Jiao

Results: 332



#Item
31

Luban: use just python to create web services for scientific applications Jiao Y.Y. Lin and Michael Aivazis California Institute of Technology,

Add to Reading List

Source URL: conference.scipy.org

Language: English - Date: 2014-02-02 11:48:51
    32

    Core Percolation in Coupled Networks Jiayu Pan1 , Yuhang Yao2 , Luoyi Fu2 , Xinbing Wang2 Department of {Zhiyuan College1 , Computer Science2 ,}, Shanghai Jiao Tong University, China ABSTRACT Core percolation, as a funda

    Add to Reading List

    Source URL: rogerfu.weebly.com

    Language: English - Date: 2017-01-18 04:43:27
      33

      Fundamental Relationship between Node Density and Delay in Wireless Networks with Unreliable Links Shizhen Zhao1 , Luoyi Fu1 , Xinbing Wang1 , Qian Zhang2 1. Department of Electronic Engineering, Shanghai Jiao Tong Unive

      Add to Reading List

      Source URL: iwct.sjtu.edu.cn

      Language: English - Date: 2012-02-20 08:07:43
        34

        Online Egocentric Models for Citation Networks Hao Wang and Wu-Jun Li Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering, Shanghai Jiao Tong University, China js05212

        Add to Reading List

        Source URL: cs.nju.edu.cn

        Language: English - Date: 2015-12-14 04:04:39
          35

          Social Relations Model for Collaborative Filtering Wu-Jun Li† and Dit-Yan Yeung‡ † Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering, Shanghai Jiao Tong Univer

          Add to Reading List

          Source URL: cs.nju.edu.cn

          Language: English - Date: 2015-12-14 04:04:39
            36

            iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting or, How to Mimic Nakamoto’s Design via Proof-of-Stake Lei Fan Shanghai Jiao Tong University

            Add to Reading List

            Source URL: www.tangrum.org

            - Date: 2018-02-11 04:23:47
              37

              Int J Game Theory DOIs00182Contests with endogenous entry Qiang Fu · Qian Jiao · Jingfeng Lu

              Add to Reading List

              Source URL: jiaoqian.weebly.com

              - Date: 2014-07-10 06:34:43
                38

                Automated Inference on Criminality using Face Images Xiaolin Wu McMaster University Shanghai Jiao Tong University Xi Zhang

                Add to Reading List

                Source URL: arxiv.org

                - Date: 2016-11-21 20:13:58
                  39

                  Proc. 23rd Int. Workshop on Description Logics (DL2010), CEUR-WS 573, Waterloo, Canada, Extending OWL with Integrity Constraints Jiao Tao1 , Evren Sirin2 , Jie Bao1 , and Deborah L. McGuinness1 1

                  Add to Reading List

                  Source URL: ceur-ws.org

                  - Date: 2010-04-20 14:40:19
                    UPDATE