[1] |
Zeng Yifu, Mu Qilin, Zhou Le, Lan Tian, Liu Qiao.
Graph Embedding Based Session Perception Model for Next-Click Recommendation
[J]. Journal of Computer Research and Development, 2020, 57(3): 590-603.
|
[2] |
Zhao Hongke, Wu Likang, Li Zhi, Zhang Xi, Liu Qi, Chen Enhong.
Predicting the Dynamics in Internet Finance Based on Deep Neural Network Structure
[J]. Journal of Computer Research and Development, 2019, 56(8): 1621-1631.
|
[3] |
Wang Fei, Qian Tieyun, Liu Bin, Peng Zhiyong.
Low-Redundancy Knowledge Graph Management with Range Query Support
[J]. Journal of Computer Research and Development, 2019, 56(8): 1758-1771.
|
[4] |
Zhang Xiangwen, Lu Ziyao, Yang Jing, Lin Qian, Lu Yu, Wang Hongji, Su Jinsong.
Weighted Lattice Based Recurrent Neural Networks for Sentence Semantic Representation Modeling
[J]. Journal of Computer Research and Development, 2019, 56(4): 854-865.
|
[5] |
Zhang Qianlong, Hou Rui, Yang Sibo, Zhao Boyan, Zhang Lixin.
The Role of Architecture Simulators in the Process of CPU Design
[J]. Journal of Computer Research and Development, 2019, 56(12): 2702-2719.
|
[6] |
Bao Yongtang, Qi Yue.
A Survey on Image-Based Hair Modeling Technique
[J]. Journal of Computer Research and Development, 2018, 55(11): 2543-2556.
|
[7] |
Wang Jian, Zhao Guosheng, Zhao Zhongnan, Li Ke.
Formal Modeling and Factor Analysis for Vulnerability Propagation Oriented to SDN
[J]. Journal of Computer Research and Development, 2018, 55(10): 2256-2268.
|
[8] |
Liao Bin, Zhang Tao, Yu Jiong, Yin Lutong, Guo Gang, Guo Binglei.
Energy Consumption Modeling and Optimization Analysis for MapReduce
[J]. Journal of Computer Research and Development, 2016, 53(9): 2107-2131.
|
[9] |
Sun Jian, Li Zhanhuai, Zhang Xiao, Wang Huifeng, Zhao Xiaonan.
A Statistic-Based Method for Hard-Disk Power Consumption in Storage System
[J]. Journal of Computer Research and Development, 2016, 53(7): 1517-1531.
|
[10] |
Zhang Xuan, Li Tong, Wang Xu, Dai Fei, Xie Zhongwen, Yu Qian.
Non-Functional Requirements Oriented Software Process Modeling
[J]. Journal of Computer Research and Development, 2016, 53(7): 1612-1630.
|
[11] |
He Xiao, Ma Zhiyi, Shao Weizhong, Hu Changjun.
A Graphical Modeling Language for Model Transformations
[J]. Journal of Computer Research and Development, 2015, 52(9): 2145-2162.
|
[12] |
Zhang Chen, Duan Zhenhua, Tian Cong, Yu Bin.
Modeling, Verification and Test of Interactive Behaviors in Distributed Software Systems
[J]. Journal of Computer Research and Development, 2015, 52(7): 1604-1619.
|
[13] |
Tang Mingsheng, Mao Xinjun, Zhou Huiping.
Agent-Based Artificial Society Modeling Language
[J]. Journal of Computer Research and Development, 2015, 52(5): 1036-1049.
|
[14] |
Nie Xiushan, Chai Yan’e, Teng Cong.
Keyframe Extraction Method Based on Dominating Set
[J]. Journal of Computer Research and Development, 2015, 52(12): 2879-2887.
|
[15] |
Bu Ning1, Liu Yuling2, Lian Yifeng2, and Huang Liang2.
UML-Based Modeling Method of Network Security Infrastructure
[J]. 计算机研究与发展, 2014, 51(7): 1578-1593.
|