[1] |
Hao WANG, Zicheng WANG, Chao ZHANG, Yunsheng MA.
Generative adversarial network based data uncertainty quantification method
[J]. Journal of Computer Applications, 2023, 43(4): 1094-1101.
|
[2] |
YIN Fei, LONG Lingli, KONG Zheng, SHAO Han, LI Xin, QIAN Zhuzhong.
Deployment method of dockers in cluster for dynamic workload
[J]. Journal of Computer Applications, 2021, 41(6): 1581-1588.
|
[3] |
LYU Ruimin, MEI Lilin, XING Hongcha, MENG Lei, ZE Yuefeng.
Sequentiality perception quantification method of painting and calligraphy based on Markov chain
[J]. Journal of Computer Applications, 2021, 41(1): 295-299.
|
[4] |
DU Xusheng, YU Jiong, YE Lele, CHEN Jiaying.
Outlier detection algorithm based on graph random walk
[J]. Journal of Computer Applications, 2020, 40(5): 1322-1328.
|
[5] |
MAO Xinyi, NIU Jun, DING Xueer, ZHANG Kaile.
QoS verification of microservice composition platform based on model checking
[J]. Journal of Computer Applications, 2020, 40(11): 3267-3272.
|
[6] |
LI Feilong, ZHAO Chunyan, FAN Rumeng.
Solving random constraint satisfaction problems based on tabu search algorithm
[J]. Journal of Computer Applications, 2019, 39(12): 3584-3589.
|
[7] |
TANG Junyong, TIAN Penghui, WANG Hui.
Network availability based on Markov chain and quality of service
[J]. Journal of Computer Applications, 2018, 38(12): 3518-3523.
|
[8] |
WANG Zhongqiang, CHEN Jide, PENG Jian, HUANG Feihu, TONG Bo.
Airline predicting algorithm based on improved Markov chain
[J]. Journal of Computer Applications, 2017, 37(7): 2124-2128.
|
[9] |
CHENG Lingfang, GUO Gongde, CHEN Lifei.
Classification of symbolic sequences with multi-order Markov model
[J]. Journal of Computer Applications, 2017, 37(7): 1977-1982.
|
[10] |
SONG Tao, WANG Xing.
Customer behavior prediction for card consumption based on two-step clustering and hidden Markov chain
[J]. Journal of Computer Applications, 2016, 36(7): 1904-1908.
|
[11] |
XU Weishan, YU Lei, FENG Junchi, HOU Shaofan.
Software testing data generation technology based on software hierarchical model
[J]. Journal of Computer Applications, 2016, 36(12): 3454-3460.
|
[12] |
MAO Yingchi, JIE Qing, CHEN Hao.
Online abnormal event detection with spatio-temporal relationship in river networks
[J]. Journal of Computer Applications, 2015, 35(11): 3106-3111.
|
[13] |
GUO Ning MAO Jianlin WANG Rui QIAO Guanhua HU Yujie ZHANG Chuanlong.
Network throughput analysis of IEEE 802.15.4 based on M/G/1/K queuing theory
[J]. Journal of Computer Applications, 2014, 34(3): 619-622.
|
[14] |
XIAO Jiawei ZHANG Li LUO Jingyun.
Blind watermarking algorithm of double keys based on Markov chain Monte Carlo sampling
[J]. Journal of Computer Applications, 2014, 34(2): 469-472.
|
[15] |
SHI Xin ZHANG Tao LEI Luning.
Dynamic evaluation of ecological security based on set pair analysis and Markov chain
[J]. Journal of Computer Applications, 2014, 34(2): 519-522.
|