Xie

Results: 586



#Item
71Microsoft Word - CV_NilsWalter_2016

Microsoft Word - CV_NilsWalter_2016

Add to Reading List

Source URL: sites.lsa.umich.edu

Language: English - Date: 2016-05-13 07:17:10
72 23 Mount Street|London|W1K 2RP +3591|

23 Mount Street|London|W1K 2RP +3591|

Add to Reading List

Source URL: www.moatti.co.uk

Language: English - Date: 2015-10-12 06:29:13
73DYNAMICS OF OPINION SPREAD IN SOCIAL NETWORKS BOLESLAW K. SZYMANSKI* G. Korniss, Sameet Sreenivasan, Pramesh Singh, Jierui Xie NETWORK SCIENCE AND TECHNOLOGY CENTER, DEPARTMENT OF COMPUTER SCIENCE, RPI, TROY, NY 12180, U

DYNAMICS OF OPINION SPREAD IN SOCIAL NETWORKS BOLESLAW K. SZYMANSKI* G. Korniss, Sameet Sreenivasan, Pramesh Singh, Jierui Xie NETWORK SCIENCE AND TECHNOLOGY CENTER, DEPARTMENT OF COMPUTER SCIENCE, RPI, TROY, NY 12180, U

Add to Reading List

Source URL: ergodic.ugr.es

Language: English - Date: 2014-04-26 04:45:46
74Inducing Wavelets into Random Fields via Generative Boosting Jianwen Xie, Yang Lu, Song-Chun Zhu, and Ying Nian Wu∗ Department of Statistics, University of California, Los Angeles, USA  Abstract

Inducing Wavelets into Random Fields via Generative Boosting Jianwen Xie, Yang Lu, Song-Chun Zhu, and Ying Nian Wu∗ Department of Statistics, University of California, Los Angeles, USA Abstract

Add to Reading List

Source URL: www.stat.ucla.edu

Language: English - Date: 2015-08-27 16:15:27
    75Mimimorphism: A New Approach to Binary Code Obfuscation Zhenyu Wu, Steven Gianvecchio, Mengjun Xie∗, and Haining Wang The College of William and Mary Williamsburg, VA 23187, USA

    Mimimorphism: A New Approach to Binary Code Obfuscation Zhenyu Wu, Steven Gianvecchio, Mengjun Xie∗, and Haining Wang The College of William and Mary Williamsburg, VA 23187, USA

    Add to Reading List

    Source URL: www.cs.wm.edu

    Language: English - Date: 2011-02-18 13:56:20
      76knitr Reference Card Yihui Xie May 9, 2016 1

      knitr Reference Card Yihui Xie May 9, 2016 1

      Add to Reading List

      Source URL: cran.rstudio.com

      Language: English - Date: 2016-05-09 15:42:44
        77MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced ­Symbolic Analysis Ruowen Wang, Peng Ning, Tao Xie, and Quan Chen, North Carolina State University  This paper is included in the Proceed

        MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced ­Symbolic Analysis Ruowen Wang, Peng Ning, Tao Xie, and Quan Chen, North Carolina State University This paper is included in the Proceed

        Add to Reading List

        Source URL: www.usenix.org

        Language: English - Date: 2013-09-28 11:40:36
          78SYNC or ASYNC: Time to Fuse for Distributed Graph-Parallel Computation Chenning Xie† Rong Chen†

          SYNC or ASYNC: Time to Fuse for Distributed Graph-Parallel Computation Chenning Xie† Rong Chen†

          Add to Reading List

          Source URL: ipads.se.sjtu.edu.cn

          Language: English - Date: 2014-12-16 04:16:53
          79PHYSICAL REVIEW E 87, Evolution of emotions on networks leads to the evolution of cooperation in social dilemmas Attila Szolnoki,1,* Neng-Gang Xie,2 Ye Ye,2 and Matjaˇz Perc3 1

          PHYSICAL REVIEW E 87, Evolution of emotions on networks leads to the evolution of cooperation in social dilemmas Attila Szolnoki,1,* Neng-Gang Xie,2 Ye Ye,2 and Matjaˇz Perc3 1

          Add to Reading List

          Source URL: www.matjazperc.com

          Language: English - Date: 2013-05-07 05:45:13
            80Energy Attack on Server Systems Zhenyu Wu, Mengjun Xie∗, and Haining Wang The College of William and Mary, Williamsburg, VA 23187, USA {adamwu, mjxie, hnw}@cs.wm.edu  Abstract

            Energy Attack on Server Systems Zhenyu Wu, Mengjun Xie∗, and Haining Wang The College of William and Mary, Williamsburg, VA 23187, USA {adamwu, mjxie, hnw}@cs.wm.edu Abstract

            Add to Reading List

            Source URL: www.cs.wm.edu

            Language: English - Date: 2011-09-15 18:05:44