[1] |
Xu Kunhao, Nie Tiezheng, Shen Derong, Kou Yue, Yu Ge.
Parallel String Similarity Join Approach Based on CPU-GPU Heterogeneous Architecture
[J]. Journal of Computer Research and Development, 2021, 58(3): 598-608.
|
[2] |
Yang Fan, Li Fei, Shu Jiwu.
Survey on Secure Persistent Memory Storage
[J]. Journal of Computer Research and Development, 2020, 57(5): 912-927.
|
[3] |
Zeng Yifu, Mu Qilin, Zhou Le, Lan Tian, Liu Qiao.
Graph Embedding Based Session Perception Model for Next-Click Recommendation
[J]. Journal of Computer Research and Development, 2020, 57(3): 590-603.
|
[4] |
Tan Jian, Luo Qiaoling, Wang Liyi, Hu Xiahui, Fan Hao, Xu Zhan.
Data Constraint Generation Technology for Microprocessor Instruction Verification Based on SMT Solver
[J]. Journal of Computer Research and Development, 2020, 57(12): 2694-2702.
|
[5] |
Feng Tao, Wang Shuaishuai, Gong Xiang, Fang Junli.
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
[J]. Journal of Computer Research and Development, 2020, 57(11): 2312-2327.
|
[6] |
Zhang Chentong, Zhang Jiaying, Zhang Zhixing, Ruan Tong, He Ping, Ge Xiaoling .
Construction of Large-Scale Disease Terminology Graph with Common Terms
[J]. Journal of Computer Research and Development, 2020, 57(11): 2467-2477.
|
[7] |
Wang Guoqing, Zhuang Lei, He Mengyang, Song Yu, Ma Ling.
Calculation Principle and Algorithm for the Window of Exact Acceleration in Real-Time Model Checking
[J]. Journal of Computer Research and Development, 2020, 57(1): 214-226.
|
[8] |
Zhao Hongke, Wu Likang, Li Zhi, Zhang Xi, Liu Qi, Chen Enhong.
Predicting the Dynamics in Internet Finance Based on Deep Neural Network Structure
[J]. Journal of Computer Research and Development, 2019, 56(8): 1621-1631.
|
[9] |
Wang Fei, Qian Tieyun, Liu Bin, Peng Zhiyong.
Low-Redundancy Knowledge Graph Management with Range Query Support
[J]. Journal of Computer Research and Development, 2019, 56(8): 1758-1771.
|
[10] |
Miao Chunyu, Chen Lina, Wu Jianjun, Zhou Jiaqing, Feng Xuhang.
Node Location Verification Framework for WSN
[J]. Journal of Computer Research and Development, 2019, 56(6): 1231-1243.
|
[11] |
Zhang Xiangwen, Lu Ziyao, Yang Jing, Lin Qian, Lu Yu, Wang Hongji, Su Jinsong.
Weighted Lattice Based Recurrent Neural Networks for Sentence Semantic Representation Modeling
[J]. Journal of Computer Research and Development, 2019, 56(4): 854-865.
|
[12] |
Wang Qiang, Zhou Fucai, Xuan Pengkai, Wu Qiyu.
Publicly Verifiable Database Model with Full Operations Based on Bilinear Map
[J]. Journal of Computer Research and Development, 2019, 56(3): 521-532.
|
[13] |
Zhang Qianlong, Hou Rui, Yang Sibo, Zhao Boyan, Zhang Lixin.
The Role of Architecture Simulators in the Process of CPU Design
[J]. Journal of Computer Research and Development, 2019, 56(12): 2702-2719.
|
[14] |
Cao Yan, Huang Zhiqiu, Kan Shuanglong, Peng Huanfeng,Ke Changbo.
Location-Constrained Access Control Model and Verification Methods
[J]. Journal of Computer Research and Development, 2018, 55(8): 1809-1825.
|
[15] |
Zhuo Xinxin, Bai Xiaoying, Xu Jing, Li Enpeng, Liu Yu, Kang Jiehui, Song Wenli.
A Tool for Automatic Service Interface Testing
[J]. Journal of Computer Research and Development, 2018, 55(2): 358-376.
|