派博傳思國際中心

標(biāo)題: Titlebook: EurAsia-ICT 2002: Information and Communication Technology; First EurAsian Confe Hassan Shafazand,A. Min Tjoa Conference proceedings 2002 S [打印本頁]

作者: HEM    時(shí)間: 2025-3-21 16:12
書目名稱EurAsia-ICT 2002: Information and Communication Technology影響因子(影響力)




書目名稱EurAsia-ICT 2002: Information and Communication Technology影響因子(影響力)學(xué)科排名




書目名稱EurAsia-ICT 2002: Information and Communication Technology網(wǎng)絡(luò)公開度




書目名稱EurAsia-ICT 2002: Information and Communication Technology網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱EurAsia-ICT 2002: Information and Communication Technology被引頻次




書目名稱EurAsia-ICT 2002: Information and Communication Technology被引頻次學(xué)科排名




書目名稱EurAsia-ICT 2002: Information and Communication Technology年度引用




書目名稱EurAsia-ICT 2002: Information and Communication Technology年度引用學(xué)科排名




書目名稱EurAsia-ICT 2002: Information and Communication Technology讀者反饋




書目名稱EurAsia-ICT 2002: Information and Communication Technology讀者反饋學(xué)科排名





作者: 粗野    時(shí)間: 2025-3-21 23:45
Application of Constraint Hierarchy to Timetabling Problemsrs since it is one of the most challenging problems in the domain. The present paper considers the application of the hierarchy of constraints which was used for the University timetabling problem. The hierarchy of constraints allows users to specify their preferences according to which the system i
作者: Factual    時(shí)間: 2025-3-22 03:58
An Intelligent System for Therapy Control in a Distributed Organizationtion system based on a multi-agent architecture, integrating knowledge-based techniques and classical information analysis and management techniques. CommonKADS was used for the design of some knowledge-based agents. Internet implementation and integration was done in a knowledge-based system implem
作者: 男生戴手銬    時(shí)間: 2025-3-22 04:46
Discovering Local Patterns from Multiple Temporal Sequences pattern is represented by a pattern . and a time period in which . is frequent. Such patterns are actually very common in practice and are potentially very useful. However it is impractical to use traditional methods on this problem directly. We propose a suffix-tree-like data structure for indexin
作者: 牢騷    時(shí)間: 2025-3-22 12:32

作者: libertine    時(shí)間: 2025-3-22 13:59
Discovering Temporal Relation Rules Mining from Interval DataWe present two new algorithms for discovering temporal relationships: one is to preprocess an algorithm for the generalization of temporal interval data and to transform timestamp data into temporal interval data; and the other is to use a temporal relation algorithm for mining temporal relation rul
作者: libertine    時(shí)間: 2025-3-22 18:03

作者: jaunty    時(shí)間: 2025-3-23 01:07
Motion Estimation Based on Temporal Correlationsplexity of the problem makes such techniques very difficult to be applied to high-resolution applications in a real time environment. If a priori knowledge about the motion of the current block is available before the motion estimation, a better starting point for the search of an optimal motion vec
作者: multiply    時(shí)間: 2025-3-23 02:34
A New Boundary Matching Algorithm Based on Edge Detectionds to severe degradation in image quality. In this paper, a new error concealment algorithm, called EBMA (Edge Detection based Boundary Matching Algorithm), is proposed to repair damaged portions of the video frames in the receiver. Conventional BMA (Boundary Matching Algorithm) assumes that the pix
作者: 泥瓦匠    時(shí)間: 2025-3-23 06:51
Lookmark: A 2.5D Web Information Visualization Systemsk. The Lookmark system offers the user the opportunity of taking individual web pages and structuring and managing them within a 2.5- dimensional space. The paper discusses relevant related work in the field of Information Visualization and Interaction, design issues and the implementation of Lookm
作者: 浪蕩子    時(shí)間: 2025-3-23 11:34

作者: geriatrician    時(shí)間: 2025-3-23 16:54

作者: 披肩    時(shí)間: 2025-3-23 20:48
Coaching a Soccer Simulation Team in RoboCup Environmentver the world. In this field, every year a formal federation holds international competitions, called RoboCup [.]. The Simulation League is one of the branches of the RoboCup..We have designed and implemented an online coach for a soccer simulation team, which is able to analyze the simulated match
作者: 抵押貸款    時(shí)間: 2025-3-24 02:04

