[1] |
MA Jin-lin, YAN Qi, MA Zi-ping.
A multi-layer mask recognition method for Tangut characters
[J]. Computer Engineering & Science, 2024, 46(12): 2227-2238.
|
[2] |
CAO Feng, XIE Yu, YI Jian-bing, LI Jun.
A contradiction separation unit resulting deduction method and its application
[J]. Computer Engineering & Science, 2024, 46(12): 2252-2260.
|
[3] |
LIU He-bing, KONG Yu-jie, XI Lei, SHANG Jun-ping.
A decoupled contrastive clustering integrating attention mechanism
[J]. Computer Engineering & Science, 2024, 46(12): 2261-2270.
|
[4] |
LI Yi-lin, ZHOU Biao.
An automatic ocular artifact removal algorithm based on channel selection and adaptive entropy threshold
[J]. Computer Engineering & Science, 2024, 46(12): 2271-2280.
|
[5] |
MAO Run-ze, WU Zi-heng, XU Jia-yang, ZHANG Yan, CHEN Zhi, .
DeepFlame: An open-source platform for reacting flow simulations empowered by deep learning and high-performance computing
[J]. Computer Engineering & Science, 2024, 46(11): 1901-1907.
|
[6] |
CHEN Zhao-hui, DUAN Xiong.
Design and implementation of an efficient memory allocation algorithm based on TLSF algorithm
[J]. Computer Engineering & Science, 2024, 46(11): 1916-1923.
|
[7] |
LIU Qing, WANG He-ming, Lv Fang-xu, ZHANG Geng, Lv Dong-bin.
A low-jitter Retimer circuit for high-performance computer optical interconnection
[J]. Computer Engineering & Science, 2024, 46(11): 1940-1948.
|
[8] |
HUANG Shan, WU Yu-fan, L He-xuan, DUAN Xiao-dong, .
A heterogeneous differential synchronous parallel training algorithm
[J]. Computer Engineering & Science, 2024, 46(11): 1949-1959.
|
[9] |
WANG Tian-yang, LI Xiao-hui, CHEN Hong-yang.
A personalized differential privacy protection scheme for multidimensional data of participatory sensing devices
[J]. Computer Engineering & Science, 2024, 46(11): 1997-2006.
|
[10] |
XU Xin, LI Ruo-shi, YUAN Ye, LIU Na.
Semantic segmentation of foggy driving scenes based on learnable image filter
[J]. Computer Engineering & Science, 2024, 46(11): 2027-2034.
|
[11] |
FU Yan, YANG Xu, YE Ou.
A smoke recognition method based on CNN and Transformer feature fusion
[J]. Computer Engineering & Science, 2024, 46(11): 2045-2052.
|
[12] |
LI Gong-jin, SHAO Yu-bin, DU Qing-zhi, LONG Hua, MA Di-nan.
Toxic comments detection based on bidirectional capsule network
[J]. Computer Engineering & Science, 2024, 46(10): 1765-1774.
|
[13] |
CHEN Zi-xiong, CHEN Xu, JING Yong-jun, SONG Ji-fei.
A survey of source code vulnerability detection research based on graph neural networks
[J]. Computer Engineering & Science, 2024, 46(10): 1775-1792.
|
[14] |
CHEN Chang-feng, ZHAO Hong-zhou, ZHOU Kai-qing.
Code plagiarism detection based on graph neural network
[J]. Computer Engineering & Science, 2024, 46(10): 1815-1824.
|
[15] |
ZHANG Yue, ZHANG Lei, LIU Bai-long, LIANG Zhi-zhen, ZHANG Xue-fei.
Multi-spatial scale traffic prediction model based on spatio-temporal Transformer
[J]. Computer Engineering & Science, 2024, 46(10): 1852-1863.
|