Based on machine vision encoder grating assembled eccentric adjustment system design
Wang, Yi-Wen, Pei, Zhen-Cheng, Liu, Xian-Li, Cong, Yan-Bin, Jin, Chang
Published in Ji suan ji ying yong yan jiu (01.12.2013)
Published in Ji suan ji ying yong yan jiu (01.12.2013)
Get full text
Journal Article
Resource scheduling algorithm for MapReduce based on machine learning
Yu, Qian, Wei, Chengjian, Wang, Kai, Zhu, Linjun
Published in Ji suan ji ying yong yan jiu (01.01.2016)
Published in Ji suan ji ying yong yan jiu (01.01.2016)
Get full text
Journal Article
Server-aided verification scheme against collusion attack
Niu, Shufen, Niu, Ling, Wang, Caifen, Lan, Caihui
Published in Ji suan ji ying yong yan jiu (01.01.2016)
Published in Ji suan ji ying yong yan jiu (01.01.2016)
Get full text
Journal Article
Fast algorithm for estimation of TDOA and FDOA based on genetic algorithm
Lu, Zhiyu, Wang, Jianhui, Wang, Daming, Wang, Yue
Published in Ji suan ji ying yong yan jiu (01.01.2016)
Published in Ji suan ji ying yong yan jiu (01.01.2016)
Get full text
Journal Article
HTTP tunnel Trojan detection method based on multi-layer conjoint analysis
Lan, Jinghong, Liu, Shengli, Li, Ye, Xiao, Da, Wang, Dongxia
Published in Ji suan ji ying yong yan jiu (01.01.2016)
Published in Ji suan ji ying yong yan jiu (01.01.2016)
Get full text
Journal Article
Practical approach of word segmentation in poor resource situation
Ma, Ning, Li, Yachao, He, Xiangzhen, Yu, Hongzhi
Published in Ji suan ji ying yong yan jiu (01.01.2016)
Published in Ji suan ji ying yong yan jiu (01.01.2016)
Get full text
Journal Article