[1] |
GUO Na, WANG Tianmiao, HU Lei, LIU Hongsheng, WANG Yuhan, YU Guoxin, SONG Xiongkang, GENG Baoduo, YANG Biao.
Human-Computer Interaction Technology for ACL Reconstruction Surgical Navigation System Based on AR
[J]. Computer Engineering and Applications, 2020, 56(21): 224-230.
|
[2] |
WANG Xiaoqiang, WANG Dong.
Fuzzy analytic network process for software demand weight
[J]. Computer Engineering and Applications, 2018, 54(10): 39-45.
|
[3] |
WEI Zhenglei1, ZHAO Hui1, HAN Bangjie2, ZHOU Huan1.
Research on cooperative attack decision of Unmanned Combat Aerial Vehicles using self-adaptive Grey Wolf Optimization
[J]. Computer Engineering and Applications, 2016, 52(18): 257-261.
|
[4] |
SHENG Bowen, YU Ying.
Sub-modular sparse representation algorithm for face recognition
[J]. Computer Engineering and Applications, 2016, 52(11): 196-199.
|
[5] |
ZHANG Liumei1,2, MA Jianfeng1, WANG Yichuan1.
Virtual machine migration recommendation for green cloud computing
[J]. Computer Engineering and Applications, 2014, 50(20): 30-35.
|
[6] |
WANG Jinyan, CHEN Weibing, ZHOU Ying, GUO Debiao.
Study of improved prioritizing algorithm based on triangular fuzzy number reciprocal judgment matrix
[J]. Computer Engineering and Applications, 2014, 50(19): 214-216.
|
[7] |
ZHAN Haomin, YIN Guisheng, WANG Shuyin, WANG Hongbin.
Method of prioritizing requirements based on SAHP and requirement patterns
[J]. Computer Engineering and Applications, 2013, 49(3): 15-19.
|
[8] |
JIA Yanhua, MO Rong, YANG Haicheng, WANG Weizhen.
Model for case retrieval in CBR system based on extenics
[J]. Computer Engineering and Applications, 2013, 49(2): 258-260.
|
[9] |
LI Xianghua, WANG Mengjun.
Decision model of project financing based on triangular fuzzy AHP
[J]. Computer Engineering and Applications, 2012, 48(11): 243-248.
|
[10] |
GUO Zhiming,MO Rong,SUN Huibin,CHANG Zhiyong.
Collaborative manufacturing task assignment based on modified Genetic Simulated Annealing algorithm
[J]. Computer Engineering and Applications, 2011, 47(14): 210-213.
|
[11] |
GUO Xiquan1,2,LUO Weiqi1,YAO Guoxiang1.
Integrated evaluation method for information security management measurement
[J]. Computer Engineering and Applications, 2011, 47(10): 75-77.
|
[12] |
YANG Li1,2,LI Nan2.
Application of FAHP in software project risk prioritization
[J]. Computer Engineering and Applications, 2010, 46(30): 65-67.
|
[13] |
LI Chong,YANG Zong-xiao,SONG Lei.
Construction and application of synthetic safety assessment model for power plants
[J]. Computer Engineering and Applications, 2010, 46(2): 230-233.
|
[14] |
MA Zong-da1,LAN Yu-qing1,GUO Shu-hang2.
Recognition method of remarkable reuse influential factors about software engineering knowledge
[J]. Computer Engineering and Applications, 2009, 45(5): 78-81.
|
[15] |
WANG Li-ping1,LI Duo-quan2.
Based on AHP method to compute credit score of telecommunication users
[J]. Computer Engineering and Applications, 2008, 44(32): 232-236.
|