Yuan

Results: 1256



#Item
291Academia / Academia Sinica / Guggenheim Fellows / Education in Taiwan / Chi-Huey Wong / Yuan T. Lee / National academy / Taiwan Institute of Economic Research / National Tsing Hua University / Der-Tsai Lee

Welcome to Academia Sinica! As you join us, allow us to embrace you and wish you success during your stay here. All of us here will be doing our utmost to ensure that your experiences at Academia Sinica and in Taiwan wil

Add to Reading List

Source URL: www.ifs.sinica.edu.tw

Language: English - Date: 2015-06-30 02:26:01
292

Low-Rank Tensors for Scoring Dependency Structures Tao Lei, Yu Xin, Yuan Zhang, Regina Barzilay, and Tommi Jaakkola Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology {taolei, y

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-05-27 13:12:59
    293

    Microarchitecture-Directed Global Power Management for Multicore Processors Gene Y. Wu, Yi Yuan, Dan Zhang Department of Electrical and Computer Engineering The University of Texas at Austin {gwu,yyuan,dan.zhang}@mail.ut

    Add to Reading List

    Source URL: danzhang.net

    Language: English
      294

      Distance Shrinkage and Euclidean Embedding via Regularized Kernel Estimation Luwan Zhang∗ , Grace Wahba† and Ming Yuan‡§ ∗‡ Morgridge Institute for Research and

      Add to Reading List

      Source URL: pages.stat.wisc.edu

      Language: English - Date: 2015-08-04 17:09:49
        295

        Analysis of the x-ray fluorescence excited by standing waves in periodic multilayers through the oscillating dipole model J.-M. André, K. Le Guen, Y.-Y. Yuan, P. Jonnard, N. Mahne, A. Giglia, S. Nannarone, Z.-S. Wang, J

        Add to Reading List

        Source URL: www.lcpmr.upmc.fr

        Language: English - Date: 2013-02-12 09:59:04
          296

          Statistica Sinica), CONVERGENCE RATES OF COMPACTLY SUPPORTED RADIAL BASIS FUNCTION REGULARIZATION Yi Lin and Ming Yuan University of Wisconsin-Madison and Georgia Institute of Technology

          Add to Reading List

          Source URL: pages.stat.wisc.edu

          Language: English - Date: 2013-01-03 18:16:37
            297Software / Computing / Computer security / Computer network security / Software testing / Penetration test / Application security / Vulnerability assessment / W3af / Security testing / Metasploit Project / Vulnerability

            International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, NovemberAN OVERVIEW OF PENETRATION TESTING 1 Aileen G. Bacudio, 1Xiaohong Yuan, 2Bei-Tseng Bill Chu, 1Monique Jones

            Add to Reading List

            Source URL: airccse.org

            Language: English - Date: 2011-11-30 01:55:07
            298

            Symmetric NAT に対する UDP Multi Hole Punching の技法 A New Method for Symmetric NAT Traversal with UDP Multi Hole Punching 1G03R033-9 Yuan Wei 魏

            Add to Reading List

            Source URL: www.goto.info.waseda.ac.jp

            Language: Japanese - Date: 2007-04-29 01:15:57
              299Software / Computer architecture / Computing / Smartphones / Computing platforms / Mobile operating systems / Linux / Linux kernel / Android / Kernel.org / Operating system / COS

              Adapting Linux for Mobile Platforms: An Empirical Study of Android Foutse Khomh, Hao Yuan, Ying Zou Department of Electrical and Computer Engineering Queen’s University Kingston, ON, Canada {foutse.khomh, hao.yuan, yin

              Add to Reading List

              Source URL: swat.polymtl.ca

              Language: English - Date: 2012-08-10 17:13:12
              300

              Carving Research Slices Out of Your Production Networks with OpenFlow Rob Sherwood, Michael Chan,Glen Gibb, Nikhil Handigol,Te-Yuan Huang,Peyman Kazemian, Masayoshi Kobayashi, David Underhill, Kok-Kiong Yap, Guido Appenz

              Add to Reading List

              Source URL: guido.appenzeller.net

              Language: English - Date: 2014-08-23 02:31:43
                UPDATE