×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [26]
内容类型
会议论文 [20]
期刊论文 [6]
发表日期
2014 [26]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共26条,第1-10条
帮助
限定条件
发表日期:2014
专题:山东大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A method of abnormal habits recognition in intelligent space
期刊论文
Engineering Applications of Artificial Intelligence: The International Journal of Intelligent Real-Time Automation, 2014, 页码: 125-133
作者:
Bin Huang
;
Guohui Tian
;
Hao Wu
;
Fengyu Zhou
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/17
Computer vision
ISUS
Human location
Abnormal habits recognition
Key points\' duration histogram
ILLUMINATION PROCESSING IN FACE RECOGNITION
期刊论文
INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2014, 卷号: 28, 期号: 5
作者:
Chen, Zhenxue
;
Liu, Chengyun
;
Chang, Faliang
;
Han, Xuzhen
;
Wang, Kaifang
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/17
Face recognition
illumination processing
self-quotient image
light
region
dark region
Multi-recipient encryption in heterogeneous setting
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 卷号: 8434 LNCS, 页码: 462-480
作者:
Wei, Puwen
;
Zheng, Yuliang
;
Wang, Wei
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/17
DEM
KEM
multi-recipient
public key encryption
sender recovery
(Pseudo-) preimage attacks on step-reduced HAS-160 and RIPEMD-160
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 卷号: 8783, 页码: 90-103
作者:
Wang, Gaoli
;
Shen, Yanzhao
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/17
Biclique
Differential meet-in-themiddle attack
HAS-160
Hash function
Preimage attack
RIPEMD-160
Fault-tolerant linear collision attack: A combination with correlation power analysis
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 卷号: 8434 LNCS, 页码: 232-246
作者:
Wang, Danhui
;
Wang, An
;
Zheng, Xuexin
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/17
correlation power analysis
linear collision attack
power analysis attack
test of chain
NLPMM: A next location predictor with Markov modeling
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 卷号: 8444 LNAI, 期号: PART 2, 页码: 186-197
作者:
Chen, Meng
;
Liu, Yang
;
Yu, Xiaohui
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/17
moving pattern
next location prediction
time factor
Colon flattening by landmark-driven optimal quasiconformal mapping
会议论文
17th International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2014, 14 September 2014 through 18 September 2014
作者:
Zeng, Wei
;
Yang, Yi-Jun
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/31
Illumination Invariance Face Recognition Using Wavelet Coefficients and Local Binary Pattern
会议论文
作者:
Hua LU
;
Ming-qiang YANG
;
Xian-ye BEN
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/31
Wavelet transform
Illumination variations
Local binary pattern
An Improved Method of Statistical Model for Text Segmentation
会议论文
4th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), NOV 15-17, 2013
作者:
Li, Xiaojin
;
Han, Aili
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/31
text segmentation
dynamic programming
artificial intelligence
A (1.408+Ε)-approximation algorithm for sorting unsigned genomes by reciprocal translocations
会议论文
8th International Frontiers of Algorithmics Workshop, FAW 2014, June 28, 2014 - June 30, 2014
作者:
Jiang, Haitao
;
Wang, Lusheng
;
Zhu, Binhai
;
Zhu, Daming
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/31
©版权所有 ©2017 CSpace - Powered by
CSpace