algorithm, fuzzy control, inverted pendulum
1Yanyan Cao, Hengjun Yue, Jian Wu 0002, Jianming Chen, Zhiming Cui Vehicle Edge Detection Based on Multi-structure Mathematical Morphology. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF edge detectio, multi-structure, mathematical morphology, structure element
1Changyuan Gao, Shuchen Zhang, Xiaoxing Zhang The Modeling and Simulation of Negotiation Process for High-Tech Virtual Enterprise Based on UML and Petri Net. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF high tech virtual enterprise, ExSpect simulation, petri net, process modeling, uml
1Huifang Deng, Haiyan Kang Research on High Performance RFID Code Resolving Technology. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF ONS, EPC code resolution, high-performing resolution network service, RFID, distributed database
1Zhonghai Chen, Yong Sun, Guoli Yang, Tengfei Wu, Guizhu Li, Longbiao Xin Air Conditioning Load Prediction Based on DE-SVM Algorithm. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Air Conditioning load, DE-SVM, Prediction
1Qing Ye, Xiaoping Wu, Yongqing Liu, Gaofeng Huang A Hybrid Model of RST and DST with its Application in Intrusion Detection. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF intrusion detection, computer security, rough set theory, Dempster-Shafer theory of evidence
1Zenghui Liu, Liguo Guan Attack Simulation and Signature Extraction of Low-Rate DoS. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Denial of service, detection, threshold, retransmission timeout
1Chengrong Xie, Yuhua Xu 0002 Adaptive Hybrid Function Projective Synchronization for Two Different Chaotic System with Uncertain Parameters. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Function projective synchronization, Adaptive control, Lyapunov stability
1Lanying Li, Xin Wang A High Security Dynamic Secret Key Management Scheme for Wireless Sensor Networks. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF key management scheme, wireless sensor networks, energy consumption, key establishment
1Gu Min, Yang Feng An Improved Genetic Algorithm Based on Polygymy. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF polygymy, genetic algorithm, optimization, premature convergence
1Zhonghua Deng, Ying Wu Overcoming Disadvantages by Making Full Use of Extrinsic Objects: Advancing Information Resource Construction by ISA. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Information system audit, Management, Information resource
1Jianfang Sun Application of Data Mining for Decision Tree Model of Multi-variety Discrete Production and Manufacture. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF discrete production and manufacture, C4.5 algorithm, data mining, decision tree
1Hongfa Wang, Feng Yu, Chen Xing, Zhimin Zhou Genetic Algorithm-Based Evaluation Model of Teaching Quality. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF teaching quality, genetic algorithm, weight, evaluation model
1Haisheng Li Study of Privacy Preserving Data Mining. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Data Dining, Data Distortion, Privacy Preserving, Data Encryption, Data Reconstruction
1Wen-lang Luo, An-dong Xie, Wen Ruan The Construction and Test for a Small Beowulf Parallel Computing System. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Beowulf System, Test, Parallel Computing, Construction
1Shi Lan, Shao Xia, Zhao Ying Design and Implementation of ICAP-Client Based on Improved LRU Algorithm. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF ICAP Client, improved LRU, outer virus scanning, Network security, protocol analysis
1Fang Yang 0004, Xuedong Tian, Xin Zhang, Xin-Biao Jia An Improved Method for Similar Handwritten Chinese Character Recognition. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF similar character recognition, Four-corner code feature, hierarchy contour feature, SVM
1Ying Lin, Yan Zhang, Yang-jia Ou The Design and Implementation of Host-Based Intrusion Detection System. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF OSSEC, intrusion detection, intrusion detection system, BP neural network, Log analysis, HIDS
1Jintao Zeng, Jinzhong Li, Xiaohui Zeng, Wenlang Luo A Prototype System of Software Reliability Prediction and Estimation. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF software reliability tool, software reliability prediction, model selection, software reliability model
1Lei Huang, Yanxiang He, Furu Wei, Wenjie Li 0002 Modeling Document Summarization as Multi-objective Optimization. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF query-sensitive term weighting and clustering, multi-objective optimization, document summarization
