[1] |
WANG Di, LI Caihong, GUO Na, LIU Guoming, GAO Tengteng.
Local Path Planning of Mobile Robot Based on Fuzzy Potential Field Method
[J]. Computer Engineering and Applications, 2021, 57(6): 212-218.
|
[2] |
ZENG Yuan1, 2, YANG Haidong1, CHEN Haiyong2.
Simplified measurement method based on IFPUG Function Point Analysis
[J]. Computer Engineering and Applications, 2017, 53(7): 60-63.
|
[3] |
LI Donghui, ZHANG Bin, FEI Xiaofei.
Attribute access control model based on OSBE
[J]. Computer Engineering and Applications, 2015, 51(7): 84-87.
|
[4] |
YOU Feng, BIAN Yi, ZHAO Ruilian.
Automatic string test data generation for EFSM model
[J]. Computer Engineering and Applications, 2014, 50(16): 57-61.
|
[5] |
ZAOKERE Kadeer1,2, AISHAN Wumaier1,2, TUERGEN Yibulayin1,2, PARIDA Tursun2,3, WU Xiaochuan1,2.
Uyghur noun stemming system based on hybrid method
[J]. Computer Engineering and Applications, 2013, 49(1): 171-175.
|
[6] |
MA Junliang, WANG Xili, HE Juhou, XIAO Bing.
Research and design of enhanced Anti-Xprobe2
[J]. Computer Engineering and Applications, 2012, 48(32): 1-4.
|
[7] |
YOU Feng,YAN Yu,ZHAO Ruilian.
Test data generation for EFSM models involving procedure call
[J]. Computer Engineering and Applications, 2011, 47(32): 87-90.
|
[8] |
ZENG Juling.
AMC/ARQ cross-layer design and its optimizing for OFDM
[J]. Computer Engineering and Applications, 2011, 47(30): 105-108.
|
[9] |
YANG Tao1,DENG Hongli2,SHAO Chenxi3.
Simulation of cellular signal transduction network based on Agent and FSM
[J]. Computer Engineering and Applications, 2011, 47(3): 221-224.
|
[10] |
ZHANG Xiuping,YANG Guowu,LI Xiaoyu.
Emulation model for MMU coprocessor
[J]. Computer Engineering and Applications, 2011, 47(3): 57-60.
|
[11] |
TIAN Yuan,LI Jianbin,ZHANG Zhen.
Effective approach to re-engineering of protocol’s state machine model
[J]. Computer Engineering and Applications, 2011, 47(19): 63-67.
|
[12] |
CHEN Tao,PAN Xue-zeng,CHEN Jian,CHEN Xiao-ping,LU Kui-jun.
Study of protocol conformance test sequence generation algorithm based on FSM
[J]. Computer Engineering and Applications, 2010, 46(6): 60-62.
|
[13] |
YANG Shi-yu1,XU Zhong-wei1,YU Gang1,2,ZHANG Sheng1.
Conformance test sequence generation for railway signal safety protocol
[J]. Computer Engineering and Applications, 2010, 46(34): 59-61.
|
[14] |
WANG Xiang-yun1,ZHAO Lei2,CAI Kai-yuan2.
Design approach for EFSM based on supervisory control theory
[J]. Computer Engineering and Applications, 2009, 45(6): 20-24.
|
[15] |
YANG Qing1,2,LI Fang-min1.
Study on model of intrusion detection for wireless Ad Hoc network based on SVM and FSM
[J]. Computer Engineering and Applications, 2009, 45(13): 114-118.
|