| [1] |
XUN Peng, CHEN Hong-yan, WANG Yong-zhi, LI Shi-jie.
An intrinsic secure open shortest path first protocol based on identity cryptography
[J]. Computer Engineering & Science, 2024, 46(06): 1022-1031.
|
| [2] |
SHANG Zhenhao,CHENG Hua,FANG Yiquan.
Link representation and prediction
based on the simplest subgraph
[J]. Computer Engineering & Science, 2019, 41(02): 253-259.
|
| [3] |
CHENG Jiale,LI Weidong.
Parallel machine scheduling problems
with tree and path constraints
[J]. Computer Engineering & Science, 2018, 40(12): 2273-2279.
|
| [4] |
WANG Xiaojie,GUO Wenqiang,WANG Sixiu,CAI Yongmei.
An efficient completely dynamic SPT algorithm
[J]. J4, 2016, 38(03): 449-453.
|
| [5] |
YANG Xiaohua1,2,WU Jigang1,2,SHI Wenjun1,2,ZHAO Guodong1,2.
A construction algorithm of the stable shortest path tree
[J]. J4, 2016, 38(03): 418-424.
|
| [6] |
WEI Wenhong1,LI Qingxia2,CAI Zhaoquan3.
A SingleSource Shortest Path Algorithm Based on the Bucket Structure
[J]. J4, 2012, 34(4): 77-81.
|
| [7] |
ZOU Beiji,HE Jiabei,RUAN Peng.
An Improved Map Matching Algorithm and Its Application in the Inspection System of Mobile Communications
[J]. J4, 2010, 32(10): 49-53.
|
| [8] |
.
[J]. J4, 2008, 30(5): 126-128.
|
| [9] |
.
[J]. J4, 2008, 30(12): 9-14.
|
| [10] |
.
[J]. J4, 2007, 29(5): 81-82.
|
| [11] |
.
[J]. J4, 2007, 29(1): 73-75.
|
| [12] |
.
[J]. J4, 2006, 28(12): 83-84.
|