[1] |
Yu Chang, Wang Yawen, Lin Huan, Gong Yunzhan.
Fault Detection Context Based Equivalent Mutant Identification Algorithm
[J]. Journal of Computer Research and Development, 2021, 58(1): 83-97.
|
[2] |
Wang Jina, Chen Junhua, Gao Jianhua.
ECC Multi-Label Code Smell Detection Method Based on Ranking Loss
[J]. Journal of Computer Research and Development, 2021, 58(1): 178-188.
|
[3] |
Zhang Yunjie, Zhang Xuan, Wang Xu, Ren Junmin, Tang Ziqi.
A Qualitative Evaluation Approach for Requirement Change Technical Debt Based on Marginal Contribution
[J]. Journal of Computer Research and Development, 2021, 58(1): 208-223.
|
[4] |
Yu Yaxin, Zhang Wenchao, Li Zhenguo, Li Ying.
Hypergraph-Based Personalized Recommendation & Optimization Algorithm in EBSN
[J]. Journal of Computer Research and Development, 2020, 57(12): 2556-2570.
|
[5] |
Shen Jie, Long Biao, Jiang Hao, Huang Chun.
Implementation and Optimization of Vector Trigonometric Functions on Phytium Processors
[J]. Journal of Computer Research and Development, 2020, 57(12): 2610-2620.
|
[6] |
Ma Qingyun, Ji Hangxu, Zhao Yuhai, Mao Keming, Wang Guoren.
An Efficient Data Partitioning Method in Distributed Heterogeneous Bandwidth Environment
[J]. Journal of Computer Research and Development, 2020, 57(12): 2683-2693.
|
[7] |
Tan Jian, Luo Qiaoling, Wang Liyi, Hu Xiahui, Fan Hao, Xu Zhan.
Data Constraint Generation Technology for Microprocessor Instruction Verification Based on SMT Solver
[J]. Journal of Computer Research and Development, 2020, 57(12): 2694-2702.
|
[8] |
Chen Yubiao, Li Jianzhong, Li Yingshu.
SBS: An Efficient R-Tree Query Algorithm Exploiting the Internal Parallelism of SSDs
[J]. Journal of Computer Research and Development, 2020, 57(11): 2404-2418.
|
[9] |
Wang Xin’ao, Duan Lei, Cui Dingshan, Lu Li, Dun Yijie, Qin Ruiqi.
Search of Students with Similar Lifestyle Based on Campus Behavior Information Network
[J]. Journal of Computer Research and Development, 2020, 57(11): 2442-2455.
|
[10] |
Du Yuefeng, Li Xiaoguang, Song Baoyan.
Discovering Consistency Constraints for Associated Data on Heterogeneous Schemas
[J]. Journal of Computer Research and Development, 2020, 57(9): 1939-1948.
|
[11] |
Du Ming, Yang Yun, Zhou Junfeng, Chen Ziyang, Yang Anping.
Efficient Methods for Label-Constraint Reachability Query
[J]. Journal of Computer Research and Development, 2020, 57(9): 1949-1960.
|
[12] |
Zhao Xiaofei, Shi Zhongzhi, Liu Jianwei.
Structural Integrity Checking Based on Logically Independent Fragment of Metadata
[J]. Journal of Computer Research and Development, 2020, 57(9): 1961-1970.
|
[13] |
Zhang Shikun, Xie Rui, Ye Wei, Chen Long.
Keyword-Based Source Code Summarization
[J]. Journal of Computer Research and Development, 2020, 57(9): 1987-2000.
|
[14] |
Yu Yaxin, Liu Meng, Zhang Hongyu.
Research on User Behavior Understanding and Personalized Service Recommendation Algorithm in Twitter Social Networks
[J]. Journal of Computer Research and Development, 2020, 57(7): 1369-1380.
|
[15] |
Liu Runtao, Liang Jianchuang.
Reverse Nearest Neighbor Query Based on New Index Structure
[J]. Journal of Computer Research and Development, 2020, 57(6): 1335-1346.
|