[1] |
Xu Lixin, Wu Huayao.
Collective Intelligence Based Software Engineering
[J]. Journal of Computer Research and Development, 2020, 57(3): 487-512.
|
[2] |
Qiu Yu, Wang Chi, Qi Kaiyue, Shen Yao, Li Chao, Zhang Chengmi, Guo Minyi.
A Survey of Smart Health: System Design from the Cloud to the Edge
[J]. Journal of Computer Research and Development, 2020, 57(1): 53-73.
|
[3] |
Wang Xiong, Dong Yihong, Shi Weijie, Pan Jianfei.
Progress and Challenges of Graph Summarization Techniques
[J]. Journal of Computer Research and Development, 2019, 56(6): 1338-1355.
|
[4] |
Wang Jice, Li Yilian, Jia Yan, Zhou Wei, Wang Yucheng, Wang He, Zhang Yuqing.
Survey of Smart Home Security
[J]. Journal of Computer Research and Development, 2018, 55(10): 2111-2124.
|
[5] |
Liu Dan, Chen Guisheng, Song Chuanming, He Xing, Wang Xianghai.
Research Advances in Screen Content Coding Methods
[J]. Journal of Computer Research and Development, 2017, 54(9): 2059-2076.
|
[6] |
Zhang Yuqing, Zhou Wei, Peng Anni.
Survey of Internet of Things Security
[J]. Journal of Computer Research and Development, 2017, 54(10): 2130-2143.
|
[7] |
Li Ke, Fang Binxing, Cui Xiang, Liu Qixu.
Study of Botnets Trends
[J]. Journal of Computer Research and Development, 2016, 53(10): 2189-2206.
|
[8] |
He Yuan, Zheng Xiaolong.
Research on Wireless Network Co-Existence at 2.4 GHz
[J]. Journal of Computer Research and Development, 2016, 53(1): 26-37.
|
[9] |
Shan Yanhu, Zhang Zhang, Huang Kaiqi.
Visual Human Action Recognition: History, Status and Prospects
[J]. Journal of Computer Research and Development, 2016, 53(1): 93-112.
|
[10] |
Zhang Yuqing, Fang Zhejun, Wang Kai, Wang Zhiqiang, Yue Hongzhou, Liu Qixu, He Yuan, Li Xiaoqi, Yang Gang.
Survey of Android Vulnerability Detection
[J]. Journal of Computer Research and Development, 2015, 52(10): 2167-2177.
|
[11] |
Lin Fei, Sun Yong, Ding Hong, Ren Yizhi1.
Self Stabilizing Distributed Transactional Memory Model and Algorithms
[J]. Journal of Computer Research and Development, 2014, 51(9): 2046-2057.
|
[12] |
Zhang Yuqing, Wang Kai, Yang Huan, Fang Zhejun, Wang Zhiqiang, and Cao Chen.
Survey of Android OS Security
[J]. Journal of Computer Research and Development, 2014, 51(7): 1385-1396.
|
[13] |
Li Renfa, Xie Yong, Li Rui, and Li Lang.
Survey of Cyber-Physical Systems
[J]. , 2012, 49(6): 1149-1161.
|
[14] |
Fang Binxing, Cui Xiang, and Wang Wei.
Survey of Botnets
[J]. , 2011, 48(8): 1315-1331.
|
[15] |
Xu Gang, Wang Guozhao, and Chen Xiaodiao,.
Free Form Deformation and Its Application
[J]. , 2010, 47(2): 344-352.
|