Jian

Results: 575



#Item
171Digital signal processing / Integral / Fast Fourier transform / Gaussian quadrature / Partial differential equation / Boundary element method / Mathematical analysis / Mathematics / Numerical integration

Advanced Scientific Computing Research FY 2004 Accomplishment Fast Volume Integration Based on the Pre-Corrected FFT L. J. Gray*, Oak Ridge National Laboratory Jian Ding and Wenjing Ye, Georgia Institute of Technology

Add to Reading List

Source URL: www.csm.ornl.gov

Language: English - Date: 2006-06-16 09:47:05
172Finance / Chief operating officer / Board of directors / Mergers and acquisitions / Venture capital / Business / Corporate governance / Management

Microsoft Word - Product Management

Add to Reading List

Source URL: www.jian.com

Language: English - Date: 2015-04-06 17:27:52
173

Observation and Change of Surface Air Temperature over Eastern Contiguous China Rucong Yu1 Jian Li2 Yatian Guo3 1

Add to Reading List

Source URL: www.geos.ed.ac.uk

Language: English - Date: 2012-06-29 08:18:18
    174

    CiteSeerX: Intelligent Information Extraction and Knowledge Creation from Web-Based Data Alexander G. Ororbia II, Jian Wu, and C. Lee Giles IST, Pennsylvania State University, University Park, PA, 16802 Email: ago109@ist

    Add to Reading List

    Source URL: www.akbc.ws

    Language: English - Date: 2015-04-02 16:06:46
      175

      Chinese general techniques requirements for important information systems Haohao Song, Zhen Lu, Jian Gu Sept. 27th, 2011

      Add to Reading List

      Source URL: www.yourcreativesolutions.nl

      Language: English - Date: 2011-09-21 18:03:24
        176HTTP / Secure communication / Cryptographic protocols / Electronic commerce / Portable software / HTTP Secure / HTTP Strict Transport Security / Transport Layer Security / Man-in-the-middle attack / Software / Computing / Cryptography

        Poster: Man-in-the-Browser-Cache: Persisting HTTPS Attacks via Browser Cache Poisoning Yaoqi Jia∗ , Yue Chen‡ , Xinshu Dong† , Prateek Saxena∗ , Jian Mao‡ , Zhenkai Liang∗ ∗ Department of Computer Science,

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2015-05-11 16:42:31
        177CNN / News media / Broadcasting / Digital media / Mesopotamian deities / NIN / Sumerogram

        Learning and Vision Group, NUS, ILSVRCNIN, Good! (您好) (Network in Network) Jian DONG, Min LIN, Yunchao WEI, Qiang CHEN*, Wei, XIA, Hanjiang LAI, Shuicheng YAN

        Add to Reading List

        Source URL: image-net.org

        Language: English - Date: 2014-09-15 03:27:57
        178Environment / Logging / Macroeconomic model / Economic model / Human geography / Natural resources / Forestry / Deforestation / Computable general equilibrium

        COMPUTABLE GENERAL EQUILIBRIUM MODELS AND THE ANALYSIS OF POLICY SPILLOVERS IN THE FOREST SECTOR Jian Xie, Jeffrey R. Vincent and Theodore Panayotou Environment Discussion Paper No. 19 July 1996

        Add to Reading List

        Source URL: www.cid.harvard.edu

        Language: English - Date: 2008-02-20 16:26:33
        179Cybercrime / Science / Antivirus software / DShield / Malware / Blacklist / Whitelist / Phishing / DNSBL / Spamming / Computer security / Computing

        To appear in Usenix Security, AugustHighly Predictive Blacklisting Jian Zhang

        Add to Reading List

        Source URL: www.cyber-ta.org

        Language: English - Date: 2008-05-20 23:18:29
        180

        A Brief Survey on Anonymization Techniques for Privacy ∗ Preserving Publishing of Social Network Data Bin Zhou Jian Pei

        Add to Reading List

        Source URL: www.cs.sfu.ca

        - Date: 2008-12-10 19:19:56
          UPDATE