Showing 1 - 20 results of 28 for search 'He Ye', query time: 0.04s
Refine Results
-
1
-
2
The appreciative advising revolution / by Bloom, Jennifer L., Hutson, Bryant L., He, Ye
Published 2008 -
3
Research and challenges of micropumps and microvalves in microfluidic systems by LIU Linbo, JIANG Zhuo, SHEN Xuanxuan, HE Ye
Published 2024-03-01
Article -
4
New short interleaver design for Turbo codes by LIU Wen-ming, ZHU Guang-xi, HE Ye-jun
Published 2005-01-01
Article -
5
New short interleaver design for Turbo codes by LIU Wen-ming, ZHU Guang-xi, HE Ye-jun
Published 2005-01-01
Article -
6
Quantitative Analysis and Comparison of BMI among Han, Tibetan, and Uygur University Students in Northwest China by Bai Jingya, He Ye, Wang Jing, Huanjiu Xi, Hai Tao
Published 2013-01-01
Article -
7
-
8
Metagenomics reveals the response of desert steppe microbial communities and carbon-nitrogen cycling functional genes to nitrogen deposition by He Ye, He Ye, Yu Zhao, Yu Zhao, Shilong He, Shilong He, Zhendan Wu, Zhendan Wu, Mei Yue, Mei Yue, Mei Hong, Mei Hong
Published 2024-03-01
Article -
9
Role-based fine-grained delegation constraint framework in collaborative environments by LIU Wei1, CAI Jia-yong1, HE Ye-ping1
Published 2008-01-01
Article -
10
Role-based fine-grained delegation constraint framework in collaborative environments by LIU Wei1, CAI Jia-yong1, HE Ye-ping1
Published 2008-01-01
Article -
11
-
12
Study on sinusoidal estimation deviation of electrostatic actuated MEMS mirror torsion angle by LI Jingang, HE Ye, YUAN Shijun, QIAO Dayong, YU Deshui, LI Zhiyuan
Published 2023-04-01
Article -
13
-
14
Identification of bacteria and fungi responsible for litter decomposition in desert steppes via combined DNA stable isotope probing by He Ye, He Ye, Nare Tu, Nare Tu, Zhendan Wu, Zhendan Wu, Shilong He, Shilong He, Yu Zhao, Yu Zhao, Mei Yue, Mei Yue, Mei Hong, Mei Hong
Published 2024-03-01
Article -
15
-
16
-
17
-
18
Security architecture to support multiple security policies based on access control space by LI Li-ping1, QING Si-han1, HE Ye-ping1, SHEN Qing-ni1
Published 2006-01-01
Article -
19
Security architecture to support multiple security policies based on access control space by LI Li-ping1, QING Si-han1, HE Ye-ping1, SHEN Qing-ni1
Published 2006-01-01
Article -
20
Policy-adaptive capability inheritance algorithm consistent with POSIX standard by SHEN Qing-ni1, QING Si-han1, HE Ye-ping1, SHEN Jian-jun1
Published 2006-01-01
Article