CORC

浏览/检索结果: 共8条,第1-8条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Derivation of Pluripotent Stem Cells with In Vivo Embryonic and Extraembryonic Potency 其他
2017-01-01
Yang, Yang; Liu, Bei; Xu, Jun; Wang, Jinlin; Wu, Jun; Shi, Cheng; Xu, Yaxing; Dong, Jiebin; Wang, Chengyan; Lai, Weifeng; Zhu, Jialiang; Xiong, Liang; Zhu, Dicong; Li, Xiang; Yang, Weifeng; Yamauchi, Takayoshi; Sugawara, Atsushi; Li, Zhongwei; Sun, Fangyuan; Li, Xiangyun; Li, Chen; He, Aibin; Du, Yaqin; Wang, Ting; Zhao, Chaoran; Li, Haibo; Chi, Xiaochun; Zhang, Hongquan; Liu, Yifang; Li, Cheng; Duo, Shuguang; Yin, Ming; Shen, Huan; Belmonte, Juan Carlos Izpisua; Deng, Hongkui
收藏  |  浏览/下载:7/0  |  提交时间:2017/12/03
A novel approach for mining maximal frequent patterns 期刊论文
EXPERT SYSTEMS WITH APPLICATIONS, 2017
Bay Vo; Sang Pham; Tuong Le; Deng, Zhi-Hong
收藏  |  浏览/下载:5/0  |  提交时间:2017/12/03
PrePost(+): An efficient N-lists-based algorithm for mining frequent itemsets via Children-Parent Equivalence pruning 期刊论文
EXPERT SYSTEMS WITH APPLICATIONS, 2015
Deng, Zhi-Hong; Lv, Sheng-Long
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
Fast mining frequent itemsets using Nodesets 期刊论文
expert systems with applications, 2014
Deng, Zhi-Hong; Lv, Sheng-Long
收藏  |  浏览/下载:2/0  |  提交时间:2015/11/10
Water quality benchmarking (WQB) and priority control screening (PCS) of persistent toxic substances (PTSs) in China: Necessity, method and a case study 期刊论文
science of the total environment, 2014
He, Wei; Qin, Ning; Kong, Xiang-Zhen; Liu, Wen-Xiu; He, Qi-Shuang; Wang, Qing-Mei; Yang, Chen; Jiang, Yu-Jiao; Yang, Bin; Wu, Wen-Jing; Xu, Fu-Liu
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/11
A new algorithm for fast mining frequent itemsets using N-lists 期刊论文
science china information sciences, 2012
Deng ZhiHong; Wang ZhongHui; Jiang JiaJian
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/10
A New Fast Vertical Method for Mining Frequent Patterns 期刊论文
international journal of computational intelligence systems, 2010
Deng, Zhihong; Wang, Zhonghui
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/13
Evaluating Network Security With Two-layer Attack Graphs 其他
2009-01-01
Xie, Anming; Cai, Zhuhua; Tang, Cong; Hu, Jianbin; Chen, Zhong
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/12


©版权所有 ©2017 CSpace - Powered by CSpace