Search Options

Sort by:

Sort search results by

Publication Type:

Publication Type filter

Open access:

Publication Date:

Periodicals:

Periodicals filter

Search results

Online since: July 2012
Authors: Kai Feng Lin, Yan Qiu Jiang, Bin Xu, Jian Min Sun, Xian Zhu Xu
Yang, Y.
Yang, D.
Tian, J.
Yang, C.
Yang, Y.
Online since: October 2021
Authors: Reginald E. Masirag, Francis O. Pacariem Jr., Juicel Marie D. Taguinod, Mary Donnabelle L. Balela
Yang, B.
Yang: J.
Yang, Z.
Yang: J.
Tian, and Q.
Online since: April 2014
Authors: Yong Shi, Jun Ke, Qi Dong Zhao, Xin Yong Li, Nan Zheng, Fang Hong Xue
[5] Hou Yang, Li Xinyong, Zhao Qidong, etc.
[7] Hou Yang, Li Xinyong, Zhao Qidong, etc.
[10] Hou Yang, Li Xinyong, Zou Xuejun, etc.
[18] Kang Qing, Yang Lixia,†, Chen Yufang, etc.
[22] Zhou Ji, Ji Tian-hao, Li Li, etc.
Online since: December 2014
Authors: Hai Rong Guo, Meng Meng Wei, Xiao Fei Wang, Li Jun Chen, Gui Ping Xu
(In Chinese) [4] Peng Ma, Changxiao Li, Ming Lei, Yujing Yang ang Jun Ma.
[8] Litao Yang, Fenglian Mo, Qiuzhen Zhu, Nan Li, Zongxi Ou ang Yangrui Li.
(In Chinese) [10] Jiao R Z.Yang C D.
[11] Shangdong Yang, Jun Wu, Jiucheng Zhao, Hongwei Tan and Yangrui Li.
Guangxi Agricultural Sciences41(2010), p.795-799 [13] Haitao Tian, Xisheng Hu, Shaofeng Zhang, Jian Xie, Dong Zhang and Jinsong An.
Online since: June 2013
Authors: Gang Liu, Fang Li
Tian Zhong[3] studied traditional testability allocation approach[4], focusing on engineering practicality, but only a few influencing factors are considered, and resource constraint is not considered.
[3]Tian Zhong.
[8]Yang J E, Hwang M J, Sung T Y, Jin Y.
Online since: February 2012
Authors: Yan Yan Liu, Chao Liu, Kang Wu, Huai Xiang Li, Lu Sheng Chen
Yang, R.
Tian, L.
Li, H.Tian, L.Yu .
Online since: July 2025
Authors: Seong Chun Koay, Ai Bao Chai, Kim Yeow Tshai, Erwan Verron, Zheng Hao Lau, Shiau Ying Ch'ng
Tian, C.
Yang, L.
Tian, Y, Ouyang, A.
Online since: February 2014
Authors: Fei Wang, Yu Wang, Yuan Tian
Research of Improved network access authorization mechanism based on Elliptic Curve Fei Wang 1, a, Yu Wang 1, a and Yuan Tian 2, b 1 Department of Information Equipment, Academy of Equipment, Beijing 101416, China 2Company of Postgraduate Management, Academy of Equipment, Beijing 101416, China awangfei791009@163.com, baashin@126.com Keywords:. network access; mutual authorization; Elliptic Curve Cryptosystem Abstract.
Security integration of WAPI based on WLAN and 3G[J].Chinese journal of computer. 2010,9: 1675-1685 [4] Wang hao, Yang jian, Liu jie, et al.
Online since: August 2013
Authors: Hao Chen, Tian Liang, Juan Yao
The Processing Algorithms and EML Modeling of True Color Synthesis for SPOT5 Image Hao Chen1,a, Tian Liang1 and Juan Yao1 1 Hunan State Engineering Laboratory of Geospatial Information, Hunan University of Science and Technology, Xiangtan, Hunan, China, 411201 ach_chenhao@163.com Keywords: SPOT-5 Image, EML Modeling, True-color Processing.
[2] Y.L.Yang and X.F.Qiu: Journal of Qinghai Environment.Vol.47(2007), p.46(in Chinese)
Online since: April 2013
Authors: Xin Peng, Tian Qi, Zuo Chang Zhang
Research on Linear Features Change Detection Based on Remote Sensing Image and Vector Data Zuochang Zhanga, Xin Pengb and Tian Qic Guangxi University of Finance and Economics, Nanning, Guangxi, China ageozzc@163.com, b395714816@qq.com, cwinterfell@qq.com Keywords: Remote sensing image, GIS vector, Linear features, Change detection, Ziplock Snake Abstract.
[6] Han Min, Sun Yang, Tang Xiaoliang.
Showing 4031 to 4040 of 9338 items