吉林大学学报(工学版) ›› 2010, Vol. 40 ›› Issue (05): 1298-1302.
• paper • Previous Articles Next Articles
SUN Zhi-xin1,2,ZHANG Yu-feng1
CLC Number:
| [1] | DONG Jian-feng, ZHANG Yu-feng, DAI Zhi-qiang. Improved recommendation algorithm based on DPM model [J]. 吉林大学学报(工学版), 2018, 48(2): 596-604. |
| [2] | LIU Lei, LIU Li-juan, WU Xin-wei, ZHANG Peng. Compiler testing method based on ECP metamorphic relation [J]. 吉林大学学报(工学版), 2017, 47(4): 1262-1267. |
| [3] | DONG Li-yan, WANG Yue-qun, HE Jia-nan, SUN Ming-hui, LI Yong-li. Collaborative filtering recommendation algorithm based on time decay [J]. 吉林大学学报(工学版), 2017, 47(4): 1268-1272. |
| [4] | DENG Chang-yi, GUO Rui-feng, ZHANG Yi-wen, WANG Hong-liang. Lower power dynamic scheduling algorithm for sporadic tasks based on balance factor [J]. 吉林大学学报(工学版), 2017, 47(2): 591-600. |
| [5] | LIU Yan-heng, LI Song-jiang, WANG Ai-min. Dynamic layering model and transmission algorithm in P2P live streaming system [J]. 吉林大学学报(工学版), 2016, 46(1): 259-264. |
| [6] | JIN Shun-fu, LI Yang, LIU Jian-ping, HUO Zhan-qiang. Strategies of Nash equilibrium and social optimization for online mechanisms of P2P nodes [J]. 吉林大学学报(工学版), 2016, 46(1): 296-302. |
| [7] | CHEN Mian-shu, WANG Shi-peng, CHEN He-xin, SHENG Kai-ping, LI Pei-peng. Improved trust model based on recommendation evidence for P2P networks [J]. 吉林大学学报(工学版), 2013, 43(06): 1666-1674. |
| [8] | XIAN Shu, ZHENG Jin, LU Xing, ZHANG Shi-peng. Identification approach of P2P flow based on the content redistribution model [J]. 吉林大学学报(工学版), 2013, 43(03): 727-733. |
| [9] | ZHANG Hua, PENG Lai-hu, HU Xu-dong, WANG Xian-mei. Model of enterprise cloud manufacture applying to textile machining industry [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 337-340. |
| [10] | WANG Xin-ying, LIU Gang, GU Fang-ming, XIAO Wei. Heterogeneous feature fusion method based on semantic and shape for 3D model retrieval [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 359-363. |
| [11] | WU Xiao-xuan, NI Zhi-wei, NI Li-ping. Clustering ensembles algorithm based on fractal dimension [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 364-367. |
| [12] | LIU Zhuang, FANG Zhi-yi, ZHANG Chun-fei, CHEN Lin, ZHAO Yang. Energy-efficient amendatory algorithm based on energy-consumption transference and data gravitation in wireless sensor networks [J]. , 2012, 42(05): 1237-1242. |
| [13] | LIU Xian, GUO Rui-feng, DING Wan-fu. Schedulability of rollback recovery fault-tolerant real-time system based on priority mixed strategy [J]. , 2012, 42(05): 1243-1250. |
| [14] | CHAI Zheng-yi, WU Hui-xin, WU-Yong. Optimization algorithm for immune real-value detector generation [J]. , 2012, 42(05): 1251-1256. |
| [15] | LI Min, JIA Chun-fu, LI Jing-wei, LIU Zhe-li, DONG Zong-qing. Format-preserving encryption for variable-length encoding character data [J]. , 2012, 42(05): 1257-1261. |
|
||