[1] |
Rui TANG, Chuanlin PANG, Ruizhi ZHANG, Chuan LIU, Shibo YUE.
DDPG-based resource allocation in D2D communication-empowered cellular network
[J]. Journal of Computer Applications, 2024, 44(5): 1562-1569.
|
[2] |
Yu WANG, Zhihui GUAN, Yuanpeng LI.
Distributed UAV cluster pursuit decision-making based on trajectory prediction and MADDPG
[J]. Journal of Computer Applications, 2024, 44(11): 3623-3628.
|
[3] |
Zhengkai DING, Qiming FU, Jianping CHEN, You LU, Hongjie WU, Nengwei FANG, Bin XING.
Ultra-short-term photovoltaic power prediction by deep reinforcement learning based on attention mechanism
[J]. Journal of Computer Applications, 2023, 43(5): 1647-1654.
|
[4] |
Lin ZHAO, Ke LYU, Jing GUO, Chen HONG, Xiancai XIANG, Jian XUE, Yong WANG.
UAV cluster cooperative combat decision-making method based on deep reinforcement learning
[J]. Journal of Computer Applications, 2023, 43(11): 3641-3646.
|
[5] |
Hanlun LI, Jianguo REN.
Malware propagation model based on characteristic behavior detection in P2P networks
[J]. Journal of Computer Applications, 2022, 42(7): 2125-2131.
|
[6] |
Qing TAN, Hui LI, Haolin WU, Zhuang WANG, Shuchao DENG.
Intrinsic curiosity method based on reward prediction error
[J]. Journal of Computer Applications, 2022, 42(6): 1822-1828.
|
[7] |
Shaobin DENG, Jun ZHU, Xiaofeng ZHOU, Shuai LI, Shurui LIU.
Industrial process control method based on local policy interaction exploration-based deep deterministic policy gradient
[J]. Journal of Computer Applications, 2022, 42(5): 1642-1648.
|
[8] |
WANG Jianping, WANG Gang, MAO Xiaobin, MA Enqi.
Motion control method of two-link manipulator based on deep reinforcement learning
[J]. Journal of Computer Applications, 2021, 41(6): 1799-1804.
|
[9] |
XIANG Xiong, TIAN Jian.
P2P transmission scheduling optimization based on software defined network
[J]. Journal of Computer Applications, 2020, 40(3): 777-782.
|
[10] |
ZHANG Ning, CHEN Qin.
Ensemble learning training method based on AUC and Q statistics
[J]. Journal of Computer Applications, 2019, 39(4): 935-939.
|
[11] |
ZHANG Ning, CHEN Qin.
P2P loan default prediction model based on TF-IDF algorithm
[J]. Journal of Computer Applications, 2018, 38(10): 3042-3047.
|
[12] |
YAN Binghao, HAN Guodong, HUANG Yajing, WANG Xiaolong.
New traffic classification method for imbalanced network data
[J]. Journal of Computer Applications, 2018, 38(1): 20-25.
|
[13] |
LIU Jing, ZHAO Wenju.
Fast content distribution method of integrating P2P technology in cloud platform
[J]. Journal of Computer Applications, 2017, 37(1): 31-36.
|
[14] |
ZHANG Qingfeng, WANG Sheng, LIAO Dan.
Nash bargaining based resource allocation in peer-to-peer network
[J]. Journal of Computer Applications, 2015, 35(9): 2424-2429.
|
[15] |
ZHANG Baojun, PAN Ruifang.
Architecture of new generation blog system with cloud storage
[J]. Journal of Computer Applications, 2015, 35(8): 2158-2163.
|