| [1] |
SU Yuhang, MA Jun, FAN Jinyu, CHEN Bohang, ZHOU Jiacheng, YIN Boran.
A WSN data stream anomaly detection algorithm based on GATv2-TCN joint optimization
[J]. Computer Engineering & Science, 2025, 47(05): 843-850.
|
| [2] |
CHEN Zi-xiong, CHEN Xu, JING Yong-jun, SONG Ji-fei.
A survey of source code vulnerability detection research based on graph neural networks
[J]. Computer Engineering & Science, 2024, 46(10): 1775-1792.
|
| [3] |
QIAO Guan-jie, L Gao-feng, TAN Jing, MO Lu-sha.
Optimization of cold and hot flows replacement in large-scale data flow statistics
[J]. Computer Engineering & Science, 2021, 43(09): 1567-1573.
|
| [4] |
ZHU Guang-lin, L Fang, LAI Qing-kuan, CHEN Hua-ying, HE Xian-bo, .
An aggressive butterfly optimization method in compiler
[J]. Computer Engineering & Science, 2021, 43(06): 962-968.
|
| [5] |
CUI Lizhen,LI Xiaoyu,HU Haidong,GAO Lili.
A coverage hole recovery algorithm with minimum
energy consumption based on polar coordinates in WSNs
[J]. Computer Engineering & Science, 2018, 40(10): 1766-1771.
|
| [6] |
YANG Sheng-zhe,YU Jun-qing,TANG Jiu-fei.
Dynamic task scheduling and optimization of data flow program
[J]. Computer Engineering & Science, 2017, 39(07): 1201-1210.
|
| [7] |
FEI Xiongwei1,2,LI Kenli2,YANG Wangdong1,2.
A highperformance parallel encryption algorithm for streams
[J]. Computer Engineering & Science, 2017, 39(02): 258-266.
|
| [8] |
YANG Qiuji,YU Junqing,MO Binsheng,HE Yunfeng.
A data flow programming model and
compiler optimization for Storm
[J]. Computer Engineering & Science, 2016, 38(12): 2409-2418.
|
| [9] |
ZHANG Yu.
Research on multimedia software engineering
[J]. J4, 2014, 36(A2): 186-188.
|
| [10] |
OUYANG Xue,ZHOU Huan,DENG Jinzhou,REN Jiangchun.
Design and implementation of a software life
cycle oriented authorization and protection system
[J]. J4, 2013, 35(4): 59-64.
|
| [11] |
CHAI Yu1,ZHOU Xuechun2.
Research of the Maximum Power Point Tracking Algorithm Based on Fuzzy Control
[J]. J4, 2012, 34(3): 142-147.
|
| [12] |
WU Ling,MA Ji.
[J]. J4, 2011, 33(7): 141-147.
|
| [13] |
.
[J]. J4, 2008, 30(5): 156-158.
|
| [14] |
.
[J]. J4, 2007, 29(9): 94-96.
|
| [15] |
.
[J]. J4, 2006, 28(9): 67-70.
|