CSpace

浏览/检索结果: 共24条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
The Unmanned Aerial Vehicle Benchmark: Object Detection, Tracking and Baseline 期刊论文
INTERNATIONAL JOURNAL OF COMPUTER VISION, 2019, 页码: 19
作者:  Yu, Hongyang;  Li, Guorong;  Zhang, Weigang;  Huang, Qingming;  Du, Dawei;  Tian, Qi;  Sebe, Nicu
收藏  |  浏览/下载:51/0  |  提交时间:2020/12/10
UAV  Object detection  Single object tracking  Multiple object tracking  
Adaptive Measurements Using One Elastic Sketch 期刊论文
IEEE-ACM TRANSACTIONS ON NETWORKING, 2019, 卷号: 27, 期号: 6, 页码: 2236-2251
作者:  Yang, Tong;  Jiang, Jie;  Liu, Peng;  Huang, Qun;  Gong, Junzhi;  Zhou, Yang;  Miao, Rui;  Li, Xiaoming;  Uhlig, Steve
收藏  |  浏览/下载:118/0  |  提交时间:2020/12/10
Bandwidth  Task analysis  Size measurement  Measurement uncertainty  Data structures  Data centers  Sketches  network measurements  elastic  compression  generic  
A Formal Methodology for Easing Development and Maintenance of Entity Services in Service Oriented Software-Defined Internet of Things 期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2019, 卷号: 6, 期号: 6, 页码: 9516-9530
作者:  Chen, Haiming;  Xie, Kaibin;  Cui, Li;  Pescape, Antonio
收藏  |  浏览/下载:94/0  |  提交时间:2020/12/10
Edge service  entity service  evolution mechanism (EM)  Internet of Things (IoT)  software architecture  
Dynamic Packet Forwarding Verification in SDN 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 卷号: 16, 期号: 6, 页码: 915-929
作者:  Li, Qi;  Zou, Xiaoyue;  Huang, Qun;  Zheng, Jing;  Lee, Patrick P. C.
收藏  |  浏览/下载:45/0  |  提交时间:2020/12/10
Control systems  Cryptography  Protocols  IP networks  Software  Prototypes  Delays  Software-defined networking  attacks  forwarding verification  
SkeletonNet: A Hybrid Network With a Skeleton-Embedding Process for Multi-View Image Representation Learning 期刊论文
IEEE TRANSACTIONS ON MULTIMEDIA, 2019, 卷号: 21, 期号: 11, 页码: 2916-2929
作者:  Yang, Shijie;  Li, Liang;  Wang, Shuhui;  Zhang, Weigang;  Huang, Qingming;  Tian, Qi
收藏  |  浏览/下载:51/0  |  提交时间:2020/12/10
Semantics  Correlation  Visualization  Skeleton  Matrix decomposition  Kernel  Laplace equations  Unsupervised multi-view subspace learning  semantic inconsistency  tensor factorization  deep auto-encoders  
Tattoo Image Search at Scale: Joint Detection and Compact Representation Learning 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2019, 卷号: 41, 期号: 10, 页码: 2333-2348
作者:  Han, Hu;  Li, Jie;  Jain, Anil K.;  Shan, Shiguang;  Chen, Xilin
收藏  |  浏览/下载:261/0  |  提交时间:2019/12/10
Large-scale tattoo search  joint detection and representation learning  sketch based search  multi-task learning  
Identification of functional lncRNAs based on competing endogenous RNA network in osteoblast differentiation 期刊论文
JOURNAL OF CELLULAR PHYSIOLOGY, 2019, 页码: 13
作者:  Hong, Shuai;  Hu, Supei;  Kang, Zhengyang;  Liu, Zhiguo;  Yang, Weibin;  Zhang, Yongzhi;  Yang, Dengfeng;  Ruan, Wenhui;  Yu, Guoyong;  Sun, Liang;  Chen, Liang
收藏  |  浏览/下载:76/0  |  提交时间:2019/12/10
ceRNA  feedback loops  lncRNA  osteoblast differentiation  
Comprehensive analysis of lncRNA-TF crosstalks and identification of prognostic regulatory feedback loops of glioblastoma using lncRNA/TF-mediated ceRNA network 期刊论文
JOURNAL OF CELLULAR BIOCHEMISTRY, 2019, 页码: 13
作者:  Ji, Yang;  Gu, Yaqin;  Hong, Shuai;  Yu, Bo;  Zhang, Jian-Hua;  Liu, Jin-Na
收藏  |  浏览/下载:71/0  |  提交时间:2019/12/10
ceRNA networks  core lncRNA-TF crosstalks  glioblastoma  survival biomarkers  
Relay Node Placement in Wireless Sensor Networks With Respect to Delay and Reliability Requirements 期刊论文
IEEE SYSTEMS JOURNAL, 2019, 卷号: 13, 期号: 3, 页码: 2570-2581
作者:  Ma, Chaofan;  Liang, Wei;  Zheng, Meng;  Yang, Bo
收藏  |  浏览/下载:70/0  |  提交时间:2019/12/10
Approximation algorithm  quality of service  relay node placement (RNP)  set cover  wireless sensor networks (WSNs)  
Context aware intrusion detection for building automation systems 期刊论文
COMPUTERS & SECURITY, 2019, 卷号: 85, 页码: 181-201
作者:  Pan, Zhiwen;  Hariri, Salim;  Pacheco, Jesus
收藏  |  浏览/下载:76/0  |  提交时间:2019/12/10
Internet of Things  Network security  Context awareness  Supervised learning  Data mining  Intrusion detection