PTCA635 发表于 2025-3-26 23:33:57

http://reply.papertrans.cn/103/10269/1026829/1026829_31.png

吹牛大王 发表于 2025-3-27 04:41:28

http://reply.papertrans.cn/103/10269/1026829/1026829_32.png

山崩 发表于 2025-3-27 07:22:41

http://reply.papertrans.cn/103/10269/1026829/1026829_33.png

Headstrong 发表于 2025-3-27 09:49:03

http://reply.papertrans.cn/103/10269/1026829/1026829_34.png

Pathogen 发表于 2025-3-27 16:13:48

http://reply.papertrans.cn/103/10269/1026829/1026829_35.png

描绘 发表于 2025-3-27 21:43:24

http://reply.papertrans.cn/103/10269/1026829/1026829_36.png

calamity 发表于 2025-3-28 01:36:46

http://reply.papertrans.cn/103/10269/1026829/1026829_37.png

贫困 发表于 2025-3-28 03:46:12

Graph-Structured Data Compression Based on Frequent Subgraph Contractiones. For the graph given, many subgraph will be generated. A based on graph traversal, the frequently patterns(fp) can be found. With join the fp patterns, a new fp pattern is produced. Followed by this loop until the threshold, the it result in compression results. Analysis and experiments show that the algorithms have high performance.

粗糙滥制 发表于 2025-3-28 07:53:21

Wireless Nerve: Invisible Anti-theft System in Wireless Sensor Networkrs can be hidden in walls and furniture. The intruder influences the transmitting link, and RSSI of the link changes. According to the changes, the system can detect the movement in monitoring area, and keep invisible. HAS is applied in indoor environment. Experiment results show that HAS achieves very low false positive and no false negative.

河潭 发表于 2025-3-28 13:56:11

http://reply.papertrans.cn/103/10269/1026829/1026829_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Web-Age Information Management; WAIM 2012 Internatio Zhifeng Bao,Yunjun Gao,Xiao Zhang Conference proceedings 2012 Springer-Verlag Berlin H