[1] |
NI Xueli, LIANG Guangjun.
Recovery Method of WeChat Revoking Message Based on Dynamic Memory Analysis
[J]. Computer Engineering and Applications, 2021, 57(23): 146-153.
|
[2] |
WEI Fenjuan, CHEN Chongcheng, YE Xiaoyan, CHEN Gong.
Application and Development of Mobile GIS for Forest Resource Investigation and Supervision
[J]. Computer Engineering and Applications, 2020, 56(6): 231-238.
|
[3] |
ZHAO Ying1, PAN Hua2, SUN Jinyan2, MO Qi3, DAI Fei4.
Random Behavior Analysis Method of Collaborative Business Process
[J]. Computer Engineering and Applications, 2019, 55(3): 245-251.
|
[4] |
XU Jiangyang, ZHANG Huijun, ZHANG Xiaolong.
Visual Analysis of Pseudo Base Station Behavior Based on Malicious SMS
[J]. Computer Engineering and Applications, 2019, 55(18): 95-102.
|
[5] |
LI Zhiqiang1, ZHU Wangchun1, ZHANG Weikun1,2.
Optimization algorithm of planning variable-message board location for area parking guidance information system
[J]. Computer Engineering and Applications, 2018, 54(8): 242-246.
|
[6] |
YE Lei1,2, CHEN Dongmei1, ZENG Lingqiu3, HAN Qingwen1, WANG Ruimei3.
Adaptive SWM-oriented clustering algorithm based on vehicle health evaluation for V2V communication
[J]. Computer Engineering and Applications, 2018, 54(23): 74-80.
|
[7] |
CHEN Jianfei1,2, DENG Min1,2, TANG Junlong1,2, WEN Yongjun1,2, TANG Lijun1,2.
Research of real-time large-scale remote experimental communication scheme
[J]. Computer Engineering and Applications, 2018, 54(19): 94-100.
|
[8] |
LI Yarong1,LI Xiao1,GE Lixia1,HE Mingxing2.
Improved multi-message and multi-receiver hybrid signcryption scheme
[J]. Computer Engineering and Applications, 2018, 54(19): 77-81.
|
[9] |
HE Zhangqing1, LI Hong2, WAN Meilin3, WU Tiezhou1.
Authentication and session key exchange protocol based on Physical Uncolonable Function
[J]. Computer Engineering and Applications, 2018, 54(18): 17-21.
|
[10] |
LIU Shiyong, CHEN Luo, XIONG Wei, WU Ye, LI Jun.
Parallel raster image tile algorithm based on MPI
[J]. Computer Engineering and Applications, 2018, 54(1): 48-53.
|
[11] |
ZENG Ang, LI Ning, YAN Jun.
Research and improvement of Mosquitto file transfer
[J]. Computer Engineering and Applications, 2017, 53(4): 123-127.
|
[12] |
LIU Hui1, ZHANG Zhenyu1,2, YANG Wenzhong2, WU Xiaohong2.
Routing algorithm based on attribute of sociality of node in opportunistic networks
[J]. Computer Engineering and Applications, 2017, 53(22): 92-96.
|
[13] |
WANG Bing1, CHEN Tinggui2.
Design method of Internet of things middleware based on high performance message management
[J]. Computer Engineering and Applications, 2017, 53(16): 89-97.
|
[14] |
GUO Wei1, CHANG Jinyong1,2, GAO Lei1.
KDM-CCA security based on DCR assumption
[J]. Computer Engineering and Applications, 2017, 53(12): 116-120.
|
[15] |
JIANG Zhiying1, CHEN Yong2, HU Bing1, SUN Zhixin1.
Research on time synchronization algorithm for Wireless Sensor Networks
[J]. Computer Engineering and Applications, 2017, 53(1): 1-8.
|