Search

Your search keyword '"Wang Yuyu"' showing total 988 results

Search Constraints

Start Over You searched for: Author "Wang Yuyu" Remove constraint Author: "Wang Yuyu"
988 results on '"Wang Yuyu"'

Search Results

1. Double Index Calculus Algorithm: Faster Solving Discrete Logarithm Problem in Finite Prime Field

2. Measuring the Conditional Luminosity and Stellar Mass Functions of Galaxies by Combining the Dark Energy Spectroscopic Instrument Legacy Imaging Surveys Data Release 9, Survey Validation 3, and Year 1 Data

3. Peculiar Velocity Reconstruction From Simulations and Observations Using Deep Learning Algorithms

6. Measuring the conditional luminosity and stellar mass functions of galaxies by combining the DESI LS DR9, SV3 and Y1 data

9. Transport of intense ion beams in plasmas: collimation and energy-loss reduction

16. Improved Methods for Estimating Peculiar Velocity Correlation Functions Using Volume Weighting

22. Todd genus and $A_k$-genus of unitary $S^1$-manifolds

23. Elliptic genera of level $N$ for complete intersections

24. A Simple and Efficient Framework of Proof Systems for NP

25. Research on the Path of Promoting Low-Carbon Consumption in the E-Commerce Industry

27. Peculiar Velocity Estimation from Kinetic SZ Effect using Deep Neural Networks

28. Examples of diffeomorphic complete intersections with different Hodge numbers

29. The Hirzebruch genera of complete intersections

34. Unconditionally Secure NIZK in the Fine-Grained Setting

35. Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security

41. The Peculiar Velocity Correlation Function

43. An overlooked subset of Cx3cr1wt/wt microglia in the Cx3cr1CreER-Eyfp/wt mouse has a repopulation advantage over Cx3cr1CreER-Eyfp/wt microglia following microglial depletion

47. Automatic extraction of non-bifurcated lunar lineaments from Lunar Reconnaissance Orbiter (LRO) monochromatic images based on a Markov chain method.

48. Reliability analysis and optimization design of a repairable k-out-of-n retrial system with two failure modes and preventive maintenance.

49. Hierarchical Integrated Signature and Encryption : (or: Key Separation vs. Key Reuse: Enjoy the Best of both Worlds)

50. Fine-Grained Secure Attribute-Based Encryption

Catalog

Books, media, physical & digital resources