History
1
313

Please fill in your query. A complete syntax description you will find on the General Help page.

Result 61 to 80 of 313 total

Reconfigurable architecture design of motion compensation for multi-standard video coding (English)
ISCAS, 2003-2006 (2010).
61
The analyse of critical node and link in robust C2 information exchange structure for mission (English)
ICMLC, 72-78 (2010).
62
Automatic three-label bone segmentation from knee MR images (English)
ISBI, 1325-1328 (2010).
63
An eye state recognition method for drowsiness detection (English)
VTC Spring, 1-5 (2010).
64
Root isolation for bivariate polynomial systems with local generic position method. (English)
May, John P. (ed.), ISSAC 2009. Proceedings of the 2009 International Symposium on Symbolic and Algebraic Computation, Seoul, July 28‒31, 2009. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-609-0). 103-109 (2009).
65
Constructing confidence belief functions from one expert. (English)
Expert Syst. Appl. 36, No. 4, 8537-8548 (2009).
66
An integrated IDEF0-3/CTPN/SFC approach for design and analysis of discrete event control systems. (English)
Int. J. Prod. Res. 47, No. 22, 6433-6453 (2009).
67
Ambient isotopic meshing of implicit algebraic surface with singularities. (English)
Comput. Res. Repos. 2009, Article No. 0903.3524 (2009).
68
Generating structurally complex test cases by data mutation: A case study of testing an automated modelling tool. (English)
Comput. J. 52, No. 5(A), 571-588 (2009).
69
The method for ranking fuzzy numbers based on the centroid index and the fuzziness degree. (English)
Cao, Bingyuan (ed.) et al., Fuzzy information and engineering. Vol. 2. Proceedings of the third international conference on fuzzy information and engineering (ICFIE 2009), Chongqing, China, September 26‒29, 2009. Berlin: Springer (ISBN 978-3-642-03663-7/pbk; 978-3-642-03664-4/ebook). Advances in Intelligent and Soft Computing 62, 1335-1342 (2009).
70
Non-identical parallel-machine scheduling research with minimizing total weighted completion times: models, relaxations and algorithms. (English)
Appl. Math. Modelling 33, No. 4, 2145-2158 (2009).
71
Converging linear particle swarm optimization and intelligent genetic algorithm for a simple multi-echelon distribution and multi-product inventory control in a supply chain model. (English)
J. Inf. Optim. Sci. 30, No. 6, 1209-1239 (2009).
72
Estimation of a population size in large-scale wireless sensor networks. (English)
J. Comput. Sci. Technol. 24, No. 5, 987-997 (2009).
73
An evaluation model of CNO intelligence information confidence. (English)
Liu, Wenyin (ed.) et al., Web information systems and mining. International conference, WISM 2009, Shanghai, China, November 7‒8, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-05249-1/pbk). Lecture Notes in Computer Science 5854, 400-412 (2009).
74
Mining preferred traversal paths with HITS. (English)
Liu, Wenyin (ed.) et al., Web information systems and mining. International conference, WISM 2009, Shanghai, China, November 7‒8, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-05249-1/pbk). Lecture Notes in Computer Science 5854, 98-107 (2009).
75
Ambient isotopic meshing for implicit algebraic surfaces with singularities. (Plenary talk). (English)
Gerdt, Vladimir P. (ed.) et al., Computer algebra in scientific computing. 11th international workshop, CASC 2009, Kobe, Japan, September 13‒17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04102-0/pbk). Lecture Notes in Computer Science 5743, 89-93 (2009).
76
Globally optimal Finsler active contours. (English)
Denzler, Joachim (ed.) et al., Pattern recognition. 31st DAGM symposium, Jena, Germany, September 9‒11, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03797-9/pbk). Lecture Notes in Computer Science 5748, 552-561 (2009).
77
Handling multi-channel hidden terminals using a single interface in cognitive radio networks. (English)
Huang, De-Shuang (ed.) et al., Emerging intelligent computing technology and applications. With aspects of artificial intelligence. 5th international conference on intelligent computing, ICIC 2009, Ulsan, South Korea, September 16‒19, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04019-1/pbk). Lecture Notes in Computer Science 5755. Lecture Notes in Artificial Intelligence, 1039-1048 (2009).
78
Perturbation analysis for the matrix equations $X\pm A^*X^{-1}A=I$. (English)
Taiwanese J. Math. 13, No. 3, 913-922 (2009).
79
Wireless sensor networks scheduling for full angle coverage. (English)
Multidimensional Syst. Signal Process. 20, No. 2, 101-119 (2009).
80

Result 61 to 80 of 313 total