|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 493 occurrences of 396 keywords
|
|
|
Results
Found 226 publication records. Showing 226 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Jianjun Huang 0002 |
A PSO Based Array Shape Calibration Utilizing Cyclostationarity. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Cyclic MUSIC, shape calibration, PSO, sensor array |
1 | Weixing Zhu, Fangkui Zhong, Xiangping Li |
Automated Monitoring System of Pig Behavior Based on RFID and ARM-LINUX. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
pig, embedded system, machine vision, GPRS, behavior detection |
1 | Jiayin Tian, Cheng Yang, Yichun Zhang, Jianbo Liu |
Distributed Key Management Scheme for Large Scale Pay-TV Application. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
key management scheme, rekey path method, key distribution, Pay-TV |
1 | ShanGuo Lv, Hongli Chen |
Study on Incremental Data Mining Based on Rough Set Theory. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
rough set theory, decision rule, incremental mining |
1 | Kun Wang, Jin-dong Wang, Liu-qing Shen, Zhen-hua Han |
An Intelligent Security Defensive Software Scheme and Realization. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
security components, decision-making, reconstruction, sense |
1 | Yanbin Liu, Ping Yuan |
A Study of User Downloading Behavior in Mobile Internet Using Clickstream Data. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
downloading behavior, visit frequency, Mobile Internet, clickstream data |
1 | Xin Yu, Zhiguang Wei |
Research on Logistics System Architecture Based on SOA. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
modern logistics, security, SOA, E-commerce, informationization |
1 | Mingyin Yao, Muhua Liu, Jinhui Zhao, Lin Huang |
Identification of Nutrition Elements in Orange Leaves by Laser Induced Breakdown Spectroscopy. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
LIBS, orange leaves, nutrition elements |
1 | Youqin Chen, Zhide Chen, Li Xu 0002 |
RFID System Security Using Identity-Based Cryptography. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Secure Two-way Authentication Protocol, Learning Parity in the Presence of Noise, HB, HB+, HB++, RFID |
1 | Xuyan Zhou, Bing Tan 0003, Bing Zhu 0002, Xuange Peng, Xuemou Liu |
On the Way to Design an Optical Camera Lens for River Sediment in Underwater Imaging. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
underwater optic imaging, underwater optical system design, focal length, Depth of Field, light source |
1 | Hailin Liu |
A Mixture Conjugate Gradient Method for Unconstrained Optimization. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Wolve condition, sufficient descent, fixed point, conjugate gradient method, unconstrained optimization |
1 | Jinbiao Wang, Shu Qin |
The Research on Two Important Counter-Examples of Four-Color Problem. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Tait conjecture, Kempe's chains, Heawood-counterexample, Tutte-counterexample, two-level Hamilton cycle |
1 | Bing Zhang, Li Chen |
An Improved Key Management of ZigBee Protocol. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
ZigBee protocol, LEAP, Resistance to attacks, Key management |
1 | Feng Wang 0039, Hui Deng, Wei Dai, Sheng Zheng, Bo Liang |
The Security Issues of Scientific-Workflow Technique in Network Grid Computing. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
scientific workflow technique, security, web service, grid computing, network, distributed data |
1 | Chang-jin Jiang, Hong Peng, Qian-Li Ma, Jian-chao Chen |
Automatic Summarization for Chinese Text Based on Combined Words Recognition and Paragraph Clustering. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
paragraph clustering, Chinese combined word, weight computation, automatic summarization |
1 | Wu Wang, Zheng-min Bai |
Performance Analysis of an Improved Single Neuron Adaptive PID Control. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
single neuron network, simulation, adaptive, BP neural networks, PID control |
1 | Wen-Huan Chine, Hsiao-Ping Wei, Keh-Chia Yeh, Li Chen, Gin-Rong Liu, Chang-Hung Chiu |
Estimating Typhoon Rainfall over Sea from SSM/I Satellite Data Using a Back-Propagated Network. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
meteorological satellite, SSM/I, back-propagated |
1 | Jianjun Huang 0002, Jiali Zhong, Pengfei Li |
A Cloud Model Inference System Based Alpha-Beta Filter for Tracking of Maneuvering Target. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
maneuvering target tracking, cloud mode inference, alpha-beta filter |
1 | Bowei Yang, Guanghua Song, Yao Zheng |
The Analysis and Enhancement of Voting Behaviors in P2P Networks. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Voting Model, Incentive, P2P network, Information Asymmetry |
1 | Yukang Tian, Huy Quan Vu |
