根深蒂固 发表于 2025-3-21 19:22:20

书目名称Intelligence and Security Informatics影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0469304<br><br>        <br><br>书目名称Intelligence and Security Informatics影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0469304<br><br>        <br><br>书目名称Intelligence and Security Informatics网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0469304<br><br>        <br><br>书目名称Intelligence and Security Informatics网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0469304<br><br>        <br><br>书目名称Intelligence and Security Informatics被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0469304<br><br>        <br><br>书目名称Intelligence and Security Informatics被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0469304<br><br>        <br><br>书目名称Intelligence and Security Informatics年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0469304<br><br>        <br><br>书目名称Intelligence and Security Informatics年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0469304<br><br>        <br><br>书目名称Intelligence and Security Informatics读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0469304<br><br>        <br><br>书目名称Intelligence and Security Informatics读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0469304<br><br>        <br><br>

指耕作 发表于 2025-3-21 22:24:30

978-3-540-89899-3Springer-Verlag Berlin Heidelberg 2008

表脸 发表于 2025-3-22 03:34:29

Intelligence and Security Informatics978-3-540-89900-6Series ISSN 0302-9743 Series E-ISSN 1611-3349

Loathe 发表于 2025-3-22 05:01:01

An Information Theory Approach to Identify Sets of Key Playerst we use to analyze the structural properties of a social network. Then, we propose a new method aimed at finding a set of key players that solves the . and . problems. Our preliminary experimental results indicate that the entropy measures can be used effectively to identify a set of key players in a social network.

Derogate 发表于 2025-3-22 09:09:44

Computational Modeling of Criminal Activityvel ideas and tools for crime investigations as well as experimental platforms for decision support in evidence-based policy making. We present here a comprehensive computational framework for modeling of criminal behavior to facilitate systematic experimental studies of a wide range of criminal activities in urban environments.

Distribution 发表于 2025-3-22 13:45:57

https://doi.org/10.1007/978-3-540-89900-6DRM; access control; audio watermarking; biometrics; classification; clustering; collaborative computing; c

FAZE 发表于 2025-3-22 17:50:40

t zu sein. Wer das öfters nötig hat, kann einem leid tun.“ Daß sie aber auch für mittlere Unternehmungen auf dem Marsche war, beweist der Erfolg, mit dem die Treuhand AG, Köln, das Schema einer Kurzfristigen Erfolgsrechnung für mittlere Maschinenfabriken auf der Kölner Werkbundausstellung im Jahre 1

Phenothiazines 发表于 2025-3-22 22:09:52

http://reply.papertrans.cn/47/4694/469304/469304_8.png

Mumble 发表于 2025-3-23 03:53:07

http://reply.papertrans.cn/47/4694/469304/469304_9.png

感情脆弱 发表于 2025-3-23 08:20:46

http://reply.papertrans.cn/47/4694/469304/469304_10.png
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Intelligence and Security Informatics; European Conference, Daniel Ortiz-Arroyo,Henrik Legind Larsen,Gerhard W Conference proceedings 2008