CORC

浏览/检索结果: 共13条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Query-Adaptive Small Object Search Using Object Proposals and Shape-Aware Descriptors 期刊论文
IEEE TRANSACTIONS ON MULTIMEDIA, 2016
Das Bhattacharjee, Sreyasee; Yuan, Junsong; Tan, Yap-Peng; Duan, Ling-Yu
收藏  |  浏览/下载:5/0  |  提交时间:2017/12/03
Seriality of semantic and phonological processes during overt speech in Mandarin as revealed by event-related brain potentials 期刊论文
BRAIN AND LANGUAGE, 2015, 卷号: 144, 期号: 0, 页码: 16-25
作者:  Zhu, Xuebing;  Damian, Markus F.;  Zhang, Qingfang
收藏  |  浏览/下载:24/0  |  提交时间:2015/09/08
How where is when? On the regional variability and resolution of geosocial temporal signatures for points of interest 期刊论文
COMPUTERS ENVIRONMENT AND URBAN SYSTEMS, 2015
McKenzie, Grant; Janowicz, Krzysztof; Gao, Song; Gong, Li
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
Subgraph Matching with Set Similarity in a Large Graph Database 期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2015
Hong, Liang; Zou, Lei; Lian, Xiang; Yu, Philip S.
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
Web Image Re-ranking Using Query-Specific Semantic Signatures 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2014
作者:  Xiaogang Wang;  Shi Qiu;  Ke Liu;  Xiaoou Tang
收藏  |  浏览/下载:19/0  |  提交时间:2015/09/01
Learning Semantic Signatures for 3D Object Retrieval 期刊论文
IEEE TRANSACTIONS ON MULTIMEDIA, 2013
作者:  Gong, Boqing;  Liu, Jianzhuang;  Wang, Xiaogang;  Tang, Xiaoou
收藏  |  浏览/下载:9/0  |  提交时间:2015/08/27
基于语义的恶意代码行为特征提取及检测方法 期刊论文
Journal of Software, 2012, 卷号: 23, 期号: 2, 页码: 378-393
王蕊; 冯登国; 杨轶; 苏璞睿
收藏  |  浏览/下载:16/0  |  提交时间:2012/11/12
implementing dynamic management for mediated service interactions 会议论文
2012 IEEE 9th International Conference on Services Computing, SCC 2012, Honolulu, HI, United states, June 24, 2012 - June 29, 2012
Qiao Xiaoqiang; Chen Wei; Wei Jun
收藏  |  浏览/下载:10/0  |  提交时间:2013/09/22
Query-Specific Visual Semantic Spaces for Web Image Re-ranking 会议论文
IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Colorado Springs, CO
作者:  Xiaogang Wang;  Ke Liu;  Xiaoou Tang
收藏  |  浏览/下载:8/0  |  提交时间:2015/08/25
depsim: a dependency-based malware similarity comparison system 会议论文
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Yi Yang; Lingyun Ying; Rui Wang; Purui Su; Dengguo Feng
收藏  |  浏览/下载:20/0  |  提交时间:2011/10/10


©版权所有 ©2017 CSpace - Powered by CSpace