[1] |
JING Qingyang, LI Bo.
Optimized Kernel Correlation Filter Approach Combined with Improved Corner Detection
[J]. Computer Engineering and Applications, 2021, 57(18): 194-203.
|
[2] |
CAO Guanghui, ZHANG Xing, JIA Xu.
Image encryption with variable-length running key based on chaotic theory
[J]. Computer Engineering and Applications, 2017, 53(13): 1-8.
|
[3] |
LIU Bingbing1, ZHOU Weiping1, SHEN Ling2.
Intelligent global optimization method for grey linear bilevel assignment problems
[J]. Computer Engineering and Applications, 2016, 52(8): 38-42.
|
[4] |
LI Guo1, HONG Xudong2, XU Jian1, HUANG Han2.
Evolutionary algorithm based on matrix coding for nurse assignment problem
[J]. Computer Engineering and Applications, 2015, 51(4): 244-248.
|
[5] |
ZHU Mingfang1,2, YE Feiyue1,2, DING Xiaowei2.
Solving algorithm of task assigned problem using gene expression programming
[J]. Computer Engineering and Applications, 2014, 50(22): 50-53.
|
[6] |
MA Qinqin, GUO Qiang, FU Xiaowei.
Precise algorithm of bi-objective assignment problem based on multi-stage
[J]. Computer Engineering and Applications, 2014, 50(21): 44-47.
|
[7] |
WANG Zicheng1,2, ZHAO Xiaohang1, WANG Hong1, CUI Guangzhao1,2.
One-time-pad cryptography algorithm based on DNA cryptography
[J]. Computer Engineering and Applications, 2014, 50(15): 97-100.
|
[8] |
WANG Gaining, WU Zhenqiang, MA Yalei, SHAO Zhiyi.
Secure network coding model on low bandwidth network
[J]. Computer Engineering and Applications, 2012, 48(11): 93-96.
|
[9] |
ZHU Jingwei,RUI Ting,JIANG Xinsheng,ZHANG Jinlin.
Simulated annealing ant colony algorithm for QAP
[J]. Computer Engineering and Applications, 2011, 47(14): 34-36.
|
[10] |
YANG Jiaoping1,GAO Leifu2,WANG Jun2.
Multiple enterprise alliance vehicle routing problem with backhauls and a two-phase approach
[J]. Computer Engineering and Applications, 2011, 47(14): 217-221.
|
[11] |
ZHANG Xiao-hong1,2,FAN Zhong-kui1,ZHONG Xiao-yong3.
Double identity authentication system of one-time pad based on Schnorr protocol
[J]. Computer Engineering and Applications, 2010, 46(19): 81-84.
|
[12] |
SONG Xiao-yu1,WANG Rui1,2,SUN Huan-liang1.
Group-query algorithm of framework for kNN query based on P2P system
[J]. Computer Engineering and Applications, 2009, 45(9): 151-153.
|
[13] |
LI Yan,GUO Qiang.
Algorithm for uncertainty assignment problem
[J]. Computer Engineering and Applications, 2009, 45(15): 61-63.
|
[14] |
LIU Gui-hai,ZHANG Jing,LI Jun-huai.
Research and application on 3-dimensional Vigenere cipher based on dual key
[J]. Computer Engineering and Applications, 2008, 44(12): 127-129.
|
[15] |
ZHANG Cui-jun,ZOU Hui,ZHANG You-hua.
Hybrid ant colony algorithm based on quadratic assignment problem
[J]. Computer Engineering and Applications, 2008, 44(10): 37-39.
|