-
501
-
502
Multi-tenant virtual domain isolation construction method based on L-DHT
Published 2020-06-01Get full text
Article -
503
-
504
Multi-parties key agreement protocol based on elliptic curve
Published 2016-05-01Get full text
Article -
505
-
506
Semigroup Generation Theorems of Anti-Triangular Operator Matrices and Their Application
Published 2024-01-01Get full text
Article -
507
Preparation and Application of Cationic Modified Cellulose Fibrils as a Papermaking Additive
Published 2016-01-01Get full text
Article -
508
Power PTN security comprehensive evaluation based on power application
Published 2015-12-01Get full text
Article -
509
-
510
Design and Analysis of a Cylindrical Surface Translation and a Rotational Parallel Mechanism
Published 2023-06-01Get full text
Article -
511
Research of Fault Diagnosis of Rolling Bearing based on MSCNN and STFT
Published 2020-07-01Get full text
Article -
512
-
513
Multi-scale Logo detection algorithm based on convolutional neural network
Published 2020-04-01Get full text
Article -
514
Research on synthesis data generation method for logo recognition
Published 2018-05-01Get full text
Article -
515
-
516
-
517
-
518
-
519
Deadline Aware Retransmission Threshold Setting Protocol in Cyber-Physical Systems
Published 2015-09-01Get full text
Article -
520
Wu’s Characteristic Set Method for SystemVerilog Assertions Verification
Published 2013-01-01Get full text
Article