[1] |
Shipan JIANG, Shuwei CHEN, Guoyan ZENG.
Strategy of invalid clause elimination in first-order logic theorem prover
[J]. Journal of Computer Applications, 2024, 44(3): 677-682.
|
[2] |
Zhongyu WANG, Xiaodong QIAN.
Optimization of edge connection rules for supply chain network based on improved expectation maximization algorithm
[J]. Journal of Computer Applications, 2024, 44(11): 3386-3395.
|
[3] |
Jihui LIU, Chengwan HE.
Online detection of SQL injection attacks based on ECA rules and dynamic taint analysis
[J]. Journal of Computer Applications, 2023, 43(5): 1534-1542.
|
[4] |
LI Xingjia, YANG Qiuhui, HONG Mei, PAN Chunxia, LIU Ruihang.
Test case prioritization approach based on historical data and multi-objective optimization
[J]. Journal of Computer Applications, 2023, 43(1): 221-226.
|
[5] |
Liqun ZHANG, Haitao LIN, Wenming HUAN, Wenting BI.
Software defined network flow rule conflict detection system based on OpenFlow
[J]. Journal of Computer Applications, 2022, 42(2): 528-533.
|
[6] |
Shunkun YU, Hongxu YAN.
Heuristic attribute value reduction model based on certainty factor
[J]. Journal of Computer Applications, 2022, 42(2): 469-474.
|
[7] |
Duoqin LI, Xianwen FANG.
Process modeling recommendation method based on behavioral profile definition target rules
[J]. Journal of Computer Applications, 2022, 42(1): 223-229.
|
[8] |
ZHANG Linfa, ZHANG Yufeng, WANG Kun, LI Zhiyao.
Medical image fusion with intuitionistic fuzzy set and intensity enhancement
[J]. Journal of Computer Applications, 2021, 41(7): 2082-2091.
|
[9] |
LYU Jia, XIAN Yan.
Co-training algorithm combining improved density peak clustering and shared subspace
[J]. Journal of Computer Applications, 2021, 41(3): 686-693.
|
[10] |
QIU Ningjia, WANG Xiaoxia, WANG Peng, WANG Yanchun.
Analysis of double-channel Chinese sentiment model integrating grammar rules
[J]. Journal of Computer Applications, 2021, 41(2): 318-323.
|
[11] |
Xuanyi LI, Yun ZHOU.
BNSL-FIM: Bayesian network structure learning algorithm based on frequent item mining
[J]. Journal of Computer Applications, 2021, 41(12): 3475-3479.
|
[12] |
Tao WANG, Cong JIN, Xiaobing LI, Yun TIE, Lin QI.
Multi-track music generative adversarial network based on Transformer
[J]. Journal of Computer Applications, 2021, 41(12): 3585-3589.
|
[13] |
YANG Shuxin, LIANG Wen, ZHU Kaili.
Reverse influence maximization algorithm in social networks
[J]. Journal of Computer Applications, 2020, 40(7): 1944-1949.
|
[14] |
XUE Feng, SHI Xuhua, SHI Feifan.
Surrogate-based differential evolution constrained optimization
[J]. Journal of Computer Applications, 2020, 40(4): 1091-1096.
|
[15] |
WANG Chunying, ZHANG Xun, ZHAO Jinxiong, YUAN Hui, LI Fangjun, ZHAO Bo, ZHU Xiaoqin, YANG Fan, LYU Shichao.
Analysis of attack events based on multi-source alerts
[J]. Journal of Computer Applications, 2020, 40(1): 123-128.
|