[1] |
ZHAO Zhen-yu, YANG Tian-hao, JIANG Wen-cheng, ZHANG Shu-zheng.
A machine learning-based fast calculation method of multi-voltage, multi-temperature and multi-parameter standard cell delay
[J]. Computer Engineering & Science, 2023, 45(08): 1331-1338.
|
[2] |
XIONG Guo-jie, ZHANG Jin-ming, HE Guang-hui.
Design and implementation of an efficient transmission protocol for Chiplet interconnection
[J]. Computer Engineering & Science, 2023, 45(08): 1339-1346.
|
[3] |
SUN Cai-xia, SUI Bing-cai, DENG Quan, ZHENG Zhong, NI Xiao-qiang, WANG Yong-wen.
A hybrid ISA processor compatible with RISC-V at application level
[J]. Computer Engineering & Science, 2023, 45(08): 1347-1353.
|
[4] |
MA Si-yuan, JIAO Jia-hui, REN Sheng-qi, SONG Wei.
Missing value filling for multi-variable urban air quality data based on attention mechanism
[J]. Computer Engineering & Science, 2023, 45(08): 1354-1364.
|
[5] |
SHI Ming-chuan, LONG Qiao-zhou, ZOU Hong-ji, LI Tun.
A Surrogate model-based assertion coverage improvement technology
[J]. Computer Engineering & Science, 2023, 45(08): 1365-1375.
|
[6] |
GAO Wen-cai, CHEN Xiao-wen.
A hybrid-hardening soft error tolerant NoC router
[J]. Computer Engineering & Science, 2023, 45(08): 1376-1382.
|
[7] |
WANG Xing-su, XIONG Wen, ZHANG Rui.
A massive subway passenger trajectory similarity connection method:A case study of Shenzhen metro
[J]. Computer Engineering & Science, 2023, 45(08): 1383-1392.
|
[8] |
XIA Ge-ming, YU Chao-dong, CHEN Jian.
Trust problems in edge computing:Challenges and reviews
[J]. Computer Engineering & Science, 2023, 45(08): 1393-1404.
|
[9] |
YIN Chun-yong, FENG Meng-xue.
A semi-supervised log anomaly detection method based on attention mechanism
[J]. Computer Engineering & Science, 2023, 45(08): 1405-1415.
|
[10] |
YU Zi-cheng, LING Jie.
A DGA domain name detection method based on Transformer and multi-feature fusion
[J]. Computer Engineering & Science, 2023, 45(08): 1416-1423.
|
[11] |
HOU Zhan-wei, LI Xin, WANG Hui, SHEN Zi-hao, LIU Kun, LIU Pei-qian.
A spatial crowdsourcing privacy preservation task allocation algorithm for road network
[J]. Computer Engineering & Science, 2023, 45(08): 1424-1432.
|
[12] |
YIN Jie, HUANG Xiao-yu, LIU Jia-yin, NIU Bo-wei, XIE Wen-wei, .
An Android malware detection method based on pre-trained language model
[J]. Computer Engineering & Science, 2023, 45(08): 1433-1442.
|
[13] |
.
Research on bimodal SAXS image structure characterization technique
[J]. Computer Engineering & Science, 2023, 45(08): 1443-1452.
|
[14] |
TANG Jian, CHE Wen-gang, GAO Sheng-xiang.
An image dehazing method based on multi-scale convolution with attention mechanism
[J]. Computer Engineering & Science, 2023, 45(08): 1453-1462.
|
[15] |
WU Dong-liang, LIU Zhi-gui, .
An electronic component defect detection method based on lightweight YOLOX
[J]. Computer Engineering & Science, 2023, 45(08): 1463-1471.
|