Search alternatives:
ceers » peers (Expand Search), beers (Expand Search), cers (Expand Search)
cheer » chee (Expand Search), sheer (Expand Search), cheen (Expand Search)
cheers » chees (Expand Search), sheers (Expand Search), cheens (Expand Search), cheaters (Expand Search), checkers (Expand Search)
chers » cheras (Expand Search), chern (Expand Search), chess (Expand Search), cherns (Expand Search), chens (Expand Search), chees (Expand Search)
chens » chen (Expand Search), cheng (Expand Search), chess (Expand Search)
cheek » cheeks (Expand Search), chee (Expand Search), check (Expand Search)
cher » chern (Expand Search), chen (Expand Search), chee (Expand Search)
ceers » peers (Expand Search), beers (Expand Search), cers (Expand Search)
cheer » chee (Expand Search), sheer (Expand Search), cheen (Expand Search)
cheers » chees (Expand Search), sheers (Expand Search), cheens (Expand Search), cheaters (Expand Search), checkers (Expand Search)
chers » cheras (Expand Search), chern (Expand Search), chess (Expand Search), cherns (Expand Search), chens (Expand Search), chees (Expand Search)
chens » chen (Expand Search), cheng (Expand Search), chess (Expand Search)
cheek » cheeks (Expand Search), chee (Expand Search), check (Expand Search)
cher » chern (Expand Search), chen (Expand Search), chee (Expand Search)
-
61
-
62
-
63
-
64
-
65
Solving nondeterministic polynomial complete problems optically and the design of its light source
Published 2013“…Compare with the conventional computer calculation method, the problem solving time is reduced. This result is cheerful since all the NP-complete problems are inter convertible. …”
Get full text
Final Year Project (FYP) -
66
Multi-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrapping
Published 2023“…To that end, we adapt Chen et al.'s bootstrapping algorithm to the NTRU setting and construct an efficient conversion from multi-key NTRU to multi-key RLWE ciphertexts. …”
Get full text
Journal Article -
67
Chaotic neural networks for solving combinatorial optimization problems
Published 2008“…The thesis re-examine Chen and Aihara's experiments on solving TSP by extensive simulations. …”
Get full text
Thesis -
68
MouthIO: Fabricating Customizable Oral User Interfaces with Integrated Sensing and Actuation
Published 2024“…MouthIO consists of an SLA-printed brace that houses a flexible PCB within a bite-proof enclosure positioned between the molar teeth and inner cheeks. Our MouthIO design and fabrication technique enables makers to customize the oral user interfaces in both form and function at low cost. …”
Get full text
Article -
69
Three essays on the funds allocation of U.S. Firms
Published 2018“…In essay two, we employ comprehensive measures of investment and cash flow, and evaluate the findings of Chen and Chen (2012) that the investment-cash flow sensitivity of U.S. firms has disappeared over time. …”
Get full text
Get full text
Thesis -
70
Bombs away.
Published 2012“…Bombs Away is a 3D animated short film produced by Junwei Tong, Kenneth Chen and Gabriel Yeong. It is about an army commander who takes up painting, seeking solace from the ravages of war.…”
Get full text
Final Year Project (FYP) -
71
A two sample size estimator for large data sets
Published 2025“…As an alternative, we show how the asymptotically efficient CEP-GMM estimator of Chen et al. (2005) and Chen et al. (2008) can also be used to reduce computational cost in our setting. …”
Journal article -
72
The new Chinese women
Published 2015“…This paper will thus argue that both Chen Ran and Yan Geling both portray the stereotypical female sexuality as well as alternatives of it. …”
Get full text
Final Year Project (FYP) -
73
That mysterious man
Published 2024“…Xu An reports to his captain Chen Yi. Xu An's main mission is to find clues on Zhang Xu's daily actions in Tang Nightclub. …”
Get full text
Thesis-Master by Coursework -
74
Access structures of elliptic secret sharing schemes
Published 2013“…It is a central problem in secret sharing to understand the access structures of secret sharing schemes. In Chen and Kramer, secret sharing schemes from algebraic-geometric codes and their applications in secure multiparty computation were proposed and studied. …”
Get full text
Get full text
Journal Article -
75
0-1 Knapsack in Nearly Quadratic Time
Published 2024“…On the upper bound side, currently the fastest algorithm runs in 𝑂e(𝑛 + 𝑤 12/5 max ) time (Chen, Lian, Mao, and Zhang 2023), improving the earlier 𝑂(𝑛 + 𝑤 3 max)-time algorithm by Polak, Rohwedder, and Węgrzycki (2021). …”
Get full text
Article -
76
Moonchild.
Published 2009“…Being the product of an extremely close collaboration with my partner Chen Yanyun, we will most probably have different yet similar experiences expressed in each of our papers. …”
Get full text
Final Year Project (FYP) -
77
New optimal asymmetric quantum codes from constacyclic codes
Published 2014“…The first class is the asymmetric quantum codes with parameters [[q2 + 1, q2 + 1 - 2(t + k + 1), (2k + 2)/(2t + 2)]]q2 where q is an odd prime power, t, k are integers with , which is a generalization of [J. Chen, J. Li and J. Lin, Int. J. Theor. Phys. 53 (2014) 72, Theorem 2] in the sense that we do not assume that q ≡1 (mod 4). …”
Get full text
Get full text
Journal Article -
78
Poisson discretizations of Wiener functionals and Malliavin operators with Wasserstein estimates
Published 2021“…In addition, we derive a convergence rate of O(λ ) for the Poisson discretization of Wiener functionals by combining the multivariate Chen–Stein method with the Malliavin calculus. Our proposed sufficient condition for establishing the mentioned convergence rate involves the kernel functions in the Wiener chaos, yet we provide examples, especially the discretization of some common path dependent Wiener functionals, to which our results apply without committing the explicit computations of such kernels. …”
Get full text
Journal Article -
79
Solving combinatorial optimization problems using augmented lagrange chaotic simulated annealing
Published 2012“…Chaotic simulated annealing (CSA) proposed by Chen and Aihara has been successfully used to solve a variety of combinatorial optimization problems. …”
Get full text
Get full text
Journal Article -
80
Pricing Nikkei index put warrants under fixed and floating exchange rate.
Published 2009“…The earlier study on the Nikkei Index Put Warrants under fixed exchange during 1990 by Chen (1992) shows that there are some pricing, however, those pricing errors are small. …”
Get full text
Thesis