Search

Your search keyword '"Chen LIN"' showing total 4,725 results

Search Constraints

Start Over You searched for: "Chen LIN" Remove constraint "Chen LIN" Publication Type eBooks Remove constraint Publication Type: eBooks
4,725 results on '"Chen LIN"'

Search Results

101. Mining Defects of Result-Sensitive Function Based on Information Entropy

102. KCRS: A Blockchain-Based Key Compromise Resilient Signature System

103. Structure Optimization of Antenna System in Airborne Radar

104. Frame Synchronization Method for BDS B2a Signal Under the Constraint of Non-binary LDPC Code

105. Pseudorandom Code Error Monitoring Method for GNSS Signal

106. The Influence of a Certain Type of Radar Operator’s Operating Ability on the Operational Effectiveness of Equipment

113. Construction and Empirical Research on the Competency Model of Rural E-commerce Innovation and Entrepreneurship

114. An Ensemble Learning Approach to Detect Malwares Based on Static Information

115. Cluster-Based Basic Safety Message Dissemination in VANETs

116. Computational Complexity Characterization of Protecting Elections from Bribery

117. Scheduling Many Types of Calibrations

120. Competitive Analysis of 'Buy Online and Pick Up in Store' Channel

121. Dynamic Attribute Package: Crowd Behavior Recognition in Complex Scene

122. The Analysis and Countermeasures of Mobile Terminal RE or RSE Problem

123. Cross Chain Bribery Contracts: Majority vs Mighty Minority

124. Understanding the Motivation for Exercise Through Smart Bracelets: The Importance of a Healthy Lifestyle

125. Examining the Impact of Exercise Tracking Data on Promoting Regular Exercise Among University Students

126. On Block-Structured Integer Programming and Its Applications

127. Advances in Understanding, Diagnosis, and Treatment of Tinnitus

128. Multiple S-Box Correlation Energy Analysis Model Based on Particle Swarm Optimization

129. The Game Among Bribers in a Smart Contract System

130. Spatial-temporal Fusion Network with Residual Learning and Attention Mechanism: A Benchmark for Video-Based Group Re-ID

131. A Security-Sensitive Function Mining Framework for Source Code

132. Cooperative BSM Dissemination in DSRC/WAVE Based Vehicular Networks

133. Research and Implementation of an Aquaculture Monitoring System Based on Flink, MongoDB and Kafka

134. Coarse-to-Fine: A RNN-Based Hierarchical Attention Model for Vehicle Re-identification

135. A General Framework for Handling Commitment in Online Throughput Maximization

143. Temperature Variation and Distribution in Tobacco Casing Cylinder Based on Infrared Thermal Imaging Detection

146. Managing Security Risks Interdependencies Between ICT and Electric Infrastructures: A Game Theoretical Analysis

147. In Defense of Fully Connected Layers in Visual Representation Transfer

148. Recognizing Potential Runtime Types from Python Docstrings

149. Spatial Invariant Person Search Network

150. PP-MCSA: Privacy Preserving Multi-channel Double Spectrum Auction

Catalog

Books, media, physical & digital resources