[1] |
YAN Pan,TAN Ying,ZHANG Jianhua.
A method of using historical calculation data
efficiently in evolutionary algorithms
[J]. J4, 20160101, 38(01): 62-66.
|
[2] |
DU Fang, JIAO Jian, JIAO Li-bo.
An anti-forensic detection model based on causality calculation
[J]. Computer Engineering & Science, 2024, 46(07): 1229-1236.
|
[3] |
ZHAO Wen-tao, GUAN Li-he, HE Jian-guo, TANG Hao.
A privacy protection recommendation algorithm in block chain environment
[J]. Computer Engineering & Science, 2024, 46(06): 1032-1040.
|
[4] |
MA Ke-fan, LI Bao-feng, ZHOU Yue-jin, WU Yuan-yuan, YU Yong-lan, DUO Rui-hua.
Design and implementation of a baseboard management controller on ZYNQ chip
[J]. Computer Engineering & Science, 2024, 46(02): 217-223.
|
[5] |
ZHAO Zhi-qiao, ZHOU Li, XUN Chang-qing, PAN Guo-teng, TIE Jun-bo, WANG Wei-zheng.
Efficient analysis of coherent hub interface protocol mixturing hardware and software
[J]. Computer Engineering & Science, 2024, 46(02): 224-231.
|
[6] |
QIN Wen-qiang, WU Zhong-cheng, ZHANG Jun, LI Fang, .
Design of convolutional neural network acceleration system based on heterogeneous platform
[J]. Computer Engineering & Science, 2024, 46(01): 12-20.
|
[7] |
WANG Yu-lei, XIE Kai-liang, CHEN Si-yun, HU Jie, CHANG Sheng.
A universal design on hardware acceleration of convolutional neural networks
[J]. Computer Engineering & Science, 2023, 45(04): 577-581.
|
[8] |
BAI Jian-jing, GU Rui-chun, LIU Qing-he.
A DDoS attack detection scheme based on Bi-LSTM in SDN
[J]. Computer Engineering & Science, 2023, 45(02): 277-285.
|
[9] |
CHEN Qiang, TAN Lin, WANG Yun-li, XIAO Jing.
A CUDA-based data-parallel processing method in industrial blockchain
[J]. Computer Engineering & Science, 2022, 44(12): 2102-2110.
|
[10] |
LU Song, JIANG Ju-ping, REN Hui-feng.
Quick customization for RISC-V processor based on FPGA
[J]. Computer Engineering & Science, 2022, 44(10): 1747-1752.
|
[11] |
QIANG Zi-lin, LIU Jian-guo, LIU Yun-feng, WEI Dong, QIANG Yan.
A power grid image retrieval method based on time-frequency domain hash coding
[J]. Computer Engineering & Science, 2022, 44(10): 1877-1884.
|
[12] |
CHEN Zi-yu, HE Jun, GUO Xiang-yu.
Implementation of cryptographic instructions for general purpose processors
[J]. Computer Engineering & Science, 2022, 44(07): 1162-1170.
|
[13] |
CHEN Xiao-fan, YANG Zhi-jie, PENG Ling-hui, WANG Shi-ying, ZHOU Gan, LI Shi-ming, KANG Zi-yang, WANG Yao, SHI Wei, WANG Lei.
A verification framework of network on chip for neuromorphic processors
[J]. Computer Engineering & Science, 2022, 44(05): 769-778.
|
[14] |
WANG Jing, QIAN Xiao-dong.
Collaborative filtering recommendation based on local sensitive hash in blockchain environment
[J]. Computer Engineering & Science, 2022, 44(03): 436-446.
|
[15] |
LI Tie-jun, MA Ke-fan, ZHANG Jian-min.
A parallel FPGA SAT solver based on incomplete algorithm
[J]. Computer Engineering & Science, 2021, 43(12): 2126-2130.
|