[1] |
MENG Yun, HU Xin, DAI Liang, YU Lei.
Connectivity Improvement Resource Allocation Algorithm in Interference Vehicular Networks
[J]. Computer Engineering and Applications, 2019, 55(7): 9-15.
|
[2] |
LIU Kang1, ZHANG Xueying1, LI Fenglian1, TIAN Yuchu1,2.
Graph partitioning method for social networks based on communication load balancing
[J]. Computer Engineering and Applications, 2018, 54(4): 66-71.
|
[3] |
GONG Chen, WU Lifang, LIU Weichan, ZHANG Xin.
Choosability of signed graphs without certain minors
[J]. Computer Engineering and Applications, 2018, 54(16): 55-58.
|
[4] |
LIU Weichan, ZHANG Xin.
Equitable vertex arboricity of outer-1-planar graphs
[J]. Computer Engineering and Applications, 2018, 54(10): 51-53.
|
[5] |
CHEN Jizhen, NING Aibing, ZHI Zhibing, HU Linlin, ZHANG Huizhen.
Exact algorithm for maximum independent set problem in graph theory
[J]. Computer Engineering and Applications, 2016, 52(1): 20-22.
|
[6] |
CHEN Hong1, WANG Fei1, XIAO Zhenjiu1,2, SUN Lina1.
Network security situation assessment model fusing multi-source data
[J]. Computer Engineering and Applications, 2015, 51(17): 96-101.
|
[7] |
CHEN Hong1, WANG Fei1, XIAO Zhenjiu1,2, SUN Lina1.
Method of network security situation prediction based on IHS_LSSVR
[J]. Computer Engineering and Applications, 2014, 50(23): 91-94.
|
[8] |
ZHANG Han1, HE Dongjian2.
Image segmentation approach by combining texture information and graph theory
[J]. Computer Engineering and Applications, 2014, 50(1): 180-184.
|
[9] |
HAN Zhong1,2, ZHAO Shengdun2, ZHANG Guicheng2,3, RUAN Weiping3, LI Jianping3, SHEN Hongli3.
Automatic structural modeling method based on process manufacturing system identifications
[J]. Computer Engineering and Applications, 2014, 50(1): 227-231.
|
[10] |
HE Yongming.
Assessment model of network security situation based on K Nearest Neighbor and Support Vector Machine
[J]. Computer Engineering and Applications, 2013, 49(9): 81-84.
|
[11] |
CAO Dun, CHEN Ziqi.
New localization algorithm for wireless sensor networks
[J]. Computer Engineering and Applications, 2012, 48(8): 116-118.
|
[12] |
CHEN Shanchao, FU Hongguang, WANG Ying.
Application of improved graph theory image segmentation algorithm in tongue image segmentation
[J]. Computer Engineering and Applications, 2012, 48(5): 201-203.
|
[13] |
LI Lijuan1,2, LI Shaodong1.
Application of adaptive clustering algorithm on DDoS attacks detection
[J]. Computer Engineering and Applications, 2012, 48(2): 86-89.
|
[14] |
LAN Meihui1,XU Jian1,SUN Yu2.
Ontology similarity computation based on spectral graph theory
[J]. Computer Engineering and Applications, 2011, 47(28): 110-112.
|
[15] |
YANG Jinglin,WANG Chengru.
Adaptive texture image retrieval based on spectral graph theory
[J]. Computer Engineering and Applications, 2011, 47(22): 195-197.
|