>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到meets相关记录96条 . 查询时间(0.077 秒)
The development of new bio-based inks is a stringent request for the expansion of additive manufacturing towards the development of 3D-printed biocompatible hydrogels. Herein, methacrylated carboxymet...
Tokyo Electric Power Company (Tepco) has demonstrated its capabilities for accurate and precise measurements of the radionuclides present in the treated water stored at the Fukushima Daiichi site, acc...
GE Hitachi Nuclear Energy's BWRX-300 small modular reactor (SMR) technology is compliant with Polish nuclear safety and radiological protection standards, the president of the National Atomic Energy A...
In this talk I plan to survey some progress on Hardy and BMO spaces, Riesz transforms, Bochner-Riesz means and spherical means by using the method of wave equation,and show interesting connections and...
Following the global supply chain collapse brought on by the COVID-19 pandemic, it became obvious that many facets of modern life are surreptitiously ruled by a tiny piece of technology known as the s...
MIT senior Sylas Horowitz kneeled at the edge of a marsh, tinkering with a blue-and-black robot about the size and shape of a shoe box and studded with lights and mini propellers.
Sachin Bhagchandani, a graduate student in the Department of Chemical Engineering currently working at the Koch Institute for Integrative Cancer Research, has won the National Cancer Institute Predoct...
The Waxy (Wx) gene responsible for amylose synthesis is an old but widely used target in quality improvements of starchy crops. New genome editing strategies were recently reported to create novel and...
Card-based cryptography provides simple and practicable protocols for performing secure multi-party computation (MPC) with just a deck of cards. For the sake of simplicity, this is often done using ca...
We develop attacks on the security of variants of pseudo-random generators computed by quadratic polynomials. In particular we give a general condition for breaking the one-way property of mappings wh...
Profiled side-channel attacks are the most powerful attacks and they consist of two steps. The adversary first builds a leakage model, using a device similar to the target one, then it exploits this l...
emph{Secure Report} is the problem of retrieving from a database table (e.g. on the cloud) all records matching specified attributes, as in SQL SELECT queries, but where the query and possibly the dat...
By 2019, big data and business analytics sales are expected to pull in $187 billion worldwide. Already making waves in this sector is Ayasdi, a company founded by a renowned mathematician and NSF awar...
The program opens with four days of tutorials that will provide an introduction to major themes of the entire program and the four workshops. The goal is to build a foundation for the participants of...
Increasingly large data sets are being ingested and produced by simulations. What experience from large-scale simulation is transferable to big data applications? Conversely, what new optimal algorith...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...