[1] |
JIN Haibo, ZHAO Xinyue.
High-Reliability Intrusion Detection Algorithm Under Conformal Prediction Framework
[J]. Computer Engineering, 2022, 48(7): 130-140.
|
[2] |
WU Jun, OUYANG Aijia, ZHANG Lin.
Redundant Contrast Pattern Filtering Algorithm for Permutation Testing
[J]. Computer Engineering, 2022, 48(1): 75-84.
|
[3] |
ZHANG Yu, HU Likun, HUANG Bin.
Improved AKAZE Image Matching Algorithm Combining Color and Illumination Information
[J]. Computer Engineering, 2021, 47(6): 225-233.
|
[4] |
WEI Shuai, ZHANG Huihua, SU Ye, XUE Pengfei, WEN Liang.
Majority Voting Algorithm Based on High-Order Heterogeneity for Mimic Defense System
[J]. Computer Engineering, 2021, 47(5): 30-35.
|
[5] |
SONG Yu, ZHANG Shuai, YAN Yonghui, QIAN Zhuzhong.
Application Performance Optimization in Edge Computing Scenario Based on Redundant Task Reduction
[J]. Computer Engineering, 2021, 47(3): 209-217,226.
|
[6] |
ZHAN Dezhi, ZHANG Guofu, SU Zhaopin, YUE Feng.
Research on Multi-Stage Testing Resource Allocation with Dynamic Reliability Constraints
[J]. Computer Engineering, 2021, 47(2): 246-253,260.
|
[7] |
HU Lili, XU Yan, TAO Huiqing.
Reliability Analysis of LTE-R Communication System Based on Dynamic Fault Tree
[J]. Computer Engineering, 2020, 46(9): 205-212.
|
[8] |
WANG Yiche, GAO Jianhua.
Allocation and Selection Method of Test Cases Based on Operational Profile
[J]. Computer Engineering, 2020, 46(6): 216-220.
|
[9] |
GAO Hanghang, WANG Xiang, ZHAO Shanghong, PENG Cong.
Controller Reliability Deployment Method for Aeronautical Information Network
[J]. Computer Engineering, 2020, 46(6): 221-229.
|
[10] |
SUN Zhiyong, JI Xinsheng, YOU Wei, LI Yingle.
A Virtual Machine Dynamic Migration Method Based on Redundant Transition
[J]. Computer Engineering, 2020, 46(2): 21-27,34.
|
[11] |
ZHAO Jihong, SUN Tianao, QU Hua, ZHANG Yin, ZHAI Fanni.
An SDN Controller Deployment Strategy for Improved Community Detection Algorithm
[J]. Computer Engineering, 2020, 46(11): 207-213.
|
[12] |
LI Lian, YANG Haotian.
GSPN-based Reliability Modeling and Analysis for Lock-step Processor System
[J]. Computer Engineering, 2019, 45(7): 296-302.
|
[13] |
LOU Li,FAN Jianhua,HU Yongyang,LI Ran.
Hierarchical architecture and security protocol for military Ad Hoc network
[J]. Computer Engineering, 2019, 45(6): 188-192,198.
|
[14] |
PENG Xiaoyan,ZHANG Bin,JIA Mingfei,WEN Kaihu.
Message Retransmission Scheduling Strategy on Static Segments of FlexRay Bus
[J]. Computer Engineering, 2019, 45(5): 99-104.
|
[15] |
QIU Hang,YOU Wei,TANG Hongbo,WANG Chen,NIU Ben.
Deployment Scheme of Reliable Service Function Chain Based on Multipath
[J]. Computer Engineering, 2019, 45(3): 101-106,112.
|