UM

Browse/Search Results:  1-10 of 10 Help

Selected(0)Clear Items/Page:    Sort:
English Textbook Selection in Taiwan: Voices of Two Book Sales Representatives Journal article
Education Research International, 2022,Volume: 2022
Authors:  Barry Lee Reynolds;  Xuan Van Ha;  Melissa H. Yu
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/06/07
The Dome of Thought: Phrenology and the Nineteenth-Century Popular Imagination Book
Manchester:Manchester University Press, 2022
Authors:  HUGHES, William
Adobe PDF | Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/07/31
Phrenology  Victorian Medicine  Scottish History  Pseudoscience  English History  Newspapers  
On Consortium Blockchain Consistency: A Queueing Network Model Approach Journal article
IEEE Transactions on Parallel and Distributed Systems, 2021,Volume: 32,Issue: 6,Page: 1369-1382
Authors:  Meng,Tianhui;  Zhao,Yubin;  Wolter,Katinka;  Xu,Cheng Zhong
Favorite |  | TC[WOS]:10 TC[Scopus]:13 | Submit date:2021/03/09
Analyzing Framework  Consistency  Consortium Blockchain  Delay Attack  Permissoned Blockchain  Queueing Networks  
Stigma, discrimination and hate crimes in Chinese-speaking world amid Covid-19 pandemic Journal article
Asian Journal of Criminology, 2021
Authors:  Xu JH(徐建華)
Adobe PDF | Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/07/31
An N × N Multiplier-Based Multi-Bit Strong PUF Using Path Delay Extraction Conference paper
IEEE International Symposium on Circutis and Systems (2020)
Authors:  Xu, C.;  Zhang, J.;  Law, M. K.;  Zhao, X.;  Mak, P. I.;  Martins, R. P.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/01/25
Multiplier  Multi-Bit  Physical Unclonable Function  Path Delay Extraction  
Characteristics of cybercrimes: evidence from Chinese judgment documents Journal article
Police Practice and Research, 2018,Volume: 19,Issue: 6,Page: 582-595
Authors:  Tianji Cai;  Li Du;  Yanyu Xin;  Lennon Y.C. Chang
Adobe PDF | Favorite |  | TC[WOS]:1 TC[Scopus]:1 | Submit date:2019/06/25
Cybercrimes  Sentencing Documents  Underground Economy  Value Chain  
Life history theory Book chapter
出自: The SAGE Encyclopedia of Lifespan Human Development:SAGE Publications, 2018, 2018
Authors:  Chang, L.;  Lu, H. J.
Adobe PDF | Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/08/07
Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization Journal article
Security and Communication Networks, 2015,Volume: 9,Issue: 1,Page: 43-53
Authors:  Yushu Zhang;  Di Xiao;  Kwok-Wo Wong;  Jiantao Zhou;  Sen Bai;  Moting Su
Adobe PDF | Favorite |  | TC[WOS]:3 TC[Scopus]:4 | Submit date:2018/12/22
Arithmetic Coding  Chaotic Map  Joint Compression And Encryption  Perturbation  
Conference proceedings of The Twenty-third ICMI Study: Primary Mathematics Study on Whole Numbers Conference proceedings
Macau SAR, 2015-6-3-10
Authors:  Sun XH(孫旭花);  Berinderjeet Kaur;  Jarmila Novotna
Adobe PDF | Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/07/27
Whole Number  Arithmatic  
Cyber security and privacy issues in smart grids Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:  Liu J.;  Xiao Y.;  Li S.;  Liang W.;  Chen C.L.P.
View | Adobe PDF | Favorite |  | TC[WOS]:309 TC[Scopus]:376 | Submit date:2018/10/30
Accountability  Ami  Privacy  Scada  Security  Smart Grid