[1] |
CHEN Kai, XU Cheng, LIU Hongzhe, DAI Songyin.
Blockchain-based Evaluation Model for Dangerous Driving Map Data
[J]. Computer Engineering, 2022, 48(8): 160-165,172.
|
[2] |
GU Qingzhu, DONG Hongbin.
MI Loss Evaluation Model for k-Anonymity in PPDM
[J]. Computer Engineering, 2022, 48(4): 143-147.
|
[3] |
DAI Bingrong, JIANG Shengming, LI Dunwei, LI Chao.
Evaluation Model of Cross-Chain Notary Mechanism Based on Improved PageRank Algorithm
[J]. Computer Engineering, 2021, 47(2): 26-31.
|
[4] |
WANG Jiahui,GUO Yi,WEN Xinxiu,WAN Feng.
Multi-source Data Acquisition and Comprehensive Evaluation System for Intelligent Business District
[J]. Computer Engineering, 2019, 45(1): 284-291.
|
[5] |
CHEN Lu,LIU Xing,CHEN Mu,LI Nige,DAI Zaojian.
Scalable Security Evaluation Model of Mobile Application Based on Graph
[J]. Computer Engineering, 2018, 44(5): 78-82.
|
[6] |
ZHANG Junwei,WANG Jing,ZHANG Weigong,QIU Keni.
Research of High Energy-efficient Data Center Server Based on Big Data
[J]. Computer Engineering, 2017, 43(8): 74-81.
|
[7] |
LI Xiaohua,WANG Yujie,YANG Li,NIE Juan,LIAN Shibin,YUAN Lei.
A Mountainous Orchard Data Acquisition System Based on Wireless Sensor Network
[J]. Computer Engineering, 2015, 41(8): 238-243,251.
|
[8] |
JIANG Mengxia,JIANG Guohua.
An Evaluation Model of Safety-critical Software
[J]. Computer Engineering, 2015, 41(10): 130-138,143.
|
[9] |
LU Shi-chang, YUAN Duo-ning, YANG Xiao-tao.
Study of Supply Chain Performance Evaluation Based on IHSA_LSSVM
[J]. Computer Engineering, 2014, 40(6): 291-294.
|
[10] |
CHANG Yan, ZHANG Shi-Bin.
Trust Evaluation Model Based on Intuitionistic Fuzzy Sets and Optimal Recommendation
[J]. Computer Engineering, 2012, 38(5): 142-144.
|
[11] |
HUA Zhu-Han, WANG Gui-Rong, XU Nan, LIU Zhi-Qiong, YANG Xiang-Quan.
Evaluation Model Based on Enterprise Service Bus Middleware
[J]. Computer Engineering, 2012, 38(2): 63-65.
|
[12] |
TAO Jian-Bei, ZHANG Chao.
Side Channel Attack Risk Evaluation Model Based on Mutual Information Game
[J]. Computer Engineering, 2012, 38(15): 12-15.
|
[13] |
YANG Sha, CAO Bei.
Grid Terminal Information Security Evaluation Model
[J]. Computer Engineering, 2012, 38(13): 125-127.
|
[14] |
SHU Bin, JIN Wei-Dong, TU Zhi-Bin.
Complex System RES Feature Evaluation Based on AHP
[J]. Computer Engineering, 2012, 38(11): 239-241.
|
[15] |
MA Bo, YANG Ya-Ting, ZHOU Chi, HU Bin-Hua.
Application of Improved Associative Classification Algorithm in Informatization Evaluation
[J]. Computer Engineering, 2011, 37(7): 7-9,17.
|