Wang Yu

Results: 183



#Item
1Metric sparsification and operator norm localization Xiaoman Chen, Romain Tessera, Xianjin Wang, Guoliang Yu November 13, 2007 Abstract We study an operator norm localization property and its applications

Metric sparsification and operator norm localization Xiaoman Chen, Romain Tessera, Xianjin Wang, Guoliang Yu November 13, 2007 Abstract We study an operator norm localization property and its applications

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2007-11-13 16:29:19
2Developing novel NMDA receptor positive modulators as neuroprotectants Yu Tian Wang Djavad Mowafaghian Centre for Brain Health and Department of Medicine/Neurology, University of British Columbia, Vancouver, Canada  The

Developing novel NMDA receptor positive modulators as neuroprotectants Yu Tian Wang Djavad Mowafaghian Centre for Brain Health and Department of Medicine/Neurology, University of British Columbia, Vancouver, Canada The

Add to Reading List

Source URL: scnw2018.cns.org.cn

Language: English - Date: 2018-06-06 21:53:20
    3Zufällige Wetten: Vom Glücksspiel zum modernen Risikomanagement Teilnehmer: Lukas Thum Yu Wang Luciana Plocki

    Zufällige Wetten: Vom Glücksspiel zum modernen Risikomanagement Teilnehmer: Lukas Thum Yu Wang Luciana Plocki

    Add to Reading List

    Source URL: didaktik.mathematik.hu-berlin.de

    Language: German - Date: 2016-07-14 11:28:30
      4INDAPSON: An Incentive Data Plan Sharing System Based on Self-Organizing Network Tuo Yu∗ , Zilong Zhou∗ , Da Zhang∗ , Xinbing Wang∗ , Yunxin Liu† , Songwu Lu§ ∗ Dept. of Electronic Engineering, Shanghai Jiao

      INDAPSON: An Incentive Data Plan Sharing System Based on Self-Organizing Network Tuo Yu∗ , Zilong Zhou∗ , Da Zhang∗ , Xinbing Wang∗ , Yunxin Liu† , Songwu Lu§ ∗ Dept. of Electronic Engineering, Shanghai Jiao

      Add to Reading List

      Source URL: iwct.sjtu.edu.cn

      Language: English - Date: 2014-01-14 02:19:52
        5Noisy Sparse Subspace Clustering  Yu-Xiang Wang  Department of Mechanical Engineering, National University of Singapore, SingaporeHuan Xu

        Noisy Sparse Subspace Clustering Yu-Xiang Wang Department of Mechanical Engineering, National University of Singapore, SingaporeHuan Xu

        Add to Reading List

        Source URL: proceedings.mlr.press

        Language: English - Date: 2018-07-16 03:38:07
          6GPS Manual Group-based Prediction System VersionAuthor: Yongbo Wang, Han Cheng, Zhicheng Pan, Zexian Liu* and Yu Xue*

          GPS Manual Group-based Prediction System VersionAuthor: Yongbo Wang, Han Cheng, Zhicheng Pan, Zexian Liu* and Yu Xue*

          Add to Reading List

          Source URL: gps.biocuckoo.org

          Language: English - Date: 2014-12-19 01:25:51
            7The analysis of large-scale gene expression correlated to the phase changes of the migratory locust Le Kang*†, XiangYong Chen*, Yan Zhou‡, BoWan Liu*, Wei Zheng*, RuiQiang Li‡, Jun Wang‡, and Jun Yu‡ *National

            The analysis of large-scale gene expression correlated to the phase changes of the migratory locust Le Kang*†, XiangYong Chen*, Yan Zhou‡, BoWan Liu*, Wei Zheng*, RuiQiang Li‡, Jun Wang‡, and Jun Yu‡ *National

            Add to Reading List

            Source URL: english.ipm.ioz.cas.cn

            Language: English - Date: 2017-05-03 02:50:41
              8A Virtual Internet Architecture1 Joseph D. Touch, Yu-Shun Wang, Lars Eggert, Gregory G. Finn {touch,yushunwa,larse,finn}@isi.edu USC/Information Sciences Institute March 24, 2003 Abstract – A Virtual Internet (VI) is a

              A Virtual Internet Architecture1 Joseph D. Touch, Yu-Shun Wang, Lars Eggert, Gregory G. Finn {touch,yushunwa,larse,finn}@isi.edu USC/Information Sciences Institute March 24, 2003 Abstract – A Virtual Internet (VI) is a

              Add to Reading List

              Source URL: eggert.org

              Language: English - Date: 2011-09-22 06:55:38
                9How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, ,   Abstract. MD5 is one of the most widely used cryptographic hash funct

                How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

                Add to Reading List

                Source URL: merlot.usc.edu

                Language: English - Date: 2005-11-09 16:49:02
                  10RISA: Distributed Road Information Sharing Architecture Joon Ahn† , Yi Wang† , Bo Yu] , Fan Bai‡ , Bhaskar Krishnamachari† † University of Southern California, Los Angeles, CA, USA ] Wipro Technologies, Rochest

                  RISA: Distributed Road Information Sharing Architecture Joon Ahn† , Yi Wang† , Bo Yu] , Fan Bai‡ , Bhaskar Krishnamachari† † University of Southern California, Los Angeles, CA, USA ] Wipro Technologies, Rochest

                  Add to Reading List

                  Source URL: anrg.usc.edu

                  Language: English - Date: 2013-07-23 10:54:04