A Multiple Population Genetic Algorithm and its Application in Fuzzy Controller. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
genetic algorithm, fuzzy control, inverted pendulum |
1 | Yanyan Cao, Hengjun Yue, Jian Wu 0002, Jianming Chen, Zhiming Cui |
Vehicle Edge Detection Based on Multi-structure Mathematical Morphology. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
edge detectio, multi-structure, mathematical morphology, structure element |
1 | Changyuan Gao, Shuchen Zhang, Xiaoxing Zhang |
The Modeling and Simulation of Negotiation Process for High-Tech Virtual Enterprise Based on UML and Petri Net. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
high tech virtual enterprise, ExSpect simulation, petri net, process modeling, uml |
1 | Huifang Deng, Haiyan Kang |
Research on High Performance RFID Code Resolving Technology. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
ONS, EPC code resolution, high-performing resolution network service, RFID, distributed database |
1 | Zhonghai Chen, Yong Sun, Guoli Yang, Tengfei Wu, Guizhu Li, Longbiao Xin |
Air Conditioning Load Prediction Based on DE-SVM Algorithm. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Air Conditioning load, DE-SVM, Prediction |
1 | Qing Ye, Xiaoping Wu, Yongqing Liu, Gaofeng Huang |
A Hybrid Model of RST and DST with its Application in Intrusion Detection. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
intrusion detection, computer security, rough set theory, Dempster-Shafer theory of evidence |
1 | Zenghui Liu, Liguo Guan |
Attack Simulation and Signature Extraction of Low-Rate DoS. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Denial of service, detection, threshold, retransmission timeout |
1 | Chengrong Xie, Yuhua Xu 0002 |
Adaptive Hybrid Function Projective Synchronization for Two Different Chaotic System with Uncertain Parameters. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Function projective synchronization, Adaptive control, Lyapunov stability |
1 | Lanying Li, Xin Wang |
A High Security Dynamic Secret Key Management Scheme for Wireless Sensor Networks. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
key management scheme, wireless sensor networks, energy consumption, key establishment |
1 | Gu Min, Yang Feng |
An Improved Genetic Algorithm Based on Polygymy. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
polygymy, genetic algorithm, optimization, premature convergence |
1 | Zhonghua Deng, Ying Wu |
Overcoming Disadvantages by Making Full Use of Extrinsic Objects: Advancing Information Resource Construction by ISA. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Information system audit, Management, Information resource |
1 | Jianfang Sun |
Application of Data Mining for Decision Tree Model of Multi-variety Discrete Production and Manufacture. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
discrete production and manufacture, C4.5 algorithm, data mining, decision tree |
1 | Hongfa Wang, Feng Yu, Chen Xing, Zhimin Zhou |
Genetic Algorithm-Based Evaluation Model of Teaching Quality. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
teaching quality, genetic algorithm, weight, evaluation model |
1 | Haisheng Li |
Study of Privacy Preserving Data Mining. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Data Dining, Data Distortion, Privacy Preserving, Data Encryption, Data Reconstruction |
1 | Wen-lang Luo, An-dong Xie, Wen Ruan |
The Construction and Test for a Small Beowulf Parallel Computing System. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Beowulf System, Test, Parallel Computing, Construction |
1 | Shi Lan, Shao Xia, Zhao Ying |
Design and Implementation of ICAP-Client Based on Improved LRU Algorithm. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
ICAP Client, improved LRU, outer virus scanning, Network security, protocol analysis |
1 | Fang Yang 0004, Xuedong Tian, Xin Zhang, Xin-Biao Jia |
An Improved Method for Similar Handwritten Chinese Character Recognition. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
similar character recognition, Four-corner code feature, hierarchy contour feature, SVM |
1 | Ying Lin, Yan Zhang, Yang-jia Ou |
The Design and Implementation of Host-Based Intrusion Detection System. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
OSSEC, intrusion detection, intrusion detection system, BP neural network, Log analysis, HIDS |
1 | Jintao Zeng, Jinzhong Li, Xiaohui Zeng, Wenlang Luo |
A Prototype System of Software Reliability Prediction and Estimation. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
software reliability tool, software reliability prediction, model selection, software reliability model |
1 | Lei Huang, Yanxiang He, Furu Wei, Wenjie Li 0002 |
Modeling Document Summarization as Multi-objective Optimization. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
query-sensitive term weighting and clustering, multi-objective optimization, document summarization |
