中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 91-100 of 156)

Filters            
Items/Page:    Sort:
an effective two-stage neural network model and its application on flood loss prediction [会议论文]
2nd International Symposium on Neural Networks, Chongqing, PEOPLES R CHINA, MAY 30-JUN
Yang L; Zuo C; Wang YG
  |  
 
digital analysis technology for morphology of polymer chain coils in flow fields [会议论文]
6th International Symposium on Polymer Physics, Dali, PEOPLES R CHINA, JUN 01-05,
Zhou CX; Zheng H; Yu W; Yao JF; Li YC
  |  
 
the low splitting theorem in the difference hierarchy [会议论文]
1st Conference on Computability in Europe (CiE 2005), Amsterdam, NETHERLANDS, JUN 08-12,
Li AS
  |  
 
asymptotic behavior of normalized linear complexity of multi-sequences [会议论文]
3rd International Conference Sequences and Their Applications (SETA 2004), Seoul, SOUTH KOREA, OCT 24-28,
Dai ZD; Imamura K; Yang JH
  |  
 
measuring internet bottlenecks: location, capacity, and available bandwidth [会议论文]
3rd International Conference on Computer Networks and Mobile Computing (ICCNMC 2005), Zhangjiajie, PEOPLES R CHINA, AUG 02-04,
Zhou H; Wang YJ; Wang Q
  |  
 
computer search for counterexamples to wilkies identity [会议论文]
20th International Conference on Automated Deduction (CADE-20), Tallinn, ESTONIA, JUL 22-27,
Zhang J
  |  
 
on mitigating network partitioning in peer-to-peer massively multiplayer games [会议论文]
3rd International Conference on Computer Networks and Mobile Computing (ICCNMC 2005), Zhangjiajie, PEOPLES R CHINA, AUG 02-04,
He Y; Zhang Y; Guo J
  |  
 
probability based dynamic load-balancing tree algorithm for wireless sensor networks [会议论文]
3rd International Conference on Computer Networks and Mobile Computing (ICCNMC 2005), Zhangjiajie, PEOPLES R CHINA, AUG 02-04,
Yan TX; Bi YZ; Sun LM; Zhu HS
  |  
 
security on-demand architecture with multiple modules support [会议论文]
1st Information Security Practice and Experience Conference, Singapore, SINGAPORE, APR 11-14,
Wu YJ; Shi WC; Liang HL; Shang QH; Yuan CY; Liang B
  |  
 
detecting the deviations of privileged process execution [会议论文]
4th International Conference on Networking (ICN 2005), Reunion Isl, FRANCE, APR 17-21,
Su PR; Li DQ; Qu HP; Feng DG
  |  
 

previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 next

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace