Peng

Results: 1037



#Item
231

Differential semblance velocity analysis via shot profile migration Peng Shen, Total E&P USA ∗ , William W. Symes, Rice University, Scott Morton, Amerada Hess, and Henri Calandra, Total E&P USA Summary Shot profile mig

Add to Reading List

Source URL: trip.rice.edu

Language: English - Date: 2007-12-17 18:03:14
    232

    IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 16, NO. 4, JULYLarge Margin Nearest Neighbor Classifiers Carlotta Domeniconi, Dimitrios Gunopulos, and Jing Peng, Member, IEEE

    Add to Reading List

    Source URL: cs.gmu.edu

    Language: English - Date: 2010-01-05 19:15:51
      233

      A Reducing Repair Traffic in P2P Backup Systems: Exact Regenerating Codes on Hierarchical Codes ZHEN HUANG, National University of Defense Technology Ernst Biersack, Eurecom Yuxing Peng, National University of Defense Te

      Add to Reading List

      Source URL: www.e-biersack.eu

      Language: English - Date: 2012-10-03 06:41:09
        234

        PENGUMUMAN SELEKSI KEDUA MITRA KERJASAMA PROYEK PLTBG DAN OPTIMALISASI TANKOS Nomor : PLTBG-BAJ/Peng./03 /IXTim Seleksi Mitra Kerjasama Proyek Pembangkit Listrik Tenaga Biogas (PLTBG) dan Optimalisasi Tandan

        Add to Reading List

        Source URL: www.ptpn4.co.id

        Language: Indonesian - Date: 2014-09-22 22:10:08
          235

          Grids for Experimental Science: The Virtual Control Room K. Keahey,1,A M. E. Papka,1,B Q. Peng,2,C D. Schissel,2,D G. Abla,2,E, T. Araki,1,3,F, J. Burruss,2,G S. Feibush,4,H P. Lane,1,I S. Klasky, 4,J T. Leggett,1,K D. M

          Add to Reading List

          Source URL: toolkit.globus.org

          Language: English - Date: 2005-04-05 18:12:18
            236

            2008 Annual Computer Security Applications Conference Bridging the Gap between Data-flow and Control-flow Analysis for Anomaly Detection∗ Peng Li University of North Carolina at Chapel Hill

            Add to Reading List

            Source URL: flyer.sis.smu.edu.sg

            Language: English - Date: 2014-12-17 01:40:50
              237

              IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, Locally Adaptive Metric Nearest-Neighbor Classification Carlotta Domeniconi, Jing Peng, and Dimitrios Gunopulos

              Add to Reading List

              Source URL: cs.gmu.edu

              Language: English - Date: 2010-01-05 19:16:12
                238

                Robust Accounting in Decentralized P2P Storage Systems Ivan Osipkov Peng Wang Nicholas Hopper Yongdae Kim

                Add to Reading List

                Source URL: syssec.kaist.ac.kr

                Language: English - Date: 2012-09-03 21:42:59
                  239

                  Distinguishing between FE and DDoS Using Randomness Check Hyundo Park1, Peng Li2 , Debin Gao2 , Heejo Lee1 , and Robert H. Deng2 1

                  Add to Reading List

                  Source URL: flyer.sis.smu.edu.sg

                  Language: English - Date: 2014-12-17 01:40:50
                    240

                    Myrmic: Secure and Robust DHT Routing Peng Wang, Nicholas Hopper, Ivan Osipkov and Yongdae Kim ABSTRACT implications, it is natural to expect that if they become popular, they will be targeted by adversaries who can cont

                    Add to Reading List

                    Source URL: syssec.kaist.ac.kr

                    Language: English - Date: 2012-09-03 21:43:01
                      UPDATE