[1] |
ZHAO Yang, ZHANG Junhua.
Multi-scale Feature Fusion Method for Spinal X-Ray Image Segmentation
[J]. Computer Engineering and Applications, 2021, 57(8): 214-219.
|
[2] |
LU Zhiliang, LIN Wei, ZENG Bi, LIU Ruixue.
Real-Time Detection Method for Robot Target Grasping Area
[J]. Computer Engineering and Applications, 2020, 56(19): 224-230.
|
[3] |
DU Mengyao, WANG Zheng, LI Na, QIANG Yan.
Dynamic Password Authentication Protocol for Wireless Body Area Network
[J]. Computer Engineering and Applications, 2020, 56(14): 68-73.
|
[4] |
ZHANG Xin1, ZOU Dexuan1, XIAO Peng1, YU Qiu2.
Self-Adjusted Simplified Particle Swarm Optimization Algorithm and Its Application
[J]. Computer Engineering and Applications, 2019, 55(8): 250-263.
|
[5] |
WEI Qingjie1, LIU Shukun2.
Method of Cross-Browser Compatibilities Testing for Web Application
[J]. Computer Engineering and Applications, 2019, 55(5): 55-59.
|
[6] |
YANG Wenxia, WANG Zheng, LI Na, MA Jianfen.
Security Analysis and Improvement of Lightweight Mobile Payment Protocol LMPP
[J]. Computer Engineering and Applications, 2019, 55(16): 88-93.
|
[7] |
YOU Feng, ZHANG Yafeng, ZHAO Ruilian, MA Jinhui.
Page cluster based research on Web application test method
[J]. Computer Engineering and Applications, 2018, 54(5): 51-56.
|
[8] |
ZHENG Bing1, LI Bin1, TIAN Lianfang1, DING Huanwen2, LI Liling1.
Computer-aided design of personalized pedicle screw in spinal surgery
[J]. Computer Engineering and Applications, 2018, 54(4): 218-224.
|
[9] |
LI Qian1, WANG Zheng1, MA Jianfen1, LI Na2.
Lightweight mobile payment protocol fairness analysis
[J]. Computer Engineering and Applications, 2018, 54(19): 82-87.
|
[10] |
XIA Zhijian, PENG Guojun, HU Hongfu.
Detection of access control vulnerabilities in Web applications based on privilege verification graph
[J]. Computer Engineering and Applications, 2018, 54(12): 63-68.
|
[11] |
QIN Manman, WANG Zheng, WANG Li.
Formal analysis and improvement of remote attestation protocol based on the SPIN
[J]. Computer Engineering and Applications, 2017, 53(1): 34-38.
|
[12] |
LV Jianghua1, LIU Zhifeng1, XU Yatao2, ZHOU Conghua1.
Verification of correctness of attribute based access control
[J]. Computer Engineering and Applications, 2016, 52(18): 98-103.
|
[13] |
DENG Zhidan, YANG Haiyan, WU Ji.
Test data generation and selection approach for Web application based on constraint-solving
[J]. Computer Engineering and Applications, 2016, 52(18): 214-221.
|
[14] |
XIA Chunrui1, WANG Rui1, LI Xiaojuan1, GUAN Yong1, ZHANG Jie2, WEI Hongxing3.
Probabilistic model checking for path planning in dynamic environment
[J]. Computer Engineering and Applications, 2016, 52(12): 5-11.
|
[15] |
HUANG Yankai, ZHOU Yu, WEI Ou.
Novel approach for attributed graph grammar response specification verification
[J]. Computer Engineering and Applications, 2016, 52(12): 15-18.
|