[1] |
WANG Di, LI Caihong, GUO Na, LIU Guoming, GAO Tengteng.
Local Path Planning of Mobile Robot Based on Fuzzy Potential Field Method
[J]. Computer Engineering and Applications, 2021, 57(6): 212-218.
|
[2] |
FEI Kai, YANG Rennong, HUANG Zhengyu, LI Qiuni.
Considering time constraints of cooperative weapon-target assignment in air combat
[J]. Computer Engineering and Applications, 2016, 52(13): 259-264.
|
[3] |
LI Donghui, ZHANG Bin, FEI Xiaofei.
Attribute access control model based on OSBE
[J]. Computer Engineering and Applications, 2015, 51(7): 84-87.
|
[4] |
WANG Xiaogang1, CAO Dong2.
Period design of periodic tasks in flight control software
[J]. Computer Engineering and Applications, 2015, 51(10): 242-246.
|
[5] |
ZAOKERE Kadeer1,2, AISHAN Wumaier1,2, TUERGEN Yibulayin1,2, PARIDA Tursun2,3, WU Xiaochuan1,2.
Uyghur noun stemming system based on hybrid method
[J]. Computer Engineering and Applications, 2013, 49(1): 171-175.
|
[6] |
LIU Xueheng, WANG Chuanxu, XU Changyan.
Inventory strategy optimization for multi-location emergency supply system based on time constraints
[J]. Computer Engineering and Applications, 2012, 48(7): 212-216.
|
[7] |
MA Junliang, WANG Xili, HE Juhou, XIAO Bing.
Research and design of enhanced Anti-Xprobe2
[J]. Computer Engineering and Applications, 2012, 48(32): 1-4.
|
[8] |
YANG Tao1,DENG Hongli2,SHAO Chenxi3.
Simulation of cellular signal transduction network based on Agent and FSM
[J]. Computer Engineering and Applications, 2011, 47(3): 221-224.
|
[9] |
ZHANG Xiuping,YANG Guowu,LI Xiaoyu.
Emulation model for MMU coprocessor
[J]. Computer Engineering and Applications, 2011, 47(3): 57-60.
|
[10] |
TIAN Yuan,LI Jianbin,ZHANG Zhen.
Effective approach to re-engineering of protocol’s state machine model
[J]. Computer Engineering and Applications, 2011, 47(19): 63-67.
|
[11] |
YANG Qing1,2,LI Fang-min1.
Study on model of intrusion detection for wireless Ad Hoc network based on SVM and FSM
[J]. Computer Engineering and Applications, 2009, 45(13): 114-118.
|
[12] |
DING Zhen-guo,ZHAO Da-yong.
URL access control algorithm based on double-array finite state machine
[J]. Computer Engineering and Applications, 2007, 43(36): 129-131.
|
[13] |
WANG Zhan-min1,FEI Rong1,WU Fei2,CUI Du-wu1.
Call center system based on CT-Bus and state node design
[J]. Computer Engineering and Applications, 2007, 43(18): 239-241.
|
[14] |
,.
Time Constraints Analysis of Task Scheduling for Colored Timed Workflow Net
[J]. Computer Engineering and Applications, 2006, 42(8期): 16-.
|