×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
清华大学 [9]
武汉大学 [7]
软件研究所 [6]
北京航空航天大学 [5]
西安交通大学 [4]
长春光学精密机械与物... [4]
更多...
内容类型
期刊论文 [37]
会议论文 [17]
学位论文 [2]
发表日期
2021 [2]
2019 [2]
2018 [2]
2017 [4]
2016 [6]
2015 [4]
更多...
学科主题
Biochemist... [2]
Biophysics [2]
Computer S... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共56条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Ensuring the Correctness of Regular Expressions: A Review
期刊论文
International Journal of Automation and Computing, 2021, 卷号: 18, 期号: 4, 页码: 521-535
作者:
Li-Xiao Zheng
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/07/20
Regular expressions
correctness
string generation
learning
static checking
verification
visualization, repairing
A two-stage temporal proposal network for precise action localization in untrimmed video
期刊论文
International Journal of Machine Learning and Cybernetics, 2021, 卷号: 12, 期号: 8, 页码: 2199-2211
作者:
Wang F(王斐)
;
Wang, Guorui
;
Du, Yuxuan
;
He, Zhenquan
;
Jiang Y(姜勇)
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2021/04/24
Action detection
Correctness discriminator
Extended context pooling
Temporal context regression
Accuracy of X-ray diffraction measurement of residual stresses in shot peened titanium alloy samples
期刊论文
NONDESTRUCTIVE TESTING AND EVALUATION, 2019, 卷号: 34, 页码: 164-177
作者:
Fu, Xuesong
;
Niu, Zhiqiang
;
Deng, Ying
;
Zhang, Jie
;
Liu, Chongyuan
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2019/12/02
Residual stress
shot peening
accuracy
correctness
uncertainty
Fine-Grained Formal Specification and Analysis of Buddy Memory Allocation in Zephyr RTOS
会议论文
2019 IEEE 22ND INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING (ISORC 2019), 2019-01-01
作者:
Zhang Feng
;
Zhao Yongwang
;
Ma Dianfu
;
Niu Wensheng
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/30
Zephyr
Buddy memory allocation
Functional correctness
Fine-grained formal specification and analysis
Analysis of Five Clustering Algorithms in Quantitative Method Research
会议论文
2018 25TH ANNUAL INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING, 2018-01-01
作者:
Huang Fu
;
Hou Hai-yan
;
Hu Zhi-gang
;
Wang Ya-jie
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/02
Clustering algorithm
Quantitative methods
Cluster validity
Correctness
An ORAM-based privacy preserving data sharing scheme for cloud storage
期刊论文
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 卷号: 39, 页码: 1-9
作者:
Yuan, Dandan
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/11
Data share
Oblivious random access memory (ORAM)
Access pattern
Shuffle correctness proof
Incremental Topological Surface Reconstruction from Massive Point Cloud Data
期刊论文
Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2017, 卷号: 29, 页码: 2117-2122
作者:
Bo, Zhicheng
;
Sun, Dianzhu
;
Li, Yanrui
;
Xu, Zhao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/26
Delau-nay triangulations
Local Delaunay triangulation
Local reconstruction process
Point cloud
Sampling densities
Surface reconstruction algorithms
Topological correctness
Triangular meshes
Implementation of WHO multimodal strategy for improvement of hand hygiene: a quasi-experimental study in a Traditional Chinese Medicine hospital in Xi'an, China
期刊论文
ANTIMICROBIAL RESISTANCE AND INFECTION CONTROL, 2017, 卷号: 6
作者:
Shen, Li
;
Wang, Xiaoqing
;
An, Junming
;
An, Jialu
;
Zhou, Ning
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/26
Healthcare-associated infection
Compliance
Correctness
Hand hygiene
Automatic Extraction of Urban Road Network by Integrated Processing of Aerial Images and LIDAR Data.
学位论文
2017
作者:
KerbouciAhmed
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/05
urban road extraction
morphological operations
Image based-color
Correctness
Quality
Detecting the Detectable: Unintended Consequences of Cryptographic Election Verification
期刊论文
IEEE Security and Privacy, 2017, 页码: 1
作者:
AleksanderEssex
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/24
Cryptography
Privacy
Electronic
voting
Malware
D
Software/Software
Engineering
D.4
Operating
Systems
D.4.6
Security
and
Privacy
Protection
D.4.6.c
Cryptographic
controls
H
Information
Technology
and
Systems
H.2
Database
Management
H.2.0
General
H.2.0.a
Security,
integrity,
and
protection
D.2
Software
Engineering
D.2.4
Software/Program
Verification
D.2.4.c
Correctness
proofs
©版权所有 ©2017 CSpace - Powered by
CSpace