[1] |
LI Jian, XI Wenfeng.
Detection Algorithm for Rule Base of Drilling Fluid Design Expert System
[J]. Computer Engineering and Applications, 2020, 56(4): 256-261.
|
[2] |
LI Yandong, ZHU Ling, GUO Yuan, YU Ying, ZHAO Lina.
Multivariable Fixed-Time Continuous Formation Control of Electrically Driven Mobile Robot
[J]. Computer Engineering and Applications, 2020, 56(15): 228-234.
|
[3] |
LI Yan, WANG Yangyang, ZHANG Hongyan, WU Youxi.
Fast Pruning Algorithm for Unreachable Vertices and Its Application in Solving Shortest Path Problem
[J]. Computer Engineering and Applications, 2020, 56(15): 51-57.
|
[4] |
CHEN Xiaoqian, LIU Ruixiang.
Route Planning Method Based on Least-Squares Policy Iteration for Unmanned Aerial Vehicle
[J]. Computer Engineering and Applications, 2020, 56(1): 191-195.
|
[5] |
JIANG Mengmeng, ZHOU Jie.
Establishing Network for Financial Market Based on High-Dimensional State Space Model
[J]. Computer Engineering and Applications, 2019, 55(10): 53-60.
|
[6] |
LI Qian1, WANG Zheng1, MA Jianfen1, LI Na2.
Lightweight mobile payment protocol fairness analysis
[J]. Computer Engineering and Applications, 2018, 54(19): 82-87.
|
[7] |
PEI Changfu1, WANG Bin1, XUE Jie2, LIU Hui1, XIONG Xin1.
Spatio-temporal evolution modeling method of brain network based on time automata
[J]. Computer Engineering and Applications, 2018, 54(14): 45-51.
|
[8] |
SONG Yingli, LIU Xuanyu, ZHANG Kaiju, SHI Huiyuan, WANG Qian.
Algorithm of IMNMSSPC applied in Earth Pressure Balance(EPB) control of shield machine
[J]. Computer Engineering and Applications, 2017, 53(4): 251-255.
|
[9] |
ZHU Wenliang1,2, NI Fusheng1,2, WANG Suhong3, YIN Fei3.
Design and implementation of tracker for dredging slurry concentration optimal control
[J]. Computer Engineering and Applications, 2017, 53(21): 263-270.
|
[10] |
MA Xuhui1, HUA Yafei2, HE Zhonghe3.
Traffic control subzone division approach based on reachability of road network
[J]. Computer Engineering and Applications, 2017, 53(17): 224-228.
|
[11] |
QIN Manman, WANG Zheng, WANG Li.
Formal analysis and improvement of remote attestation protocol based on the SPIN
[J]. Computer Engineering and Applications, 2017, 53(1): 34-38.
|
[12] |
LV Jianghua1, LIU Zhifeng1, XU Yatao2, ZHOU Conghua1.
Verification of correctness of attribute based access control
[J]. Computer Engineering and Applications, 2016, 52(18): 98-103.
|
[13] |
XIA Chunrui1, WANG Rui1, LI Xiaojuan1, GUAN Yong1, ZHANG Jie2, WEI Hongxing3.
Probabilistic model checking for path planning in dynamic environment
[J]. Computer Engineering and Applications, 2016, 52(12): 5-11.
|
[14] |
HUANG Yankai, ZHOU Yu, WEI Ou.
Novel approach for attributed graph grammar response specification verification
[J]. Computer Engineering and Applications, 2016, 52(12): 15-18.
|
[15] |
WANG Ming1, WANG Rui1, LI Xiaojuan1, GUAN Yong1, ZHANG Jie2, WEI Hongxing3.
Verification of mobile robot obstacle avoidance strategies in uncertain environment based on formal modeling and probabilistic analysis
[J]. Computer Engineering and Applications, 2016, 52(10): 31-38.
|