相似文献/References:
[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(11):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(11):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(11):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(11):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(11):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(11):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(11):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(11):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(11):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(11):47.
[11]李桃陶,周斌,王忠振. 基于社交网络的图数据挖掘应用研究[J].计算机技术与发展,2014,24(10):6.
LI Tao-tao,ZHOU Bin,WANG Zhong-zhen. Research on Graph Data Mining Application Based on Social Network[J].,2014,24(11):6.
[12]张付霞,蒋朝惠. 基于DSNPP算法的社交网络隐私保护方法[J].计算机技术与发展,2015,25(08):152.
ZHANG Fu-xia,JIANG Chao-hui. Privacy-preserving Approach in Social Networks Based on DSNPP Algorithm[J].,2015,25(11):152.
[13]房旋[],陈升波[],宫婧[][],等. 基于社交影响力的推荐算法[J].计算机技术与发展,2016,26(06):31.
FANG Xuan[],CHEN Sheng-bo[],GONG Jing[][],et al. A Recommendation Algorithm Based on Social Influence[J].,2016,26(11):31.
[14]余莎莎[],王友国[],朱亮[]. 基于SIR社交网络中商业谣言传播研究[J].计算机技术与发展,2016,26(11):195.
YU Sha-sha[],WANG You-guo[],ZHU Liang[]. Research on Online Business Rumors Transmission Based on an Improved SIR Model[J].,2016,26(11):195.
[15]余莎莎[],王友国[],朱亮[]. 基于网络博弈论的谣言扩散建模研究[J].计算机技术与发展,2017,27(04):6.
YU Sha-sha[],WANG You-guo[],ZHU Liang[]. Investigation on Rumor Diffusion Modeling with Network Game Theory[J].,2017,27(11):6.
[16]付明明,余莎莎,应志领. 在线社交网络的双谣言模型研究[J].计算机技术与发展,2017,27(09):53.
FU Ming-ming,YU Sha-sha,YING Zhi-ling. Research on Double Rumor Model in Online Social Network[J].,2017,27(11):53.