[1] |
YANG Quan.
SVM Algorithm for N1+N2 Structure Syntax Relation Determination
[J]. Computer Engineering and Applications, 2021, 57(20): 104-108.
|
[2] |
GAO Jian, WANG An.
Research on Ontology-Based Network Threat Intelligence Analysis Technology
[J]. Computer Engineering and Applications, 2020, 56(11): 112-117.
|
[3] |
LI Jinhai, HE Youshi, MA Yunlei, ZHOU Aiping.
Research of Universal Model for Knowledge Representation Based on Multi-layer Domain Ontology
[J]. Computer Engineering and Applications, 2020, 56(11): 149-155.
|
[4] |
DENG Liping1, DUAN Liguo2, YANG Lifeng2.
Trust and Behavioral Method Based Web Services Selection
[J]. Computer Engineering and Applications, 2019, 55(4): 112-118.
|
[5] |
JIA Zhichun, LU Yuan, LI Xiang, XING Xing.
Multi-Parameter Web Services Selection Method
[J]. Computer Engineering and Applications, 2019, 55(21): 74-78.
|
[6] |
WANG Siyu, HE Jingsha, TENG Da.
Access Control System Supporting Quantification and Protection of Privacy Information
[J]. Computer Engineering and Applications, 2019, 55(16): 77-87.
|
[7] |
QU Hanhua1, HUI Jianzhong1, HE Xianfeng2, WANG Muhua1, HE Xiaofeng1, FENG De’en1.
Formal concept analysis model of meteorological services
[J]. Computer Engineering and Applications, 2018, 54(9): 257-264.
|
[8] |
YOU Yun1,2,3, WAN Changxuan1,3, CHEN Huangye1,3.
Diversified commodity recommendation method considering correlation between objects
[J]. Computer Engineering and Applications, 2018, 54(7): 70-76.
|
[9] |
WANG Zhen.
Engineering change impact analysis based on design knowledge ontology
[J]. Computer Engineering and Applications, 2018, 54(5): 247-252.
|
[10] |
ZHANG Mengke1, LI Bing1,3, WANG Jian2.
Empirical comparisons between SOAP and REST Web services conducted in multiple geographical locations
[J]. Computer Engineering and Applications, 2018, 54(4): 1-8.
|
[11] |
WANG Liang1,2, GUO Xing1,2.
Large-scale service portfolio optimization based on Cauchy fireworks algorithm
[J]. Computer Engineering and Applications, 2018, 54(24): 34-40.
|
[12] |
ZHU Wenyue,LIU Zongtian.
Emergency domain knowledge modeling based on event ontology
[J]. Computer Engineering and Applications, 2018, 54(21): 148-155.
|
[13] |
TAN Zhaowen, ZONG Rong, XI Xianqiang, WU Hao.
QoS prediction based on Bayesian tensor decomposition
[J]. Computer Engineering and Applications, 2018, 54(20): 74-79.
|
[14] |
PENG Fei1, ZHANG Tao1, XU Weiguang1, ZHAO Min1, QIN Hengjia2.
Security policy generation model of operating system based on ontology
[J]. Computer Engineering and Applications, 2018, 54(2): 114-118.
|
[15] |
XIN Yuanyuan, NIU Jun, XIE Zhijun, ZHANG Kaile, MAO Xinyi.
Survey of implementation framework for microservices architecture
[J]. Computer Engineering and Applications, 2018, 54(19): 10-17.
|