[1] |
Cao Yan, Huang Zhiqiu, Kan Shuanglong, Peng Huanfeng,Ke Changbo.
Location-Constrained Access Control Model and Verification Methods
[J]. Journal of Computer Research and Development, 2018, 55(8): 1809-1825.
|
[2] |
Wang Ling,Meng Jianyao.
Dynamic Fuzzy Features Selection Based on Variable Weight
[J]. Journal of Computer Research and Development, 2018, 55(5): 893-907.
|
[3] |
Zhang Heng, Zhang Libo, WuYanjun.
Large-Scale Graph Processing on Multi-GPU Platforms
[J]. Journal of Computer Research and Development, 2018, 55(2): 273-288.
|
[4] |
Ji Yimu, Zhang Yongpan, Lang Xianbo, Zhang Dianchao, Wang Ruchuan.
Parallel of Decision Tree Classification Algorithm for Stream Data
[J]. Journal of Computer Research and Development, 2017, 54(9): 1945-1957.
|
[5] |
Wen Yingyou, Wang Shaopeng, Zhao Hong.
The Maximal Regular Patterns Mining Algorithm Based on Landmark Window over Data Stream
[J]. Journal of Computer Research and Development, 2017, 54(1): 94-110.
|
[6] |
Chen Donghuo, Liu Quan, Jin Haidong, Zhu Fei, Wang Hui.
A Temporal Logic with a Semantics Defined on the Static Structure and Dynamic Behavior of Program
[J]. Journal of Computer Research and Development, 2016, 53(9): 2067-2084.
|
[7] |
Duan Zhao, Tian Cong, Duan Zhenhua.
CEGAR Based Null-Pointer Dereference Checking in C Programs
[J]. Journal of Computer Research and Development, 2016, 53(1): 155-164.
|
[8] |
Wei Ou, Shi Yufeng, Xu Bingfeng, Huang Zhiqiu, Chen Zhe.
Abstract Modeling Formalisms in Software Model Checking
[J]. Journal of Computer Research and Development, 2015, 52(7): 1580-1603.
|
[9] |
Zhang Chen, Duan Zhenhua, Tian Cong, Yu Bin.
Modeling, Verification and Test of Interactive Behaviors in Distributed Software Systems
[J]. Journal of Computer Research and Development, 2015, 52(7): 1604-1619.
|
[10] |
Li Wenming, Ye Xiaochun, Wang Da, Zheng Fang, Li Hongliang, Lin Han, Fan Dongrui, Sun Ninghui.
MACT: Discrete Memory Access Requests Batch Processing Mechanism for High-Throughput Many-Core Processor
[J]. Journal of Computer Research and Development, 2015, 52(6): 1254-1265.
|
[11] |
Fu Ning,Du Chenglie,Li Jianliang,Liu Zhiqiang,Peng Han.
Analysis and Verification of AADL Hierarchical Schedulers
[J]. Journal of Computer Research and Development, 2015, 52(1): 167-176.
|
[12] |
Liu Yihai, Zhang Xiaomin, Shen Yinjun, Yu Yang.
A Distributed Underwater Target Detection Algorithm Based on Window Statistics
[J]. 计算机研究与发展, 2014, 51(8): 1880-1887.
|
[13] |
Pang Tao,Duan Zhenhua.
Symbolic Model Checking of WISHBONE on-Chip Bus
[J]. Journal of Computer Research and Development, 2014, 51(12): 2759-2771.
|
[14] |
Chen Donghuo, and Liu Quan,.
Generation of Test Cases Based on Symbolic Execution and LTL Formula Rewriting
[J]. , 2013, 50(12): 2661-2675.
|
[15] |
Zheng Liming, Zou Peng, Han Weihong, Li Aiping, and Jia Yan.
Traffic Anomaly Detection Using Multi-Dimensional Entropy Classification in Backbone Network
[J]. , 2012, 49(9): 1972-1981.
|