Wang Wei

Results: 298



#Item
151SUBMARINE UNDERWATER STRUCTURE-BORNE NOISE AND FLOW NOISE DUE TO PROPELLER EXCITATION Yingsan Wei, Yongsheng Wang, Ke Ding and Jian Fu Department of Mechanical Engineering, Naval University of Engineering, Wuhan, PR Chin

SUBMARINE UNDERWATER STRUCTURE-BORNE NOISE AND FLOW NOISE DUE TO PROPELLER EXCITATION Yingsan Wei, Yongsheng Wang, Ke Ding and Jian Fu Department of Mechanical Engineering, Naval University of Engineering, Wuhan, PR Chin

Add to Reading List

Source URL: www.acoustics.asn.au

Language: English - Date: 2012-08-22 02:35:30
152Reliability Digest, NovemberThe Achilles Heel of Antivirus Chia-Wei Wang ,Chong-Kuan Chen, Shiuhpyng Shieh, Department of Computer Science, National Chiao Tung University, Hsinchu City, Taiwan

Reliability Digest, NovemberThe Achilles Heel of Antivirus Chia-Wei Wang ,Chong-Kuan Chen, Shiuhpyng Shieh, Department of Computer Science, National Chiao Tung University, Hsinchu City, Taiwan

Add to Reading List

Source URL: rs.ieee.org

Language: English - Date: 2014-11-17 21:03:15
153WRF: More Runtime Options Wei Wang NCAR/NESL/MMM January 2012

WRF: More Runtime Options Wei Wang NCAR/NESL/MMM January 2012

Add to Reading List

Source URL: www2.mmm.ucar.edu

Language: English - Date: 2012-01-30 13:35:45
154Modelling and Replicating Hedge Fund Returns Wang Chun Wei ∗  March 1, 2010

Modelling and Replicating Hedge Fund Returns Wang Chun Wei ∗ March 1, 2010

Add to Reading List

Source URL: fbe.unimelb.edu.au

Language: English - Date: 2013-08-05 02:21:40
155Extending KVM Models Toward High-Performance NFV Jun Nakajima, James Tsai, Mesut Ergin, Yang Zhang, and Wei Wang 14 October 2014

Extending KVM Models Toward High-Performance NFV Jun Nakajima, James Tsai, Mesut Ergin, Yang Zhang, and Wei Wang 14 October 2014

Add to Reading List

Source URL: www.linux-kvm.org

Language: English - Date: 2014-11-01 12:40:42
156Cryptographic hash function / Block cipher / Advanced Encryption Standard / CMAC / LEX / UMAC / HMAC / Message authentication codes / Cryptography / CBC-MAC

Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC⋆ Zheng Yuan1,2 , Keting Jia3 , Wei Wang3 , and Xiaoyun Wang⋆⋆2,3 1 Beijing Electronic Science and Technology Institute, Beijing 1000

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-12 10:35:54
157WRF: More Runtime Options Wei Wang NCAR/NESL/MMM July 2013

WRF: More Runtime Options Wei Wang NCAR/NESL/MMM July 2013

Add to Reading List

Source URL: www2.mmm.ucar.edu

Language: English - Date: 2013-07-24 19:01:18
158WRF Nesting: Set Up and Run Wei Wang NCAR/NESL/MMM July 2013

WRF Nesting: Set Up and Run Wei Wang NCAR/NESL/MMM July 2013

Add to Reading List

Source URL: www2.mmm.ucar.edu

Language: English - Date: 2013-07-24 19:01:18
159WRF Nesting: Set Up and Run Wei Wang NCAR/NESL/MMM January 2015

WRF Nesting: Set Up and Run Wei Wang NCAR/NESL/MMM January 2015

Add to Reading List

Source URL: www2.mmm.ucar.edu

Language: English - Date: 2015-02-04 17:11:18
160Large Eddy Simulations of an Idealized Hurricane Yongsheng Chen, Richard Rotunno, Wei Wang, Christopher Davis, Jimy Dudhia, and Greg J. Holland National Center for Atmospheric Research∗, Boulder, Colorado 1. Introducti

Large Eddy Simulations of an Idealized Hurricane Yongsheng Chen, Richard Rotunno, Wei Wang, Christopher Davis, Jimy Dudhia, and Greg J. Holland National Center for Atmospheric Research∗, Boulder, Colorado 1. Introducti

Add to Reading List

Source URL: www2.mmm.ucar.edu

Language: English - Date: 2008-06-18 13:45:45