Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             22 results found
no title author magazine year volume issue page(s) type
1 A DNA Computing Model for the Graph Vertex Coloring Problem Based on a Probe Graph Xu, Jin
2018
4 1 p. 61-77
article
2 A Practical Approach to Constructing a Knowledge Graph for Cybersecurity Jia, Yan
2018
4 1 p. 53-60
article
3 A Statistical Analysis of China’s Traffic Tunnel Development Data Zhao, Yong
2018
4 1 p. 3-5
article
4 Calculation of the Behavior Utility of a Network System: Conception and Principle Hu, Changzhen
2018
4 1 p. 78-84
article
5 Challenges and Thoughts on Risk Management and Control for the Group Construction of a Super-Long Tunnel by TBM Deng, Mingjiang
2018
4 1 p. 112-122
article
6 Conception and Exploration of Using Data as a Service in Tunnel Construction with the NATM Du, Bowen
2018
4 1 p. 123-130
article
7 Concrete-Filled Steel Tube Arch Bridges in China Zheng, Jielian
2018
4 1 p. 143-155
article
8 Cybersecurity Research—Essential to a Successful Digital Future Craig, Jackie
2018
4 1 p. 9-10
article
9 Erratum to “Modeling and Experimental Validation of the Electron Beam Selective Melting Process” [Engineering 3 (2017) 701–707] Yan, Wentao
2018
4 1 p. 164
article
10 Glaciology and Global Climate Change Moore, John C.
2018
4 1 p. 6-8
article
11 Island Megalopolises: Tunnel Systems as a Critical Alternative in Solving Transport Problems Makarov, Vladimir V.
2018
4 1 p. 138-142
article
12 Mapping Sea Level Rise Behavior in an Estuarine Delta System: A Case Study along the Shanghai Coast Cheng, H.Q.
2018
4 1 p. 156-163
article
13 Recent Advances in Passive Digital Image Security Forensics: A Brief Review Lin, Xiang
2018
4 1 p. 29-39
article
14 Research on Combined Construction Technology for Cross-Subway Tunnels in Underground Spaces Chen, Xiangsheng
2018
4 1 p. 103-111
article
15 Research on the Construction of a Novel Cyberspace Security Ecosystem Yang, Xiao-Niu
2018
4 1 p. 47-52
article
16 Social Influence Analysis: Models, Methods, and Evaluation Li, Kan
2018
4 1 p. 40-46
article
17 SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users Li, Fenghua
2018
4 1 p. 85-93
article
18 The New Frontiers of Cybersecurity Fang, Binxing
2018
4 1 p. 1-2
article
19 Theories of Social Media: Philosophical Foundations Qi, Jiayin
2018
4 1 p. 94-102
article
20 The Practice of Forward Prospecting of Adverse Geology Applied to Hard Rock TBM Tunnel Construction: The Case of the Songhua River Water Conveyance Project in the Middle of Jilin Province Li, Shucai
2018
4 1 p. 131-137
article
21 Toward New-Generation Intelligent Manufacturing Zhou, Ji
2018
4 1 p. 11-20
article
22 Toward Privacy-Preserving Personalized Recommendation Services Wang, Cong
2018
4 1 p. 21-28
article
                             22 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands