[1] |
Honglei YAO, Jiqiang LIU, Endong TONG, Wenjia NIU.
Network security risk assessment method for CTCS based on α-cut triangular fuzzy number and attack tree
[J]. Journal of Computer Applications, 2024, 44(4): 1018-1026.
|
[2] |
Haiyan HU, Qiaoyan KANG, Shuo ZHAO, Jianfeng WANG, Youbin FU.
Service function chain deployment optimization method based on node comprehensive importance ranking
[J]. Journal of Computer Applications, 2023, 43(3): 860-868.
|
[3] |
Zhigang HAO, Li QIN.
Method for discovering important nodes in food safety standard reference network based on multi-attribute comprehensive evaluation
[J]. Journal of Computer Applications, 2022, 42(4): 1178-1185.
|
[4] |
Jiaju ZHANG, Huiping LIN.
Product and service quality analysis based on customer service dialogues
[J]. Journal of Computer Applications, 2022, 42(11): 3527-3533.
|
[5] |
Zhisheng SHAO, Guofu ZHANG, Zhaopin SU, Lei LI.
Dynamic testing resource allocation algorithm based on software architecture and generalized differential evolution
[J]. Journal of Computer Applications, 2021, 41(12): 3692-3701.
|
[6] |
LI Hanlu, XIE Qing, TANG Lingli, LIU Yongjian.
POI recommendation algorithm combining spatiotemporal information and POI importance
[J]. Journal of Computer Applications, 2020, 40(9): 2600-2605.
|
[7] |
LI Congdong, ZHANG Zhiwei, CAO Cejun, ZHANG Fanshun.
Impact assessment of engineering change propagation for complex products based on multiplex network
[J]. Journal of Computer Applications, 2020, 40(4): 1215-1222.
|
[8] |
LI Xian, WANG Yan, LUO Yong, ZHOU Jiliu.
Segmentation of nasopharyngeal neoplasms based on random forest feature selection algorithm
[J]. Journal of Computer Applications, 2019, 39(5): 1485-1489.
|
[9] |
REN Dongmei, ZHANG Yuyang, DONG Xinling.
Application of improved principal component analysis-Bayes discriminant analysis method to petroleum drilling safety evaluation
[J]. Journal of Computer Applications, 2017, 37(6): 1820-1824.
|
[10] |
ZHAO Dongmei, LI Hong.
Approach to network security situational element extraction based on parallel reduction
[J]. Journal of Computer Applications, 2017, 37(4): 1008-1013.
|
[11] |
LI Fumin, TONG Lingling, DU Cuilan, LI Yangxi, ZHANG Yangsen.
Weibo users credibility evaluation based on user relationships
[J]. Journal of Computer Applications, 2017, 37(3): 654-659.
|
[12] |
LIU Ying, ZHANG Tao, LI Kun, LI Nan.
Evaluation model of mobile application crowdsourcing testers
[J]. Journal of Computer Applications, 2017, 37(12): 3569-3573.
|
[13] |
ZHANG Weixiang, QI Yuhua, LI Dezhi.
Test case prioritization based on discrete particle swarm optimization algorithm
[J]. Journal of Computer Applications, 2017, 37(1): 108-113.
|
[14] |
XU Tao, MENG Ye.
Importance sorting method of organizational enities based on trace clustering
[J]. Journal of Computer Applications, 2016, 36(5): 1284-1289.
|
[15] |
HOU Shaofan, YU Lei, LI Zhibo, LI Gang.
Improved adaptive random testing algorithm based on crowding level of failure region
[J]. Journal of Computer Applications, 2016, 36(4): 1070-1074.
|