Zhong

Results: 388



#Item
31

When motion appears stopped: Stereo motion standstill Chia-huei Tseng, Joetta L. Gobell, Zhong-Lin Lu, and George Sperling PNAS 2006;103;; originally published online Sep 26, 2006; doi:pnas

Add to Reading List

Source URL: www.cogsci.uci.edu

- Date: 2006-10-15 13:35:20
    32

    The Science of Deep Specification Andrew W. Appel, Benjamin Pierce, Stephanie Weirich, Steve Zdancewic, Zhong Shao, Adam Chlipala Princeton

    Add to Reading List

    Source URL: www.cis.upenn.edu

    - Date: 2016-05-11 15:48:19
      33

      Perceptual motion standstill in rapidly moving chromatic displays Zhong-Lin Lu*†, Luis A. Lesmes*, and George Sperling†‡ *Laboratory of Brain Processes (LOBES), Department of Psychology, University of Southern Cali

      Add to Reading List

      Source URL: www.cogsci.uci.edu

      - Date: 2001-07-29 04:41:22
        34

        e-companion to Kou, Peng, and Zhong: Asset Pricing with Spatial Interaction ec1 E-Companion of “Asset Pricing with Spatial Interaction” by Steven Kou, Xianhua Peng, and Haowen Zhong

        Add to Reading List

        Source URL: www.rmi.nus.edu.sg

        - Date: 2016-08-02 03:48:04
          35

          Proc. Natl. Acad. Sci. USA Vol. 96, pp. 8289–8294, July 1999 Psychology The mechanism of isoluminant chromatic motion perception ZHONG-LIN LU*†, LUIS A. LESMES*,

          Add to Reading List

          Source URL: www.cogsci.uci.edu

          - Date: 2001-07-29 04:39:54
            36Neuroscience / Nervous system / Cognitive science / Electroencephalography / Evoked potentials / Neurology / Audiology / N100 / Echoic memory / Sensory memory / Iconic memory / Memory

            13 Measuring Sensory Memory: Magnetoencephalography Habituation and Psychophysics Zhong-Lin Lu

            Add to Reading List

            Source URL: www.cogsci.uci.edu

            Language: English - Date: 2004-03-01 20:21:43
            37Security / Cryptography / Computing / Formal sciences / Theoretical computer science / Secure multi-party computation / Cryptographic protocol / Mobile agent / Algorithm / Transmission Control Protocol / Computer security

            Abstract Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties Sheng Zhong 2004

            Add to Reading List

            Source URL: cs-www.cs.yale.edu

            Language: English - Date: 2004-07-28 23:00:33
            38Wireless sensor network / Wireless networking / Computing / Sensor node / Technology / Data transmission / Anomaly detection

            Visualizing Anomalies in Sensor Networks Qi Liao∗ , Lei Shi† , Yuan He‡ , Rui Li§ , Zhong Su† , Aaron Striegel∗ , Yunhao Liu ∗ University of Notre Dame, USA. E-mail: {qliao,striegel}@nd.edu. † IBM Researc

            Add to Reading List

            Source URL: conferences.sigcomm.org

            Language: English - Date: 2011-08-01 22:53:42
            39Computational neuroscience / Artificial neural networks / Applied mathematics / Cybernetics / Neuroscience / Computer vision / Convolutional neural network / Deep learning / Receptive field / Artificial intelligence / Object Process Methodology

            arXiv:1602.03935v2 [cs.CV] 21 JunFace Attribute Prediction Using Off-the-Shelf CNN Features Yang Zhong Josephine Sullivan

            Add to Reading List

            Source URL: arxiv.org

            Language: English - Date: 2016-06-21 21:29:10
            40Physics / Electronics / Electromagnetism / Flexible electronics / Heat transfer / Documents / Printing / Textual scholarship / Thermal conductivity / OLED / Laser

            Axisymmetric thermo-mechanical analysis of laser-driven non-contact transfer printing Rui Li, Yuhang Li, Chaofeng Lü, Jizhou Song, Reza Saeidpourazar, Bo Fang, Yang Zhong, Placid M. Ferreira, John

            Add to Reading List

            Source URL: rogers.matse.illinois.edu

            Language: English - Date: 2012-07-19 22:10:05
            UPDATE