[1] |
XIANG Hongxin1, YANG Yun1,2.
Survey on Imbalanced Data Mining Methods
[J]. Computer Engineering and Applications, 2019, 55(4): 1-16.
|
[2] |
SONG Yueling, LI Xiaowu.
Performance Evaluation Method of Single Reader Movement RFID System
[J]. Computer Engineering and Applications, 2019, 55(23): 228-234.
|
[3] |
XIA Yusheng, LIU Kai, ZHANG Hao, JIN Feiyu, ZHENG Linjiang.
Multilateral-Confined Method for Indoor Localization:Algorithm Design and System Implementation
[J]. Computer Engineering and Applications, 2019, 55(11): 250-256.
|
[4] |
JI Lei1, GUO Shurong2, CONG Xuhui3, LIU Caixia1.
Performance evaluation of PPP project based on OWA operator and cloud matter-element model—taking profit-making PPP project as research object
[J]. Computer Engineering and Applications, 2018, 54(16): 220-226.
|
[5] |
FEI Yunqiao1, LIU Wenping1, LUO Youqing2, LU Pengfei2.
Comparison of algorithms for unmanned aerial vehicle image segmentation in monitoring forest diseases and insect pests
[J]. Computer Engineering and Applications, 2017, 53(8): 216-223.
|
[6] |
WANG Hao1,2, LIU Xiujuan1,2, QI Jianyu1,2.
Dynamic angle precision real-time evaluation technique for strap-down INS
[J]. Computer Engineering and Applications, 2017, 53(13): 266-270.
|
[7] |
WANG Jingfeng.
C-POWGA operator and its application to uncertain multiple attribute decision making
[J]. Computer Engineering and Applications, 2015, 51(9): 57-61.
|
[8] |
CHENG Geping1, LING Hefei2.
Anti-collusion fingerprinting scheme based on perceptual model
[J]. Computer Engineering and Applications, 2015, 51(9): 107-110.
|
[9] |
XIAO Huadong, SUN Jing, WEI Min, LI Juan, SHEN Yu.
Relative sustained performance metric model for high performance computing system
[J]. Computer Engineering and Applications, 2015, 51(5): 33-37.
|
[10] |
CHEN Lei1, CAI Ming2, SHI Kun2.
RTOS kernel performance evaluation technology research based on loads of task and interrupt
[J]. Computer Engineering and Applications, 2014, 50(17): 80-85.
|
[11] |
MA Yingliang1,2, HUANG Dingdong2, WANG Baoru1.
Study of modeling ship to air missile fighting process
[J]. Computer Engineering and Applications, 2013, 49(4): 249-253.
|
[12] |
LI Xinyi, QI Yong, CHEN Pengfei.
Software aging detection method based on queuing model
[J]. Computer Engineering and Applications, 2013, 49(22): 46-51.
|
[13] |
LIU Tingting1, YANG Wei1, WANG Yuzhu2.
Performance evaluation of P2P video streaming in wireless mesh networks
[J]. Computer Engineering and Applications, 2013, 49(16): 71-76.
|
[14] |
HUANG Yewen1, WU Hong2, WANG Yuanshi2.
M/M/1 queuing model under non-preemptive limited-priority
[J]. Computer Engineering and Applications, 2013, 49(13): 80-84.
|
[15] |
CHEN Jing1,2, WANG Lu1,2, SUN Meng1,2.
Scheduling model of distributed test supported node adjustment as needed
[J]. Computer Engineering and Applications, 2012, 48(6): 57-59.
|