UM

Browse/Search Results:  1-10 of 14 Help

Filters    
Selected(0)Clear Items/Page:    Sort:
An efficient ride-sharing framework for maximizing shared Routes Conference paper
Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018
Authors:  Ta N.;  Li G.;  Zhao T.;  Feng J.;  Ma H.;  Gong Z.
Favorite  |  View/Download:4/0  |  Submit date:2019/02/12
Bigraph matching  Join based sharing  Ride sharing  Search based sharing  Shared route percentage  
Pseudonym inference in cooperative vehicular traffic scenarios Conference paper
2018 IEEE Conference on Communications and Network Security, CNS 2018
Authors:  Chu X.;  Ruan N.;  Li M.;  Jia W.
Favorite  |  View/Download:3/0  |  Submit date:2019/04/04
Location privacy  mix-zone  vehicle platoon  vehicular ad-hoc networks (VANETs)  
Model checking bounded continuous-time Extended Linear Duration Invariants Conference paper
HSCC 2018 - Proceedings of the 21st International Conference on Hybrid Systems: Computation and Control (part of CPS Week)
Authors:  An J.;  Zhan N.;  Li X.;  Zhang M.;  Yi W.
Favorite  |  View/Download:3/0  |  Submit date:2019/02/14
Duration calculus  ELDI  Model checking  Quantified linear real arithmetic  Timed automata  
Rare event prediction using similarity majority under-sampling technique Conference paper
Communications in Computer and Information Science
Authors:  Li J.;  Fong S.;  Hu S.;  Chu V.W.;  Wong R.K.;  Mohammed S.;  Dey N.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/13
Imbalanced classification  Similarity measure  SMUTE  Under-Sampling  
Flexible linear discriminant wavelet networks for rapid physiological signal interpretation Conference paper
IFMBE Proceedings
Authors:  Li B.N.;  Li Y.;  Xiang K.;  An N.;  Dong M.C.;  Vai M.I.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/14
Classification  Linear discrimination  Physiological signal interpretation  Wavelet neural networks  
Combining two strategies to optimize biometric decisions against spoofing attacks Conference paper
Proceedings of SPIE - The International Society for Optical Engineering, San Diego, CA, AUG 18-20, 2014
Authors:  Li W.;  Poh N.;  Zhou Y.
Favorite  |  View/Download:3/0  |  Submit date:2018/12/21
Biometric Authorization  Biometric Verification  Spoof Attack  
Physical and chemical influence of polyacrylate latex on cement mortars Conference paper
Advanced Materials Research
Authors:  Tian Y.;  Li Z.;  Ma H.;  Jin X.;  Jin N.
Favorite  |  View/Download:0/0  |  Submit date:2019/04/08
Chemical reactions  Polyacrylate latex  Polymer modified mortars  Pore structure  
Modelling with relational calculus of object and component systems - RCOS Conference paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Authors:  Chen Z.;  Hannousse A.H.;  Van Hung D.;  Knoll I.;  Li X.;  Liu Z.;  Liu Y.;  Nan Q.;  Okika J.C.;  Ravn A.P.;  Stolz V.;  Yang L.;  Zhan N.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/14
Design  Refinement  Requirements modelling  Transformation  
DHMT: A scalable and efficient hybrid application-layer multicast protocol Conference paper
ACM International Conference Proceeding Series
Authors:  Li J.;  Gu N.;  Jia W.
Favorite  |  View/Download:0/0  |  Submit date:2019/02/11
Application-layer multicast  Fibonacci tree  Hybrid architecture  
An efficient fibonacci series based hierarchical application-layer multicast protocol Conference paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Authors:  Li J.;  Gu N.;  Jia W.
Favorite  |  View/Download:0/0  |  Submit date:2019/02/11