[1] |
GAO Jingpeng, HU Xinyu, JIANG Zhiye.
Unmanned Aerial Vehicle Track Planning Algorithm Based on Improved DDPG
[J]. Computer Engineering and Applications, 2022, 58(8): 264-272.
|
[2] |
SI Yanna, PU Jiexin, SUN Lifan.
Review of Research on Approximate Reinforcement Learning Algorithms
[J]. Computer Engineering and Applications, 2022, 58(8): 33-44.
|
[3] |
LI Ling, WANG Zheng, LI Na.
Access Control Scheme Supporting Computing Outsourcing in Fog Computing
[J]. Computer Engineering and Applications, 2021, 57(6): 81-87.
|
[4] |
ZHOU Youhang, ZHAO Hanyun, LIU Hanjiang, LI Yuze, XIAO Yuqin.
Self-Learning Gait Planning Method for Biped Robot Using DDPG
[J]. Computer Engineering and Applications, 2021, 57(6): 254-259.
|
[5] |
WANG Xiao, TANG Lun, HE Xiaoyu, CHEN Qianbin.
Multi-dimensional Resource Optimization of Service Function Chain Based on Deep Reinforcement Learning
[J]. Computer Engineering and Applications, 2021, 57(4): 68-76.
|
[6] |
LAI Jun, WEI Jingyi, CHEN Xiliang.
Overview of Hierarchical Reinforcement Learning
[J]. Computer Engineering and Applications, 2021, 57(3): 72-79.
|
[7] |
KUANG Liqun, LI Siyuan, FENG Li, HAN Xie, XU Qingyu.
Application of Deep Reinforcement Learning Algorithm on Intelligent Military Decision System
[J]. Computer Engineering and Applications, 2021, 57(20): 271-278.
|
[8] |
YANG Xueyu, CHEN Jianping, FU Qiming, LU You, WU Hongjie.
Deep Deterministic Policy Gradient Algorithm Based on Stochastic Variance Reduction Method
[J]. Computer Engineering and Applications, 2021, 57(19): 104-111.
|
[9] |
TANG Lei, LIU Guangzhong.
Application for Improved TD3 Algorithm in Obstacle Avoidance of Quad-Rotor UAV
[J]. Computer Engineering and Applications, 2021, 57(11): 254-259.
|
[10] |
YU Bo, TAI Xianqing, MA Zhijie.
Study on Attribute and Trust-Based RBAC Model in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(9): 84-92.
|
[11] |
PENG Weiping, GUO Kaidi, SONG Cheng, YAN Xixi.
Traceable Leak Prevention Access Control Scheme for Outsourced Data
[J]. Computer Engineering and Applications, 2020, 56(6): 117-125.
|
[12] |
HONG Zheng, GONG Qiyuan, FENG Wenbo, LI Yihao.
Unknown Application Layer Protocol Recognition Based on Adaptive Clustering
[J]. Computer Engineering and Applications, 2020, 56(5): 109-117.
|
[13] |
ZHANG Keyong, LI Chunxia, YAO Jianming.
Financing Decision of Low Carbon Supply Chain Considering Carbon Limit and Sales Effort
[J]. Computer Engineering and Applications, 2020, 56(22): 256-263.
|
[14] |
FENG Ailan, YANG Teng, KONG Jili.
Order Processing Research Based on Robotic Mobile Fulfillment Systems
[J]. Computer Engineering and Applications, 2020, 56(20): 243-250.
|
[15] |
Gulmire ARKEN, Nurmamat HELIL.
CP-ABE Re-encryption Based Access Control Constraint for Sensitive Data
[J]. Computer Engineering and Applications, 2020, 56(18): 69-76.
|