[1] |
ZHANG Jianmin, XU Weikang, LIU Jinjin, LI Tiejun.
Research advances in acceleration methods for particle transport non-deterministic simulation
[J]. Computer Engineering & Science, 2025, 47(01): 1-9.
|
[2] |
XU Chao, RUAN Rongyao, CHEN Yong, .
A blockchain-based medical data auditing method
[J]. Computer Engineering & Science, 2025, 47(01): 95-106.
|
[3] |
QI Ranran, PALIDAN Tuerxun, TANG Bochuan, QIAN Yurong, .
A road extraction method based on residual attention encoder-decoder network
[J]. Computer Engineering & Science, 2025, 47(01): 119-129.
|
[4] |
ZHANG Zheng, XIA Xiaoyun, CHEN Zefeng, XIANG Yi.
A staged strategy incorporating reinforcement learning to solve the travelling thief problem
[J]. Computer Engineering & Science, 2025, 47(01): 140-149.
|
[5] |
YU Shirui, JIANG Chunmao.
A cloud computing virtual machine scheduling strategy based on fuzzy reinforcement learning
[J]. Computer Engineering & Science, 2025, 47(01): 56-65.
|
[6] |
ZHANG Yun-quan, DENG Li, YUAN Liang, YUAN Guo-xing.
State of the art analysis of China HPC 2024
[J]. Computer Engineering & Science, 2024, 46(12): 2091-2098.
|
[7] |
TIAN Zhuo, DING Jia-xin, ZHANG Chang-you, SHAO Yun-xia.
A method for converting mesh files from open-source pre-processing software to universal finite element solver
[J]. Computer Engineering & Science, 2024, 46(12): 2109-2116.
|
[8] |
WANG Qiang, SUN Yan-jie, QI Xing-yun, XU Jia-qing.
Bowtie 2-NUMA: Gene sequence alignment application with NUMA architecture adaptability
[J]. Computer Engineering & Science, 2024, 46(12): 2117-2127.
|
[9] |
SHEN Fan-fan, TANG Xing-yi, ZHANG Jun, XU Chao, CHEN Yong, HE Yan-xiang.
Malicious behavior detection method based on iFA and improved LSTM network
[J]. Computer Engineering & Science, 2024, 46(12): 2158-2170.
|
[10] |
YANG Xu-dong, LI Qiu-yan, GAO Ling, LIU Xin, DENG Ya-ni.
A distributed location anonymization method based on multi-blockchain collaboration
[J]. Computer Engineering & Science, 2024, 46(12): 2171-2185.
|
[11] |
LIU Pei, LIU Chang-hua, LIN Qiao-ling .
An intrusion detection model for vehicular networks based on optimized feature stacking and ensemb
[J]. Computer Engineering & Science, 2024, 46(12): 2186-2195.
|
[12] |
XU Shu-ping, WEI Hao-bo, SUN Yang-yang, WAN Ya-juan.
Long-term object tracking based on template update and redetection
[J]. Computer Engineering & Science, 2024, 46(12): 2196-2204.
|
[13] |
CAO Feng, XIE Yu, YI Jian-bing, LI Jun.
A contradiction separation unit resulting deduction method and its application
[J]. Computer Engineering & Science, 2024, 46(12): 2252-2260.
|
[14] |
LI Yi-lin, ZHOU Biao.
An automatic ocular artifact removal algorithm based on channel selection and adaptive entropy threshold
[J]. Computer Engineering & Science, 2024, 46(12): 2271-2280.
|
[15] |
CHEN Zhao-hui, DUAN Xiong.
Design and implementation of an efficient memory allocation algorithm based on TLSF algorithm
[J]. Computer Engineering & Science, 2024, 46(11): 1916-1923.
|