[1] |
GUAN Jin-ping, YANG Jin-ji, YANG Cheng-long.
Formal Verification of Raft Protocol Based on Probabilistic Model
[J]. Computer and Modernization, 2023, 0(09): 77-81.
|
[2] |
FENG Yun-xia, CHEN Hong-da, NIU Yun-he.
A Relay-based Consortium Chain Cross-chain Communication System
[J]. Computer and Modernization, 2023, 0(02): 121-126.
|
[3] |
JIA Jian-zhong.
Handwritten Signature Identification Based on Wavelet Transform and CPN Network
[J]. Computer and Modernization, 2020, 0(07): 27-31.
|
[4] |
ZHANG Wen-hua, ZHANG Zhi-jun.
SVM-based Verification Method for New Energy Bus Operation Mileage
[J]. Computer and Modernization, 2020, 0(05): 39-.
|
[5] |
LI Shuo1, BIAN Qing-shan2, LIU Chuan-wen2, LIU Ming-tao1, ZHANG Lin-tao1 .
Face Verification and Application Research of ID Photos Based on DCNN
[J]. Computer and Modernization, 2020, 0(02): 104-.
|
[6] |
LIU Cheng1, TAN Xiao-yang1,2.
A Face Verification System on Mobile Terminal Based on Depth Learning
[J]. Computer and Modernization, 2018, 0(02): 107-.
|
[7] |
JIANG Dongyu1, KANG Dazhou1,2, WANG Shun1.
Ontologybased Consistency Verification of Conceptual Architecture Derivation
[J]. Computer and Modernization, 2017, 0(8): 84-.
|
[8] |
DENG Jia-jia, ZHANG Yu-ping, CHEN Hai-yan.
Timeliness Requirement Validation of Brake Control System Based on SysML & AADL
[J]. Computer and Modernization, 2017, 0(6): 40-44+49.
|
[9] |
GUO Yi, YANG Wei-yong, LIU Wei.
Formal Verification Method of Secure Operating System Based on Isabelle/HOL
[J]. Computer and Modernization, 2017, 0(4): 99-104.
|
[10] |
WANG Yang1,2, XU Ying-qiu1,2, PENG Yan-bing1,2.
KNN-based Verification Code Recognition Technology on Campus Network
[J]. Computer and Modernization, 2017, 0(2): 93-97.
|
[11] |
HU Lei, JIANG Guo-hua.
A Control Method of Runtime Verification Overhead Based on Prediction
[J]. Computer and Modernization, 2016, 0(4): 94-99.
|
[12] |
CHEN Qiu-ping.
Partial-duplicate Image Retrieval via Exploiting Visual Saliency
[J]. Computer and Modernization, 2015, 0(4): 82-85,89.
|
[13] |
MA Yin-xue, LI Wen-ming, CHEN Zhe.
Improved Object-based Approaches for Bounds Checking of C Programs
[J]. Computer and Modernization, 2015, 0(10): 25-30.
|
[14] |
TANG Lian, WANG Xiao-long.
Pattern Matching-based Wireless Network Security Configuration Verification Tool
[J]. Computer and Modernization, 2015, 0(10): 98-102.
|
[15] |
WANG Xiaolei1, YU Changjiang2, LIAN Yichun2, SU Qiang2.
An Automatic Verification Algorithm Based on Weighted Calculation
[J]. Computer and Modernization, 2014, 0(4): 89-91.
|