Citation: | Sun Changlong, Hong Yu, Ge Yundong, Yao Jianmin, and Zhu Qiaoming. The Translation Mining of the Out of Vocabulary Based on Wikipedia[J]. Journal of Computer Research and Development, 2011, 48(6): 1067-1076. |
[1] | Hou Bingnan, Liu Ning, Li Xionglüe, Zhou Tongqing, Chen Yingwen, Cai Zhiping, Lu Kai. Survey on Target-Generated IPv6 Network Address Scanning[J]. Journal of Computer Research and Development, 2024, 61(9): 2307-2320. DOI: 10.7544/issn1000-1239.202330335 |
[2] | Yu Zihao, Chen Lu, Sun Ninghui, Bao Yungang. Quality Optimization Method of Dynamic Binary Translation Code Targeting for RISC-V[J]. Journal of Computer Research and Development, 2023, 60(10): 2322-2334. DOI: 10.7544/issn1000-1239.202220296 |
[3] | Xiao Jinsheng, Zhao Tao, Zhou Jian, Le Qiuping, Yang Liheng. Small Target Detection Network Based on Context Augmentation and Feature Refinement[J]. Journal of Computer Research and Development, 2023, 60(2): 465-474. DOI: 10.7544/issn1000-1239.202110956 |
[4] | Sun Yan, Ji Weifeng, Weng Jiang, Zhao Beiying. Optimal Strategy of Moving Target Defense Based on Differential Game[J]. Journal of Computer Research and Development, 2021, 58(8): 1789-1800. DOI: 10.7544/issn1000-1239.2021.20200524 |
[5] | Cai Guilin, Wang Baosheng, Wang Tianzuo, Luo Yuebin, Wang Xiaofeng, Cui Xinwu. Research and Development of Moving Target Defense Technology[J]. Journal of Computer Research and Development, 2016, 53(5): 968-987. DOI: 10.7544/issn1000-1239.2016.20150225 |
[6] | Zhang Yunzhou, Fu Wenyan, Xiang Shu, Wei Dongfei, Yang Bing. IMM-EKF Algorithm-Based Indoor Moving Target Localization[J]. Journal of Computer Research and Development, 2014, 51(11): 2408-2415. DOI: 10.7544/issn1000-1239.2014.20131073 |
[7] | Zhang Rubo, Yin Lili, Gu Hengwen. Environment Perception for AUV in Uncertain Ocean Environment[J]. Journal of Computer Research and Development, 2013, 50(9): 1981-1991. |
[8] | An Guocheng, Zhang Fengjun, Wang Hongan, and Dai Guozhong. Multi-Window Target Tracking[J]. Journal of Computer Research and Development, 2011, 48(11): 2023-2030. |
[9] | Wu Xinsong, He Yeping, Zhou Zhouyi, Liang Hongliang. An Environment-Adaptive Role-Based Access Control Model[J]. Journal of Computer Research and Development, 2011, 48(6): 983-990. |
[10] | Fan Hongqi, Lu Zaiqi, Wang Sheng, and Fu Qiang. Information Pattern Analysis of Maneuvering Target Interceptor[J]. Journal of Computer Research and Development, 2010, 47(9): 1558-1566. |