1 | Shan Wang, Yang Jiang, Minghua Gao, Chuanyun Wang, Haiwen Liu |
Artificial Neural Network Method for the Analysis of 1-D Defected Ground Structure. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
defected ground structure (DGS), modeling, artificial neural network (ANN), radial basis function (RBF) |
1 | Xiaoming Yao, Wencai Du, Mei Huang, Weihua Wu, Jundong Fu |
Pattern-Based Blind Spatial Image Watermarking. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
image pattern, spatial watermarking, robustness, blind detection |
1 | Qiufen Yang, Weihua Gui 0001, Huosheng Hu |
A Novel Real-Time Face Tracking Algorithm for Detection of Driver Fatigue. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhi-Hua Hu |
A Quay Crane Assignment Approach for Berth Allocation Problem in Container Terminal. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
quay crane assignment, quay crane allocation, berth allocation problem, integer linear programming |
1 | Lin-an Wang, Qiang Li, Xiao-juan Liang |
Modeling and Dynamic Simulation of Electric Power Steering System of Automobile Using Bond Graph Technique. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
electric power steering system, simulation, modeling, bond graph |
1 | Xiangqun Fu, Wansu Bao, Chun Zhou |
Design and Implementation of Quantum Factorization Algorithm. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
factorization, quantum algorithm, quantum circuit |
1 | Zhi Tao, Xue-Dan Tan, Tao Han, Ji-Hua Gu, Yi-Shen Xu, He-Ming Zhao |
Reconstruction of Normal Speech from Whispered Speech Based on RBF Neural Network. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
whispered speech, radial basis function neural network, voice conversion |
1 | Wang Gang, Yin Fengxia |
Study on Service Selections Based on Ontology and Qos. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Ontology, Agent, service, similarity, Qos |
1 | Zhiyuan Yang, Qinming Tan |
The Application of Random Forest and Morphology Analysis to Fault Diagnosis on the Chain Box of Ships. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
chain box, fault diagnosis, Random Forest, Morphology Analysis |
1 | Junyu Dong, Yuliang Wang, Yan Song, Guanglin Cheng |
Three-Dimensional Multiscale Texture Synthesis. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
spatial scale, lambert's model, multiscale, photometric stereo |
1 | Shaobo Li 0001, Shulin Lv, Xiaohui Jia, Zhisheng Shao |
Application of Clipboard Monitoring Technology in Graphic and Document Information Security Protection System. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
clipboard monitoring, HOOK API, file system filter driver, graphic and document information security |
1 | Zhipeng Xu, Qianting Zhou, Jun Wei |
Design of Temperature Control System for a Special Shortwave Infrared Spatial Remote Sensor Based on FPGA. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
shortwave infrared remote sensor, Incremental PID algorithm, FPGA |
1 | Ruhan He, Weibin Xu, Ying Wang, Wei Zhan |
A Route-Nearest Neighbor Algorithm for Large-Scale Vehicle Routing Problem. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Route-Nearest Neighbor (RNN), Nearest Neighbor (NN), Vehicle Routing Problem (VRP) |
1 | Zhixing Li |
Product Feature Extraction with a Combined Approach. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Textual Pattern, component, Text Mining, Bootstrapping, ID3 |
1 | Yang Li, Chong-chong Zhao |
Aesthetic Evolution of Staged L-systems for Tiling Pattern Design. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Evolutionary Algorithm, L-systems, fractal compression |
1 | Wang Taihua, Guo Fan |
Associating IDS Alerts by an Improved Apriori Algorithm. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
data mining, association rules, Apriori algorithm, itemsets |
1 | Minghui Li, Jingbo Xia, Yaoguo Wang |
Research on MAC Communication Mechanism of Air-to-Ground Data Link Based on 3G: The MSDU Frame Subsection and RTS/CTS Handshake Mechanism. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
MSDU, frames subsection mechanism, RTS/CTS, handshake mechanism, MAC, data link |
1 | Changcheng Zhou, Jie Meng |
Modeling and Simulation of Double-tube Hydraulic Damper External Characteristic. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
double-tube hydraulic damper, characteristic model, characteristic simulation, vehicle |
1 | Yin Pang, Kan Li 0001, Xin Sun 0004, Kaili Bu |
Dynamic Replica Selection Using Improved Kernel Density Estimation. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
improved KDE, geographic locality, temporal locality, replica selection |
1 | Li-li Ju, Xiu-fang Wang, Sai Ma, Chun-ming Wei |
The Algorithm Study of Sensor Compensation in MWD Instrument Based on Genetic Elman Neural Network. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