作者: Pde5-Inhibitors    時(shí)間: 2025-3-24 03:52

作者: jovial    時(shí)間: 2025-3-24 08:25
Parallel Algorithm and Architecture for Public-Key Cryptosystemble all one polynomial as a modulus and computes two modular multiplications in parallel. The architecture is based on cellular automata and has smaller area and time complexity than previous architectures. Since the proposed architecture has regularity, modularity and concurrency, it is suitable fo
作者: 一大群    時(shí)間: 2025-3-24 14:04
Specification and Verification of Security Policies in Firewallsional security policies using low level and order-dependent rules. Furthermore, dependency of firewalls to the network topology, frequent changes in network topology (specially in dynamic networks), and lack of a method for analysis and verification of specified security policy may reduce to inconsi
作者: antiandrogen    時(shí)間: 2025-3-24 16:57
Image Segmentation Based on Shape Space Modelingfrom the initial curve and we assume that the shape space is linear, it can be decomposed into the column space and the left null space of the shape matrix. In the proposed method, the shape space vector in the column space describes changes from the initial curve to the imaginary feature curve, and
作者: Intend    時(shí)間: 2025-3-24 21:12
0302-9743 anized in parallel with the EurAsia ICT conference. The proceedings of these workshops, with more than 100 papers, were published by the Austrian Computer Society. We would like to express our 978-3-540-00028-0978-3-540-36087-2Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: corporate    時(shí)間: 2025-3-24 23:27

作者: 對(duì)手    時(shí)間: 2025-3-25 06:58

作者: 人類學(xué)家    時(shí)間: 2025-3-25 10:49
Conference proceedings 2002ation, a task which was not easy due to the high quality of the submitted papers. Eleven workshops were organized in parallel with the EurAsia ICT conference. The proceedings of these workshops, with more than 100 papers, were published by the Austrian Computer Society. We would like to express our
作者: 松緊帶    時(shí)間: 2025-3-25 14:23
https://doi.org/10.1007/978-3-642-68912-3refore, the proposed approach needs very few computations and the experiment shows an improvement of the performance over the conventional BMA in terms of both subjective and objective quality of video sequences.
作者: 燈泡    時(shí)間: 2025-3-25 16:13

作者: 土坯    時(shí)間: 2025-3-25 23:16

作者: 物質(zhì)    時(shí)間: 2025-3-26 01:36
Specification and Verification of Security Policies in Firewallson of security policies. We designed and implemented a tool based on theorem proving for detecting inconsistencies, coverage, as well as applying a query on the specified policy. Results of analysis can be used to detect security vulnerabilities.
作者: 細(xì)菌等    時(shí)間: 2025-3-26 05:47
https://doi.org/10.1057/9780230500181ee for indexing the metric spaces. The data structures for indexing the vector spaces lead rather to exact matching queries while the structures for indexing the metric spaces allow us to provide the similarity queries.
作者: 符合你規(guī)定    時(shí)間: 2025-3-26 11:26

作者: Observe    時(shí)間: 2025-3-26 15:26

作者: 愛社交    時(shí)間: 2025-3-26 17:21
https://doi.org/10.1057/9780230293489as used for the University timetabling problem. The hierarchy of constraints allows users to specify their preferences according to which the system is looking for solutions that can satisfy most of the users.
作者: MOTIF    時(shí)間: 2025-3-27 00:58

作者: 突襲    時(shí)間: 2025-3-27 05:03

作者: Dealing    時(shí)間: 2025-3-27 07:55

作者: nautical    時(shí)間: 2025-3-27 11:19

作者: 暫時(shí)中止    時(shí)間: 2025-3-27 16:47
https://doi.org/10.1007/978-3-662-53336-9er area and time complexity than previous architectures. Since the proposed architecture has regularity, modularity and concurrency, it is suitable for VLSI implementation. The proposed architecture can be used as a basic architecture for the public-key cryptosystems.
作者: 天真    時(shí)間: 2025-3-27 18:57

