UM

浏览/检索结果: 共5条,第1-5条 帮助

限定条件            
已选(0)清除 条数/页:   排序方式:
Huber collaborative representation for robust face identification Conference paper
International Conference on Wavelet Analysis and Pattern Recognition
作者:  Wang Y.-L.;  Zou C.-M.;  Tang Y.Y.;  Yang L.-N.
收藏  |  浏览/下载:4/0  |  提交时间:2019/02/11
Collaborative representation  Face recognition  M-estimation  
Compact Neural Modeling of Single Flow Zinc-Nickel Batteries Based on Jaya Optimization Conference paper
2018 IEEE Congress on Evolutionary Computation, CEC 2018 - Proceedings
作者:  Zhang L.;  Li K.;  Yang Z.;  Li X.;  Guo Y.;  Du D.;  Wong C.
收藏  |  浏览/下载:1/0  |  提交时间:2019/03/04
A Software Popularity Recommendation Method Based on Evaluation Model Conference paper
Proceedings - International Computer Software and Applications Conference
作者:  Wang Y.;  Bai P.-X.;  Yang D.-Y.;  Zhou J.-T.;  Song X.
收藏  |  浏览/下载:0/0  |  提交时间:2018/12/22
Evaluation model  Recommendation  Software popularity  Software sharing platform  
Reliability-Based Design of Basal Heave Stability for Braced Excavation Using Three Different Methods Conference paper
Springer Series in Geomechanics and Geoengineering
作者:  Zhou W.-H.;  Mu Y.;  Qi X.-H.;  Yang S.
收藏  |  浏览/下载:0/0  |  提交时间:2018/12/21
Basal heave stability  Bjerrum-Eide’s method  Braced excavation  Reliability-based design  Slip circle method  Terzaghi’s method  
Defending against advanced persistent threat: A risk management perspective Conference paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
作者:  Zhong X.;  Yang L.-X.;  Yang X.;  Xiong Q.;  Wen J.;  Tang Y.Y.
收藏  |  浏览/下载:2/0  |  提交时间:2019/02/11
Advanced persistent threat  APT response problem  Game theory  Risk assessment  Risk management  State evolution model