Works matching IS 10013695 AND DT 2013 AND VI 30 AND IP 10


Results: 80
    1
    2
    3

    Improved Census transform for stereo matching.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 10, p. 3185, doi. 10.3969/j.issn.1001-3695.2013.10.077
    By:
    • LEI Lei;
    • ZHENG Jiang-bin;
    • SONG Xue-mei
    Publication type:
    Article
    4
    5
    6
    7

    Research on hole-filling algorithm for 3D models.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 10, p. 3175, doi. 10.3969/j.issn.1001-3695.2013.10.074
    By:
    • XIE Qian-ru;
    • GENG Guo-hua
    Publication type:
    Article
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23

    Security provenance model based on OPM.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 10, p. 3117, doi. 10.3969/j.issn.1001-3695.2013.10.058
    By:
    • LIU Tong;
    • WANG Feng-ying
    Publication type:
    Article
    24
    25
    26

    Object-semantics based malware detection method.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 10, p. 3106, doi. 10.3969/j.issn.1001-3695.2013.10.055
    By:
    • REN Li;
    • PAN Xiao-zhong
    Publication type:
    Article
    27
    28
    29
    30

    MIMO detection algorithm for rank-deficient channels.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 10, p. 3088, doi. 10.3969/j.issn.1001-3695.2013.10.051
    By:
    • JIANG Pan-pan;
    • ZHAO Wei-bo;
    • XU Yao;
    • WANG Da-ming
    Publication type:
    Article
    31

    Low complexity PDCCH blind detection algorithm.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 10, p. 3084, doi. 10.3969/j.issn.1001-3695.2013.10.050
    By:
    • ZHOU You;
    • HU Han-ying;
    • CHEN Guo-jun
    Publication type:
    Article
    32

    End-to-end traffic inference of encrypted MANET.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 10, p. 3079, doi. 10.3969/j.issn.1001-3695.2013.10.049
    By:
    • CHANG Hui-jun;
    • SHAN Hong;
    • HUANG Jun
    Publication type:
    Article
    33
    34
    35
    36
    37
    38
    39

    PI rate control algorithm for high-bandwidth WLAN.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 10, p. 3053, doi. 10.3969/j.issn.1001-3695.2013.10.042
    By:
    • ZHAO Wei-feng;
    • GUO Tao;
    • SHU Yan-tai;
    • LIU Chun-feng
    Publication type:
    Article
    40
    41

    Advanced aggregated multicast algorithm.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 10, p. 3048, doi. 10.3969/j.issn.1001-3695.2013.10.040
    By:
    • XU Jian;
    • NI Hong;
    • DENG Hao-jiang;
    • LIU Lei
    Publication type:
    Article
    42
    43
    44
    45

    Technique for multi-core instruction-set simulator.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 10, p. 3035, doi. 10.3969/j.issn.1001-3695.2013.10.036
    By:
    • LUO Han-qing;
    • LIANG Li-ping;
    • YE Tian-chun
    Publication type:
    Article
    46
    47
    48
    49
    50