[1] |
WU Jinghua, WU Xueqiao.
Multi-attribute Evaluation Model Based on Improved Closeness of Agent
[J]. Computer Engineering and Applications, 2021, 57(5): 65-70.
|
[2] |
LI Zhuangkuo, CHANG Kaixuan.
Ant Colony Optimization for Continuous Domains Applied to Cooperative Game
[J]. Computer Engineering and Applications, 2021, 57(24): 198-204.
|
[3] |
LYU Xin, ZHAO Liancheng, YU Jiyuan, TAN Bin, ZENG Tao, CHEN Juan.
Trajectory-Clustering Based Privacy Protection Method for Continuous Query in LBS
[J]. Computer Engineering and Applications, 2021, 57(2): 104-112.
|
[4] |
XIE Yinggang, LAN Jiangyu.
Review of Collaborative Robot and Its Motion Planning Methods
[J]. Computer Engineering and Applications, 2021, 57(13): 18-33.
|
[5] |
HE Huanye, LIN Guoyuan, GU Hao, FANG Menghua.
Improved LOF Algorithm in Cloud Virtual Machine Anomaly Detection Scenario
[J]. Computer Engineering and Applications, 2020, 56(23): 80-86.
|
[6] |
YANG Haoyun, WANG Junfeng, LIU Jiayong, TANG Zhangguo.
Research and Implementation of Covert Channel of SSL Protocol
[J]. Computer Engineering and Applications, 2020, 56(20): 67-72.
|
[7] |
LIN Yuxiang1, WANG Huiting2.
Privacy protection scheme based on continuous uncertain collaborative users
[J]. Computer Engineering and Applications, 2018, 54(9): 109-115.
|
[8] |
WANG Tiedan, ZHAO Yang, PENG Dinghong.
Research on cloud service safety evaluation based on improved IVHF-TODIM method
[J]. Computer Engineering and Applications, 2018, 54(4): 84-89.
|
[9] |
ZHENG Hao, DONG Mingli, PAN Zhikang.
Target tracking algorithm with multiple algorithms in collaboration based on image classification
[J]. Computer Engineering and Applications, 2018, 54(4): 185-191.
|
[10] |
YAO Yanling1, 2, YUAN Feng1, 2, WANG Ning1, 2.
Visualization analysis on international collaboration computing based on knowledge mapping
[J]. Computer Engineering and Applications, 2017, 53(7): 30-40.
|
[11] |
YAN Meng, LIU Jianbin, ZHENG Liwei.
QueTy: Cloud service collaboration framework supporting time marginal utility
[J]. Computer Engineering and Applications, 2017, 53(19): 86-97.
|
[12] |
LIU Zuanshi, GENG Xiuli.
Trusted cloud service evaluation method research based on D-S theory
[J]. Computer Engineering and Applications, 2017, 53(17): 70-76.
|
[13] |
SUN Tianhao, SHI Hongyuan, WAN Xuanmin.
Study on cloud service selection algorithm based on ARIMA and QoS
[J]. Computer Engineering and Applications, 2017, 53(13): 99-103.
|
[14] |
WU Yuying, RAO Yushu, JIANG Guorui.
Research on concurrent negotiation particle swarm optimization model of supply chain
[J]. Computer Engineering and Applications, 2016, 52(4): 229-233.
|
[15] |
WU Yuying, LI Jing, JIANG Guorui.
Research on argumentation-based negotiation strategy based on prospect theory
[J]. Computer Engineering and Applications, 2015, 51(3): 239-242.
|