[1] |
YE Yingshi, WEI Fuyi, CAI Xianzi.
Research on Fast Dijkstra Algorithm Based on Parallel Computing
[J]. Computer Engineering and Applications, 2020, 56(6): 58-65.
|
[2] |
DENG Youwei1, YANG Yongjian1, PENG Zhiying1, GAN Yi1, MA Jian1, HUANG Boru2.
Improved Strategies of Species Explode and Deracinate Algorithm
[J]. Computer Engineering and Applications, 2019, 55(3): 55-60.
|
[3] |
GAO Guibing1, YUE Wenhui2, ZHANG Daobing1.
Optimizing production equipment layout based on fuzzy decision and evolutionary algorithm
[J]. Computer Engineering and Applications, 2017, 53(17): 241-248.
|
[4] |
LIU Huanyu, YU Xiaoguang.
Algorithm integrates multi-heuristic rules with particle swarm optimization for spatial resource constrained project scheduling
[J]. Computer Engineering and Applications, 2016, 52(22): 226-231.
|
[5] |
MIN Liang1, SHAO Liangshan2, ZHAO Yonggang1.
Community detection based on node similarity
[J]. Computer Engineering and Applications, 2015, 51(9): 77-81.
|
[6] |
YANG He1,2, ZHOU Guohua1, LIN Ren1,3.
Research of influence factors on computing time in interval project scheduling problems
[J]. Computer Engineering and Applications, 2015, 51(23): 11-16.
|
[7] |
CHEN Jinguang1,2, SUN Rui1, MA Lili1, ZHAO Yinyin1.
Influence analysis of elementary symmetric function on implementing efficiency of GM-CPHD filter
[J]. Computer Engineering and Applications, 2015, 51(13): 206-210.
|
[8] |
LI Wen, LI Hecheng.
Multi-objective evolutionary algorithm based on space-gridding scheme
[J]. Computer Engineering and Applications, 2014, 50(8): 53-56.
|
[9] |
HAN Yi1,2,3, CAI Jianhu1,2,3, LI Yanlai4, ZHOU Lisheng1.
Presentation of computational results from evolutionary algorithms
[J]. Computer Engineering and Applications, 2012, 48(5): 35-36.
|
[10] |
PANG Shan1, YANG Xinyi2, SU Qingtang1.
Dynamic diversity preservation strategy for multi-objective evolutionary algorithms
[J]. Computer Engineering and Applications, 2012, 48(2): 48-52.
|
[11] |
HE Yan1,REN Ping’an1,2,MA Janfeng2.
Novel detecting method for DRDoS attack
[J]. Computer Engineering and Applications, 2011, 47(6): 119-121.
|
[12] |
NIE Jian,ZHENG Jinhua,XIE Zhunzhi,ZOU Juan.
Research on evolutionary algorithm with noisy fitness based on Fourier space transform
[J]. Computer Engineering and Applications, 2011, 47(28): 33-37.
|
[13] |
ZHANG Shengdong,SHEN Rui.
DOS attacks in publish/subscribe systems
[J]. Computer Engineering and Applications, 2011, 47(25): 26-29.
|
[14] |
DENG Chang-chun.
Routing method based on quantum evolutionary algorithm
[J]. Computer Engineering and Applications, 2010, 46(23): 103-105.
|
[15] |
ZHANG Hai-jun1,2,3,DING Xi-yuan2,ZHU Chao-yong2,3.
Improved sort method for Chinese strings
[J]. Computer Engineering and Applications, 2010, 46(19): 129-131.
|