Showing 1 - 20 results of 32 for search 'Qi XU', query time: 0.03s
Refine Results
-
1
-
2
Joint Optimization Decision of Online Retailers’ Pricing and Live-Streaming Effort in the Postepidemic Era by Jinrong Liu, Qi Xu, Zhongmiao Sun
Published 2022-01-01
Article -
3
Optimal Policies for the Pricing and Replenishment of Fashion Apparel considering the Effect of Fashion Level by Qi Chen, Qi Xu, Wenjie Wang
Published 2019-01-01
Article -
4
Exponential Stabilization for Timoshenko Beam with Distributed Delay in the Boundary Control by Xiu Fang Liu, Gen Qi Xu
Published 2013-01-01
Article -
5
Comparison of Common Methods in Dynamic Response Predictions of Rotor Systems with Malfunctions by Hongliang Yao, Qian Zhao, Qi Xu, Bangchun Wen
Published 2014-01-01
Article -
6
-
7
Evaluation of Public Welfare Level of Urban Rail Transit considering Operation Management by Ran Meng, Baohua Mao, Qi Xu, Yang Yang
Published 2022-01-01
Article -
8
Riesz basis property of Timoshenko beams with boundary feedback control by De-Xing Feng, Gen-Qi Xu, Siu-Pang Yung
Published 2003-01-01
Article -
9
Research of discovering vulnerabilities of NFC applications on Android platform by Zhi-qiang WANG, Qi-xu LIU, Yu-qing ZHANG
Published 2014-11-01
Article -
10
Synchronization of a Supply Chain Model with Four Chaotic Attractors by Jing Zheng, Qiongxin Zhang, Qi Xu, Fei Xu, Victor Shi
Published 2022-01-01
Article -
11
Fluid-Induced Vibration Elimination of a Rotor/Seal System with the Dynamic Vibration Absorber by Qi Xu, Junkai Niu, Hongliang Yao, Lichao Zhao, Bangchun Wen
Published 2018-01-01
Article -
12
Polymorphonuclear Leukocytes or Hydrogen Peroxide Enhance Biofilm Development of Mucoid Pseudomonas aeruginosa by Qi Tan, Qing Ai, Qi Xu, Fang Li, Jialin Yu
Published 2018-01-01
Article -
13
Weighted Complex Network Analysis of the Different Patterns of Metro Traffic Flows on Weekday and Weekend by Jia Feng, Xiamiao Li, Baohua Mao, Qi Xu, Yun Bai
Published 2016-01-01
Article -
14
-
15
-
16
Research on security of third-party tracking by Yu-qing ZHANG, Qian-ru WU, Qi-xu LIU, Ying DONG
Published 2014-09-01
Article -
17
Android malware detection method based on permission sequential pattern mining algorithm by Huan YANG, Yu-qing ZHANG, Yu-pu HU, Qi-xu LIU
Published 2013-08-01
Article -
18
Research on key technology of vulnerability threat classification by Qi-xu LIU, Chong-bin ZHANG, Yu-qing ZHANG, Bao-feng ZHANG
Published 2012-09-01
Article -
19
Research on Webshell-based botnet by Ke LI, Bin-xing FANG, Xiang CUI, Qi-xu LIU, Zhi-tao YAN
Published 2016-06-01
Article -
20
Survey on cyber deception by Zhao-peng JIA, Bin-xing FANG, Chao-ge LIU, Qi-xu LIU, Jian-bao LIN
Published 2017-12-01
Article