Citation: | Liang Yinghong, Zhao Tiejun, Liu Bo, Yang Muyun. English Text Chunking Based on Headword Extending and the Evaluation of Relative-Degree[J]. Journal of Computer Research and Development, 2006, 43(1): 153-158. |
[1] | Cui Yuanning, Li Jing, Shen Li, Shen Yang, Qiao Lin, Bo Jue. Duration-HyTE: A Time-Aware Knowledge Representation Learning Method Based on Duration Modeling[J]. Journal of Computer Research and Development, 2020, 57(6): 1239-1251. DOI: 10.7544/issn1000-1239.2020.20190253 |
[2] | Li Junfei, Hu Yuxiang, Wu Jiangxing. Research on Improving the Control Plane’s Reliability in SDN Based on Byzantine Fault-Tolerance[J]. Journal of Computer Research and Development, 2017, 54(5): 952-960. DOI: 10.7544/issn1000-1239.2017.20160055 |
[3] | Tian Hongbo, Zhang Xingjun, Zhao Xiaoyi, Dong Xiaoshe, and Wu Weiguo. Reliability and Performance Model of Tree-Structured Grid Services Based on Multivariate Exponential Distribution[J]. Journal of Computer Research and Development, 2011, 48(7): 1190-1201. |
[4] | Li Haifeng, Li Qiuying, and Lu Minyan. Software Reliability Modeling with Logistic Test Coverage Function[J]. Journal of Computer Research and Development, 2011, 48(2): 232-240. |
[5] | Yu Jiong, Tian Guozhong, Cao Yuanda, Sun Xianhe. A Resource Allocating Algorithm in Grid Workflow Based on Critical Regions Reliability[J]. Journal of Computer Research and Development, 2009, 46(11): 1821-1829. |
[6] | Ren Xiaoxi, Li Renfa, Jin Shengzhen, Zhang Kehuan, Wu Qiang. Research on Reliability of a Reconfigurable Data Processing System Based on JBits[J]. Journal of Computer Research and Development, 2007, 44(4): 722-728. |
[7] | Zhou Xuehai, Yu Jie, Li Xi, and Wand Zhigang. Research on Reliability Evaluation of Cache Based on Instruction Behavior[J]. Journal of Computer Research and Development, 2007, 44(4): 553-559. |
[8] | Wu Zhendong and Li Shanping. A Topology Control Algorithm Based on Link Reliability and Multi-Path for Sensor Networks[J]. Journal of Computer Research and Development, 2007, 44(2): 216-222. |
[9] | Yang Pei, Gao Yang, Chen Zhaoqian. Believability based Iterated Belief Revision[J]. Journal of Computer Research and Development, 2005, 42(8): 1293-1298. |
[10] | Wang Lunwei, Liao Xiangke, and Wang Huaimin. Research on Authentication Trustworthiness Theory[J]. Journal of Computer Research and Development, 2005, 42(3). |