[1] |
LIU Jinghua, TAI Xianqing, MA Zhijie, CHEN Dapeng.
Study on User Requirement-Based Dynamic QoS Service Selection Method
[J]. Computer Engineering and Applications, 2021, 57(17): 106-115.
|
[2] |
LI Hongwei, CHEN Liang, BAI Jingbo.
Projection Pursuit Threat Target Assessment Model Based on Chaotic Moth-Flame Optimization Algorithm
[J]. Computer Engineering and Applications, 2020, 56(2): 152-157.
|
[3] |
TIAN Zejin, HUANG Ruilu, LV Yuejin.
Two Consistencies of Complementary Judgment Matrix Based on Interval Rough Numbers
[J]. Computer Engineering and Applications, 2019, 55(24): 235-240.
|
[4] |
YIN Qiao1,2, WEI Zhanchen1,2, HUANG Qiulan1, SUN Gongxing1, SHI Jingyan1.
Development and Application of Hadoop Massive Data Migration System
[J]. Computer Engineering and Applications, 2019, 55(13): 66-71.
|
[5] |
ZHENG Wenqing, JIN Hu, GUO Jianpeng, FENG Hui.
Backoff Algorithm for MAC Protocol Based on Channel Occupancy and Priority
[J]. Computer Engineering and Applications, 2019, 55(11): 80-84.
|
[6] |
LI Zhipeng, LI Weizhong, DU Ruichao.
Target threat assessment using Elman neural network optimized by adaptive krill herd algorithm
[J]. Computer Engineering and Applications, 2018, 54(7): 226-231.
|
[7] |
HAN Xiaolong, LI Shang, YANG Quanye.
Strategic supply chain integration research based on genetic algorithm
[J]. Computer Engineering and Applications, 2018, 54(2): 214-221.
|
[8] |
DAI Yiyu.
Selection of data product service provider based on hesitant fuzzy linguistic decision-making model
[J]. Computer Engineering and Applications, 2018, 54(12): 133-137.
|
[9] |
ZHOU Ketao, LIU Weiguo, SHI Ronghua.
K-degree anonymity scheme for preserving privacy based on similarity of neighborhood degree sequence
[J]. Computer Engineering and Applications, 2017, 53(19): 102-108.
|
[10] |
JIN Weijian, TIAN Hua.
A kind of modified interval DEMATEL decision making method
[J]. Computer Engineering and Applications, 2017, 53(18): 56-60.
|
[11] |
LI Yanlai, YING Chengshuo.
Evaluation approach of logistics schemes based on multi-format information
[J]. Computer Engineering and Applications, 2017, 53(17): 229-233.
|
[12] |
SUN Chu, ZHAO Hui, WANG Xiaofei, WEI Zhenglei.
Application of interval numbers decision to UCAV attack-defends game theory
[J]. Computer Engineering and Applications, 2017, 53(15): 170-175.
|
[13] |
SHANG Zhanwei1, GUO Yonghui1, ZOU Junguo1, YAN Junqing2.
Interval number group decision making method with unknown objective weights of attributes and decision makers
[J]. Computer Engineering and Applications, 2017, 53(15): 227-232.
|
[14] |
ZHANG Hui, JIAO Zhimin, LI Boquan.
Interval-valued intuitionistic 2-tuple linguistic aggregation operators and their multi-attribute group decision making method
[J]. Computer Engineering and Applications, 2016, 52(24): 43-49.
|
[15] |
WEI Zhenglei1, ZHAO Hui1, HAN Bangjie2, ZHOU Huan1.
Research on cooperative attack decision of Unmanned Combat Aerial Vehicles using self-adaptive Grey Wolf Optimization
[J]. Computer Engineering and Applications, 2016, 52(18): 257-261.
|