CORC

浏览/检索结果: 共68条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
histogram-based image hashing for searching content-preserving copies 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 卷号: 6730 LNCS, 页码: 83-108
Xiang Shijun; Kim Hyoung Joong
收藏  |  浏览/下载:7/0  |  提交时间:2013/10/08
a variant of boyen-waters anonymous ibe scheme 会议论文
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Luo Song; Shen Qingni; Jin Yongming; Chen Yu; Chen Zhong; Qing Sihan
收藏  |  浏览/下载:14/0  |  提交时间:2013/10/08
trusted subjects configuration based on te model in mls systems 会议论文
2nd International Conference on Trusted Systems, INTRUST 2010, Beijing, China, December 1
Li Shangjie; He Yeping
收藏  |  浏览/下载:9/0  |  提交时间:2013/10/08
face sketch synthesis via multivariate output regression 会议论文
14th International Conference on Human-Computer Interaction, HCI International 2011, Orlando, FL, United states, 9-Jul-20
Chang Liang; Zhou Mingquan; Deng Xiaoming; Wu Zhongke; Han Yanjun
收藏  |  浏览/下载:9/0  |  提交时间:2011/10/10
fully utilize feedbacks: language model based relevance feedback in information retrieval 会议论文
7th International Conference on Advanced Data Mining and Applications, ADMA 2011, Beijing, China, December 1
Lv Sheng-Long; Deng Zhi-Hong; Yu Hang; Gao Ning; Jiang Jia-Jian
收藏  |  浏览/下载:22/0  |  提交时间:2013/10/08
maximum volume clustering 会议论文
14th International Conference on Artificial Intelligence and Statistics, AISTATS 2011, Fort Lauderdale, FL, United states, April 11, 2011 - April 13, 2011
Gang Niu; Bo Dai; Lin Shang; Masashi Sugiyama
收藏  |  浏览/下载:21/0  |  提交时间:2013/10/08
an video shot segmentation scheme based on adaptive binary searching and sift 会议论文
7th International Conference on Intelligent Computing, ICIC 2011, Zhengzhou, China, August 11, 2011 - August 14, 2011
Jiang Xinghao; Sun Tanfeng; Liu Jin; Zhang Wensheng; Chao Juan
收藏  |  浏览/下载:9/0  |  提交时间:2013/10/08
comments on the sm2 key exchange protocol 会议论文
10th International Conference on Cryptography and Network Security, CANS 2011, Sanya, China, December 1
Xu Jing; Feng Dengguo
收藏  |  浏览/下载:10/0  |  提交时间:2013/10/08
computational soundness about formal encryption in the presence of secret shares and key cycles 会议论文
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Lei Xinfeng; Xue Rui; Yu Ting
收藏  |  浏览/下载:7/0  |  提交时间:2013/10/08
towards attribute revocation in key-policy attribute based encryption 会议论文
10th International Conference on Cryptography and Network Security, CANS 2011, Sanya, China, December 1
Wang Pengpian; Feng Dengguo; Zhang Liwu
收藏  |  浏览/下载:11/0  |  提交时间:2013/10/08


©版权所有 ©2017 CSpace - Powered by CSpace