| [1] |
Xiayu WU, Hong ZHANG.
Review of evolution and changes in crowd evacuation calculation methods
[J]. Journal of Computer Applications, 2026, 46(4): 1309-1322.
|
| [2] |
Kaile YU, Jiajun LIAO, Jiali MAO, Xiaopeng HUANG.
Multi-objective optimization of steel logistics vehicle-cargo matching under multiple constraints
[J]. Journal of Computer Applications, 2025, 45(8): 2477-2483.
|
| [3] |
Tianyu XUE, Aiping LI, Liguo DUAN.
Vehicular edge computing scheme with task offloading and resource optimization
[J]. Journal of Computer Applications, 2025, 45(6): 1766-1775.
|
| [4] |
Pengcheng XU, Lei HE, Chuan LI, Weiqi QIAN, Tun ZHAO.
Deep symbolic regression method based on Transformer
[J]. Journal of Computer Applications, 2025, 45(5): 1455-1463.
|
| [5] |
Huahua WANG, Liang HUANG, Jiajie CHEN, Jiening FANG.
Dynamic allocation algorithm for multi-beam subcarriers of low orbit satellites based on deep reinforcement learning
[J]. Journal of Computer Applications, 2025, 45(2): 571-577.
|
| [6] |
Jing WANG, Xuming FANG.
Intelligent joint power and channel allocation algorithm for Wi-Fi7 multi-link integrated communication and sensing
[J]. Journal of Computer Applications, 2025, 45(2): 563-570.
|
| [7] |
Xiang KUANG, Zhen MA, Wanchun ZHU, Zhi ZHANG, Yunfei CUI.
Secure and reliable service function chain deployment based on encoder-decoder structured reinforcement learning
[J]. Journal of Computer Applications, 2025, 45(12): 3947-3956.
|
| [8] |
Lin WEI, Shihao ZHANG, Mengyang HE.
Workflow task optimization and energy-efficient offloading method for computing power network
[J]. Journal of Computer Applications, 2025, 45(12): 3916-3924.
|
| [9] |
Chengyi WANG, Lei XU, Jinyin CHEN, Hongjun QIU.
Cyber anti-mapping method based on adaptive perturbation
[J]. Journal of Computer Applications, 2025, 45(12): 3896-3908.
|
| [10] |
Xiaojuan CHEN, Wei ZHANG.
Task allocation of unmanned aerial vehicle for rural last-mile delivery based on reinforcement learning
[J]. Journal of Computer Applications, 2025, 45(12): 4055-4063.
|
| [11] |
Jun ZENG, Yinghua TONG, Defang WANG.
Anomaly detection method based on cumulative probability fluctuation and automated clustering
[J]. Journal of Computer Applications, 2025, 45(12): 3864-3871.
|
| [12] |
Haoxiang XU, Dunhui YU, Yichen DENG, Kui XIAO.
Knowledge graph constrained question answering model based on hierarchical reinforcement learning
[J]. Journal of Computer Applications, 2025, 45(12): 3764-3770.
|
| [13] |
Shuai ZHOU, Hao FU, Wei LIU.
Spatial-temporal Transformer-based hybrid return implicit Q-learning for crowd navigation
[J]. Journal of Computer Applications, 2025, 45(11): 3666-3673.
|
| [14] |
Yanpeng ZHANG, Yuqian ZHAO, Fan ZHANG, Tenghai QIU, Gui GUI, Lingli YU.
Capacitated vehicle routing problem solving method based on improved MAML and GVAE
[J]. Journal of Computer Applications, 2025, 45(11): 3642-3648.
|
| [15] |
Lin WEI, Jinyang LI, Yajie WANG, Mengyang HE.
Highly reliable matching method based on multi-dimensional resource measurement and rescheduling in computing power network
[J]. Journal of Computer Applications, 2025, 45(11): 3632-3641.
|