[1] |
ZHAO Yang, ZHANG Junhua.
Multi-scale Feature Fusion Method for Spinal X-Ray Image Segmentation
[J]. Computer Engineering and Applications, 2021, 57(8): 214-219.
|
[2] |
LU Zhiliang, LIN Wei, ZENG Bi, LIU Ruixue.
Real-Time Detection Method for Robot Target Grasping Area
[J]. Computer Engineering and Applications, 2020, 56(19): 224-230.
|
[3] |
DU Mengyao, WANG Zheng, LI Na, QIANG Yan.
Dynamic Password Authentication Protocol for Wireless Body Area Network
[J]. Computer Engineering and Applications, 2020, 56(14): 68-73.
|
[4] |
ZHANG Xin1, ZOU Dexuan1, XIAO Peng1, YU Qiu2.
Self-Adjusted Simplified Particle Swarm Optimization Algorithm and Its Application
[J]. Computer Engineering and Applications, 2019, 55(8): 250-263.
|
[5] |
YANG Wenxia, WANG Zheng, LI Na, MA Jianfen.
Security Analysis and Improvement of Lightweight Mobile Payment Protocol LMPP
[J]. Computer Engineering and Applications, 2019, 55(16): 88-93.
|
[6] |
ZHENG Bing1, LI Bin1, TIAN Lianfang1, DING Huanwen2, LI Liling1.
Computer-aided design of personalized pedicle screw in spinal surgery
[J]. Computer Engineering and Applications, 2018, 54(4): 218-224.
|
[7] |
LI Qian1, WANG Zheng1, MA Jianfen1, LI Na2.
Lightweight mobile payment protocol fairness analysis
[J]. Computer Engineering and Applications, 2018, 54(19): 82-87.
|
[8] |
QIN Manman, WANG Zheng, WANG Li.
Formal analysis and improvement of remote attestation protocol based on the SPIN
[J]. Computer Engineering and Applications, 2017, 53(1): 34-38.
|
[9] |
LV Jianghua1, LIU Zhifeng1, XU Yatao2, ZHOU Conghua1.
Verification of correctness of attribute based access control
[J]. Computer Engineering and Applications, 2016, 52(18): 98-103.
|
[10] |
XIA Chunrui1, WANG Rui1, LI Xiaojuan1, GUAN Yong1, ZHANG Jie2, WEI Hongxing3.
Probabilistic model checking for path planning in dynamic environment
[J]. Computer Engineering and Applications, 2016, 52(12): 5-11.
|
[11] |
HUANG Yankai, ZHOU Yu, WEI Ou.
Novel approach for attributed graph grammar response specification verification
[J]. Computer Engineering and Applications, 2016, 52(12): 15-18.
|
[12] |
WANG Ming1, WANG Rui1, LI Xiaojuan1, GUAN Yong1, ZHANG Jie2, WEI Hongxing3.
Verification of mobile robot obstacle avoidance strategies in uncertain environment based on formal modeling and probabilistic analysis
[J]. Computer Engineering and Applications, 2016, 52(10): 31-38.
|
[13] |
ZHANG Yi, WAN Xingyu, ZHENG Xiaodong, ZHAN Teng.
Machine tool spindle design based on improved cellular multi-objective genetic algorithm
[J]. Computer Engineering and Applications, 2015, 51(6): 260-265.
|
[14] |
HUANGFU Xiaoyan, FAN Xiaoya, HUANG Xiaoping.
Design of hybrid instruction Cache based on SRAM and STT-RAM
[J]. Computer Engineering and Applications, 2015, 51(12): 43-48.
|
[15] |
ZHANG Shuqing, XU Zhongwei, CHEN Zuxi.
Research on modeling and verification methods of interlocking system based on term rewriting system
[J]. Computer Engineering and Applications, 2014, 50(3): 49-54.
|