[1] |
LI Donghao, YANG Wenzhong, ZHONG Lijun, ZHANG Zhihao, WANG Xueying.
Bursty Event Detection Method Based on Key Microblog
[J]. Computer Engineering and Applications, 2020, 56(4): 175-183.
|
[2] |
LIU Cong, WANG Yongli, ZHOU Zitao, YOU Feng, ZHANG Caijun.
Sensitive Information Recognition Method Combining Trigger Event and Part of Speech Analysis
[J]. Computer Engineering and Applications, 2020, 56(20): 132-137.
|
[3] |
HU Wei1,2, ZENG Bin1, YAO Lu1.
Algorithm on deployment of monitoring station focused on key sea area driven by events
[J]. Computer Engineering and Applications, 2017, 53(7): 136-140.
|
[4] |
LIU Hui1, ZHANG Zhenyu1,2, YANG Wenzhong2, WU Xiaohong2.
Routing algorithm based on attribute of sociality of node in opportunistic networks
[J]. Computer Engineering and Applications, 2017, 53(22): 92-96.
|
[5] |
LV Junling, SONG Hui, HE Zhili, PAN Daru.
Survey of research on node’s selfish behavior in opportunistic networks
[J]. Computer Engineering and Applications, 2017, 53(18): 7-16.
|
[6] |
ZHANG Dan, LIN Yaguang, ZHANG Shanshan, LI Peng, WANG Xiaoming.
The impact of fragment size on forwarding of multimedia messages in opportunistic networks
[J]. Computer Engineering and Applications, 2016, 52(1): 71-75.
|
[7] |
LI Yongtao, ZHU Xiaosong, DUN Peng.
Improved routing approach based on LTP-RSS in opportunistic networks
[J]. Computer Engineering and Applications, 2014, 50(3): 55-58.
|
[8] |
SONG Manman, ZHANG Zhenyu, YANG Wenzhong, ZHANG Zhen.
Repeated-game model of node cooperation in opportunistic networks
[J]. Computer Engineering and Applications, 2014, 50(16): 86-89.
|
[9] |
HE Ming1, CHEN Guohua1,2, YANG Fei1, LIANG Wenhui1, WANG Qiuyang3.
Novel MAWN reliability evaluation method in 3D environment
[J]. Computer Engineering and Applications, 2013, 49(23): 67-70.
|
[10] |
WANG Yan1,2, LE Jiajin3, JIANG Jiulei1, ZHANG Yun2.
Research on multi-dimensional uncertainty data model based on XML
[J]. Computer Engineering and Applications, 2013, 49(23): 91-94.
|
[11] |
LI Xianjie, ZHOU Kuanjiu, WANG Jie, HOU Gang, CUI Kai.
Genetic algorithm-based approach to embedded software WCSD test
[J]. Computer Engineering and Applications, 2012, 48(36): 58-63.
|
[12] |
NING Ruifang,OUYANG Ning,MO Jianwen.
Detection of gathering events based on optical flow
[J]. Computer Engineering and Applications, 2012, 48(3): 198-201.
|
[13] |
ZHENG Jinfeng1,HE Jun1,ZHOU Hongxia2,LIU Zhong3,GUO Wensheng4.
Research of RSSI-PROPHET routing algorithm of opportunistic networks
[J]. Computer Engineering and Applications, 2011, 47(35): 106-109.
|
[14] |
LI Xue1,SHU Ning2,WANG Yan2,LI Liang2.
Research of change detection using state transition matrix
[J]. Computer Engineering and Applications, 2011, 47(32): 144-147.
|
[15] |
GAN Liang,LIU Donghong,JIA Yan,HAN Weihong.
StreamQCTree:efficient compression structure for streamcube
[J]. Computer Engineering and Applications, 2011, 47(19): 140-143.
|