Search

Showing total 110 results

Search Constraints

Start Over You searched for: Search Limiters Academic (Peer-Reviewed) Journals Remove constraint Search Limiters: Academic (Peer-Reviewed) Journals Topic computer science Remove constraint Topic: computer science Language chinese Remove constraint Language: chinese
110 results

Search Results

1. Professional entity recognition for computer science.

2. Survey of Causal Inference for Knowledge Graphs and Large Language Models.

3. 图形的逻辑力量: 因果图 的概念及其应用.

4. 城市排水工程全生命周期数字化管理关键技术与应用.

5. 多模态生物特征提取及相关性评价综述.

6. 计算机领域概念隐喻的特点及对人类思维的影响.

7. Clustering data gathering scheme based on hybrid CS in WSN.

8. Vulnerability assessment based on correlation.

9. Rational fairness exchange protocols based on maximum entropy principle.

10. Electronic cash system with multiple banks based on TPM for cloud computing.

11. Research on space-time accessibility considering direction of travel.

12. Spread model and application of shortage of supplies for emergency logistics network.

13. Application of data model for guidance system in deploying guide signs.

14. Real-time system simulation and verification approach based on STeC to Stateflow transformation system.

15. Supernetwork-based method on division of community structure in complex network.

16. Pseudoinverse solution to construction of cubic splines.

17. The Design of BKGD Based on ColdFire Family MCUS.

18. 校外实践基地在学生实践能力培养中的作用.

19. 谈计算机专业实践教学中计算思维能力的培养.

20. Global comparatively optimum static task scheduling algorithm.

21. Research of classification method for natural images based on adaptive feature-weighted K-nearest neighbors.

22. Recognition of control chart patterns based on feature fusion with support vector machine.

23. Assessment of vulnerability threat based on fuzzy theory.

24. Improved multi-source heterogeneous alert aggregation scheme.

25. Packet delay based binding method of label to data stream.

26. Safety transition system and its application.

27. Express information protection application based on K-anonymity.

28. Malware detection by monitoring host's activities.

29. New secure cetificateless signcryption scheme without pairing.

30. Multi-authority attribute based signature scheme suitable for distributed system.

31. User behavior analysis based on segmentation, clustering and timing relationship analysis.

32. Connectivity on one-dimensional flight route in aeronautical Ad hoc network.

33. IACO resources search algorithm in unstructured P2P network.

34. Improvement of Chord search algorithm research in P2P network.

35. High-accuracy phase estimation of single-tone based on restricted phase unwrapping.

36. Wireless broadcasting retransmission scheme based on Fourier matrix.

37. Research on sociality routing algorithms in mobile social networks.

38. Uplink CSI based adaptive predicted repeat GBN-HARQ scheme.

39. Spectrum allocation mechanism based on group buying.

40. Research of logistics park service resource sharing and configuration mode based on cloud logistics services.

41. Research of event-based continuous data protection system.

42. Research on PageRank algorithm optimization based on MapReduce.

43. Description of domain requirement based on limited language.

44. Study on ranking keyword search results in relational database based on data graph.

45. Adaptive fault detection method for reliable cloud computing.

46. Finite-domain representations of conformant planning tasks based on single logic program.

47. e-Learning resource ontology matching algorithm based on subgraph approximate isomorphic.

48. Data replication and scheduling algorithm in data grids.

49. Ubiquitous knowledge cloud model based on Cloud-P2P network platform.

50. Collaborative filtering recommendation algorithm based on user characteristics and item attributes.