已选(0)清除
条数/页: 排序方式:
|
| 作为政治修辞的宪法——宪法的另一种面相乃至宪法的另一种类型 其他 2014-12-01 李琦; LI Qi 收藏  |  浏览/下载:15/0  |  提交时间:2016/02/24
|
| Word relevance computation for noun-noun metaphor recognition 其他 2014-01-01 Jia, Yuxiang; Zan, Hongying; Fan, Ming; Yu, Shiwen; Wang, Zhimin 收藏  |  浏览/下载:3/0  |  提交时间:2015/11/17 |
| Stable Teichmuller mappings of type (0,4) 其他 2011-01-01 Huang Yan; Wu ShengJian 收藏  |  浏览/下载:1/0  |  提交时间:2015/11/10
|
| Long Time Anderson Localization for the Nonlinear Random Schrodinger Equation 其他 2009-01-01 Wang, W.M.; Zhang, Zhifei 收藏  |  浏览/下载:3/0  |  提交时间:2015/11/12
|
| Heterogeneous cross domain ranking in latent space 其他 2009-01-01 Wang, Bo; Tang, Jie; Fan, Wei; Chen, Songcan; Yang, Zi; Liu, Yanzhu 收藏  |  浏览/下载:5/0  |  提交时间:2015/11/13 |
| The use of categorization information in language models for question retrieval 其他 2009-01-01 Cao, Xin; Cong, Gao; Cui, Bin; Jensen, Christian S?ndergaard; Zhang, Ce 收藏  |  浏览/下载:5/0  |  提交时间:2015/11/13 |
| A new non-randomized model for analysing sensitive questions with binary outcomes 其他 2007-01-01 Tian, Guo-Liang; Yu, Jun-Wu; Tang, Man-Lai; Geng, Zhi 收藏  |  浏览/下载:2/0  |  提交时间:2015/11/12
|
| The realization of Smale solenoid type attractors in 3-manifolds 其他 2007-01-01 Ma, Jiming; Yu, Bin 收藏  |  浏览/下载:2/0  |  提交时间:2015/11/12
|
| An economical model for the risk evaluation of DoS vulnerabilities in cryptography protocols 其他 2007-01-01 Cao, Zhen; Guan, Zhi; Chen, Zhong; Hu, Jianbin; Tang, Liyong 收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03 |
| An economical model for the risk evaluation of DoS vulnerabilities in cryptography protocols 其他 2007-01-01 Cao, Zhen; Guan, Zhi; Chen, Zhong; Hu, Jianbin; Tang, Liyong 收藏  |  浏览/下载:2/0  |  提交时间:2015/11/13 |