[1] |
HUANG Xiaopeng1,HUANG Chuanhe1,NONG Huangwu1,Yang Danfeng1,YANG Jinling2.
End-to-end delay in software defined networks
[J]. J4, 20160101, 38(01): 67-72.
|
[2] |
ZHANG Yufeng,LOU Fang,ZHANG Li.
Security assessment of web applications
based on software attack surface
[J]. J4, 20160101, 38(01): 73-77.
|
[3] |
TIAN Zhuo, DING Jia-xin, ZHANG Chang-you, SHAO Yun-xia.
A method for converting mesh files from open-source pre-processing software to universal finite element solver
[J]. Computer Engineering & Science, 2024, 46(12): 2109-2116.
|
[4] |
WANG Bing-bin, TANG Zhen-zhou.
An optimal placement mechanism for software-defined networking controllers based on genetic algorithm and clustering
[J]. Computer Engineering & Science, 2024, 46(11): 1971-1978.
|
[5] |
SHEN Xiao-ning, XU Ji-yong, MAO Ming-jian, CHEN Wen-yan, SONG Li-yan, .
Dynamic agile software project scheduling using dual-index group learning particle swarm optimization
[J]. Computer Engineering & Science, 2024, 46(10): 1793-1806.
|
[6] |
HUANG Zhi-rui, JIA Xin-ru, , ZHU Hao-zhe, , CHEN Chi-xiao, .
A low-power keyword spotting system with SRAM buffer and computing-in-memory
[J]. Computer Engineering & Science, 2024, 46(08): 1331-1339.
|
[7] |
SHI Yang, CHEN Zhao-yun, SUN Hai-yan, WANG Yao-hua, WEN Mei, HU Xiao.
Design of independent software stack of FT-Matrix DSP
[J]. Computer Engineering & Science, 2024, 46(06): 968-976.
|
[8] |
WANG Lei, LIU Ran-ran.
An EDAS decision making method and its application based on a novel picture fuzzy distance
[J]. Computer Engineering & Science, 2024, 46(06): 1101-1111.
|
[9] |
ZHAO Zhi-qiao, ZHOU Li, XUN Chang-qing, PAN Guo-teng, TIE Jun-bo, WANG Wei-zheng.
Efficient analysis of coherent hub interface protocol mixturing hardware and software
[J]. Computer Engineering & Science, 2024, 46(02): 224-231.
|
[10] |
JI Jun-hao, ZHANG Yu-shu, ZHAO Ruo-yu, WEN Wen-ying, DONG Li.
Adversarial visible watermark attack based on intelligent evolutionary algorithm
[J]. Computer Engineering & Science, 2024, 46(01): 63-71.
|
[11] |
DENG Xi, FAN Guang-sheng, CHEN Li-qian, LI Tun, WANG Ji.
A Verilog code verification method based on C program analysis and verification techniques
[J]. Computer Engineering & Science, 2023, 45(12): 2146-2154.
|
[12] |
WANG Ji-chang, L Gao-feng, LIU Zhong-pei, YANG Xiang-rui.
QUIC encryption and decryption offloading based on data processing unit
[J]. Computer Engineering & Science, 2023, 45(11): 1960-1969.
|
[13] |
TANG Yu, DAI Qi, YANG Zhi-wei, YANG Ai-min, CHEN Li-fang, .
A software defect prediction algorithm based on optimized random forest
[J]. Computer Engineering & Science, 2023, 45(05): 830-839.
|
[14] |
BAI Jian-jing, GU Rui-chun, LIU Qing-he.
A DDoS attack detection scheme based on Bi-LSTM in SDN
[J]. Computer Engineering & Science, 2023, 45(02): 277-285.
|
[15] |
WANG Yang, LONG Hai-yan, JIA Xi-ran, .
Research on image quality evaluation based on color differential perception of human eye
[J]. Computer Engineering & Science, 2023, 45(02): 295-303.
|