[1] |
DENG Liping1, DUAN Liguo2, YANG Lifeng2.
Trust and Behavioral Method Based Web Services Selection
[J]. Computer Engineering and Applications, 2019, 55(4): 112-118.
|
[2] |
HE Liwen, HOU Xiaoyu, TANG Chengcheng, ZHOU Rui, ZHANG Xingning.
Rootkit Universality Detection Method for Heterogeneous BIOS Environments
[J]. Computer Engineering and Applications, 2019, 55(23): 105-112.
|
[3] |
WANG Liang1,2, GUO Xing1,2.
Large-scale service portfolio optimization based on Cauchy fireworks algorithm
[J]. Computer Engineering and Applications, 2018, 54(24): 34-40.
|
[4] |
TAN Zhaowen, ZONG Rong, XI Xianqiang, WU Hao.
QoS prediction based on Bayesian tensor decomposition
[J]. Computer Engineering and Applications, 2018, 54(20): 74-79.
|
[5] |
TANG Ni1,2, XIONG Qingyu1,2, WANG Xibin1,2, GAO Min1,2, WEN Junhao1,2, ZENG Jun1,2.
Web service recommendation based on location clustering and tensor decomposition
[J]. Computer Engineering and Applications, 2016, 52(15): 65-72.
|
[6] |
XIONG Jing1, YU Gang2,4, XU Zhongwei3,4.
Research on software safety test driven by fault model
[J]. Computer Engineering and Applications, 2014, 50(12): 232-236.
|
[7] |
CHEN Xinghao1,2, LI Taoshen1.
Research on algorithm for Web service discovery based on ontology
[J]. Computer Engineering and Applications, 2012, 48(5): 121-123.
|
[8] |
XI Shengfeng.
Efficient policy for evaluating credibility of service based on classification
[J]. Computer Engineering and Applications, 2011, 47(27): 38-40.
|
[9] |
XI Xuefeng1,2,BAN Jianmin2,FU Baochuan2.
Research on three-dimensional simulation system for supporting engineering of foundation pit
[J]. Computer Engineering and Applications, 2011, 47(12): 213-216.
|
[10] |
LIU Yi1,XUE Hongchao2,XIA Yunni2.
Model-driven approach for dependability prediction of WS-CDL based service composition
[J]. Computer Engineering and Applications, 2011, 47(11): 60-66.
|
[11] |
CAI Mei-ling1,2,CHEN Ji-feng1,2.
Enhance fault-tolerant ability of Web services composition under multi-object genetic algorithm
[J]. Computer Engineering and Applications, 2010, 46(32): 1-5.
|
[12] |
WANG Ying1,ZHANG Yong-sheng1,ZHANG Yong-qiang2,LI Jing1,SUN Cui-cui1.
Trust enhanced comprehensive evaluation model for Web services
[J]. Computer Engineering and Applications, 2010, 46(29): 89-92.
|
[13] |
LI Ji-min1,2,LIU Zhen-peng2,LIU Zhi-tian2,HAN Lei2.
Research on multi-constraint Web service composition
[J]. Computer Engineering and Applications, 2010, 46(24): 110-114.
|
[14] |
MA Yu-min1,ZHANG Yue-rong2,QIAO Fei1,FAN Liu-qun1.
Study of networked data collection system
[J]. Computer Engineering and Applications, 2010, 46(20): 53-55.
|
[15] |
LI Sheng-hong.
Modeling interaction based information alignment of Web choreography
[J]. Computer Engineering and Applications, 2010, 46(2): 11-13.
|