[1] |
NI Ming, QIAN Siyuan, YANG Shanlin.
Simulation and Optimization of Recycling and Reusing Process of Wasted Smart Phones
[J]. Computer Engineering and Applications, 2021, 57(5): 258-263.
|
[2] |
LU Wenxing, WANG Hupo, WANG Binyou.
Research on Tourist Diversion in Scenic Spots Based on Timed Petri Net
[J]. Computer Engineering and Applications, 2020, 56(8): 241-248.
|
[3] |
FENG Fujian.
Verification Analysis for Delay Time Petri Nets
[J]. Computer Engineering and Applications, 2019, 55(4): 72-78.
|
[4] |
DENG Liping1, DUAN Liguo2, YANG Lifeng2.
Trust and Behavioral Method Based Web Services Selection
[J]. Computer Engineering and Applications, 2019, 55(4): 112-118.
|
[5] |
SONG Jian, FANG Xianwen, WANG Lili, LIU Xiangwei.
Quasi Indirect Dependence Mining Method for Business Process Hide Transition
[J]. Computer Engineering and Applications, 2019, 55(22): 265-270.
|
[6] |
GUO Lin, SUN Qinglin, CHEN Sai, CHEN Zengqiang, JIA Hongchen.
Design of Powered Parafoil System Based on Real-Time Multitask Operating System
[J]. Computer Engineering and Applications, 2019, 55(16): 227-234.
|
[7] |
LUO Ling.
Reliability Checking About Embedded Airborne Software Based on Stochastic Petri Net
[J]. Computer Engineering and Applications, 2019, 55(1): 233-240.
|
[8] |
CAO Rui, FANG Xianwen, WANG Lili.
Optimization analysis of process mining based on quasi indirect dependence
[J]. Computer Engineering and Applications, 2018, 54(9): 37-41.
|
[9] |
LI Haiyan1, WANG Yanping1, ZHOU Jianyong2, LIU Jiufu2.
Design of deadlock supervisor of partially controllable Petri nets
[J]. Computer Engineering and Applications, 2018, 54(8): 48-54.
|
[10] |
PAN Jie1, WATANABE Masahiko2, ZHOU Kuanjiu1, LIANG Haoran1, CUI Kai1.
Formal modeling approach for embedded software
[J]. Computer Engineering and Applications, 2018, 54(8): 61-71.
|
[11] |
DONG Jian, DAI Shenghua.
Modeling and formal analysis of level transition based on colored Petri nets
[J]. Computer Engineering and Applications, 2018, 54(2): 208-213.
|
[12] |
JIANG Jieqi, YANG Geng, LI Peng.
Analysis of users’ behavior under cloud computing environment
[J]. Computer Engineering and Applications, 2018, 54(14): 127-132.
|
[13] |
WANG Liewei, WU Shuo, HU Junhua.
Modelling and comparisons of traffic intersections based on Petri nets
[J]. Computer Engineering and Applications, 2018, 54(14): 211-216.
|
[14] |
ZHANG Jing, WANG Liang, FAN Hongbo.
Modeling and analysis of CPS physical entity spatio-temporal state
[J]. Computer Engineering and Applications, 2018, 54(14): 41-44.
|
[15] |
ZHAO Bo1,2, LI Erhui1,2, MA Jun1,2, HUANG Yuqing1,2.
Security-enhanced key generation scheme based on USB Key
[J]. Computer Engineering and Applications, 2018, 54(10): 135-142.
|