[1] |
ZHANG Xiaofei, YANG Yang, HUANG Jiajin, ZHONG Ning.
Degree centrality based method for cognitive feature selection
[J]. Journal of Computer Applications, 2021, 41(9): 2767-2772.
|
[2] |
ZHANG Ling, KUANG Jishun.
Multiple ring scan chains using the same test pin in round robin manner
[J]. Journal of Computer Applications, 2021, 41(7): 2156-2160.
|
[3] |
XIE Wenbo, WEI Yongzhuang, LIU Zhenghong.
Parallel implementation and analysis of SKINNY encryption algorithm using CUDA
[J]. Journal of Computer Applications, 2021, 41(4): 1136-1141.
|
[4] |
TIAN Zhihong, ZHAO Jindong.
Overview of blockchain consensus mechanism for internet of things
[J]. Journal of Computer Applications, 2021, 41(4): 917-929.
|
[5] |
BAO Yulong, ZHU Xueyang, ZHANG Wenhui, SUN Pengfei, ZHAO Yingqi.
Formal verification of smart contract for access control in IoT applications
[J]. Journal of Computer Applications, 2021, 41(4): 930-938.
|
[6] |
ZHANG Lingzhe, HUANG Xiangdong, QIAO Jialin, GOU Wangminhao, WANG Jianmin.
Two-stage file compaction framework by log-structured merge-tree for time series data
[J]. Journal of Computer Applications, 2021, 41(3): 618-622.
|
[7] |
HU Lihua, ZUO Weijian, NIE Yaoyao.
Feature matching method based on weighted similarity measurement
[J]. Journal of Computer Applications, 2021, 41(2): 511-516.
|
[8] |
LI Xiuyan, LIU Mingxi, SHI Wenbo, DONG Guofang.
Efficient dynamic data audit scheme for resource-constrained users
[J]. Journal of Computer Applications, 2021, 41(2): 422-432.
|
[9] |
YANG Xianfeng, GUI Hongjun, FU Chunchang.
F-X domain predictive filtering parallel algorithm based on compute unified device architecture
[J]. Journal of Computer Applications, 2021, 41(2): 486-491.
|
[10] |
FU Kui, LIANG Shaoqing, LI Bing.
Commodity recommendation model based on improved deep Q network structure
[J]. Journal of Computer Applications, 2020, 40(9): 2613-2621.
|
[11] |
SHI Jiaqi, TAN Li, TANG Xiaojiang, LIAN Xiaofeng, WANG Haoyu.
Wireless sensor network deployment algorithm based on basic architecture
[J]. Journal of Computer Applications, 2020, 40(7): 2033-2037.
|
[12] |
CHENG Xiaohui, NIU Tong, WANG Yanjun.
Wireless sensor network intrusion detection system based on sequence model
[J]. Journal of Computer Applications, 2020, 40(6): 1680-1684.
|
[13] |
XU Jinrong, GUO Caiping, TONG Endong.
Time-aware QoS prediction for SOA-based remote sensing image processing platform
[J]. Journal of Computer Applications, 2020, 40(6): 1714-1721.
|
[14] |
SHI Jinshan, LI Ru, SONG Tingting.
Blockchain-based access control framework for Internet of things
[J]. Journal of Computer Applications, 2020, 40(4): 931-941.
|
[15] |
WANG Shuman, LI Aiping, DUAN Liguo, FU Jia, CHEN Yongle.
Service discovery method for Internet of Things based on Biterm topic model
[J]. Journal of Computer Applications, 2020, 40(2): 459-464.
|