| [1] |
SUN Xiao-le, QIAN Ya-long, QI Xin-xin, ZHANG Yun-fang, CHEN Juan, YUAN Yuan, DONG Yong.
Analysis and optimization of power consumption characteristics of Network-on-Chip
[J]. Computer Engineering & Science, 2020, 42(07): 1141-1150.
|
| [2] |
DAN Yang-chao, WANG Bin, XUE Jie, SHENG Jing-ye, LIU Chang, ZHANG Wei-wei.
Application of time-constrained Louvain algorithm in modularization of dynamic brain function network
[J]. Computer Engineering & Science, 2020, 42(07): 1158-1167.
|
| [3] |
CHEN Ru-xia, QIANG Zhen-ping, SHAO Xiao-feng, HE Li-bo.
A Retinex image enhancement algorithm based on L0-norm
[J]. Computer Engineering & Science, 2020, 42(07): 1244-1252.
|
| [4] |
LIU Shu-dong, YAO Wen-bo, ZHANG Yan.
Forest fire monitoring based on machine vision in foggy weather
[J]. Computer Engineering & Science, 2020, 42(07): 1253-1261.
|
| [5] |
HUANG Haiping,WANG Ruchuan,SUN Lijuan,SHA Chao.
A Power Management Mechanism for Wireless Sensor Networks Used by Mobile Agents
[J]. J4, 2010, 32(6): 9-12.
|
| [6] |
HUANG Qingfeng,LI Zhitang.
The Effect of the DHT Design on the Maintenance Cost Induced by Churn
[J]. J4, 2010, 32(6): 13-15.
|
| [7] |
WU Xiaoping1,XING Honggen2,SHEN Zhidong3.
Research of a Mobile Agent Secure Model Based on Distributed Trusted Measurement
[J]. J4, 2010, 32(6): 19-21.
|
| [8] |
ZHU Ming1,YIN Jianping1,CHENG Jieren1,2,LIU Qiang1,LIN Jiarun1.
A Method of Generating the MultiTargets Attack Graphs Based on Greedy Policies
[J]. J4, 2010, 32(6): 22-25.
|
| [9] |
LIN Jiarun1,YIN Jianping1,CHENG Jieren1,2,LONG Jun1,ZHU Ming1.
Research on the MultiSensor Data Fusion Technology for Network Security
[J]. J4, 2010, 32(6): 30-33.
|
| [10] |
SHEN Xueli,ZHANG Jisuo.
Reserch of Intrusion Detection Based on the BP Networks and the Improved PSO Algorithm
[J]. J4, 2010, 32(6): 34-36.
|
| [11] |
SUN Ningqing.
Based on Neural Networks and the CFSBased Feature Selection
[J]. J4, 2010, 32(6): 37-39.
|
| [12] |
WANG Haiyan, HU Ling, WANG Ruchuan.
A Trust Mechanism Based on the Trust Vector in the P2P Environment
[J]. Computer Engineering & Science, 2010, 32(5): 6-9.
|
| [13] |
ZHANG Nan, ZHANG Jianhua, CHEN Jianying.
An Intrusion Detection Mechanism Based on Immune MultiAgents in WSN
[J]. Computer Engineering & Science, 2010, 32(5): 10-14.
|
| [14] |
SUN Bocheng, QIU Yanjun, LIANG Shiqing.
A Distributed Intrusion Detection and Decision System Based on MobileAgents
[J]. Computer Engineering & Science, 2010, 32(5): 15-17.
|
| [15] |
ZHANG Hongli, HUANG Shouming.
A Mobile AgentBased IDS for Wireless Sensor Networks
[J]. Computer Engineering & Science, 2010, 32(5): 18-20.
|