Peng

Results: 1037



#Item
331Food and drink / Shrimp farm / Fish meal / Taura syndrome / Shrimp / Commercial fish feed / Penaeus / White spot syndrome / Charoen Pokphand Foods / Aquaculture / Phyla / Protostome

FEATURE (UV]LY]PL^ VMZOYPTWMLLK PUK\Z[Y`PU*OPUH by Dong Qiufen, Peng Zhidong, Zhang Song

Add to Reading List

Source URL: www.hinter.com.cn

Language: English - Date: 2014-07-11 22:27:24
332Creativity / Innovation management / New product development / Open innovation / Innovation / Technology / Intelligence

Lingnan University - Department of Marketing & International Business MScMIB Program, 2nd TermMIB601 Innovation and New Product Development Instructor PENG Ling

Add to Reading List

Source URL: www.ln.edu.hk

Language: English - Date: 2015-01-04 21:05:25
333Information / Data / Coding theory / Forward error correction / Symbol rate / Bit error rate / Code division multiple access / Phase-shift keying / Transmission Control Protocol / Data transmission / Telecommunications engineering / Error detection and correction

BitTrickle: Defending against Broadband and High-power Reactive Jamming Attacks Yao Liu, Peng Ning North Carolina State University, Raleigh, NC 27695 {yliu20, pning}@ncsu.edu Abstract—Reactive jamming is not only cost

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2012-01-11 15:25:44
334Kinematics / State space / Forward kinematics / Systems theory / Cybernetics / Control theory / Physics / Computational physics

Adaptive Tracking Control of Uncertain Robotic Manipulators in a Constrained Task Space Keng Peng Tee and Haizhou Li Abstract— In this paper, we present adaptive tracking control of uncertain robotic manipulators that

Add to Reading List

Source URL: www1.i2r.a-star.edu.sg

Language: English - Date: 2009-11-29 01:16:19
335Computing / Hacking / Software testing / Alert correlation / Attack / Alert messaging / Buffer overflow / Vulnerability / Denial-of-service attack / Cyberwarfare / Computer security / Computer network security

Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:18
336Networks / Graph operations / Clique percolation method / Decomposition method / Graph theory / Distributed data storage / Clique

Secure Distributed Cluster Formation in Wireless Sensor Networks∗ Kun Sun Intelligent Automation, Inc. Pai Peng

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:57
337Abstract algebra / Econometrics / Regression analysis / Vector calculus / Euclidean vector / Eigenvalues and eigenvectors / Linear regression / Vulnerability / Degrees of freedom / Algebra / Mathematics / Linear algebra

False Data Injection Attacks against State Estimation in Electric Power Grids ∗ Yao Liu, Peng Ning Department of Computer Science

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:03
338Kim Clijsters / Tennis / Sania Mirza / Peng Shuai

ROGERS ROOKIE TOUR TOURNAMENT DIRECTOR’S HANDBOOK MISSION STATEMENT: "TO CREATE A POSITIVE, FUN, ENTRY-LEVEL COMPETITION OPPORTUNITY

Add to Reading List

Source URL: www.tenniscanada.com

Language: English - Date: 2015-02-19 17:32:48
339Computing / Intrusion detection system / Alert correlation / Thresh / Bayesian network / Snort / Intrusion detection system evasion techniques / Computer network security / Software / System software

Reasoning about Complementary Intrusion Evidence∗ Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:57
340Public-key cryptography / ANT / Sensor node / Telecommunications engineering / Wireless sensor network / Technology / Computing

Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG NING North Carolina State University Broadcast authentication is a fundamental security service in distributed sensor n

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:17
UPDATE