[1] |
XU Jianguo, LIU Yonghui, LIU Mengfan.
Research on Semantic Role Labeling of University Policy Based on BILSTM-CRF
[J]. Computer Engineering and Applications, 2021, 57(6): 207-211.
|
[2] |
YANG Yanjiao, ZHAO Guotao, WANG Pidong.
Sentence Similarity Calculation Method Based on Semantics and Emotion
[J]. Computer Engineering and Applications, 2021, 57(16): 151-158.
|
[3] |
YU Bo, TAI Xianqing, MA Zhijie.
Study on Attribute and Trust-Based RBAC Model in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(9): 84-92.
|
[4] |
ZHANG Tao, WANG Xin, WANG Zhenlei.
Hierarchy Feedback Ant Colony Algorithm for Solving Secondary Delivery Problem of Petroleum Product
[J]. Computer Engineering and Applications, 2019, 55(21): 261-270.
|
[5] |
LIU Shuren, FENG Chaomin, CAI Changning, FAN Li.
Research on Seismic Data Processing Based on Multi-Level Storage
[J]. Computer Engineering and Applications, 2019, 55(13): 266-270.
|
[6] |
HU Zhifei, DUAN Zhongxing, CHEN Sheng, LIU Yang.
Study on guiding role of evacuation lighting and directing system of subway station
[J]. Computer Engineering and Applications, 2016, 52(15): 237-242.
|
[7] |
LI Longshu, FANG Yuan.
Research on decision system model of Robocup3D robotics team
[J]. Computer Engineering and Applications, 2015, 51(6): 37-41.
|
[8] |
SHEN Man, ZHAO Songzheng, LIU Jing.
Examination and approval of business workflow model based on role privilege
[J]. Computer Engineering and Applications, 2015, 51(4): 235-239.
|
[9] |
LI Min1,2, HUANG Qiang1, ZHOU Ling1, NI Shaoquan1.
Research on modeling of petroleum products distribution system based on object-oriented Petri nets
[J]. Computer Engineering and Applications, 2015, 51(20): 55-61.
|
[10] |
PAN Wenlin.
Research on local semantic conflicts instantly check methods for ORM model
[J]. Computer Engineering and Applications, 2015, 51(18): 144-150.
|
[11] |
WANG Mengxiang1,2, WANG Houfeng1,2, LIU Yang1,2, ZHANG Longkai1.
Study for automatic recognition of Chinese object target role
[J]. Computer Engineering and Applications, 2014, 50(8): 93-98.
|
[12] |
GUAN Xin1, WANG Jie2, TAO Zhiyong1.
Energy-tree chain algorithm of role-adaptive cluster head in WSN
[J]. Computer Engineering and Applications, 2014, 50(24): 70-75.
|
[13] |
YANG Xinhua1,2, ZHAI Yifei1.
Image enhancement based on tetrolet transform and PCNN
[J]. Computer Engineering and Applications, 2014, 50(19): 178-181.
|
[14] |
TAO Yong, WANG Chengliang.
Attributive-based RBAC policy representation and reasoning using OWL
[J]. Computer Engineering and Applications, 2014, 50(19): 66-69.
|
[15] |
LIU Pengyuan1,2, SUN Baolin1.
RBAC framework supporting poset and sync & async permission modeling
[J]. Computer Engineering and Applications, 2014, 50(10): 108-115.
|