1Shan Wang, Yang Jiang, Minghua Gao, Chuanyun Wang, Haiwen Liu Artificial Neural Network Method for the Analysis of 1-D Defected Ground Structure. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF defected ground structure (DGS), modeling, artificial neural network (ANN), radial basis function (RBF)
1Xiaoming Yao, Wencai Du, Mei Huang, Weihua Wu, Jundong Fu Pattern-Based Blind Spatial Image Watermarking. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF image pattern, spatial watermarking, robustness, blind detection
1Qiufen Yang, Weihua Gui 0001, Huosheng Hu A Novel Real-Time Face Tracking Algorithm for Detection of Driver Fatigue. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zhi-Hua Hu A Quay Crane Assignment Approach for Berth Allocation Problem in Container Terminal. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF quay crane assignment, quay crane allocation, berth allocation problem, integer linear programming
1Lin-an Wang, Qiang Li, Xiao-juan Liang Modeling and Dynamic Simulation of Electric Power Steering System of Automobile Using Bond Graph Technique. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF electric power steering system, simulation, modeling, bond graph
1Xiangqun Fu, Wansu Bao, Chun Zhou Design and Implementation of Quantum Factorization Algorithm. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF factorization, quantum algorithm, quantum circuit
1Zhi Tao, Xue-Dan Tan, Tao Han, Ji-Hua Gu, Yi-Shen Xu, He-Ming Zhao Reconstruction of Normal Speech from Whispered Speech Based on RBF Neural Network. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF whispered speech, radial basis function neural network, voice conversion
1Wang Gang, Yin Fengxia Study on Service Selections Based on Ontology and Qos. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Ontology, Agent, service, similarity, Qos
1Zhiyuan Yang, Qinming Tan The Application of Random Forest and Morphology Analysis to Fault Diagnosis on the Chain Box of Ships. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF chain box, fault diagnosis, Random Forest, Morphology Analysis
1Junyu Dong, Yuliang Wang, Yan Song, Guanglin Cheng Three-Dimensional Multiscale Texture Synthesis. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF spatial scale, lambert's model, multiscale, photometric stereo
1Shaobo Li 0001, Shulin Lv, Xiaohui Jia, Zhisheng Shao Application of Clipboard Monitoring Technology in Graphic and Document Information Security Protection System. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF clipboard monitoring, HOOK API, file system filter driver, graphic and document information security
1Zhipeng Xu, Qianting Zhou, Jun Wei Design of Temperature Control System for a Special Shortwave Infrared Spatial Remote Sensor Based on FPGA. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF shortwave infrared remote sensor, Incremental PID algorithm, FPGA
1Ruhan He, Weibin Xu, Ying Wang, Wei Zhan A Route-Nearest Neighbor Algorithm for Large-Scale Vehicle Routing Problem. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Route-Nearest Neighbor (RNN), Nearest Neighbor (NN), Vehicle Routing Problem (VRP)
1Zhixing Li Product Feature Extraction with a Combined Approach. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Textual Pattern, component, Text Mining, Bootstrapping, ID3
1Yang Li, Chong-chong Zhao Aesthetic Evolution of Staged L-systems for Tiling Pattern Design. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Evolutionary Algorithm, L-systems, fractal compression
1Wang Taihua, Guo Fan Associating IDS Alerts by an Improved Apriori Algorithm. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF data mining, association rules, Apriori algorithm, itemsets
1Minghui Li, Jingbo Xia, Yaoguo Wang Research on MAC Communication Mechanism of Air-to-Ground Data Link Based on 3G: The MSDU Frame Subsection and RTS/CTS Handshake Mechanism. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF MSDU, frames subsection mechanism, RTS/CTS, handshake mechanism, MAC, data link
1Changcheng Zhou, Jie Meng Modeling and Simulation of Double-tube Hydraulic Damper External Characteristic. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF double-tube hydraulic damper, characteristic model, characteristic simulation, vehicle
1Yin Pang, Kan Li 0001, Xin Sun 0004, Kaili Bu Dynamic Replica Selection Using Improved Kernel Density Estimation. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF improved KDE, geographic locality, temporal locality, replica selection
1Li-li Ju, Xiu-fang Wang, Sai Ma, Chun-ming Wei The Algorithm Study of Sensor Compensation in MWD Instrument Based on Genetic Elman Neural Network. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF MWD Instrument, compensation, Adaptive genetic algorithm, Elman network
