Citation: | Ji Xiaohui, Zhang Jian. An Efficient and Complete Method for Solving Mixed Constraints[J]. Journal of Computer Research and Development, 2006, 43(3): 551-556. |
[1] | Zhou Junkai, Wang Nian, Cui Li. EasiLTOM: Signal Activity Interval Recognition Based on Local Dynamic Threshold[J]. Journal of Computer Research and Development, 2022, 59(4): 826-833. DOI: 10.7544/issn1000-1239.20200662 |
[2] | Zhang Zhuhong, Tao Juan. Micro-Immune Optimization Approach Solving Nonlinear Interval Number Programming[J]. Journal of Computer Research and Development, 2014, 51(12): 2633-2643. DOI: 10.7544/issn1000-1239.2014.20131091 |
[3] | Zhou Hongbo, Jin Dahai, and Gong Yunzhan. Application of Interval Arithmetic in Software Testing Based on Field-Sensitive Point-to Analysis[J]. Journal of Computer Research and Development, 2012, 49(9): 1852-1862. |
[4] | Wang Yawen, Yao Xinhong, Gong Yunzhan, Yang Zhaohong. A Method of Buffer Overflow Detection Based on Static Code Analysis[J]. Journal of Computer Research and Development, 2012, 49(4): 839-845. |
[5] | Zhi Dejia and Wang Guojin. Bézier Approximate Merging by Interval Curves[J]. Journal of Computer Research and Development, 2011, 48(4): 675-682. |
[6] | Zhang Nan, Miao Duoqian, Yue Xiaodong. Approaches to Knowledge Reduction in Interval-Valued Information Systems[J]. Journal of Computer Research and Development, 2010, 47(8): 1362-1371. |
[7] | Bao Xiaoyuan, Tang Shiwei, Yang Dongqing. Interval\++—An Index Structure on Compressed XML Data Based on Interval Tree[J]. Journal of Computer Research and Development, 2006, 43(7): 1285-1290. |
[8] | Li Yajuan and Wang Guozhao. Uniform Interval Implicitization of Rational Surfaces[J]. Journal of Computer Research and Development, 2006, 43(5): 914-919. |
[9] | Xu Guihong, Zhang Jian. Constraint-Based Termination Analysis of Active Rules[J]. Journal of Computer Research and Development, 2006, 43(5): 894-900. |
[10] | Xu Yong, Yang Jingyu, Jin Zhong, and Lou Zhen. A Fast Kernel-Based Nonlinear Discriminant Analysis Method[J]. Journal of Computer Research and Development, 2005, 42(3). |