| [1] |
ZHUO Ling1,NIE Jing1,XIAO Jingwei1,YUAN Yang2,HU Xin1,CHEN Ke1.
A network selection algorithm in heterogeneous multinetworks
coexistence of electric power wireless communications
[J]. J4, 20160101, 38(01): 78-83.
|
| [2] |
JIA Haozhou, XU Peng , WANG Danchen, XU Yang, .
A RFID mutual authentication protocol based on a novel confusion operation
[J]. Computer Engineering & Science, 2025, 47(02): 247-255.
|
| [3] |
CAI Fapeng, FENG Ji, YANG Degang, CHEN Zhongshang.
A hierarchical clustering algorithm based on partitioning natural neighborhood graph
[J]. Computer Engineering & Science, 2025, 47(02): 370-380.
|
| [4] |
CHEN Qing-jiang, SHAO Fei, WANG Xuan-jun.
Hybrid U-shaped network and Transformer for image deblurring
[J]. Computer Engineering & Science, 2024, 46(10): 1843-1851.
|
| [5] |
HUA Yue-lin, ZHOU Xiao-lei, FAN Qiang, WANG Fang-xiao, YAN Hao, .
Learning indexing method for massive high-dimensional data based on partitioned hierarchical graph
[J]. Computer Engineering & Science, 2024, 46(07): 1193-1201.
|
| [6] |
GUO Chang-hao, TANG Xiang-yun, WENG Yu.
A data heterogeneity processing method based on asynchronous hierarchical federated learning
[J]. Computer Engineering & Science, 2024, 46(07): 1237-1244.
|
| [7] |
YANG Chun-xia, MA Wen-wen, XU Ben, HAN Yu, .
A hierarchical graph attention network text classification model that integrates label information
[J]. Computer Engineering & Science, 2023, 45(11): 2018-2026.
|
| [8] |
LI Jian-hong, SU Xiao-qian, WU Cai-hong.
Deep hierarchical attention matrix factorization
[J]. Computer Engineering & Science, 2023, 45(01): 28-36.
|
| [9] |
KOU Guang-yue, WEI Guo-heng, PING Yuan, LIU Peng.
Overview of RFID security authentication protocols
[J]. Computer Engineering & Science, 2023, 45(01): 77-84.
|
| [10] |
TANG Guang-zhen, CHEN Zhuo.
A traceable hierarchical attribute-based encryption scheme with hidden access policy
[J]. Computer Engineering & Science, 2022, 44(10): 1788-1794.
|
| [11] |
NIU Kun, GAO Zhong-he, ZHANG Fan.
An improved VIRE location algorithm for the whole region
[J]. Computer Engineering & Science, 2022, 44(09): 1602-1609.
|
| [12] |
LONG Ke-li, WANG Dong, CHEN Hu, LI Xu-jun.
An arctangent operator based on the Piecewise algorithm
[J]. Computer Engineering & Science, 2022, 44(08): 1342-1348.
|
| [13] |
ZHANG Hai-ling, SHAO Yu-bin, JIA Ji-kang, LONG Hua, DU Qing-zhi.
A hierarchical analysis algorithm of syntactic rules based on binary and ternary word models
[J]. Computer Engineering & Science, 2021, 43(07): 1316-1323.
|
| [14] |
LI Wen-hao, LI Ying-mei, BIAN Yi-xin.
Improvement of code package level refactoring based on DBSCAN algorithm
[J]. Computer Engineering & Science, 2021, 43(04): 689-696.
|
| [15] |
YANG Fan1,2,REN Shou-gang3,XU Huan-liang3,SUN Yuan-hao2,YANG Xing2.
A RFID tag number estimation algorithm
based on bit estimation
[J]. Computer Engineering & Science, 2020, 42(03): 449-455.
|