History
1
218

Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 218 total

Illumination-adaptive skin color detection method. (Chinese)
J. Comput. Appl. 31, No. 5, 1233-1236 (2011).
1
The cellular competitive decision algorithm for the degree-constrained minimum spanning tree problem. (Chinese)
J. Shanghai Second Polytech. Univ. 28, No. 3, 207-213 (2011).
2
Research on the establishment of distributed storage virtual geographic environment based on lustre file system. (English)
Zhou, Qihai (ed.), Theoretical and mathematical foundations of computer science. Second international conference, ICTMF 2011, Singapore, May 5‒6, 2011. Selected papers. Berlin: Springer (ISBN 978-3-642-24998-3/pbk; 978-3-642-24999-0/ebook). Communications in Computer and Information Science 164, 329-336 (2011).
3
Microgroup mining on TSina via network structure and user attribute. (English)
Tang, Jie (ed.) et al., Advanced data mining and applications. 7th international conference, ADMA 2011, Beijing, China, December 17‒19, 2011. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-25855-8/pbk). Lecture Notes in Computer Science 7121. Lecture Notes in Artificial Intelligence, 138-151 (2011).
4
Relative self-localization estimation for indoor mobile robot. (English)
Park, James J. (ed.) et al., Information anf technoloy convergence and services (ITCS 2011) and intelligent robotics, automations, telecommunications facilities, and applications (IRoA 2011). Selected papers based on the presentations at the conferences, Gwanju, Korea, October 20‒22, 2011. Berlin: Springer (ISBN 978-94-007-2597-3/hbk; 978-94-007-2598-0/ebook). Lecture Notes in Electrical Engineering 107, 429-431 (2012).
5
Development of a deep ocean master-slave electric manipulator control system. (English)
Jeschke, Sabina (ed.) et al., Intelligent robotics and applications. 4th international conference, ICIRA 2011, Aachen, Germany, December 6‒8, 2011. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-25488-8/pbk). Lecture Notes in Computer Science 7102. Lecture Notes in Artificial Intelligence, 412-419 (2011).
6
Development of a networked multi-agent system based on real-time ethernet. (English)
Jeschke, Sabina (ed.) et al., Intelligent robotics and applications. 4th international conference, ICIRA 2011, Aachen, Germany, December 6‒8, 2011. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-25485-7/pbk). Lecture Notes in Computer Science 7101. Lecture Notes in Artificial Intelligence, 356-365 (2011).
7
Diagnosis method of combing feature extraction based on time-frequency analysis and intelligent classifier. (English)
Gong, Zhiguo (ed.) et al., Web information systems and mining. International conference, WISM 2011, Taiyuan, China, September 24‒25, 2011. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-23970-0/pbk). Lecture Notes in Computer Science 6987, 419-425 (2011).
8
Two identities involving the cubic partition function $\text{\cyr Ya}$. (English)
Int. J. Number Theory 7, No. 6, 1615-1626 (2011).
9
Architecture design of variable block size motion estimation for full and fast search algorithms in H.264/AVC. (English)
Comput. Electr. Eng. 37, No. 3, 285-299 (2011).
10
Policy-centric protection of OS kernel from vulnerable loadable kernel modules. (English)
Bao, Feng (ed.) et al., Information security practice and experience. 7th international conference, ISPEC 2011, Guangzhou, China, May 30 ‒ June 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21030-3/pbk). Lecture Notes in Computer Science 6672, 317-332 (2011).
11
Dancer: disease-annotated chromatin epigenetics resource. (English)
Nucleic Acids Res. 39, No. Database-Issue, 889-894 (2011).
12
Phylopro: a web-based tool for the generation and visualization of phylogenetic profiles across eukarya. (English)
Bioinformatics 27, No. 6, 877-878 (2011).
13
Integrating offline analysis and online protection to defeat buffer overflow attacks. (English)
Burmester, Mike (ed.) et al., Information security. 13th international conference, ISC 2010, Boca Raton, FL, USA, October 25‒28, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-18177-1/pbk). Lecture Notes in Computer Science 6531, 409-415 (2011).
14
Assessment of MODIS thermal emissive band on-orbit calibration (English)
IEEE T. Geoscience and Remote Sensing 49, No. 6-2, 2415-2425 (2011).
15
GF(2^{n}) subquadratic polynomial basis multipliers for some irreducible trinomials (English)
IACR Cryptology ePrint Archive 2011, 606 (2011).
16
Cross-market financial risk analysis: an agent-based computational finance (English)
International Journal of Information Technology and Decision Making 10, No. 3, 563-584 (2011).
17
Architecture design of variable block size motion estimation for full and fast search algorithms in H.264/AVC (English)
Computers & Electrical Engineering 37, No. 3, 285-299 (2011).
18
Policy-centric protection of OS kernel from vulnerable loadable kernel modules (English)
ISPEC, 317-332 (2011).
19
Diagnosis method of combing feature extraction based on time-frequency analysis and intelligent classifier (English)
WISM (1), 419-425 (2011).
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 218 total