1.
|
DOA Estimation by Fourth-Order Cumulants without Source Enumeration and Eigendecomposition Bakhit Yagoup, Elhafiz Abdalla; Beijing Institute of Technology - Liu, Zhiwen; Beijing Institute of Technology - Xu, Yougen; Beijing Institute of Technology
|
2.
|
Research of the Defect Model Based on Similarity and Association Rule Han, Wanjiang; Beijing University of Posts and Telecommunication - Jiang, Lixin; Beijing University of Posts and Telecommunication - Zhang, Xiaoyan; Beijing University of Posts and Telecommunication - Lu, Tianbo; Beijing University of Posts and Telecommunication - Yi, Sun; Beijing University of Posts and Telecommunication - Yan, Li; Beijing University of Posts and Telecommunication - Li, Weijian; Beijing University of Post and Telecommunication
|
3.
|
Software Vulnerability Analysis Method Based on Adaptive-K Sequence Clustering Wu, Di; Yanshan University - Ren, Jiadong; Yanshan University
|