Showing 1 - 12 results of 12 for search 'Hong Chao', query time: 0.01s
Refine Results
-
1
Innovative Research on Teaching Method of Taekwondo in College Elective Courses under the Background of Big Data by Yahui Chang, Su Meng, Hong Chao
Published 2022-01-01
Article -
2
States constrain-based algorithm for large scale regular expression matching by Wei HE, Yun-fei GUO, Hong-chao HU
Published 2013-10-01
Article -
3
Dynamic traffic balancing scheme for LB-BvN to guarantee in-order packet delivering by HU Hong-chao, GUO Yun-fei, PANG lin, BU You-jun
Published 2011-01-01
Article -
4
Research on new kind of parallel packet switch based on CICQ by REN Tao, LAN Ju-long, HU Hong-chao, CHENG Dong-nian
Published 2010-01-01
Article -
5
MUMF:a mixed uni-and multicast fair scheduling scheme for CICQ switches by Hong-chao HU, Yun-fei GUO, Shu-qiao CHEN, Peng YI
Published 2012-01-01
Article -
6
Effect of decitabine on PD-L2 methylation in whole blood of iodine-induced autoimmune thyroiditis rats by Baiming Jin, Yanbo Qi, Hong Chao, Xiaolei Yang, Hongjie Li, Siyuan Wan
Published 2025-01-01
Article -
7
Implementation architecture of mimic security defense based on SDN by Zhen-peng WANG, Hong-chao HU, Guo-zhen CHENG, Chuan-hao ZHANG
Published 2017-10-01
Article -
8
Research on dynamic migration of virtual machine based on security level by Shuo ZHAO, Xin-sheng JI, Yu-xing MAO, Guo-zhen CHENG, Hong-chao HU
Published 2017-07-01
Article -
9
Theory and system research of communication with tracking and pointing function for hunter robot by YU Yang1, MIN Fu-hong2, NI Xiao-wu1, ZHANG Hong-chao1
Published 2011-01-01
Article -
10
RESEARCH ON BENDING FATIGUE TEST BASED ON 42CRMO GEAR (MT) by WANG JiaJun, PEI WeiChi, JI HongChao, LONG HaiYang, WANG ZhiTao
Published 2023-01-01
Article -
11
-
12
Secure deployment strategy of virtual machines based on operating system diversity by Miao ZHANG, Xin-sheng JI, Jian-jian AI, Wen-yan LIU, Hong-chao HU, Shu-min HUO
Published 2017-10-01
Article