nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A B-spline curve extension algorithm - B 样条曲线延伸算法
|
Lu, Yang |
|
2015 |
59 |
3 |
p. 1-9 |
artikel |
2 |
A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption - 基于CDH假设的强安全的无对的无证书认证密钥协商协议
|
Sun, Haiyan |
|
2016 |
59 |
3 |
p. 1-16 |
artikel |
3 |
Controllability of Boolean control networks with state-dependent constraints - 状态依赖约束下布尔网路的能控性
|
Guo, Yuqian |
|
2016 |
59 |
3 |
p. 1-14 |
artikel |
4 |
Cryptanalysis of an MOR cryptosystem based on a finite associative algebra - 基于有限结合代数的 MOR 公钥密码安全性分析
|
Wu, Wanqing |
|
2016 |
59 |
3 |
p. 1-9 |
artikel |
5 |
Detection of collapsed buildings with the aerial images captured from UAV - 基于低空无人机航拍图像的坍塌建筑物自动探测方法
|
Hua, Chunsheng |
|
2015 |
59 |
3 |
p. 1-15 |
artikel |
6 |
Generalized cryptanalysis of RSA with small public exponent - 针对公钥e小于等于N的0.5次幂的RSA算法的广义密码分析
|
Zheng, Mengce |
|
2016 |
59 |
3 |
p. 1-10 |
artikel |
7 |
High precision intelligent flexible grasping front-end with CMOS interface for robots application - 用于智能机器人精细抓握的高灵敏度柔性抓握前端
|
Hu, Xiaohui |
|
2016 |
59 |
3 |
p. 1-11 |
artikel |
8 |
Joint sparsity and fidelity regularization for segmentation-driven CT image preprocessing - 基于稀疏性和保真性正则化模型的分割驱动的CT图像预处理研究
|
Liu, Feng |
|
2016 |
59 |
3 |
p. 1-7 |
artikel |
9 |
Key recovery attack for PRESENT using slender-set linear cryptanalysis - PRESENT 算法的 slender 集线性密钥恢复攻击
|
Liu, Guoqiang |
|
2016 |
59 |
3 |
p. 1-14 |
artikel |
10 |
Linear complexity problems of level sequences of Euler quotients and their related binary sequences - 欧拉商的权位序列及其二元序列的线性复杂度问题
|
Niu, Zhihua |
|
2015 |
59 |
3 |
p. 1-12 |
artikel |
11 |
L-quantum spaces - L-量子空间
|
Zhao, Bin |
|
2016 |
59 |
3 |
p. 1-9 |
artikel |
12 |
Model based verification of dynamically evolvable service oriented systems - 基于模型的动态可演化面向服务架构验证方法
|
Zhou, Yu |
|
2016 |
59 |
3 |
p. 1-17 |
artikel |
13 |
On the matrix feedback shift register synthesis for matrix sequences - 矩阵序列的矩阵反馈移位寄存器综合问题
|
Wang, Liping |
|
2015 |
59 |
3 |
p. 1-10 |
artikel |
14 |
Public verifiability for shared data in cloud storage with a defense against collusion attacks - 支持抗共谋攻击的云共享数据完整性验证方案
|
Wang, Zhonghua |
|
2016 |
59 |
3 |
p. 1-3 |
artikel |
15 |
Robust H2/H∞ global linearization filter design for nonlinear stochastic time-varying delay systems
|
Mao, Weihua |
|
2016 |
59 |
3 |
p. 1-17 |
artikel |
16 |
Salient object detection via region contrast and graph regularization - 基于区域对比度和图正则化的显著目标检测
|
Wu, Xingming |
|
2016 |
59 |
3 |
p. 1-14 |
artikel |
17 |
Stego key searching for LSB steganography on JPEG decompressed image - 基于 JPEG 解压缩图像的 LSB 隐写密钥搜索方法
|
Liu, Jiufen |
|
2016 |
59 |
3 |
p. 1-15 |
artikel |
18 |
Variable thrust directional control technique for plateau unmanned aerial vehicles - 高原型无人机变推力轴线控制技术研究
|
Wang, Yin |
|
2016 |
59 |
3 |
p. 1-4 |
artikel |