[1] |
LI Yan, CHEN Qiaoping.
Internet rumor propagation model considering non-supportive comments
[J]. Journal of Computer Applications, 2021, 41(4): 1128-1135.
|
[2] |
WANG Jiangkun, HE Kunjin, CAO Hongfei, WANG Jinqiang, ZHANG Yan.
Interactive water flow heating simulation based on smoothed particle hydrodynamics method
[J]. Journal of Computer Applications, 2020, 40(5): 1409-1414.
|
[3] |
ZHU Qianqian, LIU Yuan, LI Fu.
Bio-inspired matrix reduction and quantization method for deep neural network
[J]. Journal of Computer Applications, 2020, 40(10): 2817-2821.
|
[4] |
ZHAO Shicao, XIAO Yonghao, DUAN Bowen, LI Yufeng.
HSWAP: numerical simulation workflow management platform suitable for high performance computing environment
[J]. Journal of Computer Applications, 2019, 39(6): 1569-1576.
|
[5] |
HUANG Bin, BAO Liyong, DING Hongwei.
Construction and characteristic analysis of Chebyshev mapping system based on homogenized distribution
[J]. Journal of Computer Applications, 2019, 39(10): 2997-3001.
|
[6] |
TIAN Hao, ZHANG Gexiang, RONG Haina, Mario J. PÉREZ-JIMÉNEZ, Luis VALENCIA-CABRERA, CHEN Peng, HOU Rong, QI Dunwu.
Population model of giant panda ecosystem based on population dynamics P system
[J]. Journal of Computer Applications, 2018, 38(5): 1488-1493.
|
[7] |
GAO Jie, WU Jiangxing, HU Yuxiang, LI Junfei.
Research of control plane' anti-attacking in software-defined network based on Byzantine fault-tolerance
[J]. Journal of Computer Applications, 2017, 37(8): 2281-2286.
|
[8] |
LI Shaolei, ZHENG Jianjing, SHANG Mengmeng.
Numerical simulation of flight vehicle multi-body separation based on unstructured mesh
[J]. Journal of Computer Applications, 2016, 36(6): 1741-1744.
|
[9] |
LIU Yang, PENG Jian, LIU Tang, WANG Bin.
Routing algorithm based on layered mechanism in river underwater sensor networks
[J]. Journal of Computer Applications, 2016, 36(5): 1183-1187.
|
[10] |
HUANG Guangqiu, HE Tong, LU Qiuqin.
System dynamics relevancy analysis model based on stochastic function Petri-net
[J]. Journal of Computer Applications, 2016, 36(12): 3262-3268.
|
[11] |
NIE Xiao, CHEN Leiting.
Boundary handling algorithm for weakly compressible fluids
[J]. Journal of Computer Applications, 2015, 35(1): 206-210.
|
[12] |
FENG Liping, SONG Lipeng, WANG Hongbin, ZHAO Qingshan.
Propagation modeling and analysis of peer-to-peer botnet
[J]. Journal of Computer Applications, 2015, 35(1): 68-71.
|
[13] |
HAO Dapeng FU Weiping WANG Wen.
Mobile robot safety navigation based on time to contact
[J]. Journal of Computer Applications, 2014, 34(4): 1209-1212.
|
[14] |
XUE Peng REN Pengfei WANG Hua.
Washout control and stability analysis for cyclic traffic flows
[J]. Journal of Computer Applications, 2014, 34(2): 597-600.
|
[15] |
ZHANG Yongjun XU Xinhai.
Fault-tolerance period optimization method for computational fluid dynamics-oriented application development frameworks
[J]. Journal of Computer Applications, 2014, 34(2): 382-386.
|