[1] |
WANG Bingnan1, LI Bin1, LIU Shuangchun2,3, TIAN Lianfang1, WANG Lifei4.
Development and design of computer-aided system for quantitative analysis of pulmonary function
[J]. Computer Engineering and Applications, 2018, 54(13): 224-230.
|
[2] |
WANG Xueli1, ZHANG Xuan1,3, LI Tong1,3, WANG Xu2.
Method of risk assessment oriented to trustworthy software
[J]. Computer Engineering and Applications, 2016, 52(19): 97-101.
|
[3] |
CHEN Yu, WANG Yadi, WANG Jindong, WANG Kun.
Method for information system risk management based on Markov logic networks
[J]. Computer Engineering and Applications, 2016, 52(18): 104-110.
|
[4] |
HUANG Yingyi1, LIU Wenqi2.
Survivability analysis of logistics network based on cascading failure
[J]. Computer Engineering and Applications, 2015, 51(21): 12-17.
|
[5] |
XIE Hongtao.
Quantitative analysis method of schedule risk in construction projects based on Bayesian Belief Networks
[J]. Computer Engineering and Applications, 2014, 50(9): 258-263.
|
[6] |
LU Xinyuan, GAO Peiran, ZHOU Xi.
Research of algorithm for risk rule mining based on rough set and classification consistency—using the risk of knowledge transfer in IT outsourcing as an example
[J]. Computer Engineering and Applications, 2013, 49(6): 217-220.
|
[7] |
FU Yun.
DSM-based risk assessment of software requirement change propagation
[J]. Computer Engineering and Applications, 2012, 48(29): 22-28.
|
[8] |
XIAO Le1,2, WU Xianglin1, ZHEN Tong2.
Research of grain emergency path optimization based on adaptive chaos-based Ant Colonies Optimization algorithm
[J]. Computer Engineering and Applications, 2012, 48(24): 28-31.
|
[9] |
ZHANG Li1, ZHANG Ning2, LI Zhinan1.
Survivable routing strategy in IP over WDM networks
[J]. Computer Engineering and Applications, 2012, 48(18): 81-83.
|
[10] |
TANG Ai-guo1,WANG Ru-long2,HU Chun-hua1.
Application of Bayesian networks in software project risk assessment
[J]. Computer Engineering and Applications, 2010, 46(7): 62-65.
|
[11] |
XU Gong-hua,ZHANG Shen.
Highly survivable storage grid model
[J]. Computer Engineering and Applications, 2010, 46(26): 91-94.
|
[12] |
YANG Yang,YAO Shu-zhen.
Risk assessment method of information security based on threat analysis
[J]. Computer Engineering and Applications, 2009, 45(3): 94-96.
|
[13] |
FAN Min 1,2,ZOU Ping2,ZHU Xing-dong1.
Method of rough set and AHP theory in IT project risk group decision making
[J]. Computer Engineering and Applications, 2009, 45(21): 226-228.
|
[14] |
XIAO Zhi-li1,HE Ming2,3,XIAO Deng-hai2,ZHOU Zhi-jie1.
Research on evaluating survivability of network information systems
[J]. Computer Engineering and Applications, 2009, 45(14): 18-21.
|
[15] |
SHAN Zhi-yong1,2,3,SHI Wen-chang2,3,LIANG Bin1,2,3,MENG Xiao-feng1,2.
Access control model for enhancing survivability
[J]. Computer Engineering and Applications, 2008, 44(35): 1-4.
|