
| index | Title |
| 1 | Detecting P2P bots by mining the regional periodicity Author(s):Yong Qiao, Yue-xiang Yang, Jie He,... Clicked:10902 Download:5266 Cited:4 <Full Text> <PPT> 3986 Journal of Zhejiang University Science C 2013 Vol.14 No.9 P.682-700 DOI:10.1631/jzus.C1300053 |
| 2 | CWLP: coordinated warp scheduling and locality-protected cache allocation on GPUs Author(s):Yang Zhang, Zuo-cheng Xing, Cang L... Clicked:8573 Download:3959 Cited:0 <Full Text> <PPT> 2237 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.2 P.206-220 DOI:10.1631/FITEE.1700059 |
| 3 | A review of design intelligence: progress, problems, and challenges Author(s):Yong-chuan Tang, Jiang-jie Huang, ... Clicked:10653 Download:5357 Cited:0 <Full Text> <PPT> 2462 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.12 P.1595-1617 DOI:10.1631/FITEE.1900398 |
| 4 | Classification of EEG-based single-trial motor imagery tasks using a B-CSP method for BCI Author(s):Zhi-chuan Tang, Chao Li, Jian-feng... Clicked:9230 Download:4214 Cited:0 <Full Text> <PPT> 2648 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.8 P.1087-1098 DOI:10.1631/FITEE.1800083 |