[1] |
FU Zhe1,2, LI Jun2.
Survey on high performance regular expression matching algorithms
[J]. Computer Engineering and Applications, 2018, 54(20): 1-13.
|
[2] |
MO Liping, ZHOU Kaiqing.
Development method of square-Hmong-characters font library for supporting component reuse
[J]. Computer Engineering and Applications, 2018, 54(12): 46-50.
|
[3] |
BAI Yu, YAN Kun, LI Shaopeng, ZHANG Huawei, LIU Yi.
Spectrum sensing for OFDM signals based on Graph
[J]. Computer Engineering and Applications, 2018, 54(11): 86-90.
|
[4] |
GAO Nan1,2, LI Meili2, SHE Yanhong2.
H-Estrada indices of mixed graphs
[J]. Computer Engineering and Applications, 2017, 53(2): 12-14.
|
[5] |
TIAN Qidong1, LIU Shungui1, JIANG Hui2, PENG Jianchun2.
Grid vulnerability evaluation by fusing grid topology and security and stability
[J]. Computer Engineering and Applications, 2016, 52(6): 223-226.
|
[6] |
XIANG Jin, LI Cuihong, WEI Deyi, YANG Jiahong.
Fast reconstruction for compressive sensing image using adjacency matrix of bipartite graph
[J]. Computer Engineering and Applications, 2013, 49(1): 191-194.
|
[7] |
HAN Guanghui.
Characteristic of regular languages
[J]. Computer Engineering and Applications, 2012, 48(4): 43-44.
|
[8] |
RUAN Qunsheng1, LIN Hongkang1,2.
Algorithm searching urban path route
[J]. Computer Engineering and Applications, 2012, 48(34): 237-240.
|
[9] |
WEI Dezhi, HONG Lianxi, LIN Lina, WU Xu.
Improved XFA for deep packet inspection
[J]. Computer Engineering and Applications, 2012, 48(34): 245-248.
|
[10] |
PENG Jiayin.
Automata and grammars theory based on Unsharp quantum logic
[J]. Computer Engineering and Applications, 2012, 48(28): 57-60.
|
[11] |
WANG Yan, LI Lingling, SHAO Xiaoyan.
Research on advanced frequent itemsets mining algorithm
[J]. Computer Engineering and Applications, 2012, 48(19): 119-121.
|
[12] |
FAN Shuyi, MENG Chen, WANG Cheng.
New minimized algorithm of DFA states
[J]. Computer Engineering and Applications, 2012, 48(1): 47-48.
|
[13] |
LI Qingsheng1,YANG Yuxing1,2,WANG Aimin1,3.
Recognition of inscriptions on bones or tortoise shells based on graph isomorphism
[J]. Computer Engineering and Applications, 2011, 47(8): 112-114.
|
[14] |
HUANG Feidan1,CAO Fasheng1,2.
Equivalence of cyclic automata
[J]. Computer Engineering and Applications, 2011, 47(7): 34-35.
|
[15] |
LIU Yingdong1,LENG Mingwei2,CHEN Xiaoyun3.
Construction algorithm of FP-tree based on adjacency matrix
[J]. Computer Engineering and Applications, 2011, 47(7): 153-155.
|