[1] |
GUO Xuekun, QIN Yuanhui, DU Liang, LUO Yongliang, WANG Hongan.
Flight Deck Aviation Support Job Detection Based on Multi-entity Bayesian Networks
[J]. Computer Engineering and Applications, 2021, 57(1): 242-253.
|
[2] |
CHEN Haiyang, LIU Xiqing, HUAN Xiaomin.
One-step Prediction SVDDBN Missing Data Interpolation Algorithm
[J]. Computer Engineering and Applications, 2020, 56(7): 81-87.
|
[3] |
ZHENG Wei, HOU Hongxu, BAN Zhijie.
Expert Finding Method Using Baysian Network on Query Semantic Extension
[J]. Computer Engineering and Applications, 2020, 56(13): 194-198.
|
[4] |
GAO Ang, DUAN Li, ZHANG Guohui, DONG Zhiming, CAO Jie, GUO Qisheng.
Development Status of Computer Generated Force Behavior Modeling
[J]. Computer Engineering and Applications, 2019, 55(19): 43-51.
|
[5] |
YAN Zhi, ZHANG Peng, XIE Chuan.
Research on Bayesian Network Structure Learning Algorithm Based on Jaya
[J]. Computer Engineering and Applications, 2019, 55(19): 173-177.
|
[6] |
YANG Wenxia, WANG Zheng, LI Na, MA Jianfen.
Security Analysis and Improvement of Lightweight Mobile Payment Protocol LMPP
[J]. Computer Engineering and Applications, 2019, 55(16): 88-93.
|
[7] |
CAI Qingsong, CHEN Xihou.
Bayesian Network Structure Merging Algorithm Based on Scoring Function
[J]. Computer Engineering and Applications, 2019, 55(11): 147-152.
|
[8] |
LI Qian1, WANG Zheng1, MA Jianfen1, LI Na2.
Lightweight mobile payment protocol fairness analysis
[J]. Computer Engineering and Applications, 2018, 54(19): 82-87.
|
[9] |
GUO Wenqiang, GAO Wenqiang, HOU Yongyan, LI Ran.
Target recognition based on BN parameter learning under scarce data set
[J]. Computer Engineering and Applications, 2018, 54(17): 122-125.
|
[10] |
ZHU Xuetong1, QIAN Xiujuan2, SUN Weiwei1, HOU Xianchun1, CHEN Guangsheng3, WANG Yongli4.
Analysis method of heart disease for pervasive health monitoring
[J]. Computer Engineering and Applications, 2018, 54(1): 159-165.
|
[11] |
WANG Dong1,2, CHEN Zhi1, YUE Wenjing3, LIU Yawei1.
Trust-driven recommendation method using Bayesian network in social networks
[J]. Computer Engineering and Applications, 2017, 53(9): 146-151.
|
[12] |
GAO Zhifang, SHENG Guanshuai, PENG Dinghong.
Information security risk assessment method based on compromise rate method
[J]. Computer Engineering and Applications, 2017, 53(23): 82-87.
|
[13] |
DING Dong1, FU Xiaodong1,2, YUE Kun3.
Review quality evaluation of online products based on Bayesian network
[J]. Computer Engineering and Applications, 2017, 53(2): 21-26.
|
[14] |
GAO Xuepan, LIAO Shizhong.
Design and implementation of forest fire probability prediction system based on Bayesian network
[J]. Computer Engineering and Applications, 2017, 53(13): 246-251.
|
[15] |
LIU Feifei, LIN Jingna, LIU Xiaoxiao.
Research of complex network node attack basded on dynamic Bayesian network
[J]. Computer Engineering and Applications, 2017, 53(11): 18-25.
|