[1] |
NI Ping, CHEN Wei.
Reflective cross-site scripting vulnerability detection based on fuzzing test
[J]. Journal of Computer Applications, 2021, 41(9): 2594-2601.
|
[2] |
ZHANG Ling, KUANG Jishun.
Multiple ring scan chains using the same test pin in round robin manner
[J]. Journal of Computer Applications, 2021, 41(7): 2156-2160.
|
[3] |
ZHANG Chen, TIAN Tian, YANG Xiuting, GONG Dunwei.
Communication coverage reduction method of parallel programs based on dominant relation
[J]. Journal of Computer Applications, 2021, 41(6): 1741-1747.
|
[4] |
DAI Tingting, ZHOU Le, YU Qinyong, HUNAG Xifeng, XIE Jun, SONG Minghui, LIU Qiao.
Cyclic iterative ontology construction method based on demand assessment and response
[J]. Journal of Computer Applications, 2020, 40(9): 2712-2718.
|
[5] |
GAO Yilu, HU Zhihua.
Path planning for automated guided vehicles based on tempo-spatial network at automated container terminal
[J]. Journal of Computer Applications, 2020, 40(7): 2155-2163.
|
[6] |
PAN Guoteng, OU Guodong, CHAO Zhanghu, LI Mengjun.
Design and implementation of Lite register model
[J]. Journal of Computer Applications, 2020, 40(5): 1369-1373.
|
[7] |
SUN Peng, XIAO Jing, ZHAO Haimeng, LIU Fan, YAN Lei, ZHAO Hongying.
Design and implementation of SIFT algorithm for UAV remote sensing image based on DSP platform
[J]. Journal of Computer Applications, 2020, 40(4): 1237-1242.
|
[8] |
XIANG Xiong, TIAN Jian.
P2P transmission scheduling optimization based on software defined network
[J]. Journal of Computer Applications, 2020, 40(3): 777-782.
|
[9] |
DU Ming, YANG Anping, ZHOU Junfeng, CHEN Ziyang, YANG Yun.
Optimized algorithm for k-step reachability queries on directed acyclic graphs
[J]. Journal of Computer Applications, 2020, 40(2): 426-433.
|
[10] |
YANG Jianxi, ZHANG Yuanli, JIANG Hua, ZHU Xiaochen.
Detection method of physical-layer impersonation attack based on deep Q-network in edge computing
[J]. Journal of Computer Applications, 2020, 40(11): 3229-3235.
|
[11] |
WANG Shuyan, ZHENG Jiani, SUN Jiaze.
Test case generation method for Web applications based on page object
[J]. Journal of Computer Applications, 2020, 40(1): 212-217.
|
[12] |
CHEN Tian, ZUO Yongsheng, AN Xin, REN Fuji.
Test data compatible compression method based on tri-state signal
[J]. Journal of Computer Applications, 2019, 39(6): 1863-1868.
|
[13] |
WANG Shuyan, WANG Rui, SUN Jiaze.
Test case generation method based on improved bacterial foraging optimization algorithm
[J]. Journal of Computer Applications, 2019, 39(3): 845-850.
|
[14] |
WANG Shuyan, YUAN Jiajuan, SUN Jiaze.
Test suite reduction method based on weak mutation criterion
[J]. Journal of Computer Applications, 2019, 39(2): 534-539.
|
[15] |
TAN Yongqi, FAN Jiancong, REN Yande, ZHOU Xiaoming.
Improved attribute reduction algorithm and its application to prediction of microvascular invasion in hepatocellular carcinoma
[J]. Journal of Computer Applications, 2019, 39(11): 3221-3226.
|