[1] |
TANG Rui, JIAO Jiye, XU Huahao.
Design of Hardware Accelerator for Embedded Convolutional Neural Network
[J]. Computer Engineering and Applications, 2021, 57(4): 252-257.
|
[2] |
WANG Yulian, LU Mingming.
Interpretable Automatic Detection of Android Malware Based on Graph Embedding
[J]. Computer Engineering and Applications, 2021, 57(23): 122-128.
|
[3] |
YOU Yun, WAN Changxuan, JIANG Tengjiao.
Project Default Risk Prediction Considering Social Network in P2P Lending
[J]. Computer Engineering and Applications, 2021, 57(13): 239-245.
|
[4] |
HAO Zhenhe, JIAO Jiye, LI Yuqian.
Design and Implementation of RISC-V Microprocessor Based on AHB Bus
[J]. Computer Engineering and Applications, 2020, 56(20): 52-58.
|
[5] |
DU De, GAO Baolu, TIAN Li.
Terrain Compression Rendering Technology Combining Fast Layered DCT and Dynamic LOD
[J]. Computer Engineering and Applications, 2020, 56(13): 223-229.
|
[6] |
WANG Kun, SONG Yonghong, ZHENG Fei, MEI Kuizhi.
Embedded Gesture Detection Algorithm Based on Convolutional Neural Network
[J]. Computer Engineering and Applications, 2019, 55(4): 137-141.
|
[7] |
GUO Lin, SUN Qinglin, CHEN Sai, CHEN Zengqiang, JIA Hongchen.
Design of Powered Parafoil System Based on Real-Time Multitask Operating System
[J]. Computer Engineering and Applications, 2019, 55(16): 227-234.
|
[8] |
LUO Ling.
Reliability Checking About Embedded Airborne Software Based on Stochastic Petri Net
[J]. Computer Engineering and Applications, 2019, 55(1): 233-240.
|
[9] |
SUN Dandan1,2, LUO Yonglong1,2, FAN Guoting1,2, GUO Liangmin1,2, ZHENG Xiaoyao1,2.
Location privacy-preserving method against attacks under P2P communication
[J]. Computer Engineering and Applications, 2018, 54(9): 75-83.
|
[10] |
PAN Jie1, WATANABE Masahiko2, ZHOU Kuanjiu1, LIANG Haoran1, CUI Kai1.
Formal modeling approach for embedded software
[J]. Computer Engineering and Applications, 2018, 54(8): 61-71.
|
[11] |
WANG Yong1,2, SHANG Wenli2, ZHAO Jianming2, WAN Ming2, YUAN Weiwei1.
Design of embedded trusted computing platform based on TPM
[J]. Computer Engineering and Applications, 2018, 54(13): 105-110.
|
[12] |
ZHAO Bo1,2, LI Erhui1,2, MA Jun1,2, HUANG Yuqing1,2.
Security-enhanced key generation scheme based on USB Key
[J]. Computer Engineering and Applications, 2018, 54(10): 135-142.
|
[13] |
ZONG Ping1, LI Lei2.
Performance comparison of PostgreSQL and MongoDB dealing with unstructured data
[J]. Computer Engineering and Applications, 2017, 53(7): 104-108.
|
[14] |
PENG Ziran1, WANG Guojun1,2.
Study on parallel algorithm of wavelet transform based on MPSoC platform
[J]. Computer Engineering and Applications, 2017, 53(4): 33-38.
|
[15] |
ZHAO Zhiguo, TAN Bang, XIA Shiying, TAN Minsheng.
P2P network comprehensive trust model based on time series
[J]. Computer Engineering and Applications, 2017, 53(15): 127-131.
|