CORC

浏览/检索结果: 共91条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Diversified Power Supply Model Based on Analytic Hierarchy Process 其他
2018-01-01
作者:  Shi, Zeyu;  Chen, Hongkun;  Min, Zihui;  Bai, Fan
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
Generalized Hamming weights of three classes of linear codes 其他
2017-01-01
Jian, Gaopeng; Feng, Rongquan; Wu, Hongfeng
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
Virasoro constraints and polynomial recursion for the linear Hodge integrals 其他
2017-01-01
Guo, Shuai; Wang, Gehao
收藏  |  浏览/下载:7/0  |  提交时间:2017/12/03
The Dynamic Assessment Method of Urban Electric Vehicle Service Network's Service Capability 其他
2017-01-01
作者:  Wang Yang;  Zhang Yu;  Jin Xiaoling;  Li Yixin;  Yang Jun
收藏  |  浏览/下载:14/0  |  提交时间:2019/12/05
The Dynamic Assessment Method of Urban Electric Vehicle Service Network's Service Capability 其他
2017-01-01
作者:  Wang Yang;  Zhang Yu;  Jin Xiaoling;  Li Yixin;  Yang Jun
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/05
利益相关者结构及其企业价值创造框图构建 其他
2016-08-01
娄桂莲; Guilian Lou; 董淑兰; Shulan Dong
收藏  |  浏览/下载:5/0  |  提交时间:2016/09/18
APPROXIMATING THE M-2 METHOD BY THE EXTENDED QUADRATURE METHOD OF MOMENTS FOR RADIATIVE TRANSFER IN SLAB GEOMETRY 其他
2016-01-01
Alldredge, Graham W.; Li, Ruo; Li, Weiming
收藏  |  浏览/下载:2/0  |  提交时间:2017/12/03
Witten's D4 Integrable Hierarchies Conjecture 其他
2016-01-01
Huijun FAN; Amanda FRANCIS; Tyler JARVIS; Evan MERRELL; Yongbin RUAN
收藏  |  浏览/下载:2/0  |  提交时间:2017/12/03
The Applications of NVM Technology in Hardware Security 其他
2016-01-01
Yang, Chaofei; Liu, Beiye; Wang, Yandan; Chen, Yiran; Li, Hai; Zhang, Xian; Sun, Guangyu
收藏  |  浏览/下载:18/0  |  提交时间:2017/12/03
Pin Tumbler Lock: A Shift based Encryption Mechanism for Racetrack Memory 其他
2016-01-01
Zhang, Hongbin; Zhang, Chao; Zhang, Xian; Sun, Guangyu; Shu, Jiwu
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03


©版权所有 ©2017 CSpace - Powered by CSpace