熱門搜尋
您輸入的關鍵字: Jianying
搜尋結果共 66 筆, 頁數 1 / 2
呈現:
Control over Communication Networks Advanced and systematic examination of the design and analysis o... more
Tensor is a natural representation for multi-dimensional data, and tensor computation can avoid poss... more
The book describes American strategies in the South China Sea, and argues that the degree of U.S. in... more
Regression analysis is a key area of interest in the field of data analysis and machine learning whi... more
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd Europ... more
The mammalian gastrointestinal mucosa is a rapidly self-renewing tissue in the body, and its homeost... more
, Prof. Liu Manhong and Dr Wang Jiani -- both scholars on and practitioners in the angel investment market -- try to provide...... more
What happens when East travels West? In today’s increasingly globalized world, these collisions are ... more
This book constitutes the refereed proceedings of the 14th International Conference on Information S... more
Research oriented non-repudiation protocols have been active since the beginning of this millennium.... more
These proceedings contain the papers selected for presentation at the 6th - ternational Conference o... more
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International I... more
The 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin Si... more
This volume contains the Research Track proceedings of the Second Information Security Practice and ... more
This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2... more
The second International Conference on Applied Cryptography and Network Security (ACNS 2004) was spo... more
PKC2004wasthe7thInternationalWorkshoponPracticeandTheoryinPublic Key Cryptography and was sponsored ... more
The 1st International Conference on "Applied Cryptography and Network Se- rity" (ACNS 2003) was spon... more
This volume contains the proceedings of the 4th International Conference on - formation and Communic... more
This review of modern literature includes fiction by Han Ong and Ida Fink, and a selection of report... more
artists in China, acclaimed writer Jianying Zha has compiled a knowledgeable, eye-opening book. . . . (China Pop) draws a...... more
This book constitutes the proceedings of the satellite workshops held around the 21st International ... more
This volume is jointly written by twenty experts and scholars from China. It aims to reflect and ans... more
This book constitutes the proceedings of the satellite workshops held around the 20th International ... more
Research on Alarm Correlation Analysis for EMU Train Based on Association Rule Mining Algorithm.- Sy... more
Overview of Multilevel Inverter Topologies and Modulation Methods.- NP voltage control strategy base... more
Health Evaluation of Train Ethernet Cable Based on Health Factor Penalty Algorithm.- Comparison on D... more
This book constitutes the proceedings of the 17th International Workshop on Security and Trust Manag... more
This book constitutes the proceedings of the satellite workshops held around the 19th International ... more
This book constitutes the proceedings of the satellite workshops held around the 18th International ... more
This book constitutes the refereed proceedings of the 21th International Conference on Information a... more
This book constitutes the proceedings of the satellite workshops held around the 17th International ... more
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International ... more
This book constitutes the proceedings of the 10th International Conference on Information Security P... more
In Tide Players, acclaimed New Yorker contributor and author Jianying Zha depicts a new generation of movers and...... more
This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its bro... more
one of the only testimonies of its kind. As Zha Jianying writes in the introduction, The book has sold well and stayed in...... more
In Tide Players, acclaimed author Jianying Zha depicts a new generation of movers and shakers who are transforming...... more
ACNS 2010, the 8th International Conference on Applied Cryptography and Network Security, was held i... more