[1] |
XU Jie, ZHU Yukun, XING Chunxiao.
Research on Financial Trading Algorithm Based on Deep Reinforcement Learning
[J]. Computer Engineering and Applications, 2022, 58(7): 276-285.
|
[2] |
WANG Mei, PENG Dandan, ZHANG Zhuangzhuang.
Research on Broadcast Timeliness of Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2022, 58(4): 100-105.
|
[3] |
DUAN Ganglong, WANG Yan, MA Xin, YANG Zeyang.
Data Feature Selection Method and Empirical Study of Bank Customer Segmentation
[J]. Computer Engineering and Applications, 2022, 58(11): 302-312.
|
[4] |
WANG Fang, ZHANG Xueying, HU Fengyun, LI Fenglian.
Ensemble Method Classifies EEG from Stroke Patients
[J]. Computer Engineering and Applications, 2021, 57(24): 276-282.
|
[5] |
QIN Xiaoyan.
Quasi-Truth Degree of First-Order Formula After Using Generalization Rule
[J]. Computer Engineering and Applications, 2019, 55(6): 39-41.
|
[6] |
WANG Linna1,2, YANG Xin3, YANG Xibei4.
Research on composite decision-theoretic rough modeling and computational method
[J]. Computer Engineering and Applications, 2018, 54(19): 122-128.
|
[7] |
WANG Bingnan1, LI Bin1, LIU Shuangchun2,3, TIAN Lianfang1, WANG Lifei4.
Development and design of computer-aided system for quantitative analysis of pulmonary function
[J]. Computer Engineering and Applications, 2018, 54(13): 224-230.
|
[8] |
GAO Zhifang, SHENG Guanshuai, PENG Dinghong.
Information security risk assessment method based on compromise rate method
[J]. Computer Engineering and Applications, 2017, 53(23): 82-87.
|
[9] |
ZHANG Jiachen, LIU Hao.
Quantitative evaluation model for mobile video quality of experience
[J]. Computer Engineering and Applications, 2017, 53(12): 133-139.
|
[10] |
CHEN Yun1,2, SHI Song1,2, PAN Yan1,2, YU Li2.
Hybrid ensemble approach for credit risk assessment based on SVM
[J]. Computer Engineering and Applications, 2016, 52(4): 115-120.
|
[11] |
WANG Xueli1, ZHANG Xuan1,3, LI Tong1,3, WANG Xu2.
Method of risk assessment oriented to trustworthy software
[J]. Computer Engineering and Applications, 2016, 52(19): 97-101.
|
[12] |
CHEN Yu, WANG Yadi, WANG Jindong, WANG Kun.
Method for information system risk management based on Markov logic networks
[J]. Computer Engineering and Applications, 2016, 52(18): 104-110.
|
[13] |
ZHOU Wei1, XIE Wenbin2, LI Lei3.
A kind of Cyberspace security framework design and risk assessment method
[J]. Computer Engineering and Applications, 2016, 52(18): 122-126.
|
[14] |
ZHANG Yongzheng, GENG Xiuli.
Risk assessment of service outsourcing based on DEMATEL and VIKOR
[J]. Computer Engineering and Applications, 2016, 52(18): 240-245.
|
[15] |
GONG Yan1, LI Sujian1, XING Enhui2.
Novel variable cell transmission model for stochastic road network with time-varying congestion degree
[J]. Computer Engineering and Applications, 2015, 51(3): 6-11.
|