[1] |
TIAN Zejin, HUANG Ruilu, LV Yuejin.
Two Consistencies of Complementary Judgment Matrix Based on Interval Rough Numbers
[J]. Computer Engineering and Applications, 2019, 55(24): 235-240.
|
[2] |
YIN Qiao1,2, WEI Zhanchen1,2, HUANG Qiulan1, SUN Gongxing1, SHI Jingyan1.
Development and Application of Hadoop Massive Data Migration System
[J]. Computer Engineering and Applications, 2019, 55(13): 66-71.
|
[3] |
ZHENG Wenqing, JIN Hu, GUO Jianpeng, FENG Hui.
Backoff Algorithm for MAC Protocol Based on Channel Occupancy and Priority
[J]. Computer Engineering and Applications, 2019, 55(11): 80-84.
|
[4] |
HAN Xiaolong, LI Shang, YANG Quanye.
Strategic supply chain integration research based on genetic algorithm
[J]. Computer Engineering and Applications, 2018, 54(2): 214-221.
|
[5] |
GAO Zhifang, SHENG Guanshuai, PENG Dinghong.
Information security risk assessment method based on compromise rate method
[J]. Computer Engineering and Applications, 2017, 53(23): 82-87.
|
[6] |
ZHOU Ketao, LIU Weiguo, SHI Ronghua.
K-degree anonymity scheme for preserving privacy based on similarity of neighborhood degree sequence
[J]. Computer Engineering and Applications, 2017, 53(19): 102-108.
|
[7] |
CHEN Yu, WANG Yadi, WANG Jindong, LI Tao.
Study of influence on information security risks by delays of security measures
[J]. Computer Engineering and Applications, 2017, 53(19): 118-123.
|
[8] |
LI Yanlai, YING Chengshuo.
Evaluation approach of logistics schemes based on multi-format information
[J]. Computer Engineering and Applications, 2017, 53(17): 229-233.
|
[9] |
RONG Quanbing1,2, WANG Fengshan1,2, ZHANG Hongjun1.
Research of matter-element risk evaluation component on engineering surrounding structure
[J]. Computer Engineering and Applications, 2016, 52(6): 264-270.
|
[10] |
CHEN Yun1,2, SHI Song1,2, PAN Yan1,2, YU Li2.
Hybrid ensemble approach for credit risk assessment based on SVM
[J]. Computer Engineering and Applications, 2016, 52(4): 115-120.
|
[11] |
WANG Xueli1, ZHANG Xuan1,3, LI Tong1,3, WANG Xu2.
Method of risk assessment oriented to trustworthy software
[J]. Computer Engineering and Applications, 2016, 52(19): 97-101.
|
[12] |
CHEN Yu, WANG Yadi, WANG Jindong, WANG Kun.
Method for information system risk management based on Markov logic networks
[J]. Computer Engineering and Applications, 2016, 52(18): 104-110.
|
[13] |
ZHOU Wei1, XIE Wenbin2, LI Lei3.
A kind of Cyberspace security framework design and risk assessment method
[J]. Computer Engineering and Applications, 2016, 52(18): 122-126.
|
[14] |
ZHANG Yongzheng, GENG Xiuli.
Risk assessment of service outsourcing based on DEMATEL and VIKOR
[J]. Computer Engineering and Applications, 2016, 52(18): 240-245.
|
[15] |
HOU Xiaoqin1, HU Zhihua1, GAO Chaofeng1, LUO Xunjie2.
Priority-based genetic algorithm for routing automated guided vehicles for traversing blocks in warehouse aisles
[J]. Computer Engineering and Applications, 2016, 52(12): 31-36.
|