[1] |
ZHANG Meng, LI Weihua.
Influence maximization algorithm based on user interactive representation
[J]. Journal of Computer Applications, 2021, 41(7): 1964-1969.
|
[2] |
WU Zhihan, CUI Zhe, LIU Ting, PU Hongquan.
Secure electronic voting scheme based on blockchain
[J]. Journal of Computer Applications, 2020, 40(7): 1989-1995.
|
[3] |
FAN Wei, DUAN Bokun, HUANG Rui, LIU Ting, ZHANG Ning.
Interactive augmentation method for aircraft engine borescope inspection images based on style transfer
[J]. Journal of Computer Applications, 2020, 40(12): 3631-3636.
|
[4] |
YAO Luji, ZHANG Li.
Design and implementation of Chinese architecture history teaching system based on mixed reality technology
[J]. Journal of Computer Applications, 2019, 39(9): 2689-2694.
|
[5] |
SHUI Liucheng, LIU Weizhong, FENG Zhuoming.
Automatic image annotation based on generative adversarial network
[J]. Journal of Computer Applications, 2019, 39(7): 2129-2133.
|
[6] |
PU Yuwen, HU Haibo, HE Lingjun.
Visual analytics on trajectory of pseudo base-stations based on SMS spam collected from mobilephone users
[J]. Journal of Computer Applications, 2018, 38(4): 1207-1212.
|
[7] |
WANG Zhenzhen, WU Yingjie.
Stability analysis of interactive development between manufacturing enterprise and logistics enterprise based on Logistic-Volterra model
[J]. Journal of Computer Applications, 2018, 38(2): 589-595.
|
[8] |
YANG Huanhuan, LI Tianrui, CHEN Xindi.
Visualization of time series data based on spiral graph
[J]. Journal of Computer Applications, 2017, 37(9): 2443-2448.
|
[9] |
LI Yingying, GAO Wei, GAO Yuchen, ZHAI Shengwei, LI Pengyuan.
Method for exploiting function level vectorization on simple instruction multiple data extensions
[J]. Journal of Computer Applications, 2017, 37(8): 2200-2208.
|
[10] |
ZHANG Suping, HAN Lin, DING Lili, WANG Pengxiang.
New improved algorithm for superword level parallelism
[J]. Journal of Computer Applications, 2017, 37(2): 450-456.
|
[11] |
ZHANG Ning, ZHONG Shan.
Mechanism of personal privacy protection based on blockchain
[J]. Journal of Computer Applications, 2017, 37(10): 2787-2793.
|
[12] |
WANG Yonghui, LI Yuxin, GUO Song, YUAN Shuai.
Fast arc detection algorithm based on tangent lines matching
[J]. Journal of Computer Applications, 2016, 36(4): 1126-1131.
|
[13] |
LI Guoliang, WEI Zhenhua, XU Lei.
Wolf pack algorithm based on modified search strategy
[J]. Journal of Computer Applications, 2015, 35(6): 1633-1636.
|
[14] |
SHI Wang, YANG Yingjie, TANG Huilin, DONG Lipeng.
Building protocol interactive process based on message sequence chart
[J]. Journal of Computer Applications, 2015, 35(5): 1373-1378.
|
[15] |
XU Jinlong, ZHAO Rongcai, HAN Lin.
Vector exploring path optimization algorithm of superword level parallelism with subsection constraints
[J]. Journal of Computer Applications, 2015, 35(4): 950-955.
|