Search

Showing total 111 results

Search Constraints

Start Over You searched for: Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic computer science Remove constraint Topic: computer science Language chinese Remove constraint Language: chinese
111 results

Search Results

1. Professional entity recognition for computer science.

2. Survey of Causal Inference for Knowledge Graphs and Large Language Models.

3. 机器学习算法在食品气味表征中的应用.

4. 图形的逻辑力量: 因果图 的概念及其应用.

5. 多模态生物特征提取及相关性评价综述.

6. 城市排水工程全生命周期数字化管理关键技术与应用.

7. 计算机领域概念隐喻的特点及对人类思维的影响.

8. Clustering data gathering scheme based on hybrid CS in WSN.

9. Vulnerability assessment based on correlation.

10. Rational fairness exchange protocols based on maximum entropy principle.

11. Electronic cash system with multiple banks based on TPM for cloud computing.

12. Application of data model for guidance system in deploying guide signs.

13. Spread model and application of shortage of supplies for emergency logistics network.

14. Real-time system simulation and verification approach based on STeC to Stateflow transformation system.

15. Research on space-time accessibility considering direction of travel.

16. Supernetwork-based method on division of community structure in complex network.

17. Pseudoinverse solution to construction of cubic splines.

18. The Design of BKGD Based on ColdFire Family MCUS.

19. 校外实践基地在学生实践能力培养中的作用.

20. 谈计算机专业实践教学中计算思维能力的培养.

21. Global comparatively optimum static task scheduling algorithm.

22. Research of classification method for natural images based on adaptive feature-weighted K-nearest neighbors.

23. Recognition of control chart patterns based on feature fusion with support vector machine.

24. Assessment of vulnerability threat based on fuzzy theory.

25. Improved multi-source heterogeneous alert aggregation scheme.

26. Packet delay based binding method of label to data stream.

27. Safety transition system and its application.

28. Malware detection by monitoring host's activities.

29. Express information protection application based on K-anonymity.

30. Multi-authority attribute based signature scheme suitable for distributed system.

31. New secure cetificateless signcryption scheme without pairing.

32. User behavior analysis based on segmentation, clustering and timing relationship analysis.

33. IACO resources search algorithm in unstructured P2P network.

34. Improvement of Chord search algorithm research in P2P network.

35. Connectivity on one-dimensional flight route in aeronautical Ad hoc network.

36. High-accuracy phase estimation of single-tone based on restricted phase unwrapping.

37. Wireless broadcasting retransmission scheme based on Fourier matrix.

38. Uplink CSI based adaptive predicted repeat GBN-HARQ scheme.

39. Spectrum allocation mechanism based on group buying.

40. Research on sociality routing algorithms in mobile social networks.

41. Research of logistics park service resource sharing and configuration mode based on cloud logistics services.

42. Research of event-based continuous data protection system.

43. Study on ranking keyword search results in relational database based on data graph.

44. Description of domain requirement based on limited language.

45. Adaptive fault detection method for reliable cloud computing.

46. Research on PageRank algorithm optimization based on MapReduce.

47. e-Learning resource ontology matching algorithm based on subgraph approximate isomorphic.

48. Finite-domain representations of conformant planning tasks based on single logic program.

49. Ubiquitous knowledge cloud model based on Cloud-P2P network platform.

50. Data replication and scheduling algorithm in data grids.