1Zhao Qiu, Mingrui Chen, Jun Huang A Study on CRL Issue by P2P Network. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF P2P, PKI, CRL
1Hongjie Sun An Integrated Network Performance Monitor System. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF network performance monitor, network tomography, active probing, passive monitoring
1Weichun Huang, Min Chen, Jian Liu A Small World Network Based Grid Resource Discovery Mechanism. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Cluster, Grid, Resource Discovery, Small World Network
1Yu Liu, Junchan Du, Feng Ji Design of Panoramic Mosaic Surveillance Platform in Severe Circumstance. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF panoramic mosaic, surveillance platform, FPGA
1Wenjun Zhang 0001 Integrated Security Framework for Secure Web Services. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, web services, authentication, authorization, confidentiality
1Guorui Li, Ying Wang 0033, Jingsha He Efficient Group Key Management Scheme in Wireless Sensor Networks. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Refined key link tree, Security, Wireless sensor networks, Key management, Group key
1Shaohua Jin, Chongguang Ding, Yongxue Wang, Yanmin Zhang, Jie Lv A Strong Deviation Theorem Based on Laplace Transform on a Non-homogeneous Tree. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF non-homogeneous tree, strong deviation theorem, Laplace transform, martingale
1Rong Zhou, Chunyue Zhao, Lili Fu, Ao Chen, Meiqian Ye ZigBee-based Vehicle Access Control System. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF WSN (Wireless Sensor Networks), CC2430, Vehicle Management, ZigBee
1Chunliang Jiang, Hanhong Jiang, Chaoliang Zhang, Jie Wang A New Method of Sea-Sky-Line Detection. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Sea-sky-line, linear fitting, Sea-sky background, histogram
1Wan Zhou, Zhang Xuehua, Xiong Xin, Jiande Wu The Application Research of Wireless Sensor Network in the Prison Monitoring System. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Prison Monitoring, Wireless Sensor Networks, Location, Sensor Node
1Haokui Tang, Zhiquan Feng Skin Segmentation Based on Double-Models. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Double-models, Dynamic parameter, Ellipse clusterring model, SGM, Fisher threshold rules
1Wenxian Wang, Xingshu Chen, Yongbin Zou, Haizhou Wang, Zongkun Dai A Focused Crawler Based on Naive Bayes Classifier. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Classifier, Naive Bayes, TF-IDF, Focused Crawler
1Ping Zhang, Yan Zhang, Zhengjiang Wu, Weifeng Du IIS Security Mechanisms. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Information server, security, operating system, security mechanism
1Ding Pan DW 2.0-Oriented Metadata Evolution Management. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF DW 2.0, structural consistency, metadata
1Xue-Dan Tan, He-Ming Zhao, Ji-Hua Gu, Zhi Tao A Noise Robust Endpoint Detection Algorithm for Whispered Speech Based on Empirical Mode Decomposition and Entropy. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF endpoint detection, whispered speech, entropy, Empirical Mode Decomposition
1Zhihua Liu, Hui Sun, Haizhi Hu Two Sub-swarms Quantum-Behaved Particle Swarm Optimization Algorithm Based on Exchange Strategy. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Quantum-behaved Particle Swarm Optimization Algorithm, exchange strategy, Particle Swarm Optimization Algorithm, local optima
1Dengfeng Zhou, Shuisheng Ye, Shaohua Hu Research on Application of Region-of-Interest in Face Detection. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Maxshift, AdaBoost, region of interest, JPEG2000, skin color
1Jian Li, Wengeng Shi Model of CSR in Chinese Medicine E-commerce Firm: Strategic Management Perspective. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF medicinet, model, E-commerce, CSR
1Weixing Zhu, Yong Ma, Rixia Wang An Adaptive Fast Algorithm for Coding Block Mode Selection. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF macro block mode, fast mode selection, coded block, RD cost, H.264/AVC
1Sibin Ying, Jianliang Ai Detection of Aircraft In-flight Icing in Non-steady Atmosphere Using Artificial Neural Network. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF aircraft icing, icing detection, icing parameter, neural network, self-organizing maps
1Miao Ma, Jian-hui Liang, Li Sun, Min Wang SAR Image Segmentation Based on SWT and Improved AFSA. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF SWT, AFSA, image segmentation, SAR image
1Li Tian, Wansu Bao A Medium Field Multivariate Public Key Signature Scheme with External Perturbation. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF multivariate public key cryptography, Medium Field Equation (MFE), high order linearization equation (HOLE), rank attack, quantum computation
