[1] |
LU Wenxing, WANG Hupo, WANG Binyou.
Research on Tourist Diversion in Scenic Spots Based on Timed Petri Net
[J]. Computer Engineering and Applications, 2020, 56(8): 241-248.
|
[2] |
YUAN Shunjie, CHENG Hui, YE Zhencheng, CHENG Peixin.
Application of SOM-T2 FLS in Stock Market Forecasting
[J]. Computer Engineering and Applications, 2020, 56(7): 130-136.
|
[3] |
FENG Fujian.
Verification Analysis for Delay Time Petri Nets
[J]. Computer Engineering and Applications, 2019, 55(4): 72-78.
|
[4] |
DENG Liping1, DUAN Liguo2, YANG Lifeng2.
Trust and Behavioral Method Based Web Services Selection
[J]. Computer Engineering and Applications, 2019, 55(4): 112-118.
|
[5] |
LI Haiyan1, WANG Yanping1, ZHOU Jianyong2, LIU Jiufu2.
Design of deadlock supervisor of partially controllable Petri nets
[J]. Computer Engineering and Applications, 2018, 54(8): 48-54.
|
[6] |
DONG Jian, DAI Shenghua.
Modeling and formal analysis of level transition based on colored Petri nets
[J]. Computer Engineering and Applications, 2018, 54(2): 208-213.
|
[7] |
WANG Liewei, WU Shuo, HU Junhua.
Modelling and comparisons of traffic intersections based on Petri nets
[J]. Computer Engineering and Applications, 2018, 54(14): 211-216.
|
[8] |
WANG Lunlei, WU Hongbo.
Annihilator operators and[⊕]ideals of IMTL-algebra with their relationships
[J]. Computer Engineering and Applications, 2017, 53(9): 57-62.
|
[9] |
LI Qing, ZHENG Lixin, PAN Shuwan, ZHANG Yukun, XIE Yishou.
Method of mobile robot navigation using monocular vision
[J]. Computer Engineering and Applications, 2017, 53(4): 223-227.
|
[10] |
GAO Zhifang, SHENG Guanshuai, PENG Dinghong.
Information security risk assessment method based on compromise rate method
[J]. Computer Engineering and Applications, 2017, 53(23): 82-87.
|
[11] |
SHI Xiaojing, ZHANG Xingfang.
Comparing of probabilistic logic, uncertain logic and fuzzy logic
[J]. Computer Engineering and Applications, 2017, 53(12): 50-52.
|
[12] |
WANG Xiaoxiao1, DU Yongqian1, YE Jianhong1,2, SUN Shixin3.
High security entrance guard system for bank vaults based on workflow net
[J]. Computer Engineering and Applications, 2016, 52(8): 221-228.
|
[13] |
ZHOU Jianren1,2, WU Hongbo2.
Syntactic proof of equivalence between [BL?] system and IMTL system
[J]. Computer Engineering and Applications, 2016, 52(5): 41-46.
|
[14] |
CHEN Yun1,2, SHI Song1,2, PAN Yan1,2, YU Li2.
Hybrid ensemble approach for credit risk assessment based on SVM
[J]. Computer Engineering and Applications, 2016, 52(4): 115-120.
|
[15] |
HAO Jialiang, ZHOU Kuanjiu, HOU Gang, JIANG Haiyang, GUO Cheng.
Capability and risk analysis of wartime logistics center using queueing Petri nets
[J]. Computer Engineering and Applications, 2016, 52(21): 263-270.
|