Online illumination estimation of outdoor scenes based on videos containing no shadow area GuanYu XingXueHong ZhouQunSheng Peng Research Paper 14 February 2013 Pages: 1 - 11
Animating turbulent water by vortex shedding in PIC/FLIP Jian ZhuYouQuan LiuEnHua Wu Research Paper 14 February 2013 Pages: 1 - 11
Dual quaternion based virtual hand interaction modeling WenFeng ChenShuJing ZhuJieQing Feng Research Paper 14 February 2013 Pages: 1 - 11
Simulation of free-surface flow using a boundless grid ChangBo WangQiang ZhangFanLong Kong Research Paper 14 February 2013 Pages: 1 - 10
Efficient polygonization of tree trunks modeled by convolution surfaces XiaoQiang ZhuXueKun GuoXiaoGang Jin Research Paper 14 February 2013 Pages: 1 - 12
Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity ShaoJing FuChao LiLongJiang Qu Research Paper 03 December 2011 Pages: 1 - 9
Rational secret sharing as extensive games ZhiFang ZhangMuLan Liu Research Paper 07 September 2011 Pages: 1 - 13
How faithfully can π be interpreted in SA? Huan LongYuXi Fu Research Paper 11 August 2012 Pages: 1 - 15
Coupled dictionary learning method for image decomposition YaFeng LiXiangChu Feng Research Paper 02 November 2011 Pages: 1 - 10
The learning performance of support vector machine classification based on Markov sampling Bin ZouZhiMing PengZongBen Xu Research Paper 07 September 2011 Pages: 1 - 16
DKNNS: Scalable and accurate distributed K nearest neighbor search for latency-sensitive applications YongQuan FuYiJie Wang Research Paper 26 November 2011 Pages: 1 - 17
Finding orthogonal latin squares using finite model searching tools FeiFei MaJian Zhang Research Paper 09 September 2011 Pages: 1 - 9
Construction of punctured and extended quantum codes over GF(2) FangYing XiaoHanWu ChenZhiHao Liu Research Paper 09 November 2012 Pages: 1 - 11
Parallel lightpath provisioning under wavelength continuity constraint in multi-domain optical networks based on hierarchical path computation element Jian SunZongWei WangYunFeng Peng Research Paper 14 February 2013 Pages: 1 - 9
Employing intelligence in object-based storage devices to provide attribute-based file access YouHui ZhangZiQiang QianWeiMin Zheng Research Paper 17 August 2012 Pages: 1 - 10
IK-CPA security implies IE-CCA security in the random oracle model Rui Xue Research Paper 17 October 2011 Pages: 1 - 11
Rejection of nonharmonic disturbances for a class of uncertain nonlinear systems with nonlinear exosystems Yuan JiangShuTang LiuRuLiang Wang Research Paper 02 January 2012 Pages: 1 - 12
Principal whitened gradient-projection algorithm for distribution control ShiCheng ZhangHuaFei SunChunHui Li Research Paper 11 April 2012 Pages: 1 - 8
Genetic algorithm approach for QoS-based tree topology construction in IEEE 802.16 mesh networks Saleh YousefiSaeed BastaniAlireza Ghiamatyoun Research Paper 08 January 2013 Pages: 1 - 17