MWD Instrument, compensation, Adaptive genetic algorithm, Elman network |
1 | Zhao Qiu, Mingrui Chen, Jun Huang |
A Study on CRL Issue by P2P Network. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
P2P, PKI, CRL |
1 | Hongjie Sun |
An Integrated Network Performance Monitor System. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
network performance monitor, network tomography, active probing, passive monitoring |
1 | Weichun Huang, Min Chen, Jian Liu |
A Small World Network Based Grid Resource Discovery Mechanism. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Cluster, Grid, Resource Discovery, Small World Network |
1 | Yu Liu, Junchan Du, Feng Ji |
Design of Panoramic Mosaic Surveillance Platform in Severe Circumstance. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
panoramic mosaic, surveillance platform, FPGA |
1 | Wenjun Zhang 0001 |
Integrated Security Framework for Secure Web Services. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
security, web services, authentication, authorization, confidentiality |
1 | Guorui Li, Ying Wang 0033, Jingsha He |
Efficient Group Key Management Scheme in Wireless Sensor Networks. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Refined key link tree, Security, Wireless sensor networks, Key management, Group key |
1 | Shaohua Jin, Chongguang Ding, Yongxue Wang, Yanmin Zhang, Jie Lv |
A Strong Deviation Theorem Based on Laplace Transform on a Non-homogeneous Tree. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
non-homogeneous tree, strong deviation theorem, Laplace transform, martingale |
1 | Rong Zhou, Chunyue Zhao, Lili Fu, Ao Chen, Meiqian Ye |
ZigBee-based Vehicle Access Control System. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
WSN (Wireless Sensor Networks), CC2430, Vehicle Management, ZigBee |
1 | Chunliang Jiang, Hanhong Jiang, Chaoliang Zhang, Jie Wang |
A New Method of Sea-Sky-Line Detection. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Sea-sky-line, linear fitting, Sea-sky background, histogram |
1 | Wan Zhou, Zhang Xuehua, Xiong Xin, Jiande Wu |
The Application Research of Wireless Sensor Network in the Prison Monitoring System. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Prison Monitoring, Wireless Sensor Networks, Location, Sensor Node |
1 | Haokui Tang, Zhiquan Feng |
Skin Segmentation Based on Double-Models. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Double-models, Dynamic parameter, Ellipse clusterring model, SGM, Fisher threshold rules |
1 | Wenxian Wang, Xingshu Chen, Yongbin Zou, Haizhou Wang, Zongkun Dai |
A Focused Crawler Based on Naive Bayes Classifier. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Classifier, Naive Bayes, TF-IDF, Focused Crawler |
1 | Ping Zhang, Yan Zhang, Zhengjiang Wu, Weifeng Du |
IIS Security Mechanisms. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Information server, security, operating system, security mechanism |
1 | Ding Pan |
DW 2.0-Oriented Metadata Evolution Management. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
DW 2.0, structural consistency, metadata |
1 | Xue-Dan Tan, He-Ming Zhao, Ji-Hua Gu, Zhi Tao |
A Noise Robust Endpoint Detection Algorithm for Whispered Speech Based on Empirical Mode Decomposition and Entropy. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
endpoint detection, whispered speech, entropy, Empirical Mode Decomposition |
1 | Zhihua Liu, Hui Sun, Haizhi Hu |
Two Sub-swarms Quantum-Behaved Particle Swarm Optimization Algorithm Based on Exchange Strategy. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Quantum-behaved Particle Swarm Optimization Algorithm, exchange strategy, Particle Swarm Optimization Algorithm, local optima |
1 | Dengfeng Zhou, Shuisheng Ye, Shaohua Hu |
Research on Application of Region-of-Interest in Face Detection. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Maxshift, AdaBoost, region of interest, JPEG2000, skin color |
1 | Jian Li, Wengeng Shi |
Model of CSR in Chinese Medicine E-commerce Firm: Strategic Management Perspective. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
medicinet, model, E-commerce, CSR |
1 | Weixing Zhu, Yong Ma, Rixia Wang |
An Adaptive Fast Algorithm for Coding Block Mode Selection. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
macro block mode, fast mode selection, coded block, RD cost, H.264/AVC |
1 | Sibin Ying, Jianliang Ai |
Detection of Aircraft In-flight Icing in Non-steady Atmosphere Using Artificial Neural Network. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
aircraft icing, icing detection, icing parameter, neural network, self-organizing maps |
1 | Miao Ma, Jian-hui Liang, Li Sun, Min Wang |
SAR Image Segmentation Based on SWT and Improved AFSA. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
SWT, AFSA, image segmentation, SAR image |
1 | Li Tian, Wansu Bao |
A Medium Field Multivariate Public Key Signature Scheme with External Perturbation. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
