Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Loading…
Relative Local Mean Classifier with Optimized Decision Rule
Guihua Wen, Lijun Jiang
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Real-time LOD Algorithm Based on Triangle Collapse Optimization
Jun Chen, Xiong Shi
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Achieving Distributed System Information Security
Distefano, S., Puliafito, A.
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Hierarchical ID-Based Blind Signature from Lattices
Chen Liang, Cui Yongquan, Tang Xueming, Hu Dongping, Wan Xin
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
An Access Control Mode Based on Information Flow Graph
Wang Chao, Chen XingYuan, Li Na
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
FTA Based Runtime Evaluation of System Reliability for Autonomous Unmanned Vehicle
Guoqi Li
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
K-times Proxy Re-encryption
Xu An Wang, Ziqing Wang, Yi Ding, Shujun Bai
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
A Protocol of Privacy-Preserving Closest Pair in Two Dimensional Space
Yong-long Luo, Chao Cheng, Cai-xia Chen, Hong Zhong
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Model Composition and Generating Tests for Web Applications
Bo Song, Shengwen Gong, Shengbo Chen
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
A Trust-based Dynamic Secure Service Discovery Model for Pervasive Computing
Fang Shen, Qingqi Pei, Shu-po Bu
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Improvement of the MapReduce Model Based on Message Middleware Oriented Data Intensive Computing
Ge Junwei, Xian Jiang, Yiqiu Fang
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Simulation of Influence of Desired Velocity Distribution and Herd Effect on Pedestrian Evacuation
Yu Yanfei, Min Yonglin
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Automatic Detection of Lumina in Mouse Liver Immunohistochemical Color Image Using Support Vector Machine and Cellular Neural Network
Wang Hui, Zhou ZhiGuo, Jie LongMei
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Image Quality Assessment Based on Binary Structure Information
Chun-Hsien Chou, Yun-Hsiang Hsu
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Improved Word Similarity Computation for Chinese Using Sub-word Information
Peng Jin, Carroll, J., Yunfang Wu, McCarthy, D.
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Fast Verification of Memory Consistency for Chip Multi-Processor
Zheng Lv, Hao Chen, Feng Chen, Yi Lv
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Fast Network Traffic Anomaly Detection Based on Iteration
Hua Jiang, Liaojun Pang
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks
YaHui Li, WenSheng Niu, YaDi Zhang, JianFeng Ma, YuLong Shen
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding
Loading…
Design of the DS-UWB Communication System Based on Chaotic Variable Spreading Factor
Dong Li, Jiang Fei Bo
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Published in 2011 Seventh International Conference on Computational Intelligence and Security (01.12.2011)
Get full text
Conference Proceeding