CORC

浏览/检索结果: 共9条,第1-9条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
FVBM:A Filter-Verification-Based Method for Finding Top-k Closeness Centrality on Dynamic Social Networks 其他
2016-01-01
Yiyong Lin; Jinbo Zhang; Yuanxiang Ying; Shenda Hong; Hongyan Li
收藏  |  浏览/下载:7/0  |  提交时间:2017/12/03
Real-time Activity Recognition on Smartphones Using Deep Neural Networks 其他
2015-01-01
Zhang, Licheng; Wu, Xihong; Luo, Dingsheng
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
Query Based Hybrid Learning Models for Adaptively Adjusting Locality 其他
2012-01-01
Zhu, Yuanchun; Mi, Guyue; Tan, Ying
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/13
Reconfiguration algorithm for low temperature sub-array on VLSI/WSI arrays with faults 其他
2011-01-01
Jigang, Wu; Niu, Zhipeng; Zhu, Yuanbo; Srikanthan, Thambipillai; Shen, Qingni
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/13
High-performance drosophila movement tracking 其他
2011-01-01
Yu, Xiaoyi; Zhou, Han; Wu, Lingyi; Liu, Qingfeng
收藏  |  浏览/下载:2/0  |  提交时间:2015/11/12
An Adjacency Matrixes-based Model for Network Security Analysis 其他
2010-01-01
Xie, Anming; Tang, Cong; Gui, Nike; Cai, Zhuhua; Hu, Jianbin; Chen, Zhong
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/16
Optimal infostation deployment for spatio-temporal information dissemination 其他
2010-01-01
Xiong, Yongping; Tian, Rui; Ma, Jian; Liu, Yan; Sun, Limin
收藏  |  浏览/下载:1/0  |  提交时间:2015/11/13
Evaluating Network Security With Two-layer Attack Graphs 其他
2009-01-01
Xie, Anming; Cai, Zhuhua; Tang, Cong; Hu, Jianbin; Chen, Zhong
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/12
Digital Storage System for Newly Twice-Imaging Airborne Camera Device 其他
2008-01-01
Yan, L.; Sheng, T. T.; Duan, X. H.; Wu, Y. K.; Zhao, S. H.
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/12


©版权所有 ©2017 CSpace - Powered by CSpace