نتایج جستجو
Advanced Data Mining and Applications: 7th International Conference, ADMA 2011, Beijing, China, December 17-19, 2011, Proceedings, Part I
Yong-Bin Kang, Shonali Krishnaswamy (auth.), Jie Tang, Irwin King, Ling Chen, Jianyong Wang (eds.), 2011
Advanced Data Mining and Applications: 7th International Conference, ADMA 2011, Beijing, China, December 17-19, 2011, Proceedings, Part I
Yong-Bin Kang, Shonali Krishnaswamy (auth.), Jie Tang, Irwin King, Ling Chen, Jianyong Wang (eds.), 2011
Advanced Data Mining and Applications: 7th International Conference, ADMA 2011, Beijing, China, December 17-19, 2011, Proceedings, Part I
Yong-Bin Kang, Shonali Krishnaswamy (auth.), Jie Tang, Irwin King, Ling Chen, Jianyong Wang (eds.), 2011
Natural Language Processing and Chinese Computing: First CCF Conference, NLPCC 2012, Beijing, China, October 31-November 5, 2012. Proceedings
Yuan Wang, Jie Liu, XingLiang Dong, Tianbi Liu, YaLou Huang (auth.), Ming Zhou, Guodong Zhou, Dongyan Zhao, Qun Liu, Lei Zou (eds.), 2012
Smart Hydrogel Functional Materials
Liang-Yin Chu, Rui Xie, Xiao-Jie Ju, Wei Wang (auth.), 2013
Web Information Systems and Mining: International Conference, WISM 2012, Chengdu, China, October 26-28, 2012. Proceedings
Jie Zhao, Fang Yu, Minfeng Tang, Wenliao Du, Jin Yuan (auth.), Fu Lee Wang, Jingsheng Lei, Zhiguo Gong, Xiangfeng Luo (eds.), 2012
China and New Left Visions: Political and Cultural Interventions
Ban Wang, Jie Lu, 2012
Contemporary Research on E-business Technology and Strategy: International Conference, iCETS 2012, Tianjin, China, August 29-31, 2012, Revised Selected Papers
Ayoub Yousefi, Jie Tang (auth.), Vasil Khachidze, Tim Wang, Sohail Siddiqui, Vincent Liu, Sergio Cappuccio, Alicia Lim (eds.), 2012
Hydraulic Fracturing in Earth-rock Fill Dams
Wang, Jun-Jie, 2014
Computer Networks
Jie Wang, 2002
Computer Network Security Theory and Practice
Jie Wang, 2009
Computer Network Security. Theory and Practice
Jie Wang, 2009
"错误" 的行为: 行为经济学关于世界的思考, 从个人到商业和社会 /"Cuo wu" de xing wei: xing wei jing ji xue guan yu shi jie de si kao, cong ge ren dao shang ye he she hui
Thaler, Richard H.; Wang, Jin, 2016
Rockburst evolutionary process and energy dissipation characteristics
He, Xueqiu; Li, Zhenlei; Liu, Jie; Song, Dazhao; Wang, Enyuan, 2020
国家与学术的地方互动:四川大学国立化进程(1925-1939) /Guo jia yu xue shu de di fang hu dong
王东杰 Wang dong jie, 2005
图解炼金术 = The mystic alchemy /Tu jie lian jin shu = The mystic alchemy
Wang, Shuming; Cao, Kusano Takumi, 2007
图解黑魔法 = Black magic /Tu jie hei mo fa = Black magic
Caoye, Qiao; Wang, Shuming
图解恶魔学 = The knowledge of demon /Tu jie e mo xue = The knowledge of demon
Array, Array; Wang, Shuming
Ubiquitous Security: Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers
Guojun Wang, Kim-Kwang Raymond Choo, Jie Wu, Ernesto Damiani, 2023
Network Security Empowered by Artificial Intelligence (Advances in Information Security, 107)
Yingying Chen (editor), Jie Wu (editor), Paul Yu (editor), Xiaogang Wang (editor), 2024
Advances in Computation and Intelligence: 4th International Symposium, ISICA 2009 Huangshi, China, Ocotober 23-25, 2009 Proceedings
Fengrui Wang, Wenhong Wang, Quanke Pan, Fengchao Zuo (auth.), Zhihua Cai, Zhenhua Li, Zhuo Kang, Yong Liu (eds.), 2009
Advances in Computation and Intelligence: 4th International Symposium, ISICA 2009 Huangshi, China, Ocotober 23-25, 2009 Proceedings
Fengrui Wang, Wenhong Wang, Quanke Pan, Fengchao Zuo (auth.), Zhihua Cai, Zhenhua Li, Zhuo Kang, Yong Liu (eds.), 2009
