An Intelligent Knowledge Management Model for Construction and Reuse of Automobile Manufacturing Intellectual Properties
暂无分享,去创建一个
[1] Vassilios Petridis,et al. Clustering and Classification in Structured Data Domains Using Fuzzy Lattice Neurocomputing (FLN) , 2001, IEEE Trans. Knowl. Data Eng..
[2] Peter Willett,et al. The Limitations of Term Co-Occurrence Data for Query Expansion in Document Retrieval Systems , 1991 .
[3] F. Bodendorf,et al. A system architecture for flexible, knowledge-based, multimedia CBT-applications , 1994, Proceedings IEEE 1st International Conference on Multi Media Engineering Education.
[4] W. V. Subbarao,et al. Encryption based security for ISDN communication: technique and application , 1994, Proceedings of SOUTHEASTCON '94.
[5] Mario Piattini,et al. Auditing data warehouse security , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
[6] Theodore A. Linden,et al. Authentication in office system internetworks , 1983, TOIS.
[7] Jörg Hahn,et al. The committee support system , 1988 .
[8] Venu Dasigi. Information fusion experiments for text classification , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).
[9] Ludwig Nastansky,et al. Reengineering organizational structures from within , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.
[10] Kazuhiko Tsuda,et al. The extraction method of the word meaning class , 1999, 1999 Third International Conference on Knowledge-Based Intelligent Information Engineering Systems. Proceedings (Cat. No.99TH8410).
[11] Reiner Sailer. Security services in an open service environment , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[12] Douglas L. Jones,et al. Minimax disappointment criterion for video broadcasting , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[13] Udaya Annakkage,et al. Dynamic security control using secure regions derived from a decision tree technique , 2000, 2000 Power Engineering Society Summer Meeting (Cat. No.00CH37134).
[14] Rada Mihalcea,et al. Using WordNet and Lexical Operators to Improve Internet Searches , 2000, IEEE Internet Comput..
[15] Andreas Dengel. Bridging the media gap from the Guthenberg's world to electronic document management systems , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.
[16] Tung-Sang Ng,et al. Partial-encryption technique for intellectual property protection of FPGA-based products , 2000, IEEE Trans. Consumer Electron..
[17] Donald H. Kraft,et al. A feature mining based approach for the classification of text documents into disjoint classes , 2002, Inf. Process. Manag..
[18] Selwyn Russell. Transparent cosignatures for electronic documents , 1993, Proceedings of 9th Annual Computer Security Applications Conference.
[19] Takeshi Koshiba,et al. Text classification and keyword extraction by learning decision trees , 1993, Proceedings of 9th IEEE Conference on Artificial Intelligence for Applications.
[20] Chooi-Tian Lee,et al. Designing a virtual access control configuration protocol for implementation over ISDN and shared-media networks , 1996, Proceedings of LCN - 21st Annual Conference on Local Computer Networks.
[21] Wai Lam,et al. Modeling textual document classification , 1999, IEEE SMC'99 Conference Proceedings. 1999 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.99CH37028).
[22] Masami Shishibori,et al. Automatic text summarization based on keyword derivation , 2001, 2001 IEEE International Conference on Systems, Man and Cybernetics. e-Systems and e-Man for Cybernetics in Cyberspace (Cat.No.01CH37236).
[23] J. Farkas. Towards classifying full-text using recurrent neural networks , 1995, Proceedings 1995 Canadian Conference on Electrical and Computer Engineering.
[24] Hahn-Ming Lee,et al. An intelligent web-page classifier with fair feature-subset selection , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).
[25] Jörg Hahn,et al. The Committee Support System 1Originally published in Computer Standards and Interfaces, volume 8 (1988), pages 57–66. Copyright of original article: 0920-5489/88/$3.50 © 1988, Elsevier Science Publishers B.V. (North-Holland). All rights reserved. 1 , 1999 .
[26] E. Jukes. Case based reasoning in legal case-retrieval , 1995 .
[27] P. Fitzpatrick. Performance analysis of a layered wireless network serving different user classes , 1996, Proceedings of Vehicular Technology Conference - VTC.
[28] Chilin Shih,et al. A Stochastic Finite-State Word-Segmentation Algorithm for Chinese , 1994, ACL.
[29] L. G. Mason,et al. Fairness in network optimal flow control , 1990, SBT/IEEE International Symposium on Telecommunications.
[30] Benchiao Jai. RADIUS: rapid application delivery, installation and upgrade system , 1998, Proceedings Technology of Object-Oriented Languages. TOOLS 28 (Cat. No.98TB100271).