UM

Browse/Search Results:  1-4 of 4 Help

Filters                
Selected(0)Clear Items/Page:    Sort:
Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks Journal article
Information Sciences, 2016,Volume: 352-353,Page: 188-202
Authors:  Yu S.;  Ai Y.;  Xu B.;  Zhou Y.;  Li W.;  Liao Q.;  Poh N.
Favorite  |  View/Download:5/0  |  Submit date:2018/12/21
Biometric Authentication  Brute-force  Liveness Score  Probabilistic  Spoofing Attack  
Spatial Coordinated Medium Sharing: Optimal Access Control Management in Drive-Thru Internet Journal article
IEEE Transactions on Intelligent Transportation Systems, 2015,Volume: 16,Issue: 5,Page: 2673-2686
Authors:  Zhou H.;  Liu B.;  Hou F.;  Luan T.H.;  Zhang N.;  Gui L.;  Yu Q.;  Shen X.S.
Favorite  |  View/Download:6/0  |  Submit date:2019/03/01
Dcf  Drive-thru Internet  Ieee 802.11  Saturated Throughput  Spatial Coordination  
ChainCluster: Engineering a cooperative content distribution framework for highway vehicular communications Journal article
IEEE Transactions on Intelligent Transportation Systems, 2014,Volume: 15,Issue: 6,Page: 2644
Authors:  Zhou H.;  Liu B.;  Luan T.H.;  Hou F.;  Gui L.;  Li Y.;  Yu Q.;  Shen X.
Favorite  |  View/Download:5/0  |  Submit date:2018/10/30
Clustering  Cooperative Content Distribution  Drive-thru Internet  Highways  
Fourier spectrum characterization of Hardy spaces and applications Journal article
Proceedings of the American Mathematical Society, 2009,Volume: 137,Issue: 3,Page: 971
Authors:  Qian T.;  Xu Y.;  Yan D.;  Yan L.;  Yu B.
Favorite  |  View/Download:8/0  |  Submit date:2018/10/30