[1] |
YAO Jie, CHENG Chunling, HAN Jing, LIU Zheng.
Anomaly detection method based on multi-task temporal convolutional network in cloud workflow
[J]. Journal of Computer Applications, 2021, 41(6): 1701-1708.
|
[2] |
SHI Jinshan, LI Ru, SONG Tingting.
Blockchain-based access control framework for Internet of things
[J]. Journal of Computer Applications, 2020, 40(4): 931-941.
|
[3] |
LIU Weirong, ZHEN Hong.
Modeling and simulation of container transportation process in blockchain based container sharing mode
[J]. Journal of Computer Applications, 2019, 39(7): 2141-2147.
|
[4] |
ZHAO Shicao, XIAO Yonghao, DUAN Bowen, LI Yufeng.
HSWAP: numerical simulation workflow management platform suitable for high performance computing environment
[J]. Journal of Computer Applications, 2019, 39(6): 1569-1576.
|
[5] |
FU Shucun, FU Zhangjie, XING Guowen, LIU Qingxiang, XU Xiaolong.
Computation offloading method for workflow management in mobile edge computing
[J]. Journal of Computer Applications, 2019, 39(5): 1523-1527.
|
[6] |
SUN Huiming, DU Yuyue.
Process model mining method for multi-concurrent 2-loops of triangles
[J]. Journal of Computer Applications, 2019, 39(3): 851-857.
|
[7] |
XIA Haonan, DAI Shenghua.
Security encryption of radio block center based on colored Petri net
[J]. Journal of Computer Applications, 2018, 38(12): 3476-3480.
|
[8] |
YANG Tao, SHI Lin, SONG Mengdie, LI Shoubin, WANG Qing.
Design and implementation of process management system supporting multi-tool collaboration
[J]. Journal of Computer Applications, 2017, 37(7): 2019-2026.
|
[9] |
ZHANG Wei, SUN Tao, WAN Xiaoyun.
Simplification method for testing behavior of parallel software
[J]. Journal of Computer Applications, 2017, 37(5): 1276-1281.
|
[10] |
TANG Chaosheng, LIU Shihong, CHENG Jieren.
Model composition method of decision support system driven by double factors of state and data
[J]. Journal of Computer Applications, 2017, 37(2): 581-586.
|
[11] |
MING Li, LI Tong, QIN Jianglong, ZHENG Ming, JIANG Xudong, XIE Zhongwen.
SaaS-oriented modeling and analysis of load balancing strategy
[J]. Journal of Computer Applications, 2017, 37(1): 24-30.
|
[12] |
LI Yun, CHEN Pangsen, SUN Shanlin.
Security analysis and implementation for wireless local area network access protocol via near field communication authentication
[J]. Journal of Computer Applications, 2016, 36(5): 1236-1245.
|
[13] |
ZHANG Xinglong, LI Songli, XIAO Junchao.
Service integration-oriented workflow model and implementation method
[J]. Journal of Computer Applications, 2015, 35(7): 1993-1998.
|
[14] |
DUAN Ju, CHEN Wanghu, WANG Runping, YU Maoyi, WANG Shikai.
Execution optimization policy of scientific workflow based on cluster aggregation under cloud environment
[J]. Journal of Computer Applications, 2015, 35(6): 1580-1584.
|
[15] |
HE Hua, LIN Chuang, ZHAO Zenghua, PANG Shanchen.
null
[J]. Journal of Computer Applications, 2015, 35(5): 1255-1261.
|