Showing results 27 to 46 of 58
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Feature Weighting Random Forest for Detection of Hidden Web Search Interfaces Journal:International Journal of Computational Linguistics and Chinese Language Processing | 2008 | ||
Privacy Guaranteed Mutual Authentication on EPCglobal Class 1 Gen 2 Scheme Proceeding/Conference:The International Conference for Young Computer Scientists | 2008 | ||
A service platform for RFID technology adoption analysis in inventory control Proceeding/Conference:IEEE International Conference on Service Operations and Logistics, and Informatics | 2008 | ||
Towards Practical Privacy Preserving Technology Adoption Analysis Service Platform Proceeding/Conference:2008 IEEE International Conference on e-Business Engineering | 2008 | ||
Design and Analysis for RFID Authentication Protocol Proceeding/Conference:2008 IEEE International Conference on e-Business Engineering | 2008 | ||
Developing a Trusted System for Tracking Asset on the Move Proceeding/Conference:The 2008 International Symposium on Trusted Computing | 2008 | ||
Performance Analysis Of Ubiquitous Intelligence For Query Proceeding/Conference:The World Congress on Engineering | 2008 | ||
A Changing Window Approach to Exploring Gene Expression Patterns Proceeding/Conference:IEEE International Conference on Bioinformatics and Biomedicine (BIBM) | 2008 | ||
Building a Decision Cluster Classification Model for High Dimensional Data by a Variable Weighting k-Means Method Proceeding/Conference:AI '08 Proceedings of the 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence | 2008 | ||
Mobile intelligence for delay tolerant logistics and supply chain management Proceeding/Conference:Proceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing | 2008 | ||
A P2P collaborative RFID data cleaning model Proceeding/Conference:Proceedings - 3rd International Conference on Grid and Pervasive Computing Symposia/Workshops, GPC 2008 | 2008 | ||
Value Analysis Framework for RFID Technology Adoption in Retailers in China Journal:Communications of the Association for Information Systems | 2008 | ||
PGMAP: a privacy guaranteed mutual authentication protocol conforming to EPC class 1 gen 2 standards Proceeding/Conference:Proceedings of the IEEE International Conference on e-Business Engineering, ICEBE 2008 | 2008 | ||
A Graphical Workflow Modeler For Docking Process In Drug Discovery Book:Handbook Of Research On Computational Grid Technologies For Life Sciences, Biomedicine And Healthcare | 2009 | ||
A Mobile Service Platform for Trustworthy E-Learning Service ProvisioningAn Intelligent Mobile e-Learning Service Platform Book:Architectures for Distributed and Complex M-Learning Systems: Applying Intelligent Technologies | 2009 | ||
2009 | |||
The Analysis on Mass Deployment of RFID for Intelligent Transportation Systems Journal:中国电子商情.RFID技术与应用 | 2009 | ||
Intelligent System of Passenger Transportation Capacity Requirements Analysis in Guangzhou Asian Games Proceeding/Conference:International Conference on Transportation Engineering 2009 | 2009 | ||
Improved blog clustering through automated weighting of text blocks Proceeding/Conference:Proceedings of the International Conference on Machine Learning and Cybernetics | 2009 | ||
A Semantic DOM Approach For Webpage Information Extraction Proceeding/Conference:International Conference on Management and Service Science (MASS) | 2009 |