Showing 1 - 20 results of 24 for search 'Bolin Ma', query time: 0.04s
Refine Results
-
1
The Boundedness of Commutators of Singular Integral Operators with Besov Functions by Xionglue Gao, Bolin Ma
Published 2010-01-01
Article -
2
Almost Everywhere Convergence of Riesz Means Related to Schrödinger Operator with Constant Magnetic Fields by Liurui Deng, Bolin Ma
Published 2013-01-01
Article -
3
The Fractional Carleson Measures on the Unit Ball of ℝn+1 by Dongfang Wang, Bolin Ma
Published 2013-01-01
Article -
4
Estimation of wireless channel fading model in maritime communication for complex meteorological environment by Yasheng DAI, Bolin MA, Guangxue YUE
Published 2022-03-01
Article -
5
A Continuous Characterization of Triebel-Lizorkin Spaces Associated with Hermite Expansions by Shuli Gong, Bolin Ma, Zunwei Fu
Published 2015-01-01
Article -
6
Estimation of wireless channel fading model in maritime communication for complex meteorological environment by Yasheng DAI, Bolin MA, Guangxue YUE
Published 2022-03-01
Article -
7
Weighted Multilinear Hardy Operators on Herz Type Spaces by Shuli Gong, Zunwei Fu, Bolin Ma
Published 2014-01-01
Article -
8
The boundedness of commutators on locally compact Vilenkin groups by Canqin Tang, Qingguo Li, Bolin Ma
Published 2005-01-01
Article -
9
Dependable-cooperative channel resource allocation scheme in wireless mesh network by Mingming LI, Guangxue YUE, Shaoqing DAI, Bolin MA
Published 2017-05-01
Article -
10
SQLMVED: SQL injection runtime prevention system based on multi-variant execution by Bolin MA, Zheng ZHANG, Hao LIU, Jiangxing WU
Published 2021-04-01
Article -
11
Dependable-cooperative channel resource allocation scheme in wireless mesh network by Mingming LI, Guangxue YUE, Shaoqing DAI, Bolin MA
Published 2017-05-01
Article -
12
SQLMVED: SQL injection runtime prevention system based on multi-variant execution by Bolin MA, Zheng ZHANG, Hao LIU, Jiangxing WU
Published 2021-04-01
Article -
13
Security capability analysis of software-based heterogeneous redundant execution system by Bolin MA, Zheng ZHANG, Quan REN, Gaofei ZHANG, Jiangxing WU
Published 2021-09-01
Article -
14
Method against process control-flow hijacking based on mimic defense by Chuanxing PAN, Zheng ZHANG, Bolin MA, Yuan YAO, Xinsheng JI
Published 2021-01-01
Article -
15
DropBlock based bimodal hybrid neural network for wireless communication modulation recognition by Yan GAO, Jian SHI, Shengyu MA, Bolin MA, Guangxue YUE
Published 2022-05-01
Article -
16
Method against process control-flow hijacking based on mimic defense by Chuanxing PAN, Zheng ZHANG, Bolin MA, Yuan YAO, Xinsheng JI
Published 2021-01-01
Article -
17
-
18
DropBlock based bimodal hybrid neural network for wireless communication modulation recognition by Yan GAO, Jian SHI, Shengyu MA, Bolin MA, Guangxue YUE
Published 2022-05-01
Article -
19
Security capability analysis of software-based heterogeneous redundant execution system by Bolin MA, Zheng ZHANG, Quan REN, Gaofei ZHANG, Jiangxing WU
Published 2021-09-01
Article -
20
SSDHT:social network-based secure DHT mechanism by Panpan LI, Zhengxia XIE, Guangxue YUE, Bolin MA, Li CHEN, Jianhua LIU
Published 2018-11-01
Article