[1] |
GUO Xuekun, QIN Yuanhui, DU Liang, LUO Yongliang, WANG Hongan.
Flight Deck Aviation Support Job Detection Based on Multi-entity Bayesian Networks
[J]. Computer Engineering and Applications, 2021, 57(1): 242-253.
|
[2] |
GAO Ang, DUAN Li, ZHANG Guohui, DONG Zhiming, CAO Jie, GUO Qisheng.
Development Status of Computer Generated Force Behavior Modeling
[J]. Computer Engineering and Applications, 2019, 55(19): 43-51.
|
[3] |
CAI Qingsong, CHEN Xihou.
Bayesian Network Structure Merging Algorithm Based on Scoring Function
[J]. Computer Engineering and Applications, 2019, 55(11): 147-152.
|
[4] |
ZHU Xuetong1, QIAN Xiujuan2, SUN Weiwei1, HOU Xianchun1, CHEN Guangsheng3, WANG Yongli4.
Analysis method of heart disease for pervasive health monitoring
[J]. Computer Engineering and Applications, 2018, 54(1): 159-165.
|
[5] |
GAO Zhifang, SHENG Guanshuai, PENG Dinghong.
Information security risk assessment method based on compromise rate method
[J]. Computer Engineering and Applications, 2017, 53(23): 82-87.
|
[6] |
CHEN Yun1,2, SHI Song1,2, PAN Yan1,2, YU Li2.
Hybrid ensemble approach for credit risk assessment based on SVM
[J]. Computer Engineering and Applications, 2016, 52(4): 115-120.
|
[7] |
WANG Xueli1, ZHANG Xuan1,3, LI Tong1,3, WANG Xu2.
Method of risk assessment oriented to trustworthy software
[J]. Computer Engineering and Applications, 2016, 52(19): 97-101.
|
[8] |
ZHENG Huimeng1,2, LIU Weidong1, XIAO Chengdi1, YU Weifeng1.
Assessment of hardware product design defects using Bayesian networks
[J]. Computer Engineering and Applications, 2016, 52(19): 228-233.
|
[9] |
CHEN Yu, WANG Yadi, WANG Jindong, WANG Kun.
Method for information system risk management based on Markov logic networks
[J]. Computer Engineering and Applications, 2016, 52(18): 104-110.
|
[10] |
ZHOU Wei1, XIE Wenbin2, LI Lei3.
A kind of Cyberspace security framework design and risk assessment method
[J]. Computer Engineering and Applications, 2016, 52(18): 122-126.
|
[11] |
ZHANG Yongzheng, GENG Xiuli.
Risk assessment of service outsourcing based on DEMATEL and VIKOR
[J]. Computer Engineering and Applications, 2016, 52(18): 240-245.
|
[12] |
ZHANG Ming1, WANG Fuzhang1, CHENG Chao2.
Equipment fault clustering and Bayesian network pre-alarm of urban rail transit
[J]. Computer Engineering and Applications, 2016, 52(11): 259-264.
|
[13] |
ZHANG Xuan1,2, LIN Yifeng1, BAI Chuan1, WANG Xu3, MA Muting1, YU Qian1,2.
Risk assessment model for mobile payment based on Bayesian network
[J]. Computer Engineering and Applications, 2014, 50(5): 60-64.
|
[14] |
CHEN Fan1, XIE Hongtao2.
Risk analysis of construction technology innovation by Bayesian networks model
[J]. Computer Engineering and Applications, 2014, 50(18): 33-38.
|
[15] |
LU Xinyuan, GAO Peiran, ZHOU Xi.
Research of algorithm for risk rule mining based on rough set and classification consistency—using the risk of knowledge transfer in IT outsourcing as an example
[J]. Computer Engineering and Applications, 2013, 49(6): 217-220.
|