Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Zhiting Xiao"'
Publikováno v:
Advances in Intelligent Networking and Collaborative Systems ISBN: 9783030577957
INCoS
INCoS
Based on the core database of Web of Science, 146 foreign effective literatures on anti-terrorism intelligence early warning research are extracted, and the research status, hotpots and frontiers of foreign anti-terrorism intelligence early warning r
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a7cfbce1e8dc791b42e7ae4f7d59189e
https://doi.org/10.1007/978-3-030-57796-4_32
https://doi.org/10.1007/978-3-030-57796-4_32
Publikováno v:
2017 Chinese Automation Congress (CAC).
In this paper, by learning the origin of the word distributed representation, knowing the distributed representation is one of the bridges of natural language processing mapping to mathematical calculations. Through the learning distributed represent
Publikováno v:
2017 3rd IEEE International Conference on Control Science and Systems Engineering (ICCSSE).
A new phantom excludability algorithm based on speciality of sensor and target was proposed in this paper in order to exclude the false intersection points on direction finding process for emitting lines in passive cross location. Firstly, deduce the
Publikováno v:
INCoS
In order to verify whether there is a correlation between human behavior and EEG signal, proposes a method based on exploratory analysis to study the relationship between human behavior and EEG. Through the acquisition of mice EEG and respiratory sig
Publikováno v:
International Journal of Grid and Utility Computing. 10:422
In order to study the spatiotemporal characteristics and activity patterns of terrorism attacks in China, so as to make effective counter-terrorism strategies, two kinds of different intelligence sources were analysed by means of social network analy
Publikováno v:
2012 Fourth International Conference on Multimedia Information Networking and Security.
Cloud computing enables organizations to realize the commercial benefits while facing the new security issues. In this paper, we presents a security model for called the Trusted Private Virtual Data center (TVPDc) that offering centralized security m
Publikováno v:
2012 Fourth International Conference on Multimedia Information Networking and Security.
A key technology of cloud computing is virtualization, which can lead to reduce the total cost and increase the application flexibility. However along with these benefits come added security challenges. The extension of Trusted Computing to virtual e
Autor:
Yi Ren, Zhiting Xiao
Publikováno v:
2010 2nd International Conference on E-business and Information System Security.
The current privacy-preserving researches focus on the privacy release control method. However, the current release control methods only considere the protection of privacy without taking the usability of privacy into account. In this paper, a releas
Autor:
Zhiting Xiao, Yi Ren
Publikováno v:
2010 2nd International Conference on Future Computer and Communication.
The current release control methods consider the balance between privacy protection and usability for individual privacy data, but that balance for a released data set is not considered. In this paper, a release method based on game theory is propose
Publikováno v:
ISECS
Role based access control (RBAC) has been widely adopted as a policy neutral access control model by many IT corporations. RBAC96, which is the most famous family of RBAC models, provides a common frame reference for related research and development.