[1] |
ZHOU Guangrui, XU Shulin, GUO Yiyun, LU Faming, YUE Hao.
Estimation of Least-Cost Planning Sequence for Labeled Petri Nets
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(7): 1350-1358.
|
[2] |
YAN Tong, BAI Zhihua, GAO Zhen, YAN Lina, ZHOU Lei.
Detection and Defense Mechanism of LDoS Attack in SDN Environment
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(4): 566-577.
|
[3] |
JIANG Jiaxin, HUANG Zhiqiu, MA Weiwei.
Research on Information Flow Control in Service Composition for Privacy Requirement
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(3): 370-379.
|
[4] |
CHEN Qinxia, LIU Dun, LIANG Decui.
Improved AHP Approach Based on Rough Set Theory and Information Entropy
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(3): 484-493.
|
[5] |
HU Qianwei, LI Zichen, YAN Xixi.
Research on Key Management Scheme for Hierarchical Access Control in Database
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(6): 921-931.
|
[6] |
SUN Xiaoling.
Bidirectional Fuzzy Fault Reasoning Algorithm of Intuitionistic Fuzzy Petri Net
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(6): 1006-1013.
|
[7] |
YIN Hongwei, LI Fanzhang.
Spectral Deep Learning Algorithm for Image Sequence
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(3): 414-426.
|
[8] |
LI Han, ZHENG Shang, CHEN Feng.
Research on Role Engineering of Legacy System
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(12): 1931-1940.
|
[9] |
LI Denghui, JIAO Jian, CHEN Xin, SONG Yapeng, XIAO Qing.
Research on Modeling Method of Android Malware Based on Colored-Petri Nets
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(1): 99-105.
|
[10] |
ZHAO Fang, FANG Xianwen, FANG Huan.
Analysis Method of the Smallest Change Region with Dynamic Slice of Petri Nets
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(4): 516-523.
|
[11] |
YANG Yunxue, LU Xiao, DONG Jun.
Network Security Risk Assessment Based on Enterprise Environment
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(10): 1387-1397.
|
[12] |
DAI Fei, MO Qi, LIN Leilei, ZHU Rui, LI Tong, XIE Zhongwen.
Collaboration Business Process Modeling Based on Petri Nets and Pi Calculus
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(6): 692-706.
|
[13] |
JIA Lei, LIU Jing, MA Yanlin, YE Xinming.
Design and Analysis of Incentive Mechanism?in BitTorrent Protocol
[J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(3): 275-287.
|
[14] |
WANG Jing, HU Hao, YU Ping, LV Jian, GE Jidong.
Public View and Object Petri Net Based Modeling of Cross-Organizational Process
[J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(1): 18-27.
|
[15] |
WANG Chunzi, GUO Wei, ZHANG Bin.
Algorithm Design and Simulation of Solving Nonlinear Mixed Integer Programming Problem
[J]. Journal of Frontiers of Computer Science and Technology, 2013, 7(9): 854-864.
|