Search

Showing total 15,783 results

Search Constraints

Start Over You searched for: Language chinese Remove constraint Language: chinese Publisher application research of computers edition Remove constraint Publisher: application research of computers edition
15,783 results

Search Results

1. Algorithm review of distributed clustering problem in distributed environments.

2. Research on privacy preservation mechanism for DaaS.

3. Research progress on similarity locomotion of humanoid robot.

4. Survey of image segmentation methods based on Markov random fields.

5. Advances in research in Landweber iterate method for inverse problems and its application.

6. Research on max entropy reordering in Uyghur-Chinese machine translation based on tackiness fuzzy rules.

7. Recommendation list selection algorithm with diversity enhancement.

8. Predict algorithm of micro-blog retweet scale based on SVM.

9. Hot topics found on micro-blog based on speed growth.

10. Collaborative filtering algorithm based on two-step filling for alleviating data sparsity.

11. Locally ordinal classifier chains for multi-label learning.

12. Frequent itemsets mining based on Apriori-bit.

13. Research of text orientation in opinion leaders identification.

14. New social similarities for collaborative filtering.

15. Research on multi-products delivery plan in B2C companies.

16. Model and simulation on dynamic evolutionary between urban economy and transportation system.

17. Model and analysis for cascading failure on logistics network based on local information of nodes.

18. Wolf colony search algorithm based on leader strategy.

19. Model and hybrid genetic algorithm for robust multi-objective linear programming.

20. Solving generalized Nash equilibrium problem based on immune particle swarm algorithm.

21. Fruit fly optimization algorithm with adaptive mutation.

22. Application of grid workflow scheduling based on chaos-genetic algorithm.

23. Research of project scheduling problems with disruption based on chaotic particle swarm algorithm.

24. GPU-based parallel collaborative filtering algorithm.

25. Petri net modeling and FPGA implementation of parallel computing.

26. Flicker detection algorithm based on FFT about error analysis and correction.

27. Improved evidence combination approach.

28. Chinese spam filtering based on graph regularized MNMF algorithm.

29. Reliable guaranteed cost control for stochastic distribution system.

30. Dynamic compaction of multiple target test pattern based on SAT.

31. Method of getting circular reachability relation in non-determinate planning.

32. Fuzzy artificial bees colony algorithm for solving traveling salesman problem.

33. Graph matching algorithm based on edge map's connection.

34. Discrete-time high-order distributed consensus algorithm.

35. Design and implementation of GPS location history data mining and anomalous detection system.

36. Research on unified coding system for Internet of things.

37. Cloud computing strategy of coordinated control in urban region traffic things networking.

38. Method of real-time city-traffic monitoring based on simplified road network model.

39. Dynamic evolution of software architectures and realization based on incidence matrix.

40. Evaluation method of software usability process based on fuzzy analytic hierarchy process.

41. Amelioration method of SNM based on flexible window and ranking adjusting.

42. UML sequence based interlocking test case generation.

43. Categorical approach for making model of data model.

44. Research of software defect prediction model based on LASSO-SVM.

45. Temporal logic of actions' expression of predicate behavior graph in concurrent system.

46. Cooperative method of key derivation for LTE systems based on radio interface and core network.

47. Cloud computing key management scheme based on covert mapping combined public key.

48. Research of quantitative network security assessment based on Bayesian-attack graphs.

49. Research of predicting insider threat based on Bayesian network.

50. Probabilistic public-key cryptosystem based on Chebyshev.