[1] |
HU Zhangfang, JIAN Fang, TANG Shanshan, MING Ziping, JIANG Bowen.
DFSMN-T:Mandarin Speech Recognition with Language Model Transformer
[J]. Computer Engineering and Applications, 2022, 58(9): 187-194.
|
[2] |
YANG Zhengqiu, ZHENG Yifan, XIU Jiapeng.
Research on Security System for Internet of Vehicles Based on Digital Signature
[J]. Computer Engineering and Applications, 2022, 58(9): 116-126.
|
[3] |
DENG Liping, XIAO He, WANG Juan.
Anti-Occlusion Particle Filter Tracking Algorithm Based on Similarity Detection
[J]. Computer Engineering and Applications, 2022, 58(14): 185-193.
|
[4] |
WANG Qin, LIU Dun.
Sequential Three-Way Sentiment Classification Combined with Ensemble Learning
[J]. Computer Engineering and Applications, 2021, 57(23): 211-218.
|
[5] |
DONG Xuedong, HAN Shuo, ZHANG Cheng.
New Paillier Digital Signature Scheme Based on Cubic Residue
[J]. Computer Engineering and Applications, 2020, 56(18): 77-81.
|
[6] |
LU Shufei, CHEN Yan, CUI Yaodong.
Machinability-Oriented Optimization Algorithm for Rectangular Items Cutting Stock Problem
[J]. Computer Engineering and Applications, 2020, 56(17): 55-59.
|
[7] |
YU Lianglong, DU Weizhang.
Secret Sharing Scheme Based on Symmetric Bivariate Polynomial
[J]. Computer Engineering and Applications, 2020, 56(13): 120-123.
|
[8] |
XIAO Shuai, WANG Xu’an, PAN Feng.
Elliptic Curve Digital Signature Algorithm Without Modular Inverse Operation
[J]. Computer Engineering and Applications, 2020, 56(11): 118-123.
|
[9] |
ZHANG Ping, LI Yamin.
Forward Secure Elliptic Curve Digital Signature Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 115-120.
|
[10] |
CHENG Xiaomei, SHEN Yuantong.
Double-Target CNN Image Quality Assessment Method
[J]. Computer Engineering and Applications, 2019, 55(9): 26-32.
|
[11] |
ZHAO Ying1, PAN Hua2, SUN Jinyan2, MO Qi3, DAI Fei4.
Random Behavior Analysis Method of Collaborative Business Process
[J]. Computer Engineering and Applications, 2019, 55(3): 245-251.
|
[12] |
CHEN Rui, PANG Haiping, HAO Li, LI Da, YANG Dong.
Modeling and Analysis of Asynchronous Scheduling Mechanism for Powerlink Protocol
[J]. Computer Engineering and Applications, 2019, 55(17): 259-265.
|
[13] |
JIANG Yi1,2, LUO Yuhao1, ZHU Hengwei1.
Research of scheduling based on Topology under Storm clusters
[J]. Computer Engineering and Applications, 2018, 54(7): 84-88.
|
[14] |
SUN Qin1, 2, JIANG Yanhuang1, 2, HU Wei2, ZHANG Yi2, GAO Feng3.
Feature selection algorithm based on multi-criterion ranking and C-SVM
[J]. Computer Engineering and Applications, 2018, 54(3): 125-130.
|
[15] |
ZHANG Yu, CUI Yaodong, LIANG Zehua.
Two-dimensional cutting stock problem of multiple logs
[J]. Computer Engineering and Applications, 2018, 54(19): 266-270.
|