[1] |
LI Hui, JU Peng-jin, JI Yong-xing.
Error tracing and location technology in multi-processor cache coherence verification
[J]. Computer Engineering & Science, 2022, 44(07): 1171-1180.
|
[2] |
CAO Suzhen,WANG Fei,LANG Xiaoli.
A secure electronic transaction protocol with privacy protection
[J]. Computer Engineering & Science, 2019, 41(04): 626-632.
|
[3] |
WU Zhenwei,ZHANG Wenzhe.
A concurrent linked list based on
hardware transactional memory
[J]. Computer Engineering & Science, 2018, 40(增刊S1): 154-158.
|
[4] |
CHEN Ting1,2,LIU Jianxun1,2,CAO Buqing1,2,LI Run2.
Web services clustering based on Biterm topic model
[J]. Computer Engineering & Science, 2018, 40(10): 1737-1745.
|
[5] |
DUAN Yucong1,SHAO Lixu1,CAO Buqing2,SUN Xiaobing3,QI Lianyong4.
An investment defined transaction processing optimization
approach with collaborative storage and computation adaptation
[J]. Computer Engineering & Science, 2018, 40(08): 1383-1389.
|
[6] |
LIU Shiwen1,5,MA Duoyao2,4,LEI Cheng1,3,5,YIN Shaodong2,4,ZHANG Hongqi1,5.
An active defense technique based
on network security awareness
[J]. Computer Engineering & Science, 2018, 40(06): 1057-1061.
|
[7] |
ZHANG Shao-shuai,YUAN Jin-sheng.
A WSN security situational awareness
model based on set pair analysis
[J]. Computer Engineering & Science, 2017, 39(03): 505-511.
|
[8] |
BAI Tian1,LI Guo-hui2.
A sensor transaction scheduling algorithm on multiprocessor platforms
[J]. Computer Engineering & Science, 2016, 38(08): 1609-1614.
|
[9] |
LI Yingzhi1,XIAO Laiyuan2.
A study on the smart city server system
based on contextaware technology
[J]. J4, 2016, 38(03): 443-448.
|
[10] |
SUN Ziwen1,LIU Jiajie2,JI Zhicheng1.
Agent based D-S data fusion in wireless sensor networks
[J]. J4, 2014, 36(10): 1919-1924.
|
[11] |
CHEN Daqian,REN Guangwei.
Reflections on community e-government
network security and data sharing
[J]. J4, 2014, 36(09): 1705-1710.
|
[12] |
WANG Jun,LIU Lei,ZHANG Long,LI Sikun.
Multi-core transaction level modeling and
multi-view co-verification environment
[J]. J4, 2014, 36(05): 821-827.
|
[13] |
GUO Lanlan,WANG Hui,CHEN Xiangtao.
Research of immune self-learning Web service emergence method
based on biological neuro-endocrine immune system
[J]. J4, 2014, 36(04): 713-718.
|
[14] |
JIANG Jianhong1,LUO Mei2.
Growth pattern analysis of seller’s
credit based on C2C transactions
[J]. J4, 2014, 36(04): 758-764.
|
[15] |
ZHOU Jie,REN Jiangchun,WANG Zhiying,CHENG Yong,MEI Songzhu.
A Petri net based Web services composition security dynamic detecting technology
[J]. J4, 2014, 36(02): 250-257.
|