Issue Date | Title | Author(s) |
2021-01-01 | Quantum algorithms for graph problems with cut queries | Lee, T; Santha, M; Zhang, S |
2018-11-15 | Clinically Relevant Cytotoxic Immune Cell Signatures and Clonal Expansion of T-Cell Receptors in High-Risk MYCN-Not-Amplified Human Neuroblastoma. | Wei, JS; Kuznetsov, IB; Zhang, S; Song, YK; Asgharzadeh, S; Sindiri, S; Wen, X; Patidar, R; Najaraj, S; Walton, A; Auvil, JMG; Gerhard, DS; Yuksel, A; Catchpoole, D; Hewitt, SM; Sondel, PM; Seeger, R; Maris, JM; Khan, J |
2016-02-01 | Trajectory optimization of multiple quad-rotor UAVs in collaborative assembling task | Chen, Y; Yu, J; Mei, Y; Zhang, S; Ai, X; Jia, Z |
2004-12-01 | Discovering interesting association rules by clustering | Zhao, Y; Zhang, C; Zhang, S |
2023-01-01 | GaitStrip: Gait Recognition via Effective Strip-Based Feature Representations and Multi-level Framework | Wang, M; Lin, B; Guo, X; Li, L; Zhu, Z; Sun, J; Zhang, S; Liu, Y; Yu, X; Wang, L; Gall, J; Chin, TJ; Sato, I; Chellappa, R |
2003-12-01 | Verifying the purchase request in SET protocol | Chen, Q; Zhang, C; Zhang, S; Li, C |
2006-01 | Detecting Collusion in Security protocols | Chen, Q; Chen, PY; Zhang, S; Zhang, C; Zhou, X; Li, J; Shen, H |
2012-01 | Memory performance prediction of web server applications based on grey system theory | Huang, F; Zhang, S; Yuan, C; Zhong, Z |
2005-12-01 | A framework for merging inconsistent beliefs in security protocol analysis | Chen, Q; Chen, YPP; Zhang, C; Zhang, S |
2006-01 | An norm-driven state machine model for CSCW systems | Zhang, S; Gu, N; Yang, J |