Loading…
The Half-Sweep Iterative Alternating Decomposition Explicit (HSIADE) Method for Diffusion Equation
Get full text
Book Chapter
Conference Proceeding
Loading…
Feature Selection with Particle Swarms
Liu, Yu, Qin, Zheng, Xu, Zenglin, He, Xingshi
Published in Lecture notes in computer science (01.01.2004)
Published in Lecture notes in computer science (01.01.2004)
Get full text
Book Chapter
Conference Proceeding
Loading…
Loading…
Loading…
An Image Analysis System for Tongue Diagnosis in Traditional Chinese Medicine
Wang, Yonggang, Zhou, Yue, Yang, Jie, Xu, Qing
Published in Lecture notes in computer science (01.01.2004)
Published in Lecture notes in computer science (01.01.2004)
Get full text
Book Chapter
Conference Proceeding
Loading…
Fast Query Over Encrypted Character Data in Database
Wang, Zheng-Fei, Dai, Jing, Wang, Wei, Shi, Bai-Le
Published in Lecture notes in computer science (01.01.2004)
Published in Lecture notes in computer science (01.01.2004)
Get full text
Book Chapter
Conference Proceeding
Loading…
Discretization of Continuous Attributes in Rough Set Theory and Its Application
Zhang, Gexiang, Hu, Laizhao, Jin, Weidong
Published in Lecture notes in computer science (01.01.2004)
Published in Lecture notes in computer science (01.01.2004)
Get full text
Book Chapter
Conference Proceeding
Loading…
Determining Optimal Decision Model for Support Vector Machine by Genetic Algorithm
Ohn, Syng-Yup, Nguyen, Ha-Nam, Kim, Dong Seong, Park, Jong Sou
Published in Lecture notes in computer science (01.01.2004)
Published in Lecture notes in computer science (01.01.2004)
Get full text
Book Chapter
Conference Proceeding
Loading…
Use of Simulation Technology for Prediction of Radiation Dose in Nuclear Power Plant
Get full text
Book Chapter
Conference Proceeding
Loading…
Multiscale Centerline Extraction of Angiogram Vessels Using Gabor Filters
Sang, Nong, Tang, Qiling, Liu, Xiaoxiao, Weng, Wenjie
Published in Lecture notes in computer science (01.01.2004)
Published in Lecture notes in computer science (01.01.2004)
Get full text
Book Chapter
Conference Proceeding
Loading…
Key Management for Secure Multicast Using the RingNet Hierarchy
Wang, Guojun, Liao, Lin, Cao, Jiannong, Chan, Keith C. C.
Published in Lecture notes in computer science (01.01.2004)
Published in Lecture notes in computer science (01.01.2004)
Get full text
Book Chapter
Conference Proceeding
Loading…
Loading…
A Brushlet-Based Feature Set Applied to Texture Classification
Shan, Tan, Zhang, Xiangrong, Jiao, Licheng
Published in Lecture notes in computer science (01.01.2004)
Published in Lecture notes in computer science (01.01.2004)
Get full text
Book Chapter
Conference Proceeding
Loading…
A Parallel Algorithm for the Biorthogonal Wavelet Transform Without Multiplication
Get full text
Book Chapter
Conference Proceeding
Loading…
Implementation of the Security System for Instant Messengers
Get full text
Book Chapter
Conference Proceeding
Loading…
Loading…
A Modular k-Nearest Neighbor Classification Method for Massively Parallel Text Categorization
Get full text
Book Chapter
Conference Proceeding
Loading…
String Matching with Swaps in a Weighted Sequence
Zhang, Hui, Guo, Qing, Iliopoulos, Costas S.
Published in Lecture notes in computer science (01.01.2004)
Published in Lecture notes in computer science (01.01.2004)
Get full text
Book Chapter
Conference Proceeding
Loading…
Monte Carlo Simulation of the Effects of Large Blood Vessels During Hyperthermia
Get full text
Book Chapter
Conference Proceeding
Loading…
Factoring-Based Proxy Signature Schemes with Forward-Security
Get full text
Book Chapter
Conference Proceeding