[1] |
Liu Chaojie, Wang Fang, Zou Xiaomin, Feng Dan.
A Scalable Timestamp-Based Durable Software Transactional Memory
[J]. Journal of Computer Research and Development, 2022, 59(3): 499-517.
|
[2] |
Zhang Jingwei, Liu Shaojian, Yang Qing, Zhou Ya.
DMFUCP: A Distributed Mining Framework for Universal Companion Patterns on Large-Scale Trajectory Data
[J]. Journal of Computer Research and Development, 2022, 59(3): 647-660.
|
[3] |
Miao Xue, Guo Xi, Wang Zhaoshun, Xie Yonghong.
Convex Polygon Tree for Indexing Field-of-Views
[J]. Journal of Computer Research and Development, 2022, 59(3): 706-719.
|
[4] |
Fang Yuan, Wang Lizhen, Wang Xiaoxuan, Yang Peizhong.
Spatial Occupancy-Based Dominant Co-Location Patterns Mining
[J]. Journal of Computer Research and Development, 2022, 59(2): 264-281.
|
[5] |
Xu Tiancheng, Qiao Shaojie, Wu Jun, Han Nan, Yue Kun, Yi Yugen, Huang Faliang, Yuan Chang’an.
A Spatial Crowdsourcing Task Assignment Approach Based on Spatio-Temporal Location Prediction
[J]. Journal of Computer Research and Development, 2022, 59(2): 310-328.
|
[6] |
Zhang Tianming, Xu Yiheng, Cai Xinwei, Fan Jing.
A Shortest Path Query Method over Temporal Graphs
[J]. Journal of Computer Research and Development, 2022, 59(2): 362-375.
|
[7] |
Shen Zhengchen, Zhang Qianli, Zhang Chaofan, Tang Xiangyu, Wang Jilong.
Location Privacy Attack Based on Deep Learning
[J]. Journal of Computer Research and Development, 2022, 59(2): 390-402.
|
[8] |
Zhou Peng, Wu Yanjun, Zhao Chen.
Identify Linux Security Vulnerability Fix Patches Automatically
[J]. Journal of Computer Research and Development, 2022, 59(1): 197-208.
|
[9] |
Ding Xue’er, Niu Jun, Zhang Kaile, Mao Xinyi.
Code Search Method Based on the Reachability Analysis of Petri Nets
[J]. Journal of Computer Research and Development, 2022, 59(1): 236-250.
|
[10] |
Cheng Haodong, Han Meng, Zhang Ni, Li Xiaojuan, Wang Le.
Closed High Utility Itemsets Mining over Data Stream Based on Sliding Window Model
[J]. Journal of Computer Research and Development, 2021, 58(11): 2500-2514.
|
[11] |
Xiao Tianming, Guan Jianbo, Jian Songlei, Ren Yi, Zhang Jianfeng, Li Bao.
Software Vulnerability Detection Method Based on Code Property Graph and Bi-GRU
[J]. Journal of Computer Research and Development, 2021, 58(8): 1668-1685.
|
[12] |
Wang Ye, Chen Junwu, Xia Xin, Jiang Bo.
Intelligent Requirements Elicitation and Modeling: A Literature Review
[J]. Journal of Computer Research and Development, 2021, 58(4): 683-705.
|
[13] |
Bao Yang, Yang Zhibin, Yang Yongqiang, Xie Jian, Zhou Yong, Yue Tao, Huang Zhiqiu, Guo Peng.
An Automated Approach to Generate SysML Models from Restricted Natural Language Requirements in Chinese
[J]. Journal of Computer Research and Development, 2021, 58(4): 706-730.
|
[14] |
Wang Chunhui, Jin Zhi, Zhao Haiyan, Cui Muyuan.
An Approach for Improving the Requirements Quality of User Stories
[J]. Journal of Computer Research and Development, 2021, 58(4): 731-748.
|
[15] |
Zhong Renyi, WangChong, Liang Peng, Luo Zhong.
Automatic Trend Analysis of Mobile App Updates Based on App Changelogs
[J]. Journal of Computer Research and Development, 2021, 58(4): 763-776.
|