搜索筛选:
搜索耗时4.7772秒,为你在为你在102,285,761篇论文里面共找到 1,000 篇相符的论文内容
类      型:
[会议论文] 作者:, 来源:第八届中国可信计算与信息安全学术会议 年份:2014
Revealing security vulnerabilities is one of great challenges for the Android ecosvstem Staticanalvsis...is the usual approach of the securitv analysis for computer software However.it is undirected and...
[会议论文] 作者:Joy Wolfram,Mauro Ferrari,Yuliang Zhao, 来源:International Conference on Nanoscience & Technology,China 2 年份:2013
The establishment of a collaborative Ph.D.program between the National Center for Nanoscience and Technology...
[会议论文] 作者:, 来源:第八届中国可信计算与信息安全学术会议 年份:2014
  It is essential to study an effective approach of security testing for third-party component.In this...
[会议论文] 作者:Li Zhou,Yu Fawen,Liao Yongsong, 来源:第四届中古社会科学研讨会:农业发展与粮食安全 年份:2010
  The basic national conditions of China featured by a large population and less water and land resources..., have imposed a lasting stress on food security in t...
[会议论文] 作者:Xing-GuoSun;, 来源:International Conference for Physiological Sciences 2012(201 年份:2012
systems in human.After more than 20 years hard works,a Chinese physiologist presented some parts of holistic...
[会议论文] 作者:, 来源:第八届中国可信计算与信息安全学术会议 年份:2014
The security policy can exactlv reflect the security expectations of svstem models Besides.it is also...
[会议论文] 作者:Chunlin Liu,Yea-Saen Fang,Tat-Seng Lok,Chong-Kuan Tan,Hua-Gang Dai, 来源:第二届建筑结构抗倒塌学术交流会 年份:2012
Since 2005, many High-Profile Commercial Buildings in Singapore have implemented Enhanced Security Protection...measures.Guidelines on enhancing building security in Singapore are made available on the...
[会议论文] 作者:Hauenstein Jonathan, 来源:第八届工业与应用数学国际大会 年份:2015
  For systems of differential equations,one often investigates stability.The center-focus problem aims...
[会议论文] 作者:Xu MingDi,Gao XueYuan,Zhang Fan, 来源:第十二届中国可信计算与信息安全学术会议 年份:2018
Virus,trojan and malware on embedded systems have brought signif-icant effect for the information security...of the industrial control systems(ICS).ICS as the national core infrastructure,the security a...
[会议论文] 作者:, 来源:中国医师协会整合医学分会首届学术年会 年份:2016
Many people engaging in medical science asked me, "Youve been working on the exploration of Holistic...
[会议论文] 作者:Jor-Shan CHOI, 来源:The 2nd China-Japan Academic Symposium on Nuclear Fuel Cycle 年份:2013
  In the IAEA "Milestones in the Development of a National Infrastructure for Nuclear Power", the importance...of nuclear safety, security, and safeguards/nonpr...
[会议论文] 作者:WuBo;FanYouPing;, 来源:中国高等学校电力系统及其自动化专业第30届学术年会 年份:2014
  Modeling and simulation of security and stability control equipment (SSCE) are effective ways to verify...its accuracy and reliability.Ongoing studies in this...
[会议论文] 作者:CHEN Bu-xing,FU Qiang,HU Hong-yu,CHEN Wei,GAO Peng,HUA Xu, 来源:第11届中国介入心脏病学大会 年份:2013
Background The SOLAR study is a randomized single-center study aimed to evaluate the safety and feasibility...of left radial approach (LRA) compared with right radial approach (RRA) for percutaneous cor...
[会议论文] 作者:Kim Hyo-Jeong,Jung Jong-Soo,Kong Dal-Yong,Kang,Jung-Hoon,Kim So-Young,Kim Soo-Hyun,Lim Jong-Deock, 来源:天津市人民政府 年份:2007
The Cultural Heritage Administration of Korean government established a national research institute("...Natural Heritage Center") dedicated to investigating,studying,and educating people on natural herit...
[会议论文] 作者:TIANGuo-Liang[1]FANGHong-Bin[2]TanMing[2]QINHong[3]TANGMan-Lai[4], 来源:2012试验设计及其应用研讨会暨中国数学会均匀设计分会第十一届学术年会 年份:2012
  Motivated by experimental designs for drug combination studies,in this paper,we propose a novel approach...
[会议论文] 作者:TIAN Guo-Liang,FANG Hong-Bin,Tan Ming,QIN Hong,TANG Man-Lai, 来源:2012试验设计及其应用研讨会暨中国数学会均匀设计分会第十一届学术年会 年份:2012
  Motivated by experimental designs for drug combination studies,in this paper,we propose a novel approach...
[会议论文] 作者:Matthias Kaun, 来源:2015年中文数字出版与数字图书馆国际研讨会 年份:2015
Situation in Germany National responsibility for East Asian material East Asia Virtual Library CrossAsia...Defining Services for European China Studies Situation in Europe National responsibilities with...
[会议论文] 作者:Han Li,Xin (Robert) Luo, 来源:对外经济贸易大学 年份:2017
Computer abuses by insiders are considered as the leading cause for organizational information security...breaches.Extant studies have largely examined insider threats at a high level of abstraction, ig...
[会议论文] 作者:Traian Dumitrascu,Leonard David,Irinel Popescu, 来源:2015中国外科周暨第25届国际外科、胃肠科及肿瘤科医师协会会议 年份:2015
Background Background: A posterior superior mesenteric artery first approach pancreatico-duodenectomy...has been advocated in some studies to have advantages over the standard approach in periampullary...
[会议论文] 作者:Masanobu Kawachi, 来源:The 13th International Conference on Culture Collections(ICC 年份:2013
The Microbial Culture Collection at the National Institute for Environmental Studies (NIES-Collection...
相关搜索: