Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Loading…
Dynamic Partial Reconfiguration in FPGAs
Wang Lie, Wu Feng-yan
Published in 2009 third International Symposium on Intelligent Information Technology Application : 21-22 November 2009 (01.11.2009)
Published in 2009 third International Symposium on Intelligent Information Technology Application : 21-22 November 2009 (01.11.2009)
Get full text
Conference Proceeding
Loading…
Identification of Nutrition Elements in Orange Leaves by Laser Induced Breakdown Spectroscopy
Mingyin Yao, Muhua Liu, Jinhui Zhao, Lin Huang
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
An Adaptive Median Filter for Image Denoising
Chin-Chen Chang, Ju-Yuan Hsiao, Chih-Ping Hsieh
Published in 2008 Second International Symposium on Intelligent Information Technology Application : 20-22 December 2008 (01.12.2008)
Published in 2008 Second International Symposium on Intelligent Information Technology Application : 20-22 December 2008 (01.12.2008)
Get full text
Conference Proceeding
Loading…
A Study of User Downloading Behavior in Mobile Internet Using Clickstream Data
Yanbin Liu, Ping Yuan
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
The Research of Privacy-Preserving Clustering Algorithm
Yanguang Shen, Junrui Han, Huifang Shan
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
Associating IDS Alerts by an Improved Apriori Algorithm
Wang Taihua, Guo Fan
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
Automated Assessment System for Subjective Questions Based on LSI
Xinming Hu, Huosong Xia
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
SPIHT Algorithm Combined with Huffman Encoding
Wei Li, Zhen Peng Pang, Zhi Jie Liu
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
A Prototype System of Software Reliability Prediction and Estimation
Jintao Zeng, Jinzhong Li, Xiaohui Zeng, Wenlang Luo
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
A High Security Dynamic Secret Key Management Scheme for Wireless Sensor Networks
Lanying Li, Xin Wang
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
Attack Simulation and Signature Extraction of Low-Rate DoS
Zenghui Liu, Liguo Guan
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
An Ontology for Vulnerability Lifecycle
Wita, Ratsameetip, Jiamnapanon, Nattanatch, Teng-amnuay, Yunyong
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
A Flexible Fuzzy Comprehensive Evaluation Method
Juan Chen
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
Integrated Security Framework for Secure Web Services
Wenjun Zhang
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
Intrusion Detection Model Based on Improved Support Vector Machine
Jingbo Yuan, Haixiao Li, Shunli Ding, Limin Cao
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
Loading…
An Improved Pattern Matching Algorithm
Jingbo Yuan, Jisen Zheng, Shunli Ding
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
Mobile Intelligence Sharing Based on Agents in Mobile Peer-to-Peer Environment
Ye, Liang
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding
Loading…
Mining Maximal Patterns Based on Improved FP-tree and Array Technique
Hua-jin Wang, Chun-an Hu
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Published in 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (01.04.2010)
Get full text
Conference Proceeding