Sort by:
Publication Type:
Open access:
Publication Date:
Periodicals:
Search results
Online since: October 2011
Authors: Li Juan Li, Feng Liu, Bing Yuan
., Chen F.J. and Tan Y: Springer Berlin / Heidelberg. (2008)
[7] S.L.
Ho, Yang S.Y., Ni G.Z., Lo Edward W.C., and Wong H.C: IEEE Transactions on Magnetics Vol.41 (2005), p. 1756 [8] Baumgartner U., Magele Ch., and Renhart W: IEEE Transactions on Magnetics Vol.40 (2004), p. 1172 [9] Zhang W.B., Lai L.F: Journal of Guangxi University (Natural Science Edition) Vol.33 (2008), p. 40(in Chinese)
Ho, Yang S.Y., Ni G.Z., Lo Edward W.C., and Wong H.C: IEEE Transactions on Magnetics Vol.41 (2005), p. 1756 [8] Baumgartner U., Magele Ch., and Renhart W: IEEE Transactions on Magnetics Vol.40 (2004), p. 1172 [9] Zhang W.B., Lai L.F: Journal of Guangxi University (Natural Science Edition) Vol.33 (2008), p. 40(in Chinese)
Online since: November 2013
Authors: Zhong Liang, Jian Hong Yi, Jia Min Zhang, Yi Chun Liu, Jing Hong Du, Guo You Gan, Ji Kang Yan
Wong, P.
Szargan, Surface and Interface Analysis, 40(1) (2008) 27-36
Zhao, Acta Physica Sinica, 57(5) (2008) 3188-3192
Szargan, Surface and Interface Analysis, 40(1) (2008) 27-36
Zhao, Acta Physica Sinica, 57(5) (2008) 3188-3192
Online since: March 2015
Authors: C.M. Jiang, J.J. Lu, L.J. Lu
And in Singapore, Yeung & Wong [8] examined 608 road traffic accidents (RTAs) that occurred in the three expressway tunnels over 2009–2011.
References [1] PIARC Technical Committee 3.3 Road Tunnel Operation, 2008.
Risk Analysis for Road Tunnels, May 2008 [2] Kerstin Lemke.
Vol. 15, No. 1, pp. 3-11 [8] Jian Sheng Yeung, Yiik Diew Wong.
Transportation Research Part F 11, 2008 pp.61–74 [11] Lord, D., Mannering, F., 2010.
References [1] PIARC Technical Committee 3.3 Road Tunnel Operation, 2008.
Risk Analysis for Road Tunnels, May 2008 [2] Kerstin Lemke.
Vol. 15, No. 1, pp. 3-11 [8] Jian Sheng Yeung, Yiik Diew Wong.
Transportation Research Part F 11, 2008 pp.61–74 [11] Lord, D., Mannering, F., 2010.
Artificial Neural Network Based Intrusion Detection Method Combined with Manifold Learning Algorithm
Online since: October 2011
Authors: Zhi Xiong Li, Jin Guang Chen
Gu: Adaptive intrusion detection algorithm based on rough sets, J T singhua Univ (Sci & Tech), Vo l. 48 (2008), p. 1165-1168
Appl., vol. 35, pp. 307–316, August 2008
Wong, 2002.
Appl., vol. 35, pp. 307–316, August 2008
Wong, 2002.
Online since: September 2011
Authors: Wen Ya Fan, Hun Yu Gong, Yin Hong Qu, Yu Ping Miao, Zhi Dong Liu
[5] Wong, C.
International Dairy Journal.2008, 18: 260-270
[Thesis].Shanghai, Shanghai Ocean University, 2008: 54-58
International Dairy Journal.2008, 18: 260-270
[Thesis].Shanghai, Shanghai Ocean University, 2008: 54-58
Online since: May 2014
Authors: Wei Gan, Ying Hua Zhou
References
[1] Thomas H.Cormen Charles E.Leiserson, Ronald L.Rivest Clifford Stein.Introduction to Algorithms[M].Beijing: Mechanical Industry Press,2013:142-155
[2] Kumar S,Turner J,Crowley P.Peacock hashing:Deterministic and updatable hashing for high performance networking[C]//The 27th Conference on Computer Communications.Washington, DC:IEEE Computer Society, 2008:101-105
[4] AHMADI M,WONG S.
A memory-optimized bloom filer using an additional hashing function[C]//IEEE Global Telecommunications conference,Washington,DC:IEEE Computer Society, 2008:1-5
[4] AHMADI M,WONG S.
A memory-optimized bloom filer using an additional hashing function[C]//IEEE Global Telecommunications conference,Washington,DC:IEEE Computer Society, 2008:1-5
Online since: January 2013
Authors: Guo Li Ji, Jing Ci Yao, Zi Jiang Yang, Cong Ting Ye
Vol. 9 (2008), p. 306
[2] Kazutaka Katoh, Kazuharu Misawa, Kei-ichi Kuma, Takashi Miyata: Nucleic Acids Research. 30, 3059(2002)
[3] Robert C.
Wong.
Micro, IEEE. 28, 39(2008) [12] Julie D.
Wong.
Micro, IEEE. 28, 39(2008) [12] Julie D.
Online since: February 2013
Authors: Ya Lei Liu, Xiao Hui Gu
T Wong, and S Lau.The Acoustic Vector-Sensor’s Near-Field Array-Manifold.
Journal of System Simulation, vol.1,pp:128-131(2008) [12] P.
Systems Engineering Theory and Practise, vol.5,pp:136-141 (2008) (In chinese)
Journal of System Simulation, vol.1,pp:128-131(2008) [12] P.
Systems Engineering Theory and Practise, vol.5,pp:136-141 (2008) (In chinese)
Online since: April 2012
Authors: Agus Geter E. Sutjipto, Bakri Jufriadi, Hens Saputra
Mater. 115 (2008) p.215–233
[2] Yeung K.L., Wong L., Sun W., et al.
[4] Haile, T., Nakhla, H., A Novel Zeolite Coating for Protection of Concrete Sewers from Biological Sulfuric Acid Attack, Geomicrobiologi Journal 25 (2008) 322–331 [5] Bedi, R.S., Beving, D.E., Zanello, L.P., Yan, Y.S., Acta Biomater. 5 (2009) p. 3265–3271
[2] Yeung K.L., Wong L., Sun W., et al.
[4] Haile, T., Nakhla, H., A Novel Zeolite Coating for Protection of Concrete Sewers from Biological Sulfuric Acid Attack, Geomicrobiologi Journal 25 (2008) 322–331 [5] Bedi, R.S., Beving, D.E., Zanello, L.P., Yan, Y.S., Acta Biomater. 5 (2009) p. 3265–3271
Online since: September 2014
Authors: Yang Wang, Jing Shuang Liu, Jing Jing Zhang
Zhu: submitted to Journal of Agro-Environment Science Vol. 27 (2008), p. 560-563
Zheng: submitted to Journal of Agro-Environment Science Vol. 27 (2008), p. 1769-1773
Wong: submitted to Environmental Pollution Vol. 129 (2004), p. 113-124
Zheng: submitted to Journal of Agro-Environment Science Vol. 27 (2008), p. 1769-1773
Wong: submitted to Environmental Pollution Vol. 129 (2004), p. 113-124