| [1] |
TANG Tao, JIANG Hao, PENG Lin, QI Haijun, LU Qingfeng.
Reproducible matrix decomposition on domestic chip
[J]. Computer Engineering & Science, 2025, 47(5): 761-774.
|
| [2] |
LI Junzhe, FU Zhenxin, YANG Honghui, MA Yinping, LI Ruomiao, FAN Chun, .
Design and implementation of a cross-cluster data migration system for computational networks
[J]. Computer Engineering & Science, 2025, 47(5): 775-786.
|
| [3] |
XIE Yang, LI Chen, CHEN Xiaowen.
A near-data processing architecture for data-intensive applications
[J]. Computer Engineering & Science, 2025, 47(5): 797-810.
|
| [4] |
CHEN Chuyi, LUO Xiongfei, YAN Baotong, FENG Yuxuan, MA Ke, QIAO Ying.
An adaptive cache management method for multi-layer recursive DNS
[J]. Computer Engineering & Science, 2025, 47(5): 823-831.
|
| [5] |
LIANG Jiajie, XU Huiying, ZHU Xinzhong, WANG Shumeng, LIU Ziyang, LI Chen.
An improved marine animal object detection algorithm based on YOLOv8n: DPSC-YOLO
[J]. Computer Engineering & Science, 2025, 47(4): 695-705.
|
| [6] |
WANG Yuheng, LIU Qiang, WU Xiaojie.
RCGNN: Robustness certification for graph neural networks under graph injection attacks
[J]. Computer Engineering & Science, 2025, 47(3): 434-447.
|
| [7] |
XIE Bin, LI Yanwei, YANG Shumin, XU Yan, WANG Guanchao.
Emotional color transfer combining image decomposition and self-sparse fuzzy clustering
[J]. Computer Engineering & Science, 2025, 47(3): 513-523.
|
| [8] |
SHEN Jie, LONG Biao, HUANG Chun, TANG Tao, PENG Lin.
Optimization of exponential and logarithm functions for vector units
[J]. Computer Engineering & Science, 2025, 47(1): 18-26.
|
| [9] |
TANG Zhu, CHEN Baohai, WANG Jingyu, ZHU Qi.
OpenOCD debugging optimization for isomorphic asymmetric multi-core architecture
[J]. Computer Engineering & Science, 2025, 47(1): 45-55.
|
| [10] |
GAO Yingying, TIAN Ye.
An image encryption algorithm based on fractional 2D-TFCDM mapping and improved Hilbert curve scrambling
[J]. Computer Engineering & Science, 2025, 47(1): 66-74.
|
| [11] |
SHEN Fan-fan, TANG Xing-yi, ZHANG Jun, XU Chao, CHEN Yong, HE Yan-xiang.
Malicious behavior detection method based on iFA and improved LSTM network
[J]. Computer Engineering & Science, 2024, 46(12): 2158-2170.
|
| [12] |
MA Jin-lin, YAN Qi, MA Zi-ping.
A multi-layer mask recognition method for Tangut characters
[J]. Computer Engineering & Science, 2024, 46(12): 2227-2238.
|
| [13] |
CAO Feng, XIE Yu, YI Jian-bing, LI Jun.
A contradiction separation unit resulting deduction method and its application
[J]. Computer Engineering & Science, 2024, 46(12): 2252-2260.
|
| [14] |
LIU He-bing, KONG Yu-jie, XI Lei, SHANG Jun-ping.
A decoupled contrastive clustering integrating attention mechanism
[J]. Computer Engineering & Science, 2024, 46(12): 2261-2270.
|
| [15] |
LI Yi-lin, ZHOU Biao.
An automatic ocular artifact removal algorithm based on channel selection and adaptive entropy threshold
[J]. Computer Engineering & Science, 2024, 46(12): 2271-2280.
|