[1] |
Zheng Wenping, Wu Zhikang, Yang Gui.
A Novel Algorithm for Identifying Critical Nodes in Networks Based on Local Centrality
[J]. Journal of Computer Research and Development, 2019, 56(9): 1872-1880.
|
[2] |
Zheng Wenping, Che Chenhao, Qian Yuhua, Wang Jie.
A Two-Stage Community Detection Algorithm Based on Label Propagation
[J]. Journal of Computer Research and Development, 2018, 55(9): 1959-1971.
|
[3] |
Pan Weifeng, Jiang Bo, Li Bing, Hu Bo, Song Beibei.
Interactive Service Recommendation Based on Composition History
[J]. Journal of Computer Research and Development, 2018, 55(3): 613-628.
|
[4] |
Chen Junyu, Zhou Gang, Nan Yu, Zeng Qi.
Semi-Supervised Local Expansion Method for Overlapping Community Detection
[J]. Journal of Computer Research and Development, 2016, 53(6): 1376-1388.
|
[5] |
WangYing,YuHai,ZhuZhiliang.
A Class Integration Test Order Method Based on the Node Importance of Software
[J]. Journal of Computer Research and Development, 2016, 53(3): 517-530.
|
[6] |
PanWeifeng,LiBing,ZhouXiaoyan,HePeng.
Regression Test Case Prioritization Based on Bug Propagation Network
[J]. Journal of Computer Research and Development, 2016, 53(3): 550-558.
|
[7] |
Li Quangang, Liu Qiao, Qin Zhiguang.
Modeling and Simulation of Communication Network Based on Topic Model
[J]. Journal of Computer Research and Development, 2016, 53(1): 206-215.
|
[8] |
Peng Min, Huang Jiajia, Zhu Jiahui, Huang Jimin, Liu Jiping.
Mass of Short Texts Clustering and Topic Extraction Based on Frequent Itemsets
[J]. Journal of Computer Research and Development, 2015, 52(9): 1941-1953.
|
[9] |
Shen Yan, Zhu Yuquan, Liu Chunhua.
Incremental FP_GROWTH Algorithm Based on Disk-resident 1-itemsets Counting
[J]. Journal of Computer Research and Development, 2015, 52(3): 569-578.
|
[10] |
Wang Le, Feng Lin, Wang Shui.
An Algorithm of Mining TOP-K High Utility Patterns Without Generating Candidates
[J]. Journal of Computer Research and Development, 2015, 52(2): 445-455.
|
[11] |
Liu Zhihong, Zeng Yong, Wu Hongliang, Ma Jianfeng.
Controlling Complex Networks via Influence
[J]. Journal of Computer Research and Development, 2014, 51(12): 2788-2796.
|
[12] |
Ge Xin, Zhao Hai, and Zhang Jun.
Degree Correlation and Its Features of Spreading on Networks
[J]. , 2013, 50(4): 741-749.
|
[13] |
Liu Dayou, Jin Di, He Dongxiao, Huang Jing, Yang Jianning, and Yang Bo,.
Community Mining in Complex Networks
[J]. , 2013, 50(10): 2140-2154.
|
[14] |
Shen Yan, , Song Shunlin, and Zhu Yuquan.
Mining Algorithm of Association Rules Based on Disk Table Resident FP-TREE
[J]. , 2012, 49(6): 1313-1322.
|
[15] |
Guo Chi, Wang Lina, Guan Yiping, and Zhang Xiaoying.
A Network Immunization Strategy Based on Dynamic Preference Scan
[J]. , 2012, 49(4): 717-724.
|