[1] |
Wu Zhijun, Zhang Rudan, Yue Meng.
A Method for Joint Detection of Attacks in Named Data Networking
[J]. Journal of Computer Research and Development, 2021, 58(3): 569-582.
|
[2] |
Li Song, Hu Yanming, Hao Xiaohong, Zhang Liping, Hao Zhongxiao.
Approximate k-Nearest Neighbor Query of High Dimensional Data Based on Dimension Grouping and Reducing
[J]. Journal of Computer Research and Development, 2021, 58(3): 609-623.
|
[3] |
Zhang Yunjie, Zhang Xuan, Wang Xu, Ren Junmin, Tang Ziqi.
A Qualitative Evaluation Approach for Requirement Change Technical Debt Based on Marginal Contribution
[J]. Journal of Computer Research and Development, 2021, 58(1): 208-223.
|
[4] |
Wang Tao, Chen Wei, Li Juan, Liu Shaohua, Su Lingang, Zhang Wenbo.
Association Mining Based Consistent Service Configuration
[J]. Journal of Computer Research and Development, 2020, 57(1): 188-201.
|
[5] |
Guo Yingjie, Liu Xiaoyan, Wu Chenxi, Guo Maozu,Li Ao.
U-Statistics and Ensemble Learning Based Method for Gene-Gene Interaction Detection
[J]. Journal of Computer Research and Development, 2018, 55(8): 1683-1693.
|
[6] |
Yu Bowen, Pu Lingjun, Xie Yuting, Xu Jingdong, Zhang Jianzhong.
Joint Task Offloading and Base Station Association in Mobile Edge Computing
[J]. Journal of Computer Research and Development, 2018, 55(3): 537-550.
|
[7] |
Jia Xibin, Jin Ya, Chen Juncheng.
Domain Alignment Based on Multi-Viewpoint Domain-Shared Feature for Cross-Domain Sentiment Classification
[J]. Journal of Computer Research and Development, 2018, 55(11): 2439-2451.
|
[8] |
Zhang Chun, Zhou Jing.
Optimization Algorithm of Association Rule Mining for EMU Operation and Maintenance Efficiency
[J]. Journal of Computer Research and Development, 2017, 54(9): 1958-1965.
|
[9] |
Yu Guoxian, Wang Keyao, Fu Guangyuan, Wang Jun, Zeng An.
Protein Function Prediction Based on Multiple Networks Collaborative Matrix Factorization
[J]. Journal of Computer Research and Development, 2017, 54(12): 2660-2673.
|
[10] |
Niu Xinzheng, Wang Chongyi, Ye Zhijia, She Kun.
An Efficient Association Rule Hiding Algorithm Based on Cluster and Threshold Interval
[J]. Journal of Computer Research and Development, 2017, 54(12): 2785-2796.
|
[11] |
Jiang Shujuan, Han Han, Shi Jiaojiao, Zhang Yanmei, Ju Xiaolin, Qian Junyan.
Detecting Infeasible Paths Based on Branch Correlations Analysis
[J]. Journal of Computer Research and Development, 2016, 53(5): 1072-1085.
|
[12] |
WangWei,LiTong,HeYun,LiHao.
A Hybrid Approach for Ripple Effect Analysis of Software Evolution Activities
[J]. Journal of Computer Research and Development, 2016, 53(3): 503-516.
|
[13] |
Li Pengyuan, Pan Haiwei, Li Qing, Han Qilong, Xie Xiaoqin, Zhang Zhiqiang.
Top-k Medical Images Query Based on Association Graph
[J]. Journal of Computer Research and Development, 2015, 52(9): 2033-2045.
|
[14] |
Hu Zhaohua, Yuan Xiaotong, Li Jun, He Jun.
Robust Fragments-Based Tracking with Multi-Feature Joint Kernel Sparse Representation
[J]. Journal of Computer Research and Development, 2015, 52(7): 1692-1704.
|
[15] |
Shen Yan, Zhu Yuquan, Liu Chunhua.
Incremental FP_GROWTH Algorithm Based on Disk-resident 1-itemsets Counting
[J]. Journal of Computer Research and Development, 2015, 52(3): 569-578.
|