نتایج جستجو برای: shen connection

تعداد نتایج: 101653  

Journal: :Computer Networks 2013
Feng Shan Weifa Liang Jun Luo Xiaojun Shen

1389-1286/$ see front matter 2012 Elsevier B.V. All rights reserved. http://dx.doi.org/10.1016/j.comnet.2012.12.005 ⇑ Corresponding author at: School of Computer Science and Engineering, Southeast University, Jiangsu, Nanjing 210096, China. E-mail addresses: [email protected] (F. Shan), [email protected]. edu.au (W. Liang), [email protected] (J. Luo), [email protected] (X. Shen). Feng Shan a,e,⇑, W...

2007
Dan Huang Yun Shen Liyou Qiu Crystal Y. Chen Ling Shen Jim Estep Robert Hunt Daphne Vasconcelos George Du Pyone Aye Andrew A. Lackner Michelle H. Larsen William R. Jacobs Barton F. Haynes Norman L. Letvin Zheng W. Chen

Immune Distribution and Localization of Phosphoantigen-Specific V 2V 2 T Cells in Lymphoid and Nonlymphoid Tissues in Mycobacterium tuberculosis Infection Dan Huang,† Yun Shen,† Liyou Qiu, Crystal Y. Chen, Ling Shen, Jim Estep, Robert Hunt, Daphne Vasconcelos, George Du, Pyone Aye, Andrew A. Lackner, Michelle H. Larsen, William R. Jacobs, Jr., Barton F. Haynes, Norman L. Letvin, and Zheng W. Chen*

2009
Igor V. Nikolaev

A covariant functor from the category of the complex tori to the category of the Effros–Shen algebras is constructed. The functor maps isomorphic complex tori to the stably isomorphic Effros–Shen algebras. Our construction is based on the Teichmüller theory of the

Journal: :I. J. Network Security 2011
Shiang-Feng Tzeng Cheng-Chi Lee Tzu-Chun Lin

Shen and Chen proposed a novel key management scheme for dynamic access control in a hierarchy. In this article, the authors shall present an improved version of Shen and Chen’s scheme to reduce the computational time required for key generation and derivation.

2014
Jian Xu Chong-huai Yan Sudha Rani Kotha Jun Zhang Jin-song Zhang Chenshu Zhang

Jian Xu ([email protected]) Li-xiao Shen ([email protected]) Chong-huai Yan ([email protected]) Howard Hu ([email protected]) Fang Yang ([email protected]) Lu Wang ([email protected]) Sudha Rani Kotha ([email protected]) Fengxiu Ouyang ([email protected]) Li-na Zhang ([email protected]) Xiang-peng Liao ([email protected]) Jun Zhang ([email protected]) Ji...

Journal: :Journal of the Japanese Institute of Landscape Architecture 2000

Journal: :História, Ciências, Saúde-Manguinhos 2007

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید باهنر کرمان - دانشکده ریاضی و کامپیوتر 1389

the concepts of similarity and dissimilarity have been the interest of many researchers. basically, in the studies the similarity between two objects or phenomena, has been discussed. in this thesis, we consider the case when the resemblance or similarity among three objects or phenomena of a set, 3-similarity in our terminology, is desired. later we will extend our definitions and propos...

2013
Stephen Mann

Implicit surfaces are one technique for surface modeling in computer graphics. The are several implicit surface schemes to interpolate point data. In this report, I study two schemes, one by Turk and O’Brien, the other by Shen, and test how well they work. Further, although Shen derives a linear version of his scheme, he only implemented a constant version. In this report, I implemented and tes...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید