[1] |
Feng Xinyue, Yang Qiusong, Shi Lin, Wang Qing, Li Mingshu.
Critical Memory Data Access Monitor Based on Dynamic Strategy Learning
[J]. Journal of Computer Research and Development, 2019, 56(7): 1470-1487.
|
[2] |
Wang Fupan, Wu Yadong, Yang Wenchao, Yang Fan, Hou Jiaxin, Liao Jing.
Design and Research of Data Glove Based on Visual Information Fusion
[J]. Journal of Computer Research and Development, 2018, 55(12): 2764-2774.
|
[3] |
Wang Juanjuan, Qiao Ying, Wang Hongan.
Graph-Based Auto-Driving Reasoning Task Scheduling
[J]. Journal of Computer Research and Development, 2017, 54(8): 1693-1702.
|
[4] |
Wang Juanjuan, Wang Hongan.
Multi-Agent Multi-Criticality Scheduling Based Self-Healing System of Power Grid
[J]. Journal of Computer Research and Development, 2017, 54(4): 720-730.
|
[5] |
Yang Yang, Wu Ji, Yuan Chunchun, Liu Chao, Yang Haiyan, Xing Liang.
Objectives Conformity Argument Patterns for Software Testing Process in DO-178C
[J]. Journal of Computer Research and Development, 2017, 54(3): 654-668.
|
[6] |
Zhang Xiaohang,Li Guoliang, Feng Jianhua.
Theme-Aware Task Assignment in Crowd Computing on Big Data
[J]. Journal of Computer Research and Development, 2015, 52(2): 309-317.
|
[7] |
Xiong Jinbo, Yao Zhiqiang, Ma Jianfeng, Li Fenghua, and Li Qi.
Action-Based Multilevel Access Control for Structured Document
[J]. , 2013, 50(7): 1399-1408.
|
[8] |
Xu Ronglong, and Liu Zhengjie.
A Prediction Model of 3D Menu Performance on Mobile Phone
[J]. , 2013, 50(4): 891-899.
|
[9] |
Ye Jun, Tan Qingping, and Li Tun.
The Property Inference of Aspect-Oriented Program
[J]. , 2013, 50(2): 344-351.
|
[10] |
Lü Zhiguo, Li Yan , and Xu Xin.
Research on Fast 3D Hand Motion Tracking System
[J]. , 2012, 49(7): 1398-1407.
|
[11] |
Sun Cong, Tang Liyong, Chen Zhong, and Ma Jianfeng.
Secure Information Flow in Java by Optimized Reachability Analysis of Weighted Pushdown System
[J]. , 2012, 49(5): 901-912.
|
[12] |
He Yanxiang, Wu Wei, Chen Yong, Li Qingan, and Liu Jianbo.
A Kind of Safe Typed Memory Model for C-Like Languages
[J]. , 2012, 49(11): 2440-2449.
|
[13] |
Li Chao, Yin Lihua, and Guo Yunchuan,.
Analysis for Probabilistic and Timed Information Flow Security Properties via ptSPA
[J]. , 2011, 48(8): 1370-1380.
|
[14] |
Zhu Yingjie, Li Chunpeng, Ma Wanli, Xia Shihong, Zhang Tielin, and Wang Zhaoqi.
Interaction Feature Modeling of Virtual Object in Immersive Virtual Assembly
[J]. , 2011, 48(7): 1298-1306.
|
[15] |
Chen Shi, Ma Tianjun, and Gao Youxing.
Gait Recognition Using Distributions of Silhouette Feature
[J]. , 2009, 46(2): 295-301.
|