[1] |
ZHANG Ruifang1, GUO Kehua1,2.
Novel retrieval intention modeling method for personalized website
[J]. Computer Engineering and Applications, 2018, 54(6): 37-43.
|
[2] |
SHEN Xiajiong1, 2, YE Manman2, GAN Tian2, HAN Daojun1, 2.
Information retrieval based on concept lattice and its tree visualization
[J]. Computer Engineering and Applications, 2017, 53(3): 95-99.
|
[3] |
HE Wei, XU Du.
Improved uneven cluster routing algorithm for wireless sensor network
[J]. Computer Engineering and Applications, 2017, 53(24): 136-141.
|
[4] |
JIA He1, AI Zhongliang1,2, JIA Gaofeng2, LIU Zhonglin1,2, CHEN Boxiong2.
Research and realization on judicial large data retrieval model
[J]. Computer Engineering and Applications, 2017, 53(20): 249-253.
|
[5] |
SUN Ting, DING Jie.
Research on integration and retrieval technologies of heterogeneous government information resources
[J]. Computer Engineering and Applications, 2017, 53(2): 103-106.
|
[6] |
ZHAO Zhiguo, TAN Bang, XIA Shiying, TAN Minsheng.
P2P network comprehensive trust model based on time series
[J]. Computer Engineering and Applications, 2017, 53(15): 127-131.
|
[7] |
WANG Xiaobo, LI Xiao, MA Bo.
Search result clustering algorithm based on frequent itemsets meaning sequence
[J]. Computer Engineering and Applications, 2015, 51(1): 13-20.
|
[8] |
WAN Fucheng, LI Dongchen, HE Xiangzhen, XU Tao.
Research of Tibetan text index strategy for information retrieval
[J]. Computer Engineering and Applications, 2014, 50(7): 208-211.
|
[9] |
XUE Jin1, ZHANG Dong1, TANG Bin2.
Research on active detection forwarding strategy for Named Data Networking(NDN)
[J]. Computer Engineering and Applications, 2014, 50(18): 89-93.
|
[10] |
WANG Xuyang, WAN Li.
Research on semantic similarity in information retrieval
[J]. Computer Engineering and Applications, 2014, 50(10): 124-127.
|
[11] |
WANG Min, ZHOU Zhurong.
Context search based on faceted ontology
[J]. Computer Engineering and Applications, 2013, 49(5): 127-131.
|
[12] |
JI Meili1, WANG Xinhua1,2.
Research on cooperative caching in mobile P2P network
[J]. Computer Engineering and Applications, 2012, 48(9): 70-73.
|
[13] |
LI Jie.
P2P trust evaluation model with amount of information for rough set
[J]. Computer Engineering and Applications, 2012, 48(6): 90-93.
|
[14] |
SUN Jianzhi1, YUN Bing2, HAN Zhongming1, ZHANG Yingxin1, CHEN Dan1.
Robustness analysis of opportunistic network routing algorithms under flooding attacks
[J]. Computer Engineering and Applications, 2012, 48(5): 54-58.
|
[15] |
REN Feng, CAO Dun, FU Ming.
OLAP query algorithm based on real-time semantic dimension hierarchical
[J]. Computer Engineering and Applications, 2012, 48(4): 149-151.
|