1![GAnGS: Gather, Authenticate ’n Group Securely ∗ Chia-Hsin Owen Chen† , Chung-Wei Chen‡ , Cynthia Kuo§ , Yan-Hao Lai∗ , Jonathan M. McCune§ , Ahren Studer§⋄ , Adrian Perrig§ , Bo-Yin Yang† , Tzong-Chen GAnGS: Gather, Authenticate ’n Group Securely ∗ Chia-Hsin Owen Chen† , Chung-Wei Chen‡ , Cynthia Kuo§ , Yan-Hao Lai∗ , Jonathan M. McCune§ , Ahren Studer§⋄ , Adrian Perrig§ , Bo-Yin Yang† , Tzong-Chen](https://www.pdfsearch.io/img/b4c3379631c4c56bdb7f2e4bd24eeb7c.jpg) | Add to Reading ListSource URL: precision.moscito.orgLanguage: English - Date: 2011-03-20 04:03:38
|
---|
2![dReach: δ-Reachability Analysis for Hybrid Systems Soonho Kong, Sicun Gao, Wei Chen, and Edmund Clarke Computer Science Department, Carnegie Mellon University, USA Abstract. dReach is a bounded reachability analysis to dReach: δ-Reachability Analysis for Hybrid Systems Soonho Kong, Sicun Gao, Wei Chen, and Edmund Clarke Computer Science Department, Carnegie Mellon University, USA Abstract. dReach is a bounded reachability analysis to](https://www.pdfsearch.io/img/3499925c882d69569a092a8a86079616.jpg) | Add to Reading ListSource URL: scungao.github.ioLanguage: English - Date: 2018-09-27 16:37:21
|
---|
3![Working Paper Series Subsidizing Fuel Efficient Cars: Evidence from China’s Automobile Industry ChiA-Wen Chen, Wei-Min Hu, and Christopher R. Knittel Working Paper Series Subsidizing Fuel Efficient Cars: Evidence from China’s Automobile Industry ChiA-Wen Chen, Wei-Min Hu, and Christopher R. Knittel](https://www.pdfsearch.io/img/67541c7c83546e48588e66759f488519.jpg) | Add to Reading ListSource URL: ceepr.mit.eduLanguage: English - Date: 2018-01-29 17:52:07
|
---|
4![Supplementary Material for ”Combinatorial multi-armed bandit: general framework, results and applications”, by Wei Chen, Yajun Wang, and Yang Yuan. A. Full proof of Theorem 1 We use the following two well known bound Supplementary Material for ”Combinatorial multi-armed bandit: general framework, results and applications”, by Wei Chen, Yajun Wang, and Yang Yuan. A. Full proof of Theorem 1 We use the following two well known bound](https://www.pdfsearch.io/img/7cdfbdb3d345a768e3c79a9c586789d5.jpg) | Add to Reading ListSource URL: proceedings.mlr.pressLanguage: English - Date: 2018-07-16 03:38:06
|
---|
5![Influence Maximization in Social Networks When Negative Opinions May Emerge and Propagate∗ Microsoft Research Technical Report† MSR-TROctober 2010 Wei Chen Influence Maximization in Social Networks When Negative Opinions May Emerge and Propagate∗ Microsoft Research Technical Report† MSR-TROctober 2010 Wei Chen](https://www.pdfsearch.io/img/1d3424d9d64ad93e5d076ac1cc142b84.jpg) | Add to Reading ListSource URL: www.andrew.cmu.eduLanguage: English - Date: 2018-05-22 15:05:38
|
---|
6![Robustness Analysis of Floating-Point Programs by Self-Composition Liqian Chen? , Jiahong Jiang, Banghu Yin, Wei Dong, and Ji Wang National Laboratory for Parallel and Distributed Processing, National University of Defen Robustness Analysis of Floating-Point Programs by Self-Composition Liqian Chen? , Jiahong Jiang, Banghu Yin, Wei Dong, and Ji Wang National Laboratory for Parallel and Distributed Processing, National University of Defen](https://www.pdfsearch.io/img/a240e8fffdf8d9a816e57b2813ceefcc.jpg) | Add to Reading ListSource URL: lqchen.github.ioLanguage: English - Date: 2018-08-14 11:59:25
|
---|
7![The analysis of large-scale gene expression correlated to the phase changes of the migratory locust Le Kang*†, XiangYong Chen*, Yan Zhou‡, BoWan Liu*, Wei Zheng*, RuiQiang Li‡, Jun Wang‡, and Jun Yu‡ *National The analysis of large-scale gene expression correlated to the phase changes of the migratory locust Le Kang*†, XiangYong Chen*, Yan Zhou‡, BoWan Liu*, Wei Zheng*, RuiQiang Li‡, Jun Wang‡, and Jun Yu‡ *National](https://www.pdfsearch.io/img/09b6a0b0dfb871a7e816e379d210edaf.jpg) | Add to Reading ListSource URL: english.ipm.ioz.cas.cnLanguage: English - Date: 2017-05-03 02:50:41
|
---|
8![Combinatorial Multi-Armed Bandit: General Framework, Results and Applications Wei Chen Microsoft Research Asia, Beijing, China Combinatorial Multi-Armed Bandit: General Framework, Results and Applications Wei Chen Microsoft Research Asia, Beijing, China](https://www.pdfsearch.io/img/89ab2717044aa2c673a3ef01e9071085.jpg) | Add to Reading ListSource URL: proceedings.mlr.pressLanguage: English - Date: 2018-07-16 03:38:06
|
---|
9![ObjectNet3D: A Large Scale Database for 3D Object Recognition Yu Xiang, Wonhui Kim, Wei Chen, Jingwei Ji, Christopher Choy, Hao Su, Roozbeh Mottaghi, Leonidas Guibas and Silvio Savarese Stanford University ❖ Database C ObjectNet3D: A Large Scale Database for 3D Object Recognition Yu Xiang, Wonhui Kim, Wei Chen, Jingwei Ji, Christopher Choy, Hao Su, Roozbeh Mottaghi, Leonidas Guibas and Silvio Savarese Stanford University ❖ Database C](https://www.pdfsearch.io/img/a8b499bce21769dc5e154553131e4aec.jpg) | Add to Reading ListSource URL: yuxng.github.ioLanguage: English - Date: 2018-07-25 18:48:24
|
---|
10![Evaluating Support for Global Address Space Languages on the Cray X1 Christian Bell Wei Chen Dan Bonachea Evaluating Support for Global Address Space Languages on the Cray X1 Christian Bell Wei Chen Dan Bonachea](https://www.pdfsearch.io/img/1e94a870b1d304ac582ab862db217282.jpg) | Add to Reading ListSource URL: gasnet.lbl.gov- Date: 2018-02-02 13:25:28
|
---|