[1] |
XU Xiaoyuan, LI Haibo, HUANG Li.
Convex Optimization Analysis of Joint Delay Tail Probability of Multi-heterogeneous Files in Cloud Storage
[J]. Computer Engineering and Applications, 2021, 57(5): 88-94.
|
[2] |
HUI Hui, GOU Bo, WANG Ying.
Secure Transmission Scheme for Successive Relaying Networks Under Eavesdropping Environment
[J]. Computer Engineering and Applications, 2021, 57(4): 77-82.
|
[3] |
JIANG Bin, LIANG Xiao’an, ZHANG Liang, GAO Yangjun.
Evidence Combination Method Based on Improved Modified Weight
[J]. Computer Engineering and Applications, 2021, 57(24): 100-106.
|
[4] |
MEI Jie, WEI Yuanyuan, XU Taosheng.
Fusion Clustering Algorithm Based on Multi-Prototypes Using Density Peaks
[J]. Computer Engineering and Applications, 2021, 57(22): 78-85.
|
[5] |
WANG Yingbo, SUN Yongdi.
GNN-Based Matrix Factorization Recommendation Algorithm
[J]. Computer Engineering and Applications, 2021, 57(19): 129-134.
|
[6] |
ZHU Yongming, QIU Wenjing.
Correlation Coefficient of Probability Multi-valued Neutrosophic Set and Its Application
[J]. Computer Engineering and Applications, 2021, 57(15): 186-192.
|
[7] |
DAN Yufang, TAO Jianwen, XU Haote.
Semi-Supervised Classification Method of Possibilistic Clustering Assumption
[J]. Computer Engineering and Applications, 2020, 56(9): 65-74.
|
[8] |
PENG Jiayin.
Controlled Bidirectional Remote Quantum Control
[J]. Computer Engineering and Applications, 2020, 56(9): 117-124.
|
[9] |
LU Junjie, HUANG Jinquan, LU Feng.
Likelihood K-means Clustering for Gas Path Failure Diagnostics of Turbofan Engine
[J]. Computer Engineering and Applications, 2020, 56(9): 136-141.
|
[10] |
WANG Wenhui, LI Peng, HU Yundi.
Measurement Set Partitioning Algorithm for Extended Target Based on Target Prediction
[J]. Computer Engineering and Applications, 2020, 56(8): 143-148.
|
[11] |
WANG Qi, XUE Hong, CHEN Maomao.
Simulation of Ruin Probability for Risk Model Perturbed by Fractional Brown Motion
[J]. Computer Engineering and Applications, 2020, 56(8): 215-219.
|
[12] |
XU Xinjian, QIU Runhe.
Physical Layer Security of Cognitive Relay Network
[J]. Computer Engineering and Applications, 2020, 56(6): 79-85.
|
[13] |
CHEN Xin, GAO Liangjun, REN Chuanbao, YI Maoxiang, HUANG Zhengfeng.
Hardware Trojan Detection Based on Transition Probability and RO Structure
[J]. Computer Engineering and Applications, 2020, 56(3): 49-54.
|
[14] |
MA Yuandong, LUO Zijiang, NI Zhaofeng, XU Bin, WU Fengjiao, SUN Shouyu, YANG Xiuzhang.
Multi-target Detection Based on Improved SSD Algorithm
[J]. Computer Engineering and Applications, 2020, 56(23): 23-30.
|
[15] |
ZHOU Fei, LUO Xiaoyong, LIU Yunping.
Real-Time Correction of IMM Target Tracking Algorithm Based on Probability Model
[J]. Computer Engineering and Applications, 2020, 56(21): 85-92.
|