Advanced Search



13 results found in all.
index Title
1An application-layer based centralized information access control for VPN
Author(s):Ouyang Kai, Zhou Jing-li, Xia Tao, Yu Sheng-sheng  Clicked:8428  Download:3944  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.2 P.240-249  DOI:10.1631/jzus.2006.A0240
2A simple and effective method for total RNA isolation of appressoria in Magnaporthe oryzae
Author(s):Tong-bao LIU, Jian-ping LU, Xiao-hong LIU, Hang MIN, Fu-cheng LIN  Clicked:8292  Download:4733  Cited:7  <Full Text>
Journal of Zhejiang University Science B  2008 Vol.9 No.10 P.811-817  DOI:10.1631/jzus.B0860011
3Preface
Author(s):Marco CECCARELLI  Clicked:6337  Download:3137  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2010 Vol.11 No.4 P.I-II  DOI:10.1631/jzus.A10ISRM09
4Freshness constraints of an age of information based event-triggered Kalman consensus filter algorithm over a wireless sensor network
Author(s):Rui Wang, Yahui Li, Hui Sun, Youmin Zhang  Clicked:9313  Download:10800  Cited:0  <Full Text>  <PPT> 2834
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.1 P.51-67  DOI:10.1631/FITEE.2000206
5Event-triggered dynamic output-feedback control for a class of Lipschitz nonlinear systems
Author(s):Zhiqian LIU, Xuyang LOU, Jiajia JIA  Clicked:6337  Download:18660  Cited:0  <Full Text>  <PPT> 1235
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.11 P.1684-1699  DOI:10.1631/FITEE.2100552
6Event-triggered distributed optimization formodel-free multi-agent systems
Author(s):Shanshan ZHENG, Shuai LIU, Licheng WANG  Clicked:3814  Download:3743  Cited:0  <Full Text>  <PPT> 1091
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.2 P.214-224  DOI:10.1631/FITEE.2300568
7Fibrillarin promotes homologous recombination repair by facilitating the recruitment of recombinase RAD51 to DNA damage sites
Author(s):Yanhua MU, Jinhua HAN, Mingjie WU, Zongfang LI, Ke DU, Yameng WEI, Mengjie WU, Jun HUANG  Clicked:2764  Download:3155  Cited:0  <Full Text>  <PPT> 1238
Journal of Zhejiang University Science B  2023 Vol.24 No.12 P.1165-1173  DOI:10.1631/jzus.B2300518
8Modified dynamic event-triggered scaled formation control formulti-agent systems via a sparrowsearch algorithm based co-design algorithm
Author(s):Yanping YANG, Siyu MA, Dawei LI, Jinghui SUO  Clicked:4227  Download:3601  Cited:0  <Full Text>  <PPT> 990
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.2 P.197-213  DOI:10.1631/FITEE.2300615
9Style-conditioned music generation with Transformer-GANs
Author(s):Weining WANG, Jiahui LI, Yifan LI, Xiaofen XING  Clicked:3784  Download:4369  Cited:0  <Full Text>  <PPT> 1235
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.1 P.106-120  DOI:10.1631/FITEE.2300359
10Event-triggered finite-time command-filtered tracking control for nonlinear time-delay cyber physical systems against cyber attacks
Author(s):Yajing MA, Yuan WANG, Zhanjie LI, Xiangpeng XIE  Clicked:4002  Download:3861  Cited:0  <Full Text>  <PPT> 1152
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.2 P.225-236  DOI:10.1631/FITEE.2300613
11Event-triggered distributed cross-dimensional formation control for heterogeneous multi-agent systems
Author(s):Huimin WEI, Chen PENG, Min ZHAO  Clicked:3832  Download:3691  Cited:0  <Full Text>  <PPT> 1056
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.8 P.1123-1133  DOI:10.1631/FITEE.2300627
12Handling polysemous triggers and arguments in event extraction: an adaptive semantics learning strategy with reward–penalty mechanism
Author(s):Haili LI, Zhiliang TIAN, Xiaodong WANG, Yunyan ZHOU, Shilong PAN, Jie ZHOU, Qiubo XU, Dongsheng LI  Clicked:3319  Download:4917  Cited:0  <Full Text>  <PPT> 793
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.4 P.534-555  DOI:10.1631/FITEE.2400220
13Sum-based dynamic discrete event-triggered mechanism for synchronization of delayed neural networks under deception attacks
Author(s):Zhongjing YU, Duo ZHANG, Shihan KONG, Deqiang OUYANG, Hongfei LI, Junzhi YU  Clicked:1657  Download:2830  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.9 P.1662-1678  DOI:10.1631/FITEE.2401000
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE