[1] |
YAO Yiwen, JIANG Shujuan, BO Lili.
Survey of Mutation-Based Fault Location
[J]. Computer Engineering and Applications, 2019, 55(20): 1-12.
|
[2] |
ZHOU Liangze1, ZHOU Tingting2.
New theory that the first bit of machine number complement code is a number bit instead of a sign bit of data
[J]. Computer Engineering and Applications, 2018, 54(14): 56-64.
|
[3] |
SANG Hongqiang1,2, CHEN Fa1, LIU Fen1, YANG Chenghao1, XU Liping1.
Branch analysis method for kinematics of steel cable-driven robot
[J]. Computer Engineering and Applications, 2017, 53(4): 45-50.
|
[4] |
ZHANG Rongguang, HU Xiaohui, ZONG Yongsheng.
Discretization of continuous attributes based on improved discrete particle swarm optimization
[J]. Computer Engineering and Applications, 2017, 53(18): 108-114.
|
[5] |
ZHANG Gongjie1,2, XIE Chunli2.
Equivalent mutant analysis in weak mutation testing
[J]. Computer Engineering and Applications, 2017, 53(12): 21-24.
|
[6] |
GUO Caiping1,2,3, SHU Huazhong4, GUI Zhiguo1, 2, ZHANG Pengcheng1,2.
Improvement based on regularization for building hybrid criteria model of radiotherapy planning
[J]. Computer Engineering and Applications, 2017, 53(1): 23-28.
|
[7] |
WU Binghai1, SONG Yuanbin1, GUO Weidong2.
Vehicle scheduling problem for plants under line-pickup mode
[J]. Computer Engineering and Applications, 2016, 52(4): 223-228.
|
[8] |
LI Junyu1,2,WANG Xia1,2.
Decision reduction for object oriented concept lattices
[J]. Computer Engineering and Applications, 2016, 52(18): 154-157.
|
[9] |
XIE Xin1,2, LIU Fenlin1,2, LU Bin1,2, XIANG Fei1,2.
Virtual machine protection based on Handler obfuscation enhancement
[J]. Computer Engineering and Applications, 2016, 52(15): 146-152.
|
[10] |
QIU Tingting, LI Kedian.
μ-Reduction based on objects in inconsistent objective random information systems
[J]. Computer Engineering and Applications, 2016, 52(10): 75-79.
|
[11] |
NIE Wenyan1, WANG Zhonggen2.
Analysis of electromagnetic scattering characteristics from conducting targets using Adaptive Cross Approximation algorithm
[J]. Computer Engineering and Applications, 2015, 51(4): 232-234.
|
[12] |
QIN Huani.
Quotient space based on intuitionistic fuzzy set
[J]. Computer Engineering and Applications, 2015, 51(2): 21-25.
|
[13] |
YANG Hui1, ZHAO Lancao1, MENG Fanxing2.
Application of rough set theory to QAR data
[J]. Computer Engineering and Applications, 2014, 50(5): 227-233.
|
[14] |
HOU Lijuan, SHI Changqiong.
Discretization algorithm based on binary discernibility matrix
[J]. Computer Engineering and Applications, 2014, 50(21): 214-217.
|
[15] |
CHEN Wei1,2, XU Feng1,2.
Backup-service-based developing model of workflow with high reliability
[J]. Computer Engineering and Applications, 2013, 49(7): 39-44.
|