[1] |
WU Congcong, HE Yichao, ZHAO Jianli.
New Genetic Algorithm for Discounted {0-1} Knapsack Problem
[J]. Computer Engineering and Applications, 2020, 56(7): 57-66.
|
[2] |
QIN Qin, LIANG Chengji.
Optimization of Equipment Coordination Scheduling with Considering Buffer Space in Automated Container Terminal
[J]. Computer Engineering and Applications, 2020, 56(6): 262-270.
|
[3] |
LI Jiayue, ZHAO Bo, LI Xiang, LIU Hui, LIU Yifan, ZOU Jianwen.
Network Traffic Anomaly Prediction Method Based on Deep Learning
[J]. Computer Engineering and Applications, 2020, 56(6): 39-50.
|
[4] |
ZHANG Jianhua, LI Fangfang, YANG Lan.
Research on Matching Supply and Demand of Case Knowledge Based on PFS and RS
[J]. Computer Engineering and Applications, 2020, 56(23): 139-145.
|
[5] |
LIANG Chengji, YU Jian.
Research on Dispatching of Container Terminals Quay Crane Scheduling with Interference Constraints
[J]. Computer Engineering and Applications, 2020, 56(10): 273-278.
|
[6] |
REN Jun1, TANG Qiwen1, XU Yi2, HU Shanzhong2.
Research on Multi Granularity Rough Set for University Students’ Poverty Support Evaluation
[J]. Computer Engineering and Applications, 2019, 55(7): 82-86.
|
[7] |
QI Meilan, LI Xiaonan.
Matroidal Structure Based on Set-Valued Mapping and Its Relationship with Covering Rough Sets
[J]. Computer Engineering and Applications, 2019, 55(6): 50-56.
|
[8] |
DONG Hao1, ZHANG Haiping2, LI Zhongjin1, LIU Hui1.
Computation Offloading for Service Workflow in Mobile Edge Computing
[J]. Computer Engineering and Applications, 2019, 55(2): 36-43.
|
[9] |
PENG Lisha, QIAN Wenbin, WANG Yinglong, SHU Wenhao.
Incomplete Neighborhood System Oriented Three-Way Decisions Granular Computing Method
[J]. Computer Engineering and Applications, 2019, 55(18): 53-60.
|
[10] |
LIU Jichao, WANG Feng, SONG Peng.
Dimension Incremental Feature Selection Algorithm for Missing Data
[J]. Computer Engineering and Applications, 2019, 55(17): 95-99.
|
[11] |
LIU Haiyan, ZHANG Yu, BI Jianquan, XING Meng.
Review of technology based on distributed and collaborative network intrusion detection
[J]. Computer Engineering and Applications, 2018, 54(8): 1-6.
|
[12] |
WANG Yinglong, HUA Jiajia, YANG Jun, QIAN Wenbin.
Attribute reduction based on similar relation in set-valued decision information system
[J]. Computer Engineering and Applications, 2018, 54(5): 122-126.
|
[13] |
HUANG Weiting1, ZHAO Hong2.
Divide and conquer algorithm for cost-sensitive feature selection based on dynamic misclassification costs
[J]. Computer Engineering and Applications, 2018, 54(3): 166-171.
|
[14] |
XUE Meng, JIANG Shujuan, WANG Rongcun.
Systematic review of test data generation based on intelligent optimization algorithm
[J]. Computer Engineering and Applications, 2018, 54(17): 16-23.
|
[15] |
LOU Gaoxiang, CAI Zongyan, LIU Qingtao.
Application of new hybrid algorithm in mixed model assembly scheduling
[J]. Computer Engineering and Applications, 2018, 54(16): 254-259.
|