[1] |
WANG Ping-shui.
Research on association rules mining algorithm
[J]. Computer Engineering and Applications, 2010, 46(30): 115-116.
|
[2] |
WANG Zheng-fei1,2,WANG Wei3,SHI Bo-le3.
Design and implementation of encrypted data in outsourced database
[J]. Computer Engineering and Applications, 2010, 46(28): 141-145.
|
[3] |
YIN Li-feng1,HAO Zhong-xiao1,2.
Inference rules for XML strong multivalued dependencies based on XML Schema
[J]. Computer Engineering and Applications, 2010, 46(28): 152-156.
|
[4] |
GUO Xue-feng,HUANG Hui-xian,TANG Hong-zhong.
Application of step-by-step filtering on short-term traffic flow prediction
[J]. Computer Engineering and Applications, 2010, 46(27): 217-219.
|
[5] |
ZHAO Er-feng1,2,JIN Yi1,2,YANG Yang1,2,LI Jian-jun1,2.
Multi-dimensional data model design about dam safety monitoring system
[J]. Computer Engineering and Applications, 2010, 46(25): 231-234.
|
[6] |
MENG Cai-xia.
Research on mining frequent itemsets in data streams
[J]. Computer Engineering and Applications, 2010, 46(24): 138-140.
|
[7] |
JIANG Qun,WANG Yue,YAN He.
Research on optimizing dynamic pricing based on evolutionary computation techniques
[J]. Computer Engineering and Applications, 2010, 46(24): 229-232.
|
[8] |
SONG Guang-jun1,2,HAO Zhong-xiao1,3,WANG Li-jie2.
Research on indexing of moving objects in road networks
[J]. Computer Engineering and Applications, 2010, 46(22): 157-161.
|
[9] |
DUAN Ming-xiu.
Improved CLARA clustering algorithm based on SOFM algorithm
[J]. Computer Engineering and Applications, 2010, 46(22): 210-212.
|
[10] |
QIU Bao-zhi,JU Chang-tao.
Study of boundary detecting technique with clustering
[J]. Computer Engineering and Applications, 2010, 46(20): 133-137.
|
[11] |
XIANG Jun.
Scheduling algorithms of real-time transactions based on traversing a directed acyclic graph
[J]. Computer Engineering and Applications, 2010, 46(19): 135-137.
|
[12] |
ZHANG Yue-qin.
Algorithm for mining frequent itemsets from sliding window over data streams
[J]. Computer Engineering and Applications, 2010, 46(16): 132-134.
|
[13] |
SUN Dong-pu1,HAO Zhong-xiao1,2.
Survey on variant of nearest neighbor queries in spatio-temporal database
[J]. Computer Engineering and Applications, 2010, 46(14): 12-16.
|
[14] |
ZHU Xing-hui1,ZHANG Lin-feng1,TIAN Li2.
Communication efficient threshold monitoring method for large-scaled distributed systems
[J]. Computer Engineering and Applications, 2010, 46(14): 98-102.
|
[15] |
ZHOU Li-juan,SHI Qian,GE Xue-bin,WANG Lin-shuang.
Cluster-based evaluation in fuzzy-genetic data mining
[J]. Computer Engineering and Applications, 2010, 46(13): 118-121.
|