Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Granular Computing Model Based on Quantum Computing Theory
Jun Hu, Chun Guan
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
A Simple and Real-Time Parallel Compression of Time Series Scientific Simulation Data for Interactive and Cooperative Supercomputing
Wenjuan Liu, Xinhong Hei, Fukuma, Shinji, Mori, Shin-Ichiro
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
A Parallel Algorithm for Datacleansing in Incomplete Information Systems Using MapReduce
Fei Chen, Lin Jiang
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Loading…
Image Up-Scaling: Based on Self Similarity and Local Information
Xin Zheng, Chenlei Lv, Qingqing Xu, Ping Guo
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Internet Security Protection in Personal Sensitive Information
Yubin Wang, Chao Li, Nan Cheng
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
A New Genetic Algorithm for Release-Time Aware Divisible-Load Scheduling
Xiaoli Wang, Yuping Wang, Kun Meng
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Identifying Relevant Messages for Social TV
Weibo Li, Chunhong Zhang, Xiaofeng Qiu, Yang Ji
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Balance Function Analysis in Variable Weight Decision Making
Deqing Li, Wenyi Zeng, Junhong Li, Ping Guo
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
An Exemplar-Based Hidden Markov Model with Discriminative Visual Features for Lipreading
Xin Liu, Yiu-ming Cheung
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Loading…
An Improved Method of Access Control Based on BLP Model in MILS
Kaiqiang Li, Hao Feng, Yahui Li, Zhiwei Zhang
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
A Novel Key Pre-distribution Scheme in Wireless Sensor Networks
Zhongyuan Qin, Yuying Wang, Hengkang Wang, Jie Huang
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
A Novel Tracking Method Based on Ensemble Metric Learning
Qirun Huo, Yao Lu
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms
Yahui Li, Wensheng Niu, Peng Li, Jianfeng Ma, Yulong Shen
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Relative Efficiency of Third-Grade General Public Hospitals in Zhejiang Province, China
Lin Kai, Ni Rong, Shao Yan-Hua, Wu Si-Jing, Ma Xiao-Jiao
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
A Rendering Algorithm for Function Call Diagram in Software Reliability Assurance
Zhoukai Wang, Yikun Zhang, Xinhong Hei, Linjing Sun, Rui Zhou, Ming Zhao
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Multi-user Preferences Based Top-k Query Processing Algorithm
Yunlong Wu, Guohua Liu, Yuanyuan Liu
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Improved Feedback Vertex Sets in Kautz Digraphs K (d, n)
Xirong Xu, Chun Yin, Sijia Zhang, Yazhen Huang
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding
Loading…
Information Flow Control Model and Method in Distribute MILS
Kaiqiang Li, Hao Feng, Yahui Li, Zhiwei Zhang
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Published in 2014 Tenth International Conference on Computational Intelligence and Security (01.11.2014)
Get full text
Conference Proceeding