作者: badinage    時(shí)間: 2025-3-27 22:23

作者: 葡萄糖    時(shí)間: 2025-3-28 02:37
Discovering Temporal Relation Rules Mining from Interval Datata and to transform timestamp data into temporal interval data; and the other is to use a temporal relation algorithm for mining temporal relation rules and to discover the rules from temporal interval data. This technique can provide more useful knowledge in comparison with other conventional data mining techniques.
作者: 債務(wù)    時(shí)間: 2025-3-28 10:10
A Prototype for Functionality Based Network Management Systemap handling and log processing are distributed and segregated that reduces the consumption of network bandwidth and processing load. The top-level manager and the middle level managers work cooperatively and provide intelligence, greater autonomy and automation.
作者: evanescent    時(shí)間: 2025-3-28 13:03

作者: myriad    時(shí)間: 2025-3-28 17:41

作者: Generosity    時(shí)間: 2025-3-28 22:19

作者: anus928    時(shí)間: 2025-3-29 01:32
Dictionary of Mathematical Geosciencesmage similarity measure based on EPNI components is also designed and compared with some other measures known from the literature. Experimental results show a good recognition accuracy in a data set containing a wide range of color images.
作者: Bombast    時(shí)間: 2025-3-29 06:44

作者: 落葉劑    時(shí)間: 2025-3-29 10:41

作者: Anthropoid    時(shí)間: 2025-3-29 15:12

作者: 羅盤    時(shí)間: 2025-3-29 19:02
Improving Information Retrieval System Security via an Optimal Maximal Coding Schemecomputational difficulty and the information-theoretic impossibility point of view, the problem of breaking an optimal maximal code is further investigated. Due to the Huffman code being a proper subclass of the optimal maximal code, which is good at applying to a large information retrieval system and consequently improving the system security.
作者: jumble    時(shí)間: 2025-3-29 19:56

作者: 在前面    時(shí)間: 2025-3-30 02:48

作者: AV-node    時(shí)間: 2025-3-30 05:40

作者: 燦爛    時(shí)間: 2025-3-30 12:01

作者: 嘴唇可修剪    時(shí)間: 2025-3-30 13:52

作者: CRAB    時(shí)間: 2025-3-30 18:48
https://doi.org/10.1007/978-3-662-53342-0erator to outline object boundaries, the proposed algorithm can ignore unwanted feature points generated by low-level image processing operations and is therefore applicable to images of the complex background. We can also compensate for limitations of the shape matrix with the dynamic graph search algorithm.
作者: farewell    時(shí)間: 2025-3-30 20:55

作者: Negotiate    時(shí)間: 2025-3-31 02:22

作者: Flavouring    時(shí)間: 2025-3-31 08:09
Different Local Search Algorithms in STAGE for Solving Bin Packing ProblemE’s success in solving this problem. Then by comparing the results of experiments on Bin-Packing problem, we analyze the effectiveness of steepest-descent hill climbing, stochastic hill climbing and first-improvement hill climbing as the local search algorithms in STAGE.
作者: Chronological    時(shí)間: 2025-3-31 11:22

作者: 怕失去錢    時(shí)間: 2025-3-31 14:33

作者: 竊喜    時(shí)間: 2025-3-31 20:35
Dictionary of International Commerceerification system, reference models of speakers and their decision thresholds should be already determined. Reference model and decision threshold updating can render a speaker verification system more robust against inter-session variability, due to changes in speaker’s voice and the diversity in
作者: 破譯密碼    時(shí)間: 2025-4-1 01:03

作者: 高度表    時(shí)間: 2025-4-1 04:47

作者: 要控制    時(shí)間: 2025-4-1 09:20

作者: intercede    時(shí)間: 2025-4-1 12:29





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
社旗县| 万州区| 白朗县| 恩施市| 龙州县| 平舆县| 翁牛特旗| 延吉市| 开平市| 天等县| 来凤县| 寻乌县| 神木县| 安塞县| 丰城市| 汕尾市| 抚远县| 鄂托克前旗| 略阳县| 来宾市| 青岛市| 平安县| 凤庆县| 长顺县| 沅陵县| 乌兰浩特市| 洞头县| 且末县| 美姑县| 长岭县| 东丽区| 通山县| 北辰区| 克东县| 若尔盖县| 密云县| 濉溪县| 富民县| 砚山县| 商都县| 青岛市|