[1] |
Zheng XIE, Zihao WANG, Dan TANG, Hang ZHANG, Hongliang CAI.
Double fault tolerant array code with low compilation complexity
[J]. Journal of Computer Applications, 2023, 43(9): 2766-2774.
|
[2] |
ZHENG Shangwen, LIU Yao, ZHOU Tanping, YANG Xiaoyuan.
Optimized CKKS scheme based on learning with errors problem
[J]. Journal of Computer Applications, 2021, 41(6): 1723-1728.
|
[3] |
XU Zhiqiang, JIANG Tiegang, YANG Libo.
Stochastic support selection based generalized orthogonal matching pursuit algorithm
[J]. Journal of Computer Applications, 2020, 40(4): 1104-1108.
|
[4] |
Wenli WU, Guohua LIU, Junbao ZHANG.
Complexity analysis of functional query answering on big data
[J]. Journal of Computer Applications, 2020, 40(2): 416-419.
|
[5] |
ZHAO Kunsong, YU Dunhui, ZHANG Wanshan.
Priority calculation method of software crowdsourcing task release
[J]. Journal of Computer Applications, 2018, 38(7): 2032-2036.
|
[6] |
YU Dunhui, WANG Yi, ZHANG Wanshan.
Ability dynamic measurement algorithm for software crowdsourcing workers
[J]. Journal of Computer Applications, 2018, 38(12): 3612-3617.
|
[7] |
ZHOU Wei, GUO Mengyu, XIANG Danlei.
Improved QRD-M detection algorithm for spatial modulation system
[J]. Journal of Computer Applications, 2018, 38(10): 2950-2954.
|
[8] |
JIN Pengfei, NIU Baoning, ZHANG Xingzhong.
KSRG: an efficient optimal route query algorithm for multi-keyword coverage
[J]. Journal of Computer Applications, 2017, 37(2): 352-359.
|
[9] |
HANG Bo, WANG Yi, KANG Changqing.
Computational complexity optimization for mobile audio bandwidth extension
[J]. Journal of Computer Applications, 2016, 36(2): 516-520.
|
[10] |
LI Shenghua, ZHAO Hannuo, LUO Lianfei.
Construction of binary three-order cyclotomic sequences with 3-valued autocorrelation and large linear complexity
[J]. Journal of Computer Applications, 2015, 35(9): 2542-2545.
|
[11] |
PENG Xindong, YANG Yong.
Information measures for interval-valued fuzzy soft sets and their clustering algorithm
[J]. Journal of Computer Applications, 2015, 35(8): 2350-2354.
|
[12] |
HAO Yanbin, GUO Xiao, YANG Naiding.
Computing method of attribute granule structure of information system based on incremental computation
[J]. Journal of Computer Applications, 2015, 35(7): 1915-1920.
|
[13] |
HAN Guanghui ZENG Cheng.
Improvement of Boyer-Moore string matching algorithm
[J]. Journal of Computer Applications, 2014, 34(3): 865-868.
|
[14] |
GUAN Xiang YANG Xiaoyuan WEI Yuechuan LIU Longfei.
Integral attack on SNAKE(2) block cipher
[J]. Journal of Computer Applications, 2014, 34(10): 2831-2833.
|
[15] |
WEI Hongru ZHEN Yafei WANG Xinyu.
Biclique cryptanalysis of ARIRANG-256
[J]. Journal of Computer Applications, 2014, 34(1): 69-72.
|