Journal of Computer Applications
Received:2025-07-29
Revised:2025-09-22
Online:2025-11-05
Published:2025-11-05
田博然1,周建涛1,赵大明2
通讯作者:
田博然
CLC Number:
田博然 周建涛 赵大明. 基于树基模型的双阶段能耗特征选择方法[J]. 《计算机应用》唯一官方网站, DOI: 10.11772/j.issn.1001-9081.2025070854.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2025070854
| [1] | Mingxu GONG, Wei ZHANG, Wendi FENG, Huaping MU. Low-latency scheduling for data-dependent cryptographic services [J]. Journal of Computer Applications, 2026, 46(3): 867-876. |
| [2] | . Review of collaborative large models for network operations and maintenance [J]. Journal of Computer Applications, 0, (): 0-0. |
| [3] | Junrui WU, Jiangchuan YANG, Haisheng YU, Sai ZOU, Wenyong WANG. Performance evaluation method for deterministic networks based on complex-enhanced attention graph neural network [J]. Journal of Computer Applications, 2026, 46(2): 505-517. |
| [4] | Limei DONG, Yanzi LI, Jiayin LI, Li XU. Neighborhood-enhanced unsupervised graph anomaly detection [J]. Journal of Computer Applications, 2026, 46(2): 458-466. |
| [5] | . UAV trajectory planning for wireless sensor networks based on nonlinear age of information [J]. Journal of Computer Applications, 0, (): 0-0. |
| [6] | . RDMA based edge computing cloud-edge data communication technology [J]. Journal of Computer Applications, 0, (): 0-0. |
| [7] | Zifen HE, Deze ZENG, Lifeng TIAN, Yuepeng LI, Jiayu ZHANG. Low-latency data transmission routing method for LEO satellites considering laser antenna alignment overhead [J]. Journal of Computer Applications, 2026, 46(1): 198-206. |
| [8] | LI Huaijin, ZHANG Shibing, YANG Min. DDoS attack detection method based on DeepInsight and hybrid quantum convolutional neural network [J]. Journal of Computer Applications, 0, (): 0-0. |
| [9] | Xiang KUANG, Zhen MA, Wanchun ZHU, Zhi ZHANG, Yunfei CUI. Secure and reliable service function chain deployment based on encoder-decoder structured reinforcement learning [J]. Journal of Computer Applications, 2025, 45(12): 3947-3956. |
| [10] | Lin WEI, Shihao ZHANG, Mengyang HE. Workflow task optimization and energy-efficient offloading method for computing power network [J]. Journal of Computer Applications, 2025, 45(12): 3916-3924. |
| [11] | Haoqun ZHENG, Lizhi CAI, Kang YANG, Xiaoyu WANG. Intrusion detection method with multi-stage fusion for internet of medical things [J]. Journal of Computer Applications, 2025, 45(12): 3909-3915. |
| [12] | Ruilong CHEN, Peng YI, Tao HU, Youjun BU. Encrypted traffic classification method based on federated prototypical incremental learning [J]. Journal of Computer Applications, 2025, 45(12): 3888-3895. |
| [13] | . ADS-B attack detection method based on improved DeepLabV3+ [J]. Journal of Computer Applications, 0, (): 0-0. |
| [14] | Jingjing WANG, Mengze CHEN, Ziwei YAN, Jiaxun WANG, Zan LUO, Yakun REN, Kai LEI. Open chain-network integration architecture with semantic-rich non-fungible data element [J]. Journal of Computer Applications, 2025, 45(11): 3502-3509. |
| [15] | Lin WEI, Jinyang LI, Yajie WANG, Mengyang HE. Highly reliable matching method based on multi-dimensional resource measurement and rescheduling in computing power network [J]. Journal of Computer Applications, 2025, 45(11): 3632-3641. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||