| [1] |
ZHAO Shu, XIAO Man, LI Wei-dong.
Semi-online algorithms for hierarchical scheduling on three machines with reassignment
[J]. Computer Engineering & Science, 2022, 44(06): 1126-1132.
|
| [2] |
ZHANG Bao-hua, LI En-lin, ZHANG Hua-ping, SHANG Jian-yun.
A sentiment unit representation method based on layer hierarchy
[J]. Computer Engineering & Science, 2022, 44(01): 149-158.
|
| [3] |
GONG Wencong1,YUAN Jingling1,2,CHEN Mincheng1,XIANG Yao1,ZHAO Zikang1.
A QoE level evaluation model
based on user experience delay
[J]. Computer Engineering & Science, 2019, 41(03): 479-484.
|
| [4] |
GUO Xue1,LI Zheng2,ZHANG He3,RONG Guoping3,WEN Junhao1.
Web service composition strategy and implementation
of composition decision-making platform
[J]. Computer Engineering & Science, 2018, 40(08): 1358-1365.
|
| [5] |
LI Yuan1,DIAO Sheng-quan1,HU Jin-zhu1,2,ZHAI Hong-sen1,YANG Meng-chuan1,HUANG Wen-can1.
Marked complex sentence hierarchy analysis
based on semantics and rules
[J]. Computer Engineering & Science, 2017, 39(12): 2306-2313.
|
| [6] |
WANG Lingjiao1,2,PENG Zhiqiang1,2,GUO Hua1,2,ZHONG Yiqun1,2.
A low power clustering protocol based on fuzzy control
[J]. Computer Engineering & Science, 2016, 38(10): 2001-2009.
|
| [7] |
GU Zhaojun,WANG Ruili.
A security situation assessment model of information system
based on improved fuzzy analytical hierarchy process
[J]. Computer Engineering & Science, 2016, 38(10): 2010-2017.
|
| [8] |
LI Gang1,FENG Zhen-qian2,ZHAO Bao-kang2,HE Qian1,YANG Hui-ya3.
An architecture for integrated spatial-terrestrial networks
[J]. Computer Engineering & Science, 2016, 38(09): 1797-1802.
|
| [9] |
CHEN Guo-jun1,LIN Xiang-hong1,DUAN Shu-feng2.
Visualization of relationship of genealogical members using metagraph
[J]. Computer Engineering & Science, 2016, 38(07): 1454-1461.
|
| [10] |
SHANG Yan,FAN Xinwei,YU Hong.
A novel node influence measurement algorithm based
on characteristics of users and propagation
[J]. J4, 2015, 37(11): 2105-2111.
|
| [11] |
TANG Ying,ZHANG Yuping,CHEN Haiyan.
A comprehensive evaluation method based on
entropy theory and measure of medium truth scale
[J]. J4, 2015, 37(05): 946-950.
|
| [12] |
MENG Yongdang1,CAI Jun1,HE Jun1,JI Feng2.
An AHP-based browser vulnerability taxonomy
[J]. J4, 2014, 36(11): 2137-2141.
|
| [13] |
MAO Li1,2,QI Deyu1.
A dynamic network performance evaluation
method based on multi-dimensional measurement
[J]. J4, 2014, 36(11): 2106-2113.
|
| [14] |
PAN Chengsheng,CHEN Zhiqiang,QIU Shaoming,SUI Lei.
Study for AHP-based access strategy
in distributed constellation network
[J]. J4, 2014, 36(05): 879-883.
|
| [15] |
SHU Bing,REN Xiujiang,ZHANG Qingbo,CHEN Fangyuan.
Adaptability analysis of data-intensive applications
on on-chip storage structure of NVIDIA Fermi
[J]. J4, 2014, 36(04): 601-606.
|