[1] |
WANG Jing, CHEN Lan, ZHANG He, WANG Haiyong.
Multi-resource scheduling algorithm based on EDA simulation software
[J]. Journal of University of Chinese Academy of Sciences, 2021, 38(5): 696-701.
|
[2] |
LI Xiaomu, TIAN Miaomiao, MA Guangbin, LIN Youming, CHENG Bo.
Satellite imaging planning method based on improved cuckoo search
[J]. Journal of University of Chinese Academy of Sciences, 0, (): 544-544.
|
[3] |
ZHANG Libo, ZHANG Fei, LUO Tiejian.
Knowledge structure evolution and evaluation method in computer science
[J]. , 2016, 33(6): 844-850.
|
[4] |
GUAN Zengda, CHENG Li, ZHU Tingshao.
Heterogeneous transfer learning based on translation invariant kernels
[J]. , 2015, 32(1): 121-126.
|
[5] |
QIAN Quan, ZHU Wei, CHE Hong-Yi, ZHANG Rui.
An improved multi-pattern string matching algorithm and GPU parallelization
[J]. Journal of University of Chinese Academy of Sciences, 2013, 30(5): 706-712.
|
[6] |
GUO Long-Kun, SHEN Hong.
Hardness of the edge-disjoint Min-Min problem in undirected graphs
[J]. , 2012, 29(4): 549-554.
|
[7] |
LI Hong-Yan, ZHAO Xian-Feng, HUANG Wei, SHENG Ren-Nong.
Steganalysis of palette images based on run-length statistics and Walsh spectrum energy distribution
[J]. , 2012, (3): 423-428.
|
[8] |
ZHANG Tao, ZHAO Xian-Feng, HUANG Wei, SHENG Ren-Nong.
Analysis of complementarity among three sets of the features and their fusion for spatial steganography
[J]. , 2012, (2): 264-270.
|
[9] |
WAN Wei, ZHAO Xian-Feng, HUANG Wei, SHENG Ren-Nong.
Steganalysis of MP3Stego based on Huffman table distribution and recoding
[J]. , 2012, 29(1): 118-124.
|
[10] |
SHAO Xiu-Feng, LI Rong-Hua.
On the security proof of a protocol for private integer comparison
[J]. , 2011, 28(2): 262-265.
|
[11] |
DENG Yi, ZHAO Xian-Feng, FENG Deng-Guo.
JPEG image steganalysis based on characteristic function and quality factor
[J]. , 2010, 27(3): 389-396.
|
[12] |
WU Jie, CHEN Yu-Fu.
Lifting algorithms for Gröbner basis computation of invariant ideals
[J]. , 2009, 26(6): 731-744.
|
[13] |
WANG Jing, XIA Lu-Ning, JING Ji-Wu, GU Qing.
A fault-tolerant dedicated computer system model
[J]. , 2009, 26(6): 826-834.
|
[14] |
ZHU Yu, ZHANG Hong-Bin.
Selection Method for AVL Tree Rebalancing
[J]. , 2006, 23(4): 527-533.
|
[15] |
Tong Jianjun, Zou Mingfu.
Detection Algorithm of Hough Transform in the Container Number Recognition
[J]. , 2005, 22(1): 72-77.
|