[1] |
ZONG Xiaoping, TAO Zeze.
Knowledge Tracing Model Based on Mastery Speed
[J]. Computer Engineering and Applications, 2021, 57(6): 117-123.
|
[2] |
GAO Tianyu, WANG Qingrong, YANG Lei.
Data Mining Model Based on Attribute Dependability Enhancement of Rough Set
[J]. Computer Engineering and Applications, 2021, 57(3): 87-93.
|
[3] |
JIANG Kui, QIU Yuandong, ZHENG Haocheng.
ICMPv6 DDoS Attack Detection Method Based on Information Entropy and LSTM
[J]. Computer Engineering and Applications, 2021, 57(21): 148-154.
|
[4] |
WANG Hairui, XIANYU Jianchuan.
Application of Distributed Generation Configuration Based on Improved Sparrow Search Algorithm
[J]. Computer Engineering and Applications, 2021, 57(20): 245-252.
|
[5] |
TIAN Yang, CHEN Zhigang, SONG Xinxia, LI Tianming.
Overview of Blockchain Application in Supply Chain Management
[J]. Computer Engineering and Applications, 2021, 57(19): 70-83.
|
[6] |
ZHANG Jun, LIAO Xuehua, YU Xuling, LEI Meng.
Research on Realizing Relational Database In-Memory Storage Model
[J]. Computer Engineering and Applications, 2021, 57(19): 123-128.
|
[7] |
MA Yang, ZHAO Xujun.
Multi-source Outlier Detection Algorithm Based on Relevant Subspace
[J]. Computer Engineering and Applications, 2021, 57(17): 88-95.
|
[8] |
XIANG Yixuan, JIANG He, PAN Pinchen, SUN Conghui.
Study on [K]-means Clustering Algorithm of Quadratic Power Coupling
[J]. Computer Engineering and Applications, 2021, 57(14): 95-102.
|
[9] |
ZHANG Nianpeng, WU Xu, ZHU Qiang.
Entropy-Based Oversampling Framework
[J]. Computer Engineering and Applications, 2021, 57(13): 96-101.
|
[10] |
WANG Wentao, LI Shumei, TANG Jie, LYU Weilong.
DDoS Attack Detection Method Based on Probability Graph Model and DNN
[J]. Computer Engineering and Applications, 2021, 57(13): 108-115.
|
[11] |
ZHANG Bowen, LIU Zhi, SANG Guoming.
Anomaly Detection Algorithm Based on Kernel Density Fluctuation
[J]. Computer Engineering and Applications, 2021, 57(12): 132-136.
|
[12] |
RAO Jiawang, MA Ronghua.
Improved Kernel Density Estimator Based Spatial Point Density Algorithm
[J]. Computer Engineering and Applications, 2021, 57(11): 260-265.
|
[13] |
ZHOU Bifeng, LUO Yiping.
Aperiodically Intermittent Neutralization Control of Distributed Parameter Systems with Delay
[J]. Computer Engineering and Applications, 2020, 56(8): 220-225.
|
[14] |
WANG Jie, CHEN Zhigang, LIU Jialing, CHENG Hongbing.
Privacy Behavior Mining Technology for Cloud Computing Based on Clustering
[J]. Computer Engineering and Applications, 2020, 56(5): 80-84.
|
[15] |
LIAO Wenxiong, ZENG Bi, LIANG Tiankai, XU Yayun, ZHAO Junfeng.
Personal Credit Risk Assessment Method for High-Dimensional Data
[J]. Computer Engineering and Applications, 2020, 56(4): 219-224.
|