multivariate public key cryptography, Medium Field Equation (MFE), high order linearization equation (HOLE), rank attack, quantum computation |
1 | Jingbo Yuan, Haixiao Li, Shunli Ding, Limin Cao |
Intrusion Detection Model Based on Improved Support Vector Machine. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
hypothesis test theory, support vector machine, intrusion detection |
1 | Da-guo Jiang, Zhao-hui Liu |
Preparation and Piezomagnetic Effect of FeSiB Amorphous Powders /IIR Composite Film. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Fe78Si9B13 amorphous powders, butyl rubber, composite film, piezomagnetic effect |
1 | Ding Hong, Zhao Yizhu |
A Historical Role-Based Fast Negotiation Model in Open Network. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
HRFN, history role, historical information record, credential disclosure sequence |
1 | Xiao-hui Zeng, Wen-lang Luo, Jin-tao Zeng, Yan-ping Chen, Shi-yao Jin |
Research on a High Efficient Intrusion Prevention Model. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
network security, distributed scheduling, intrusion prevention, network attack, network intrusion |
1 | Meiyu Zhang, Jinghua Mei |
The Design and Implementation of Electronic Farm System Based on Google Maps. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
windows live, shortest path, Ajax, google maps |
1 | Mahboobeh Houshmand, Elaheh Soleymanpour, Hossein Salami, Mahya Amerian, Hossein Deldari |
Efficient Scheduling of Task Graphs to Multiprocessors Using a Combination of Modified Simulated Annealing and List Based Scheduling. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
List based scheduling algorithms, modified simulated annealing, task scheduling problem, NP hard problems |
1 | Shaobo Li 0001, Xiaohui Jia, Shulin Lv, Zhisheng Shao |
Research and Application of USB Filter Driver Based on Windows Kernel. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
USB filter driver, USB bus, Windows kernel, Irp, driver model |
1 | Xiangang Jiang, Dean Ma, Longfeng Tao |
The Research of High Noise Image's Restoration and Recognition of Train's Plates. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
image of train license plate, license recognition, image restoration, Wiener filter, Contourlet transform |
1 | Feng Gao, Jingsha He, Shufen Peng, Xu Wu |
A Quantifying Metric for Privacy Protection Based on Information Theory. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
trust, information theory, privacy protection, quantifying |
1 | Bin Tan, Xuyan Zhou |
Automatic Construction of Web-Based English/Chinese Parallel Corpora. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Jacobi correlation coefficient, vector space, Parallel corpora |
1 | Suying Yang, Meng Wang, Jianying Lin, Kuijun Meng |
Optimization Design of Supervising and Controlling on the SOFC Integration System. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
SOFC, integrated control, data schedule, optimum design |
1 | Bin Zhang |
Research on the Directional Interferences Canceling. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
directional interference, inverse beamforming, iterative inverse beamforming, tow ship noise, towed sonar |
1 | Yan Zhang, Ying Lin |
Research on the Key Technology of Secure Computer Forensics. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
integerity, secure evidence, computer forensics, digital evidence |
1 | Yuchuan Zhang, Yuzhao Liu |
A Collaborative Filtering Algorithm Based on Time Period Partition. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
time factor, item-based, time period partition, TPPCF, phase |
1 | Mahboobeh Houshmand, Monireh Houshmand, Habib Rajabi Mashhadi |
Game Theory Based View to the Quantum Key Distribution BB84 Protocol. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
BB84 protocol, static game theory, mixed strategy Nash equilibrium |
1 | Dong Li, Chunhui Yang |
A Trust Evaluation Model for Web Service Selection. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
service selection, trust model, Qos |
1 | Ratsameetip Wita, Nattanatch Jiamnapanon, Yunyong Teng-Amnuay |
An Ontology for Vulnerability Lifecycle. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
Vulnerability lifecycle, Security related ontology, Risk prioritization, CVE, Security management |
1 | Jie Xia, Jian Wu 0002, Yanyan Cao, Zhiming Cui |
SOM-Based Classification Method for Moving Object in Traffic Video. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
SOM, K-Means, object tracking, motion detection, object classification |
1 | Kaiqiang Guo, Jiewu Xia |
An Improved Algorithm of Collision Detection in 2D Grapple Games. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
rectangular areas, algorithm, coordinate, collision detection |
Displaying result #1 - #100 of 226 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ >>] |
|