[1] |
ZHANG Kaibi, ZHOU Zhen, WEI Pengcheng, LI Li.
Multi-Keyword Verifiable Ciphertext Search Scheme in Outsourced Database
[J]. Computer Engineering and Applications, 2019, 55(17): 76-81.
|
[2] |
BAI Zhi’an1, ZENG Jianping2.
Optimal Selection Method for LDA Topics Based on Degree of Overlap and Completeness
[J]. Computer Engineering and Applications, 2019, 55(12): 155-161.
|
[3] |
HE Zhaoyang, DU Yuyue, WANG Lu.
Process mining algorithm for discovering special loop structures
[J]. Computer Engineering and Applications, 2018, 54(22): 42-50.
|
[4] |
LI Shiyang, WANG Xiaoming.
Multi-user verifying completeness and integrity encrypted keyword query in cloud storage
[J]. Computer Engineering and Applications, 2016, 52(7): 132-138.
|
[5] |
LV Jianghua1, LIU Zhifeng1, XU Yatao2, ZHOU Conghua1.
Verification of correctness of attribute based access control
[J]. Computer Engineering and Applications, 2016, 52(18): 98-103.
|
[6] |
ZOU Muquan, WANG Lizhen, YAO Huachuan.
Spatial colocation patterns discovery in fuzzy spatial
[J]. Computer Engineering and Applications, 2014, 50(7): 108-115.
|
[7] |
PENG Li, YANG Hengfu.
ABox consistency decision algorithm for description logic SHIN
[J]. Computer Engineering and Applications, 2013, 49(20): 55-62.
|
[8] |
GONG Zhiwei1, LIU Renren2.
Minimal covering for precomplete sets in partial four-valued logic
[J]. Computer Engineering and Applications, 2012, 48(23): 52-57.
|
[9] |
SHI Huixian1,WANG Guojun1,2.
Logic system MTL▽ and its completeness
[J]. Computer Engineering and Applications, 2011, 47(6): 30-33.
|
[10] |
JIN Huixia1,HE Qian2.
Decision of Sheffer functions in partial four-valued logic
[J]. Computer Engineering and Applications, 2011, 47(29): 140-142.
|
[11] |
HE Qian,LIU Ren-ren.
Conformational and determinant algorithm on Sheffer function in partial two-valued logic
[J]. Computer Engineering and Applications, 2010, 46(5): 28-30.
|
[12] |
ZHANG Sheng-li1,2,PAN Zheng-hua2.
One new model of infinite valued for medium proposition logic and its meaning
[J]. Computer Engineering and Applications, 2010, 46(31): 45-49.
|
[13] |
SHENG Gang1,CUI Xin-chun2.
Query completeness verification of outsourced databases
[J]. Computer Engineering and Applications, 2009, 45(28): 145-147.
|
[14] |
GUO Jing 1,2,LIAO Shi-zhong1.
Complete labeling set for 3D-sketch with occlusion
[J]. Computer Engineering and Applications, 2009, 45(21): 189-192.
|
[15] |
CHEN Jian-nan.
Preliminary study of balanced perfect magic square of prime order
[J]. Computer Engineering and Applications, 2009, 45(21): 179-182.
|