| [1] |
ZHANG Yuanyin, XIAO Minguang, LIU Zhiyong, WENG Lingling, CHEN Zhiguang, LU Yutong.
Optimization of isoline and isosurface extraction algorithm based on domestic heterogeneous many-core processors
[J]. Computer Engineering & Science, 2025, 47(02): 200-209.
|
| [2] |
LIN Kai-zhi, ZONG Yan-yan, SUN Long-ling, .
Research on PCIe topology application of AI server
[J]. Computer Engineering & Science, 2022, 44(03): 390-395.
|
| [3] |
LANG Xiao-li,CAO Su-zhen,LIU Xiang-zhen,ZHANG Yu-lei,WANG Fei.
A certificateless public key authenticated searchable
encryption scheme with efficient authorization
[J]. Computer Engineering & Science, 2020, 42(03): 418-426.
|
| [4] |
WANG Cai-fen1,2,SU Shun-chang1,YANG Xiao-dong1.
A dynamically updated password
authorization multi-secret sharing scheme
[J]. Computer Engineering & Science, 2019, 41(09): 1597-1602.
|
| [5] |
ZHAO Bin1,2,HE Jingsha1, ZHANG Yixuan1,JI Xinrong1.
A risk minimization authorization model
based on knowledge discovery
[J]. J4, 2015, 37(11): 2112-2120.
|
| [6] |
OUYANG Xue,ZHOU Huan,DENG Jinzhou,REN Jiangchun.
Design and implementation of a software life
cycle oriented authorization and protection system
[J]. J4, 2013, 35(4): 59-64.
|
| [7] |
WEI Lifeng,DING Yan,CHEN Songzheng,HE Lianyue.
Research on User’s Rights Control Technology Based on Authentication Trustworthiness
[J]. J4, 2011, 33(9): 24-28.
|
| [8] |
LIU Lin1,MAO Xinjun2.
Agent,Goal and Scenario Integrated Requirement Analysis Methodology
[J]. J4, 2010, 32(6): 1-8.
|
| [9] |
TU Jie, LI Zhou-Jun, ZHANG Chong-Bin, LI Jiang.
Research on the Scenario of the Active Scanning of Web Vulnerability
[J]. J4, 2010, 32(3): 31-34.
|
| [10] |
.
[J]. J4, 2008, 30(7): 69-72.
|
| [11] |
.
[J]. J4, 2008, 30(5): 84-87.
|
| [12] |
.
[J]. J4, 2008, 30(3): 153-155.
|
| [13] |
.
[J]. J4, 2008, 30(2): 28-33.
|
| [14] |
.
[J]. J4, 2008, 30(11): 98-101.
|
| [15] |
.
[J]. J4, 2007, 29(4): 128-130.
|