Frontiers of Computer Science in China最新文献

筛选
英文 中文
Efficient normalized cross correlation calculation method for stereo vision based robot navigation 基于立体视觉的机器人导航的高效归一化互相关计算方法
Frontiers of Computer Science in China Pub Date : 2011-06-01 DOI: 10.1007/s11704-011-9190-2
Yehu Shen
{"title":"Efficient normalized cross correlation calculation method for stereo vision based robot navigation","authors":"Yehu Shen","doi":"10.1007/s11704-011-9190-2","DOIUrl":"https://doi.org/10.1007/s11704-011-9190-2","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"5 1","pages":"227-235"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-011-9190-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52660698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI 基于EFI的通用可信计算便携式TPM方案的设计与实现
Frontiers of Computer Science in China Pub Date : 2011-06-01 DOI: 10.1007/s11704-011-9180-4
Lei Han, Jiqiang Liu, Zhen Han, Xueye Wei
{"title":"Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI","authors":"Lei Han, Jiqiang Liu, Zhen Han, Xueye Wei","doi":"10.1007/s11704-011-9180-4","DOIUrl":"https://doi.org/10.1007/s11704-011-9180-4","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"23 1","pages":"169-180"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-011-9180-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52661064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fingerprint segmentation based on an AdaBoost classifier 基于AdaBoost分类器的指纹分割
Frontiers of Computer Science in China Pub Date : 2011-06-01 DOI: 10.1007/s11704-011-9134-x
Eryun Liu, Heng Zhao, Fangfei Guo, Jimin Liang, Jie Tian
{"title":"Fingerprint segmentation based on an AdaBoost classifier","authors":"Eryun Liu, Heng Zhao, Fangfei Guo, Jimin Liang, Jie Tian","doi":"10.1007/s11704-011-9134-x","DOIUrl":"https://doi.org/10.1007/s11704-011-9134-x","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"5 1","pages":"148-157"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-011-9134-x","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52660418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions 对Maiorana-McFarland函数过滤的流密码的再同步攻击
Frontiers of Computer Science in China Pub Date : 2011-06-01 DOI: 10.1007/s11704-011-9158-2
Wenfeng Yang, Yu-pu Hu
{"title":"A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions","authors":"Wenfeng Yang, Yu-pu Hu","doi":"10.1007/s11704-011-9158-2","DOIUrl":"https://doi.org/10.1007/s11704-011-9158-2","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"5 1","pages":"158-162"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-011-9158-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52660521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Psu: a novel low-latency constant-degree overlay network Psu:一种新型的低延迟恒度覆盖网络
Frontiers of Computer Science in China Pub Date : 2011-06-01 DOI: 10.1007/s11704-011-0033-y
Lan Li, W. Xiao
{"title":"Psu: a novel low-latency constant-degree overlay network","authors":"Lan Li, W. Xiao","doi":"10.1007/s11704-011-0033-y","DOIUrl":"https://doi.org/10.1007/s11704-011-0033-y","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"5 1","pages":"250-258"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-011-0033-y","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52658141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improving performance by creating a native join-index for OLAP 通过为OLAP创建本机连接索引来提高性能
Frontiers of Computer Science in China Pub Date : 2011-06-01 DOI: 10.1007/s11704-011-9181-3
Yansong Zhang, Shan Wang, Jiaheng Lu
{"title":"Improving performance by creating a native join-index for OLAP","authors":"Yansong Zhang, Shan Wang, Jiaheng Lu","doi":"10.1007/s11704-011-9181-3","DOIUrl":"https://doi.org/10.1007/s11704-011-9181-3","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"5 1","pages":"236-249"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-011-9181-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52661176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Individual difference of artificial emotion applied to a service robot 应用于服务机器人的人工情感的个体差异
Frontiers of Computer Science in China Pub Date : 2011-06-01 DOI: 10.1007/s11704-010-0145-9
Wei Wang, Zhiliang Wang, Siyi Zheng, Xuejing Gu
{"title":"Individual difference of artificial emotion applied to a service robot","authors":"Wei Wang, Zhiliang Wang, Siyi Zheng, Xuejing Gu","doi":"10.1007/s11704-010-0145-9","DOIUrl":"https://doi.org/10.1007/s11704-010-0145-9","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"5 1","pages":"216-226"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-010-0145-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52655983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A simple fingerprinting scheme for large user groups 针对大型用户组的简单指纹识别方案
Frontiers of Computer Science in China Pub Date : 2011-06-01 DOI: 10.1007/s11704-011-9163-5
D. Hu, Qiaoliang Li
{"title":"A simple fingerprinting scheme for large user groups","authors":"D. Hu, Qiaoliang Li","doi":"10.1007/s11704-011-9163-5","DOIUrl":"https://doi.org/10.1007/s11704-011-9163-5","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"5 1","pages":"163-168"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-011-9163-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52660578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Resolving conflicts between negotiation success and sensitive information protection in automated trust negotiation 解决自动信任协商中协商成功与敏感信息保护之间的冲突
Frontiers of Computer Science in China Pub Date : 2011-06-01 DOI: 10.1007/s11704-011-9307-7
Bailing Liu, Feng Xiao, Ke Deng
{"title":"Resolving conflicts between negotiation success and sensitive information protection in automated trust negotiation","authors":"Bailing Liu, Feng Xiao, Ke Deng","doi":"10.1007/s11704-011-9307-7","DOIUrl":"https://doi.org/10.1007/s11704-011-9307-7","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"5 1","pages":"135-147"},"PeriodicalIF":0.0,"publicationDate":"2011-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-011-9307-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52660780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Behavior pattern extraction by trajectory analysis 基于轨迹分析的行为模式提取
Frontiers of Computer Science in China Pub Date : 2011-03-01 DOI: 10.1007/s11704-010-0074-7
Jia Wen, C. Li, Z. Xiong
{"title":"Behavior pattern extraction by trajectory analysis","authors":"Jia Wen, C. Li, Z. Xiong","doi":"10.1007/s11704-010-0074-7","DOIUrl":"https://doi.org/10.1007/s11704-010-0074-7","url":null,"abstract":"","PeriodicalId":49201,"journal":{"name":"Frontiers of Computer Science in China","volume":"5 1","pages":"37-44"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11704-010-0074-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52655000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信