暂无分享,去创建一个
[1] A. T. Papagiannakis,et al. An improved image processing technique for asphalt concrete X-ray CT images , 2013 .
[2] Changhe Yuan,et al. Finding Optimal Bayesian Network Structures with Constraints Learned from Data , 2014, UAI.
[3] Changhe Yuan,et al. Tightening Bounds for Bayesian Network Structure Learning , 2014, AAAI.
[4] Alida Mazzoli,et al. Particle size, size distribution and morphological evaluation of airborne dust particles of diverse woods by Scanning Electron Microscopy and image processing program , 2012 .
[5] Luciano Boquete,et al. EOG-based eye movements codification for human computer interaction , 2012, Expert Syst. Appl..
[6] D. Meng. Data security in cloud computing , 2013, 2013 8th International Conference on Computer Science & Education.
[7] Sateesh Kumar Peddoju,et al. Access Control Based Data Security in Cloud Computing , 2012 .
[8] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[9] Nam-Sik Kim,et al. Dynamic characteristics of suspension bridge hanger cables using digital image processing , 2013 .
[10] Anupam Agrawal,et al. Vision based hand gesture recognition for human computer interaction: a survey , 2012, Artificial Intelligence Review.
[11] Du meng. Data security in cloud computing , 2013, ICCSE 2013.
[12] Aleksandra Labus,et al. Scaffolding Environment for Adaptive E-learning through Cloud Computing , 2013, J. Educ. Technol. Soc..
[13] Maarten Bullynck,et al. Computing Primes (1929-1949): Transformations in the Early Days of Digital Computing , 2015, IEEE Annals of the History of Computing.
[14] Antorweep Chakravorty,et al. Privacy Preserving Data Analytics for Smart Homes , 2013, 2013 IEEE Security and Privacy Workshops.
[15] Giovani Rubert Librelotto,et al. Applying Pervasive Computing in an Architecture for Homecare Environments , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.
[16] Naif Alajlan,et al. Differential Evolution Extreme Learning Machine for the Classification of Hyperspectral Images , 2014, IEEE Geoscience and Remote Sensing Letters.
[17] Haoxiang Wang,et al. An Effective Image Representation Method Using Kernel Classification , 2014, 2014 IEEE 26th International Conference on Tools with Artificial Intelligence.
[18] Jinjun Chen,et al. An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[19] Tanushri Mittal,et al. A Survey of Cryptographic based Security Algorithms for Cloud Computing , 2014 .
[20] Farrukh Shahzad,et al. State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions , 2014, EUSPN/ICTH.