[1] |
ZHOU Ruimin, LI Hui.
Path Planning of Mobile Robot Based on Improved Dynamic Programming Algorithm
[J]. Computer Engineering and Applications, 2020, 56(21): 20-24.
|
[2] |
CHEN Junjie, TONG Shurong, NIE Yafei, ZHANG Jingwen.
R&D Program Scheduling and Staff Assignment with Hierarchical Levels of Competency
[J]. Computer Engineering and Applications, 2019, 55(3): 209-218.
|
[3] |
WANG Fei, CHEN Ming.
Identity-Based Multi-Proxy Multi-Signature Scheme in Standard Model
[J]. Computer Engineering and Applications, 2019, 55(18): 67-74.
|
[4] |
TAN Yuesheng, ZHANG Shiyang, WANG Jingyu.
CP-ABE Attribute Revocation Scheme Based on Multi-Authorization Centers
[J]. Computer Engineering and Applications, 2019, 55(13): 78-84.
|
[5] |
LIAN Wei.
Globally Optimal Shape Matching Algorithm Using Tree Representation
[J]. Computer Engineering and Applications, 2019, 55(1): 217-225.
|
[6] |
ZHANG Yu, CUI Yaodong, LIANG Zehua.
Two-dimensional cutting stock problem of multiple logs
[J]. Computer Engineering and Applications, 2018, 54(19): 266-270.
|
[7] |
XIAO Hongde.
Calculation of minimum count of money and determination of money denomination
[J]. Computer Engineering and Applications, 2018, 54(16): 266-270.
|
[8] |
SONG Dongyun, ZHENG Jin, ZHANG Zuping.
Chinese short text similarity computation based on hybrid strategy
[J]. Computer Engineering and Applications, 2018, 54(12): 116-120.
|
[9] |
GE Lixia1, LI Xiao1, HE Mingxing2, LI Yarong1, LIU Xiaojian2.
Improved certificateless proxy signature scheme
[J]. Computer Engineering and Applications, 2017, 53(8): 92-94.
|
[10] |
WANG Yonggui1, ZHANG Yan1, YANG Dongdong2.
Research on algorithm of community discovery of wireless city based on MapReduce
[J]. Computer Engineering and Applications, 2017, 53(4): 106-112.
|
[11] |
SHANG Yufang, LIANG Xiangqian, SUN Yiru.
Identity-based proxy re-signature over ideal lattice
[J]. Computer Engineering and Applications, 2017, 53(21): 110-114.
|
[12] |
XU Hailin1, LU Yang2.
Efficient certificate-based proxy re-encryption scheme
[J]. Computer Engineering and Applications, 2017, 53(14): 80-86.
|
[13] |
YI Ting, DU Weizhang.
Forward secure threshold proxy signature scheme with designated verifier
[J]. Computer Engineering and Applications, 2017, 53(10): 101-106.
|
[14] |
TIAN Juanhong, ZHANG Jianzhong, LI Yanping.
Robust multi-proxy multi-blind signature scheme
[J]. Computer Engineering and Applications, 2017, 53(1): 130-133.
|
[15] |
ZOU Changzhi.
Identity-based multi-proxy signature without bilinear pairings
[J]. Computer Engineering and Applications, 2016, 52(9): 96-101.
|