1![In-situ Gallium-doping for forming p+ Germanium-Tin and application in Germanium-Tin PIN photodetector Wei Wang,1 Saumitra Vajandar,2 Sin Leng Lim,2 Yuan Dong,1 Vijay Richard D’Costa,1 Thomas Osipowicz,2 Eng Soon Tok,2 In-situ Gallium-doping for forming p+ Germanium-Tin and application in Germanium-Tin PIN photodetector Wei Wang,1 Saumitra Vajandar,2 Sin Leng Lim,2 Yuan Dong,1 Vijay Richard D’Costa,1 Thomas Osipowicz,2 Eng Soon Tok,2](https://www.pdfsearch.io/img/191c2fe39b9ccfef51004a42fc677ecd.jpg) | Add to Reading ListSource URL: www.ciba.nus.edu.sgLanguage: English - Date: 2018-02-08 23:12:57
|
---|
2![A Generalized FAST TCP Scheme Cao Yuan a , Liansheng Tan a,b , Lachlan L. H. Andrew c , Wei Zhang a , Moshe Zukerman d,∗ , a Department b The A Generalized FAST TCP Scheme Cao Yuan a , Liansheng Tan a,b , Lachlan L. H. Andrew c , Wei Zhang a , Moshe Zukerman d,∗ , a Department b The](https://www.pdfsearch.io/img/6126c9ad9baee1dd946ef15dcc899b60.jpg) | Add to Reading ListSource URL: netlab.caltech.eduLanguage: English - Date: 2008-05-19 22:23:53
|
---|
3![Supplementary Material for ”Combinatorial multi-armed bandit: general framework, results and applications”, by Wei Chen, Yajun Wang, and Yang Yuan. A. Full proof of Theorem 1 We use the following two well known bound Supplementary Material for ”Combinatorial multi-armed bandit: general framework, results and applications”, by Wei Chen, Yajun Wang, and Yang Yuan. A. Full proof of Theorem 1 We use the following two well known bound](https://www.pdfsearch.io/img/7cdfbdb3d345a768e3c79a9c586789d5.jpg) | Add to Reading ListSource URL: proceedings.mlr.pressLanguage: English - Date: 2018-07-16 03:38:06
|
---|
4![Disagreement-Based Multi-System Tracking Quannan Li1 , Xinggang Wang2 , Wei Wang3 , Yuan Jiang3 , Zhi-Hua Zhou3 , Zhuowen Tu1 1 Lab of Neuro Imaging, University of California, Los Angeles Disagreement-Based Multi-System Tracking Quannan Li1 , Xinggang Wang2 , Wei Wang3 , Yuan Jiang3 , Zhi-Hua Zhou3 , Zhuowen Tu1 1 Lab of Neuro Imaging, University of California, Los Angeles](https://www.pdfsearch.io/img/b3a7a2f91c01240a11466a6699d3f944.jpg) | Add to Reading ListSource URL: pages.ucsd.edu- Date: 2012-12-05 04:23:16
|
---|
5![SINGA: A Distributed Deep Learning Platform Beng Chin Ooi† , Kian-Lee Tan† , Sheng Wang† , Wei Wang† , Qingchao Cai† , Gang Chen§ , Jinyang Gao† , Zhaojing Luo† , Anthony K. H. Tung† , Yuan Wang‡, Zhon SINGA: A Distributed Deep Learning Platform Beng Chin Ooi† , Kian-Lee Tan† , Sheng Wang† , Wei Wang† , Qingchao Cai† , Gang Chen§ , Jinyang Gao† , Zhaojing Luo† , Anthony K. H. Tung† , Yuan Wang‡, Zhon](https://www.pdfsearch.io/img/e986756354fbdaa2ad805fdeed68b5c6.jpg) | Add to Reading ListSource URL: www.comp.nus.edu.sg- Date: 2015-08-11 04:37:18
|
---|
6![Pingmesh: A Large-Scale System for Data Center Network Latency Measurement and Analysis∗ Chuanxiong Guo, Lihua Yuan, Dong Xiang, Yingnong Dang, Ray Huang, Dave Maltz, Zhaoyi Liu, Vin Wang, Bin Pang, Hua Chen, Zhi-Wei L Pingmesh: A Large-Scale System for Data Center Network Latency Measurement and Analysis∗ Chuanxiong Guo, Lihua Yuan, Dong Xiang, Yingnong Dang, Ray Huang, Dave Maltz, Zhaoyi Liu, Vin Wang, Bin Pang, Hua Chen, Zhi-Wei L](https://www.pdfsearch.io/img/acface9115e70d4e89d33bd5aa645cb0.jpg) | Add to Reading ListSource URL: conferences.sigcomm.orgLanguage: English - Date: 2015-07-29 16:54:57
|
---|
7![Symmetric NAT に対する UDP Multi Hole Punching の技法 A New Method for Symmetric NAT Traversal with UDP Multi Hole Punching 1G03R033-9 Yuan Wei 魏 Symmetric NAT に対する UDP Multi Hole Punching の技法 A New Method for Symmetric NAT Traversal with UDP Multi Hole Punching 1G03R033-9 Yuan Wei 魏](https://www.pdfsearch.io/img/439cb39035a72c09b48ce485bebabd07.jpg) | Add to Reading ListSource URL: www.goto.info.waseda.ac.jpLanguage: Japanese - Date: 2007-04-29 01:15:57
|
---|
8![New Birthday Attacks on Some MACs Based on Block Ciphers New Birthday Attacks on Some MACs Based on Block Ciphers Wei Wang Joint work with Zheng Yuan, Keting Jia, Guangwu Xu, and New Birthday Attacks on Some MACs Based on Block Ciphers New Birthday Attacks on Some MACs Based on Block Ciphers Wei Wang Joint work with Zheng Yuan, Keting Jia, Guangwu Xu, and](https://www.pdfsearch.io/img/0f1bc476b1fc0f7ea5ddf3d87a878717.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2009-08-17 00:42:08
|
---|
9![Teaching Statistics to Non-specialists in Mainland China YUAN Wei Renmin University of China, Abstract The paper firstly introduces the changes of statistical education during the last 30 years, and the Teaching Statistics to Non-specialists in Mainland China YUAN Wei Renmin University of China, Abstract The paper firstly introduces the changes of statistical education during the last 30 years, and the](https://www.pdfsearch.io/img/90c8eb32b888355ec0bcaa76f9d140c2.jpg) | Add to Reading ListSource URL: www.statistics.gov.hk- Date: 2013-08-22 04:39:20
|
---|
10![Estimations of suspended sediment concentration from Echo Intensity using ADCP, OBS and LISST-100 YUAN Ye ZHAO Liang WEI Hao JANG Wensheng Estimations of suspended sediment concentration from Echo Intensity using ADCP, OBS and LISST-100 YUAN Ye ZHAO Liang WEI Hao JANG Wensheng](https://www.pdfsearch.io/img/7c1c53518870088f93849f33089a3396.jpg) | Add to Reading ListSource URL: www.pices.intLanguage: English - Date: 2007-08-28 17:03:29
|
---|