CSpace

浏览/检索结果: 共36条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Computation of arbitrage in a financial market with various types of frictions 期刊论文
ALGORITHMIC APPLICATIONS IN MANAGEMENT, PROCEEDINGS, 2005, 卷号: 3521, 页码: 270-280
作者:  Cai, MC;  Deng, XT;  Li, ZF
收藏  |  浏览/下载:94/0  |  提交时间:2018/07/30
A novel regularized fisher discriminant method for face recognition based on subspace and rank lifting scheme 期刊论文
AFFECTIVE COMPUTING AND INTELLIGENT INTERACTION, PROCEEDINGS, 2005, 卷号: 3784, 页码: 152-159
作者:  Chen, WS;  Yuen, PC;  Huang, J;  Lai, JH;  Tang, JL
收藏  |  浏览/下载:90/0  |  提交时间:2018/07/30
face recognition  linear discriminant analysis  small sample size problem  regularized method  null space  
Measuring inconsistency in requirements specifications 期刊论文
SYMBOLIC AND QUANTITATIVE APPROACHES TO REASONING WITH UNCERTAINTY, PROCEEDINGS, 2005, 卷号: 3571, 页码: 440-451
作者:  Mu, KD;  Jin, Z;  Lu, RQ;  Liu, WR
收藏  |  浏览/下载:81/0  |  提交时间:2018/07/30
Polyhedral scene analysis combining parametric propagation with calotte analysis 期刊论文
COMPUTER ALGEBRA AND GEOMETRIC ALGEBRA WITH APPLICATIONS, 2005, 卷号: 3519, 页码: 383-402
作者:  Li, HB;  Zhao, LN;  Chenl, Y
收藏  |  浏览/下载:85/0  |  提交时间:2018/07/30
polyhedral scene analysis  imaging algebra  Crassmann-Cayley algebra  constraint satisfaction  projective reconstruction  
A novel Fisher criterion based S-t-subspace linear discriminant method for face recognition 期刊论文
COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 1, PROCEEDINGS, 2005, 卷号: 3801, 页码: 933-940
作者:  Chen, WS;  Yuen, PC;  Huang, J;  Lai, JH
收藏  |  浏览/下载:89/0  |  提交时间:2018/07/30
On Wintner's conjecture about central configurations 期刊论文
COMPUTER ALGEBRA AND GEOMETRIC ALGEBRA WITH APPLICATIONS, 2005, 卷号: 3519, 页码: 1-4
作者:  Wu, WT
收藏  |  浏览/下载:84/0  |  提交时间:2018/07/30
celestial mechanics  central configurations  Wintner's conjecture  extrernal values  extremal zeroes  finite kernel theorem  
Ontology-based inconsistency management of software requirements specifications 期刊论文
SOFSEM 2005:THEORY AND PRACTICE OF COMPUTER SCIENCE, 2005, 卷号: 3381, 页码: 340-349
作者:  Zhu, XF;  Jin, Z
收藏  |  浏览/下载:56/0  |  提交时间:2018/07/30
Security analysis of three cryptographic schemes from other cryptographic schemes 期刊论文
INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 卷号: 3822, 页码: 290-301
作者:  Chow, SSM;  Cao, ZJ;  Liu, JK
收藏  |  浏览/下载:74/0  |  提交时间:2018/07/30
group signature  signcryption  identity-based signature  proxy signature  secret sharing  bilinear pairings  
nD object representation and detection from single 2D line drawing 期刊论文
COMPUTER ALGEBRA AND GEOMETRIC ALGEBRA WITH APPLICATIONS, 2005, 卷号: 3519, 页码: 363-382
作者:  Li, HB;  Wang, Q;  Zhao, LN;  Chen, Y;  Huang, L
收藏  |  浏览/下载:98/0  |  提交时间:2018/07/30
Minimum-cost optimization in multicommodity logistic chain network 期刊论文
COMPUTER ALGEBRA AND GEOMETRIC ALGEBRA WITH APPLICATIONS, 2005, 卷号: 3519, 页码: 97-104
作者:  Li, HX;  Tian, SC;  Pan, Y;  Zhang, X;  Yu, XC
收藏  |  浏览/下载:109/0  |  提交时间:2018/07/30
transportation network management  network operations  multicommodity flow  maximal-flow algorithm  minimum-cost optimization