History
1
1060
Year:
-
Type:
Journal
Book
Article
Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 from 1060 total

Robot formations using a single camera and entropy-based segmentation. (English)
J. Intell. Robot. Syst. 68, No. 1, 21-41 (2012).
1
An efficient two-stage level set segmentation framework for overlapping plant leaf image. (English)
Huang, De-Shuang (ed.) et al., Intelligent computing technology. 8th international conference, ICIC 2012, Huangshan, China, July 25‒29, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31587-9/pbk). Lecture Notes in Computer Science 7389, 466-474 (2012).
2
Shot classification using domain specific features for movie management. (English)
Lee, Sang-goo (ed.) et al., Database systems for advanced applications. 17th international conference, DASFAA 2012, Busan, South Korea, April 15‒19, 2012. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-29034-3/pbk). Lecture Notes in Computer Science 7239, 314-318 (2012).
3
A comparison of buying decision patterns by product involvement: an eye-tracking approach. (English)
Pan, Jeng-Shyang (ed.) et al., Intelligent information and database systems. 4th Asian conference, ACIIDS 2012, Kaohsiung, Taiwan, March 19‒21, 2012. Proceedings, Part III. Berlin: Springer (ISBN 978-3-642-28492-2/pbk). Lecture Notes in Computer Science 7198. Lecture Notes in Artificial Intelligence, 37-46 (2012).
4
Characteristics of decision-making for different levels of product involvement depending on the degree of trust transfer: a comparison of cognitive decision-making criteria and physiological responses. (English)
Pan, Jeng-Shyang (ed.) et al., Intelligent information and database systems. 4th Asian conference, ACIIDS 2012, Kaohsiung, Taiwan, March 19‒21, 2012. Proceedings, Part III. Berlin: Springer (ISBN 978-3-642-28492-2/pbk). Lecture Notes in Computer Science 7198. Lecture Notes in Artificial Intelligence, 27-36 (2012).
5
Advances in visual computing. 8th international symposium, ISVC 2012, Rethymnon, Crete, Greece, July 16‒18, 2012. Revised selected papers, Part I. (English)
Lecture Notes in Computer Science 7431. Berlin: Springer (ISBN 978-3-642-33178-7/pbk). xxxvii, 733~p. EUR~93.09 (2012).
6
Advances in visual computing. 8th international symposium, ISVC 2012, Rethymnon, Crete, Greece, July 16‒18, 2012. Revised selected papers, Part II. (English)
Lecture Notes in Computer Science 7432. Berlin: Springer (ISBN 978-3-642-33190-9/pbk). xxxvii, 771~p. EUR~93.09 (2012).
7
A new weighted correlation coefficient method to evaluate reconstructed brain electrical sources. (English)
J. Appl. Math. 2012, Article ID 251295, 11 p. (2012).
8
A new decomposition method for variational inequalities with linear constraints. (English)
J. Optim. Theory Appl. 152, No. 3, 675-695 (2012).
9
A ubiquitous English vocabulary learning system: evidence of active/passive attitudes vs. Usefulness/ease-of-use (English)
Computers & Education 58, No. 1, 273-282 (2012).
10
Quality assessment of landsat surface reflectance products using MODIS data (English)
Computers & Geosciences 38, No. 1, 9-22 (2012).
11
Revision of wfmm - A wideband fast multipole method for the two-dimensional complex Helmholtz equation (English)
Computer Physics Communications 183, No. 2, 446-447 (2012).
12
Additive outlier detection and estimation for the logarithmic autoregressive conditional duration model (English)
Communications in Statistics - Simulation and Computation 41, No. 3, 287-301 (2012).
13
Single-machine scheduling with job-position-dependent learning and time-dependent deterioration (English)
IEEE Transactions on Systems, Man, and Cybernetics, Part A 42, No. 1, 192-200 (2012).
14
Decentralized adaptive attitude synchronization of spacecraft formation (English)
Systems & Control Letters 61, No. 1, 238-246 (2012).
15
A strictly nonblocking network based on nonblocking $4\times 4$ optical switches (English)
Optical Switching and Networking 9, No. 1, 1-12 (2012).
16
Image denoising model in combination with partial differential equation and median filtering. (Chinese)
J. Comput. Appl. 31, No. 9, 2512-2514 (2011).
17
Skin segmentation based on real AdaBoost. (Chinese)
J. Comput. Appl. 31, No. 12, 3370-3372 (2011).
18
Cryptanalysis of a provably secure cross-realm client-to-client password-authenticated key agreement protocol of CANS ’09. (English)
Lin, Dongdai (ed.) et al., Cryptology and network security. 10th international conference, CANS 2011, Sanya, China, December 10‒12, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25512-0/pbk). Lecture Notes in Computer Science 7092, 172-184 (2011).
19
The PI index of the deficient sunflowers attached with lollipops. (English)
Int. J. Contemp. Math. Sci. 6, No. 41-44, 2001-2007 (2011).
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 from 1060 total