Works matching IS 10013695 AND DT 2013 AND VI 30 AND IP 11


Results: 82
    1
    2
    3
    4
    5
    6

    Feature line extraction method for heritage image.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3500, doi. 10.3969/j.issn.1001-3695.2013.11.077
    By:
    • YAN Si-hai;
    • GENG Guo-hua;
    • LI Kang;
    • HAO Ni
    Publication type:
    Article
    7
    8
    9
    10
    11
    12
    13
    14

    3D object recognition based on path-contour.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3483, doi. 10.3969/j.issn.1001-3695.2013.11.073
    By:
    • ZHANG Gui-mei;
    • ZHANG Yi
    Publication type:
    Article
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26

    Method to detect Chinese domain name homograph attack.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3426, doi. 10.3969/j.issn.1001-3695.2013.11.057
    By:
    • HONG Bo;
    • GENG Guang-gang;
    • WANG Li-ming;
    • MAO Wei
    Publication type:
    Article
    27
    28
    29
    30
    31
    32
    33
    34

    Differential fault attack on LILI-128.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3396, doi. 10.3969/j.issn.1001-3695.2013.11.049
    By:
    • CHEN Hao;
    • WANG Tao;
    • LIU Hui-ying
    Publication type:
    Article
    35

    Application-layer DoS attack detection based on HMM.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 11, p. 3393, doi. 10.3969/j.issn.1001-3695.2013.11.048
    By:
    • XIE Bai-lin;
    • JIANG Sheng-yi;
    • ZHANG Qian-sheng;
    • HAN De-zhi
    Publication type:
    Article
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50