Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 572-576.doi: 10.11896/JsJkx.190900114
• Interdiscipline & Application • Previous Articles Next Articles
GAO Lin, DUAN Guo-lin and YAO Tao
CLC Number:
[1] MIRAFZAL S M.More odd graph theory from another point of view.Discrete Mathematics,2018,341(1):217-220. [2] WEI W H,XIAO W J,HUANG S Q,et al.Research on the application of algebraic graph theory in parallel processing.Computer Science,2008,35(11):67-69. [3] YAN H,LU T W.Study on the application of graph theory in pavement crack segmentation.Journal of Wuhan University of Technology,2012,34(1):53-57. [4] SHI Z,WATANABE S,OGAWA K,et al.3-Resilience assessment methodology and fundamentals of graph theory.Structural Resilience in Sewer Reconstruction,2018:79-111. [5] LIU Y,YU P,CHU D,et al.Stationary distribution of stochastic Markov Jump coupled systems based on graph theory.Chaos,Solitons & Fractals,2019,119(2):188-195. [6] VECCHIO F,MIRAGLIA F,ROSSINI P M.Connectome: Graph theory application in functional brain network architecture.Clinical Neurophysiology Practice,2017,2:206-213. [7] ESPADINHA-CRUZ P,GRILO A.The Business Interoperability Decomposition Framework to analyse buyer-supplier dyads.Computers in Industry,2019,109:165-181. [8] TABER A,KUMAR G,FREYTAG M.A moment-vector approach to interoperable analysis.Computer-Aided Design,2018,102:139-147. [9] REZAEI R,CHIEW T K,LEE S P,et al.Interoperability assessment:A systematic literature review.Computers in Industry,2019,106:111-132. [10] REZAEI R,CHIEW T K,LEE S P,et al.Interoperability evalua-tion models:A systematic review.Computers in Industry,2014,65(1):1-23. [11] PARTAL A,DUNPHY K.Cultural impact assessment:a systematic literature review of current methods and practice around the world.Impact Assessment & ProJect Appraisal,2016,34(1):1-13. [12] SATURNO M,RAMOS L F P,POLATO F,et al.Evaluation of Interoperability between Automation Systems using Multi-criteria Methods.Procedia Manufacturing,2017,11:1837-1845. [13] MYKKANEN J A,TUOMAINEN M P.An evaluation and selection framework for interoperability standards.Information and Software Technology,2008,50(3):176-197. [14] PIRAYESH N A,ETIENNE A,KLEINER M,et al.Perfor-mance evaluation of collaboration in the design process:Using interoperability measurement.Computers in Industry,2015,72:14-26. [15] DUCQ Y,CHEN D,DOUMEINGTS G.A contribution of system theory to sustainable enterprise interoperability science base.Computers in Industry,2012,63(8):844-857. [16] CHEN D,KNOTHE T,DOUMEINGS G.POP Meta-Model for Enterprise Model Interoperability.IFAC Proceedings Vo-lumes,2009,42(4):175-180. |
[1] | CHENG Fu-hao, XU Tai-hua, CHEN Jian-jun, SONG Jing-jing, YANG Xi-bei. Strongly Connected Components Mining Algorithm Based on k-step Search of Vertex Granule and Rough Set Theory [J]. Computer Science, 2022, 49(8): 97-107. |
[2] | ZHANG Lu-ping, XU Fei. Survey on Spiking Neural P Systems with Rules on Synapses [J]. Computer Science, 2022, 49(8): 217-224. |
[3] | LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke. Secure Coordination Model for Multiple Unmanned Systems [J]. Computer Science, 2022, 49(7): 332-339. |
[4] | CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587. |
[5] | ZHANG Geng-qiang, XIE Jun, YANG Zhang-lin. Accelerating Forwarding Rules Issuance with Fast-Deployed-Segment-Routing(FDSR) in SD-MANET [J]. Computer Science, 2022, 49(2): 377-382. |
[6] | LIU Xiao-die. Recognition and Transformation for Complex Noun Phrases Based on Boundary Perception [J]. Computer Science, 2021, 48(6A): 299-305. |
[7] | XU Hui-hui, YAN Hua. Relative Risk Degree Based Risk Factor Analysis Algorithm for Congenital Heart Disease in Children [J]. Computer Science, 2021, 48(6): 210-214. |
[8] | SHEN Xia-jiong, YANG Ji-yong, ZHANG Lei. Attribute Exploration Algorithm Based on Unrelated Attribute Set [J]. Computer Science, 2021, 48(4): 54-62. |
[9] | WEN Xin, YAN Xin-yi, CHEN Ze-hua. Minimal Optimistic Concept Generation Algorithm Based on Equivalent Relations [J]. Computer Science, 2021, 48(3): 163-167. |
[10] | JIANG Zheng, WANG Jun-li, CAO Rui-hao, YAN Chun-gang. Method of Service Decomposition Based on Microservice Architecture [J]. Computer Science, 2021, 48(12): 17-23. |
[11] | YANG Jin-cai, HU Qiao-ling, HU Quan. Rule-based Automatic Recognition of Relations for Marked Complex Sentences [J]. Computer Science, 2021, 48(11A): 124-129. |
[12] | LIU Shan-shan, ZHU Hai-long, HAN Xiao-xia, MU Quan-qi, HE Wei. Enterprise Risk Assessment Model Based on Principal Component Regression and HierarchicalBelief Rule Base [J]. Computer Science, 2021, 48(11A): 570-575. |
[13] | ZENG Hui-kun, MI Ju-sheng, LI Zhong-ling. Dynamic Updating Method of Concepts and Reduction in Formal Context [J]. Computer Science, 2021, 48(1): 131-135. |
[14] | LI Li. Survey on Multi-winner Voting Theory [J]. Computer Science, 2021, 48(1): 217-225. |
[15] | LI Yu-rong, LIU Jie, LIU Ya-lin, GONG Chun-ye, WANG Yong. Parallel Algorithm of Deep Transductive Non-negative Matrix Factorization for Speech Separation [J]. Computer Science, 2020, 47(8): 49-55. |
|