Advanced Search



141 results found in all.
index Title
46Contact-free and pose-invariant hand-biometric-based personal identification system using RGB and depth data
Author(s):Can Wang, Hong Liu, Xing Liu  Clicked:9583  Download:7883  Cited:7  <Full Text>  <PPT> 2552
Journal of Zhejiang University Science C  2014 Vol.15 No.7 P.525-536  DOI:10.1631/jzus.C1300190
47Probabilistic hypergraph based hash codes for social image search
Author(s):Yi Xie, Hui-min Yu, Roland Hu  Clicked:9573  Download:3970  Cited:1  <Full Text>  <PPT> 2457
Journal of Zhejiang University Science C  2014 Vol.15 No.7 P.537-550  DOI:10.1631/jzus.C1300268
48Image anti-aliasing techniques for Internet visual media processing: a review
Author(s):Xu-dong Jiang, Bin Sheng, Wei-yao Lin, Wei Lu, Li-zhuang Ma  Clicked:17253  Download:3444  Cited:0  <Full Text>  <PPT> 2018
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.717-728  DOI:10.1631/jzus.C1400100
49Seamless handover between unicast and multicast multimedia streams
Author(s):Mau-Luen Tham, Chee-Onn Chow, Yi-han Xu, Khong Neng Choong, Cheng Suan Lee  Clicked:15321  Download:3738  Cited:0  <Full Text>  <PPT> 2563
Journal of Zhejiang University Science C  2014 Vol.15 No.10 P.929-942  DOI:10.1631/jzus.C1400052
50Botnet detection techniques: review, future trends, and issues
Author(s):Ahmad Karim, Rosli Bin Salleh, Muhammad Shiraz, Syed Adeel Ali Shah, Irfan Awan, Nor Badrul Anuar  Clicked:21264  Download:22687  Cited:10  <Full Text>  <PPT> 3161
Journal of Zhejiang University Science C  2014 Vol.15 No.11 P.943-983  DOI:10.1631/jzus.C1300242
51Inertial measurement unit-camera calibration based on incomplete inertial sensor information
Author(s):Hong Liu, Yu-long Zhou, Zhao-peng Gu  Clicked:10217  Download:3246  Cited:2  <Full Text>  <PPT> 2812
Journal of Zhejiang University Science C  2014 Vol.15 No.11 P.999-1008  DOI:10.1631/jzus.C1400038
52An image-based approach to the reconstruction of ancient architectures by extracting and arranging 3D spatial components
Author(s):Divya Udayan J, HyungSeok Kim, Jee-In Kim  Clicked:8573  Download:3748  Cited:2  <Full Text>  <PPT> 2682
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.1 P.12-27  DOI:10.1631/FITEE.1400141
53A lightweight authentication scheme with user untraceability
Author(s):Kuo-Hui Yeh  Clicked:8547  Download:3451  Cited:2  <Full Text>  <PPT> 2496
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.4 P.259-271  DOI:10.1631/FITEE.1400232
54Spontaneous versus posed smile recognition via region-specific texture descriptor and geometric facial dynamics
Author(s):Ping-ping Wu, Hong Liu, Xue-wu Zhang, Yuan Gao  Clicked:8697  Download:2911  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.7 P.955-967  DOI:10.1631/FITEE.1600041
55An initial categorization of foundational research in complex technical systems
Author(s):Imre Horváth  Clicked:13064  Download:4110  Cited:1  <Full Text>  <PPT> 3452
Journal of Zhejiang University Science A  2015 Vol.16 No.9 P.681-705  DOI:10.1631/jzus.A1500172
56An analysis in metal barcode label design for reference
Author(s):Yin Zhao, Hong-guang Xu, Qin-yu Zhang  Clicked:7252  Download:5007  Cited:0  <Full Text>  <PPT> 2226
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.2 P.173-184  DOI:10.1631/FITEE.1500212
57VirtMan: design and implementation of a fast booting system for homogeneous virtual machines in iVCE
Author(s):Zi-yang Li, Yi-ming Zhang, Dong-sheng Li, Peng-fei Zhang, Xi-cheng Lu  Clicked:7846  Download:6930  Cited:0  <Full Text>  <PPT> 2423
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.2 P.110-121  DOI:10.1631/FITEE.1500216
58A social tag clustering method based on common co-occurrence group similarity
Author(s):Hui-zong Li, Xue-gang Hu, Yao-jin Lin, Wei He, Jian-han Pan  Clicked:7966  Download:3580  Cited:2  <Full Text>  <PPT> 2367
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.2 P.122-134  DOI:10.1631/FITEE.1500187
59Caching resource sharing in radio access networks: a game theoretic approach
Author(s):Jun-feng Xie, Ren-chao Xie, Tao Huang, Jiang Liu, F. Richard Yu, Yun-jie Liu  Clicked:8969  Download:3702  Cited:1  <Full Text>  <PPT> 2429
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.12 P.1253-1265  DOI:10.1631/FITEE.1500497
60BORON: an ultra-lightweight and low power encryption design for pervasive computing
Author(s):Gaurav Bansod, Narayan Pisharoty, Abhijit Patil  Clicked:7960  Download:4652  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.3 P.317-331  DOI:10.1631/FITEE.1500415
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE