相似文献/References:
[1]严秀 李龙澍.软件逆向工程技术研究[J].计算机技术与发展,2009,(04):20.
YAN Xiu,LI Long-shu.Research of Technology in Software Reverse Engineering[J].,2009,(04):20.
[2]阚红星 马溪骏 桂宏新.基于COCOMOⅡ的自动测试维护代价实例研究[J].计算机技术与发展,2008,(11):47.
KAN Hong-xing,ma Xi-jun,GUI Hong-xin.A Case Study on Maintenance Cost for Regression Test Automation Based on COCOMO Ⅱ[J].,2008,(04):47.
[3]陈永郑 李龙澍.基于程序切片技术的回归测试方法研究[J].计算机技术与发展,2007,(12):113.
CHEN Yong-zheng,LI Long-shu.Regression Testing Based on Program Slicing[J].,2007,(04):113.
[4]丁剑洁 鱼滨 侯红.软件维护中程序理解的应用与研究[J].计算机技术与发展,2007,(04):218.
DING Jian-Jie,YU Bin,HOU Hong.Research and Application of Program Understanding in the Software Maintenance[J].,2007,(04):218.
[5]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(04):1.
[6]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(04):5.
[7]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(04):13.
[8]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(04):21.
[9]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(04):25.
[10]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(04):29.