咨询与建议

限定检索结果

文献类型

  • 6 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 2 篇 控制科学与工程
    • 1 篇 电气工程
    • 1 篇 信息与通信工程

主题

  • 2 篇 computer science
  • 1 篇 computer simulat...
  • 1 篇 information syst...
  • 1 篇 ultrasonic imagi...
  • 1 篇 data security
  • 1 篇 access control
  • 1 篇 support vector m...
  • 1 篇 lymph nodes
  • 1 篇 leak detection
  • 1 篇 public key crypt...
  • 1 篇 filtering
  • 1 篇 informatics
  • 1 篇 robust guarantee...
  • 1 篇 lymphatic system
  • 1 篇 history
  • 1 篇 connectivity
  • 1 篇 nodes
  • 1 篇 bit error rate
  • 1 篇 educational inst...
  • 1 篇 linear matrix in...

机构

  • 2 篇 department of co...
  • 2 篇 department of co...
  • 1 篇 inst. of comput ...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 institute of com...
  • 1 篇 department of me...
  • 1 篇 institute of com...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of el...
  • 1 篇 institute of com...

作者

  • 2 篇 chuanfeng li
  • 1 篇 zeyu sun
  • 1 篇 chuan-yu chang
  • 1 篇 shyue-liang wang
  • 1 篇 guo-cheng lan
  • 1 篇 shao-jer chen
  • 1 篇 tzung-pei hong
  • 1 篇 j.c.r. tseng
  • 1 篇 yongji wang
  • 1 篇 leou jj
  • 1 篇 xiang gao
  • 1 篇 w.-p. yang
  • 1 篇 vincent s. tseng
  • 1 篇 chang cy
  • 1 篇 shu-lin hwang
  • 1 篇 cheng-ting lai
  • 1 篇 feipei lai

语言

  • 7 篇 英文
检索条件"机构=Institute of Computer Science and InformationEngineering"
7 条 记 录,以下是1-10 订阅
排序:
Optimization Coverage of Nonlinear Sequence Nodes Based on Mobile Strategy in WSN
Optimization Coverage of Nonlinear Sequence Nodes Based on M...
收藏 引用
2012 International Conference on Modelling,Identification and Control(建模、辨别与控制国际会议 ICMIC 2012)
作者: Zeyu Sun Chuanfeng Li Department of Computer and Information Engineering of Luoyang Institute of Science and Technology Lu Department of Computer and InformationEngineering of Luoyang Institute of Science and Technology Luo
This paper proposes one kind nonlinear sequence node coverage optimization algorithm based on the mobile strategy, which establishes the sensor node and the target node mapping relation *** uses geometric graphic in t... 详细信息
来源: 评论
An improved approach for sequential utility pattern mining
An improved approach for sequential utility pattern mining
收藏 引用
IEEE International Conference on Granular Computing (GRC)
作者: Guo-Cheng Lan Tzung-Pei Hong Vincent S. Tseng Shyue-Liang Wang Department of Computer Science and InformationEngineering National Cheng Kung University Taiwan Department of Computer Science and Information Engineering National University of Kaohsiung Taiwan Department of Computer Science and Engineering National Sun Yat-sen University Taiwan Department of Computer Science and InformationEngineering Institute of Medical Informatics National Cheng Kung University Taiwan
In this paper, we propose an efficient projection-based algorithm to discover high sequential utility patterns from quantitative sequence databases. An effective pruning strategy in the proposed algorithm is designed ... 详细信息
来源: 评论
Robust Guaranteed Cost Control for BTT Vehicle Based on LMI
Robust Guaranteed Cost Control for BTT Vehicle Based on LMI
收藏 引用
2012 International Conference on Modelling,Identification and Control(建模、辨别与控制国际会议 ICMIC 2012)
作者: Chuanfeng Li Xiang Gao Yongji Wang Department of Computer and Information Engineering of Luoyang Institute of Science and Technology Lu Department of Computer and InformationEngineering of Luoyang Institute of Science and Technology Luo Department of Control Science andEngineering Huazhong University of Science and TechnologyWuhan430
BTT(Bank-to-Turn) vehicle is a kind of typical nonlinear system which has parametric uncertainty and heavy exogenous *** paper presents a partial linearization method use of robust guaranteed cost control techniques f... 详细信息
来源: 评论
Applying the Particle Swarm Optimization and Boltzmann Function for Feature Selection and Classification of Lymph Node in Ultrasound Images
Applying the Particle Swarm Optimization and Boltzmann Funct...
收藏 引用
International Conference on Intelligent Systems Design and Applications (ISDA)
作者: Chuan-Yu Chang Cheng-Ting Lai Shao-Jer Chen Department of Computer and Communication Engineering National Yunlin University of Science and Technology Yunlin Taiwan Institute of Computer Science and InformationEngineering National Yunlin University of Science and Technology Yunlin Taiwan Department of Medical Imaging Buddhist Tzu Chi General Hospital Chiayi Taiwan
A lymph node (LN), which can resist virus and germs, is part of the lymphatic system that exists in the human body and every apparatus inside it. There are many kinds of pathological changes in LN. Metastatic is one o... 详细信息
来源: 评论
Two cache lines prediction for a wide-issue micro-architecture
Two cache lines prediction for a wide-issue micro-architectu...
收藏 引用
computer Systems Architecture Conference (ACSAC), Australasian
作者: Shu-Lin Hwang Feipei Lai Department of Electrical Engineering MinGchi Institute of Technology Taipei Taiwan Department of Computer Science and InformationEngineering National Taiwan University Taipei Taiwan
Modern micro-architectures employ superscalar techniques to enhance system performance. The superscalar microprocessors must fetch at least one instruction cache line at a time to support high issue rate and large amo... 详细信息
来源: 评论
Detection and elimination of 2-D transmission error patterns in DPCM images
收藏 引用
IEEE TRANSACTIONS ON COMMUNICATIONS 1996年 第10期44卷 1251-1256页
作者: Chang, CY Leou, JJ Institute of Computer Science and InformationEngineering National Chung Engineering University Chiayi Taiwan Inst. of Comput Sci. & Inf. Eng. Nat. Chung Cheng Univ. Chiayi Taiwan
The paper studies two methods for detecting and removing channel error patterns in images transmitted by two-dimensional differential-pulse-code-modulation (2-D DPCM) with fixed-length words. The methods are based on ... 详细信息
来源: 评论
A new access control scheme with high data security
A new access control scheme with high data security
收藏 引用
International Phoenix Conference on computers and Communications (IPCCC)
作者: J.C.R. Tseng W.-P. Yang Institute of Computer Science and InformationEngineering National Chiao Tung University Taiwan
A GMH (generalized Merkle-Hellman) cryptosystem is presented, and two theorems are proved to ensure its correctness. The GMH cryptosystem is very suitable for those application domains in which data protection is need... 详细信息
来源: 评论