1Jingbo Yuan, Haixiao Li, Shunli Ding, Limin Cao Intrusion Detection Model Based on Improved Support Vector Machine. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF hypothesis test theory, support vector machine, intrusion detection
1Da-guo Jiang, Zhao-hui Liu Preparation and Piezomagnetic Effect of FeSiB Amorphous Powders /IIR Composite Film. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Fe78Si9B13 amorphous powders, butyl rubber, composite film, piezomagnetic effect
1Ding Hong, Zhao Yizhu A Historical Role-Based Fast Negotiation Model in Open Network. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF HRFN, history role, historical information record, credential disclosure sequence
1Xiao-hui Zeng, Wen-lang Luo, Jin-tao Zeng, Yan-ping Chen, Shi-yao Jin Research on a High Efficient Intrusion Prevention Model. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF network security, distributed scheduling, intrusion prevention, network attack, network intrusion
1Meiyu Zhang, Jinghua Mei The Design and Implementation of Electronic Farm System Based on Google Maps. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF windows live, shortest path, Ajax, google maps
1Mahboobeh Houshmand, Elaheh Soleymanpour, Hossein Salami, Mahya Amerian, Hossein Deldari Efficient Scheduling of Task Graphs to Multiprocessors Using a Combination of Modified Simulated Annealing and List Based Scheduling. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF List based scheduling algorithms, modified simulated annealing, task scheduling problem, NP hard problems
1Shaobo Li 0001, Xiaohui Jia, Shulin Lv, Zhisheng Shao Research and Application of USB Filter Driver Based on Windows Kernel. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF USB filter driver, USB bus, Windows kernel, Irp, driver model
1Xiangang Jiang, Dean Ma, Longfeng Tao The Research of High Noise Image's Restoration and Recognition of Train's Plates. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF image of train license plate, license recognition, image restoration, Wiener filter, Contourlet transform
1Feng Gao, Jingsha He, Shufen Peng, Xu Wu A Quantifying Metric for Privacy Protection Based on Information Theory. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF trust, information theory, privacy protection, quantifying
1Bin Tan, Xuyan Zhou Automatic Construction of Web-Based English/Chinese Parallel Corpora. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Jacobi correlation coefficient, vector space, Parallel corpora
1Suying Yang, Meng Wang, Jianying Lin, Kuijun Meng Optimization Design of Supervising and Controlling on the SOFC Integration System. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF SOFC, integrated control, data schedule, optimum design
1Bin Zhang Research on the Directional Interferences Canceling. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF directional interference, inverse beamforming, iterative inverse beamforming, tow ship noise, towed sonar
1Yan Zhang, Ying Lin Research on the Key Technology of Secure Computer Forensics. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF integerity, secure evidence, computer forensics, digital evidence
1Yuchuan Zhang, Yuzhao Liu A Collaborative Filtering Algorithm Based on Time Period Partition. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF time factor, item-based, time period partition, TPPCF, phase
1Mahboobeh Houshmand, Monireh Houshmand, Habib Rajabi Mashhadi Game Theory Based View to the Quantum Key Distribution BB84 Protocol. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF BB84 protocol, static game theory, mixed strategy Nash equilibrium
1Dong Li, Chunhui Yang A Trust Evaluation Model for Web Service Selection. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF service selection, trust model, Qos
1Ratsameetip Wita, Nattanatch Jiamnapanon, Yunyong Teng-Amnuay An Ontology for Vulnerability Lifecycle. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Vulnerability lifecycle, Security related ontology, Risk prioritization, CVE, Security management
1Jie Xia, Jian Wu 0002, Yanyan Cao, Zhiming Cui SOM-Based Classification Method for Moving Object in Traffic Video. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF SOM, K-Means, object tracking, motion detection, object classification
1Kaiqiang Guo, Jiewu Xia An Improved Algorithm of Collision Detection in 2D Grapple Games. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF rectangular areas, algorithm, coordinate, collision detection
Displaying result #1 - #100 of 226 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license