UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 141.814
11.
  • Gut Microbiota-brain Axis Gut Microbiota-brain Axis
    Wang, Hong-Xing; Wang, Yu-Ping Chinese medical journal, 10/2016, Letnik: 129, Številka: 19
    Journal Article
    Recenzirano
    Odprti dostop

    Objective: To systematically review the updated information about the gut microbiota-brain axis. Data Sources: All articles about gut microbiota-brain axis published up to July 18, 2016, were ...
Celotno besedilo

PDF
12.
  • Auction Mechanisms in Cloud... Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks
    Jiao, Yutao; Wang, Ping; Niyato, Dusit ... IEEE transactions on parallel and distributed systems, 2019-Sept.-1, 2019-9-1, Letnik: 30, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    As an emerging decentralized secure data management platform, blockchain has gained much popularity recently. To maintain a canonical state of blockchain data record, proof-of-work based consensus ...
Celotno besedilo

PDF
13.
  • The response of soil respir... The response of soil respiration to precipitation change is asymmetric and differs between grasslands and forests
    Du, Yue; Wang, Ying‐Ping; Su, Fanglong ... Global change biology, October 2020, 2020-Oct, 2020-10-00, 20201001, Letnik: 26, Številka: 10
    Journal Article
    Recenzirano

    Intensification of the Earth's hydrological cycle amplifies the interannual variability of precipitation, which will significantly impact the terrestrial carbon (C) cycle. However, it is still ...
Celotno besedilo
14.
  • On the anonymity of two-fac... On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
    Wang, Ding; Wang, Ping Computer networks (Amsterdam, Netherlands : 1999), 11/2014, Letnik: 73
    Journal Article
    Recenzirano

    Display omitted •We demonstrate privacy breaches into two password authentication schemes for WSNs.•Public-key techniques are indispensible to achieve user untraceability.•Our principle is applicable ...
Celotno besedilo
15.
  • (TiZrNbTa)-Mo high-entropy ... (TiZrNbTa)-Mo high-entropy alloys: Dependence of microstructure and mechanical properties on Mo concentration and modeling of solid solution strengthening
    Wang, Shao-Ping; Xu, Jian Intermetallics, April 2018, 2018-04-00, 20180401, Letnik: 95
    Journal Article
    Recenzirano

    In this work, the evolution of microstructure and fundamental mechanical properties with Mo concentration in the arc-melted (TiZrNbTa)100-xMox (0 ≤ x ≤ 20) high-entropy alloys (HEAs) are ...
Celotno besedilo
16.
Celotno besedilo
17.
  • Measuring Two-Factor Authen... Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
    Wang, Ding; Li, Wenting; Wang, Ping IEEE transactions on industrial informatics, 09/2018, Letnik: 14, Številka: 9
    Journal Article

    Dozens of two-factor authentication schemes have been proposed to secure real-time data access in industrial wireless sensor networks (WSNs). However, more often than not, the protocol designers ...
Celotno besedilo
18.
  • Leaching of heavy metals fr... Leaching of heavy metals from abandoned mine tailings brought by precipitation and the associated environmental impact
    Wang, Ping; Sun, Zehang; Hu, Yuanan ... The Science of the total environment, 12/2019, Letnik: 695
    Journal Article
    Recenzirano

    Abandoned tailings are one of the most important sources of heavy metal pollution in the areas surrounding mining districts, and significant leaching of heavy metals could be brought by ...
Celotno besedilo
19.
  • Structural Basis for Cooper... Structural Basis for Cooperative Function of Mettl3 and Mettl14 Methyltransferases
    Wang, Ping; Doxtader, Katelyn A.; Nam, Yunsun Molecular cell, 07/2016, Letnik: 63, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    N6-methyladenosine (m6A) is a prevalent, reversible chemical modification of functional RNAs and is important for central events in biology. The core m6A writers are Mettl3 and Mettl14, which both ...
Celotno besedilo

PDF
20.
  • Zipf's Law in Passwords Zipf's Law in Passwords
    Wang, Ding; Cheng, Haibo; Wang, Ping ... IEEE transactions on information forensics and security, 2017-Nov., 2017-11-00, Letnik: 12, Številka: 11
    Journal Article
    Recenzirano

    Despite three decades of intensive research efforts, it remains an open question as to what is the underlying distribution of user-generated passwords. In this paper, we make a substantial step ...
Celotno besedilo
1 2 3 4 5
zadetkov: 141.814

Nalaganje filtrov