[1] |
Ouyang Dantong, Gao Han, Xu Yini, Zhang Liming.
Minimal Conflict Set Solving Method Combined with Fault Logic Relationship
[J]. Journal of Computer Research and Development, 2020, 57(7): 1472-1480.
|
[2] |
Ou Yan, Feng Yujing, Li Wenming, Ye Xiaochun, Wang Da, Fan Dongrui.
Optimum Research on Inner-Inst Memory Access Conflict for Dataflow Architecture
[J]. Journal of Computer Research and Development, 2019, 56(12): 2720-2732.
|
[3] |
Deng Zhaoyong, Ouyang Dantong, Geng Xuena, Liu Jie.
Computing the Minimal Hitting Sets with Dynamic Maximum Element Coverage Value
[J]. Journal of Computer Research and Development, 2018, 55(4): 791-801.
|
[4] |
Xu Yini, Ouyang Dantong, Liu Meng, Zhang Liming, Zhang Yonggang.
Algorithm of Computing Minimal Conflict Sets Based on the Structural Feature of Fault Output
[J]. Journal of Computer Research and Development, 2018, 55(11): 2386-2394.
|
[5] |
Song Jinfeng, Wen Lijie, Wang Jianmin.
A Similarity Measure for Process Models Based on Task Occurrence Relations
[J]. Journal of Computer Research and Development, 2017, 54(4): 832-843.
|
[6] |
Huang Xiaohui, Li Dong, Shi Hailong, Cui Li.
EasiRCC: A Method of Rule-Matching and Conflict Resolution for Smart Home
[J]. Journal of Computer Research and Development, 2017, 54(12): 2711-2720.
|
[7] |
Zhu Suxia, Chen Deyun, Ji Zhenzhou, Sun Guanglu, Zhang Hao.
A Concurrent Memory Race Recording Algorithm for Snoop-Based Coherence
[J]. Journal of Computer Research and Development, 2016, 53(6): 1238-1248.
|
[8] |
Luo Jun, Zhao Chuanzhi, Wang Fei.
An Efficient Privilege Manage Method Based on RBAC
[J]. Journal of Computer Research and Development, 2016, 53(5): 1000-1008.
|
[9] |
Ma Ruxia, Meng Xiaofeng, Wang Lu, Shi Yingjie.
MTruths:An Approach of Multiple Truths Finding from Web Information
[J]. Journal of Computer Research and Development, 2016, 53(12): 2858-2866.
|
[10] |
Ma Ruxia, Meng Xiaofeng.
Truth Discovery Based Credibility of Data Categories on Data Sources
[J]. Journal of Computer Research and Development, 2015, 52(9): 1931-1940.
|
[11] |
Chen Hao,Wang Rui,Sun Rongli,Xiao Kejiang, Cui Li.
DSlT: An Evidence Reasoning Method for Information Fusion in Wireless Sensor Networks
[J]. Journal of Computer Research and Development, 2015, 52(4): 972-982.
|
[12] |
Wang Yiyuan, Ouyang Dantong, Zhang Liming, Zhang Yonggang.
A Method of Computing Minimal Hitting Sets Using CSP
[J]. Journal of Computer Research and Development, 2015, 52(3): 588-595.
|
[13] |
Zhang Degan, Song Xiaodong, Zheng Ke, Liang Yanpin.
A Kind of New Anti-Collision Approach Based on AID
[J]. Journal of Computer Research and Development, 2015, 52(12): 2725-2735.
|
[14] |
Zhu Suxia, Ji Zhenzhou, Li Dong, and Zhang Hao.
A Cyclic Memory Race Recording Algorithm Implemented with Hardware Signatures
[J]. Journal of Computer Research and Development, 2014, 51(5): 1149-1157.
|
[15] |
Wu Yinghong, Huang Hao, Zeng Qingkai.
Description of Service Oriented Access Control Policy Refinement
[J]. Journal of Computer Research and Development, 2014, 51(11): 2470-2482.
|