History
1
2653

Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 2653 total

Force-imitated particle swarm optimization using the near-neighbor effect for locating multiple optima. (English)
Inf. Sci. 182, No. 1, 139-155 (2012).
1
Processing generalized $k$-nearest neighbor queries on a wireless broadcast stream. (English)
Inf. Sci. 188, 64-79 (2012).
2
An integral transform and its applications in parameter estimation of LFM signals. (English)
Circuits Syst. Signal Process. 31, No. 3, 1017-1031 (2012).
3
A probabilistic graphical model for topic and preference discovery on social media. (English)
Neurocomputing 95, 78-88 (2012).
4
Incorporation of radius-info can be simple with SimpleMKL. (English)
Neurocomputing 89, 30-38 (2012).
5
Pre-LOI trajectory maneuvers of the CHANG$^{\prime}$E-2 libration point mission. (English)
Sci. China, Inf. Sci. 55, No. 6, 1249-1258 (2012).
6
Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models. (English)
Sci. China, Inf. Sci. 55, No. 4, 911-920 (2012).
7
Dynamic call and connection admission control in automatically switched optical network for grid computing applications. (English)
Sci. China, Inf. Sci. 55, No. 2, 419-432 (2012).
8
Active and passive nearest neighbor algorithm: a newly-developed supervised classifier. (English)
Huang, De-Shuang (ed.) et al., Advanced intelligent computing theories and applications. With aspects of artificial intelligence. 7th international conference, ICIC 2011, Zhengzhou, China, August 11‒14, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-25943-2/pbk). Lecture Notes in Computer Science 6839. Lecture Notes in Artificial Intelligence, 189-196 (2012).
9
Weighted inverse minimum cut problem under the sum-type Hamming distance. (English)
Snoeyink, Jack (ed.) et al., Frontiers in algorithmics and algorithmic aspects in information and management. Joint international conference, FAW-AAIM 2012, Beijing, China, May 14‒16, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29699-4/pbk). Lecture Notes in Computer Science 7285, 26-35 (2012).
10
Bäcklund transformation, superposition formulae and $N$-soliton solutions for the perturbed Korteweg-de Vries equation. (English)
Commun. Nonlinear Sci. Numer. Simul. 17, No. 6, 2394-2402 (2012).
11
Mixed and componentwise condition numbers of nonsymmetric algebraic Riccati equation. (English)
Appl. Math. Comput. 218, No. 14, 7595-7601 (2012).
12
The equilibrium generalized assignment problem and genetic algorithm. (English)
Appl. Math. Comput. 218, No. 11, 6526-6535 (2012).
13
A systematic approach for 2D-image to 3D-range registration in urban environments. (English)
Comput. Vis. Image Underst. 116, No. 1, 25-37 (2012).
14
Sorted random projections for robust rotation-invariant texture classification. (English)
Pattern Recognition 45, No. 6, 2405-2418 (2012).
15
Convergence of an online gradient method with inner-product penalty and adaptive momentum. (English)
Neurocomputing 77, 243-252 (2012).
16
Clustering analysis in large graphs with rich attributes. (English)
Holmes, Dawn E (ed.). et al., Data mining: foundations and intelligent paradigms. Volume 1: Clustering, association and classification. Berlin: Springer (ISBN 978-3-642-23165-0/hbk; 978-3-642-23166-7/ebook). Intelligent Systems Reference Library 23, 7-27 (2012).
17
Ballistic missile detection via micro-Doppler frequency estimation from radar return (English)
Digital Signal Processing 22, No. 1, 87-95 (2012).
18
Cyberguarder: A virtualization security assurance architecture for Green cloud computing (English)
Future Generation Comp. Syst. 28, No. 2, 379-390 (2012).
19
On coverage of wireless sensor networks for rolling terrains (English)
IEEE Trans. Parallel Distrib. Syst. 23, No. 1, 118-125 (2012).
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 2653 total