[1] |
ZHANG Hua-nan1,JIN Hong2.
A flooding protocol of wireless sensor
network based on connected dominating set
[J]. Computer Engineering & Science, 2019, 41(12): 2143-2153.
|
[2] |
ZHONG He1,LIU Hui1,CUI Tao2,WANG Kun1,HE Ye2,SHEN Lihua1,YANG Bo1,HE Ruijian1,ZHU Zhouyuan3,HU Jinghong4,CHEN Zhangxing1.
A new scalable parallel simulator for
polymer flooding in naturally fractured reservoirs
[J]. Computer Engineering & Science, 2019, 41(06): 993-1000.
|
[3] |
CHEN Shi-jun1,WANG Hui-qiang2,CHEN Da-wei1,LIU Xiu-bing2,HU Hai-jing2.
A base station placement optimization algorithm
based on improved tabu search
[J]. Computer Engineering & Science, 2018, 40(02): 341-347.
|
[4] |
ZHANG Peng1,2,FENG Xu-xiang1,GE Xiao-qing1.
A hardware resource allocation method for multi-antenna
ground station based on improved genetic algorithm
#br#
[J]. Computer Engineering & Science, 2017, 39(06): 1155-1163.
|
[5] |
LI Dong-jie,HE An-hua.
Face detection and location tracking based on Mega2560
[J]. Computer Engineering & Science, 2016, 38(10): 2100-2108.
|
[6] |
CHENG Xueqing1,2,WU Zhongkai3,JIA Jiangtao1,LIU Xingwen1.
Time reliability analysis on transportation
process of loading stations
[J]. J4, 2016, 38(06): 1252-1256.
|
[7] |
YU Xin,XIE Mian,LI Chenyu.
Solving non-Lipschitz optimization problems by
smoothing neural networks
[J]. J4, 2015, 37(12): 2262-2269.
|
[8] |
WANG Xiaojing.
A data-based rapid checking method of
GSM system antenna feeder interference
[J]. J4, 2014, 36(10): 1906-1910.
|
[9] |
YUAN Lei1,ZHANG Qilin1,2,WANG Xianpei2,ZHAO Yongbiao1.
Vulnerability analysis of substation
automation system based on CML
[J]. J4, 2013, 35(3): 168-172.
|
[10] |
LIU Yonglan,LIU Jinmang,HE Zhenghong.
Study on the Locating Precision of Target’s Height Based on 3R and the Atmospheric Refraction
[J]. J4, 2012, 34(11): 190-196.
|
[11] |
ZHANG Qilin1,2,YUAN Lei1,ZHAO Yongbiao1,TANG Zhiqian3.
An Evaluation Method of Power Quality for GridConnected PV Plants Based on GAHP
[J]. J4, 2012, 34(10): 182-186.
|
[12] |
CHI Yaping 1,QI Youjun2,WEI Zhanzhen1,FANG Yong1.
An Improved Remote Anonymous Attestation Scheme Based on Privacy CA
[J]. J4, 2012, 34(1): 38-42.
|
[13] |
LI Xinyan,LI Jie,ZHANG Jing.
A DHTBased CrossProtocol PeertoPeer Resource Sharing Model
[J]. J4, 2010, 32(4): 97-100.
|
[14] |
XU Cong-Yuan, LIU Mo-Jun.
A Model of Resource DiscoveryBased on Mobile Agents in Grid
[J]. J4, 2010, 32(1): 109-112.
|
[15] |
.
[J]. J4, 2008, 30(9): 96-98.
|