CORC

浏览/检索结果: 共12条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
作为政治修辞的宪法——宪法的另一种面相乃至宪法的另一种类型 其他
2014-12-01
李琦; LI Qi
收藏  |  浏览/下载:15/0  |  提交时间:2016/02/24
Word relevance computation for noun-noun metaphor recognition 其他
2014-01-01
Jia, Yuxiang; Zan, Hongying; Fan, Ming; Yu, Shiwen; Wang, Zhimin
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/17
Stable Teichmuller mappings of type (0,4) 其他
2011-01-01
Huang Yan; Wu ShengJian
收藏  |  浏览/下载:1/0  |  提交时间:2015/11/10
Long Time Anderson Localization for the Nonlinear Random Schrodinger Equation 其他
2009-01-01
Wang, W.M.; Zhang, Zhifei
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/12
Heterogeneous cross domain ranking in latent space 其他
2009-01-01
Wang, Bo; Tang, Jie; Fan, Wei; Chen, Songcan; Yang, Zi; Liu, Yanzhu
收藏  |  浏览/下载:5/0  |  提交时间:2015/11/13
The use of categorization information in language models for question retrieval 其他
2009-01-01
Cao, Xin; Cong, Gao; Cui, Bin; Jensen, Christian S?ndergaard; Zhang, Ce
收藏  |  浏览/下载:5/0  |  提交时间:2015/11/13
A new non-randomized model for analysing sensitive questions with binary outcomes 其他
2007-01-01
Tian, Guo-Liang; Yu, Jun-Wu; Tang, Man-Lai; Geng, Zhi
收藏  |  浏览/下载:2/0  |  提交时间:2015/11/12
The realization of Smale solenoid type attractors in 3-manifolds 其他
2007-01-01
Ma, Jiming; Yu, Bin
收藏  |  浏览/下载:2/0  |  提交时间:2015/11/12
An economical model for the risk evaluation of DoS vulnerabilities in cryptography protocols 其他
2007-01-01
Cao, Zhen; Guan, Zhi; Chen, Zhong; Hu, Jianbin; Tang, Liyong
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
An economical model for the risk evaluation of DoS vulnerabilities in cryptography protocols 其他
2007-01-01
Cao, Zhen; Guan, Zhi; Chen, Zhong; Hu, Jianbin; Tang, Liyong
收藏  |  浏览/下载:2/0  |  提交时间:2015/11/13


©版权所有 ©2017 CSpace - Powered by CSpace