Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 445-452.
• Big Data & Data Mining • Previous Articles Next Articles
YANG Feng
CLC Number:
[1]王齐,钱宇华,李飞江.基于空间结构的符号数据仿射传播算法[J].模式识别与人工智能,2016,29(12):1132-1139. [2]党红恩,赵尔平,刘炜,等.利用数据变换与并行运算的闭频繁项集挖掘方法[J].湘潭大学自然科学学报,2018,40(1):119-122. [3]BAZAN J G,NGUYEN H S,NGUYEN S H,et al.Rough Set Algorithms in Classification Problem[C]∥Rough set methods and applications.Physica-Verlag GmbH,2000:49-88. [4]MIN F,LIU Q,FANG C.Rough sets approach to symbolic value partition[J].International Journal of Approximate Reaso-ning,2008,49(3):689-700. [5]沈思倩,毛宇光,江冠儒.不完全数据集的差分隐私保护决策树研究[J].计算机科学,2017,44(6):139-143. [6]HOSSAIN M M,HABIB A,RAHMAN M S.Transliteration Based Bengali Text Compression using Huffman principle[C]∥International Conference on Informatics,Electronics & Vision.IEEE,2014:1-6. [7]朱淑芹,李俊青,葛广英.基于一个新的四维离散混沌映射的图像加密新算法[J].计算机科学,2017,44(1):188-193. [8]孙艳歌,王志海,原继东,等.基于信息熵的数据流自适应集成分类算法[J].中国科学技术大学学报,2017,47(7):575-582. [9]XU Y,CHEN B Z,HU Z C.Research for multi-sensor data fusion based on Huffman tree clustering algorithm in greenhouses[J].International Journal of Embedded Systems,2016,8(1):34. [10]曹鹏,栗伟,赵大哲.面向不均衡数据集的ARSGOS算法[J].小型微型计算机系统,2014,35(4):818-823. [11]FALANDYSZ J.Review:On published data and methods for selenium in mushrooms[J].Food Chemistry,2013,138(1):242-250. [12]YANG L,LUO P,CHEN C L,et al.A large-scale car dataset for fine-grained categorization and verification[C]∥Computer Vision and Pattern Recognition.IEEE,2015:3973-3981. [13]SHASHA D.Open Field Tic-Tac-Toe[J].Communications of the Acm,2017,60(1):112. [14]JONAS A.DieGSVP-Agenturen als Forschungsobjekt[M]∥Das Governance-System der GSVP:Die Rolle des EU-Satellitenzentrums und der Europischen Verteidigungsagentur.Nomos Verlagsgesellschaft mbH & Co.KG,2015:133-177. [15]赵继军,郭昆,冯楠,等.基于RSVP—TE的有向泛洪IRWA算法研究[J].光通信研究,2013(5):8-11. |
[1] | FANG Lian-hua, LIN Yu-mei, WU Wei-zhi. Optimal Scale Selection in Random Multi-scale Ordered Decision Systems [J]. Computer Science, 2022, 49(6): 172-179. |
[2] | ZHAO Zhi-qiang, YI Xiu-shuang, LI Jie, WANG Xing-wei. Research on DoS Intrusion Detection Technology of IPv6 Network Based on GR-AD-KNN Algorithm [J]. Computer Science, 2021, 48(6A): 524-528. |
[3] | LI Ming-lei, HUANG Hui, LU Yu-liang, ZHU Kai-long. SymFuzz:Vulnerability Detection Technology Under Complex Path Conditions [J]. Computer Science, 2021, 48(5): 25-31. |
[4] | ZHANG Yan-jin, BAI Liang. Fast Symbolic Data Clustering Algorithm Based on Symbolic Relation Graph [J]. Computer Science, 2021, 48(4): 111-116. |
[5] | WEN Xin, YAN Xin-yi, CHEN Ze-hua. Minimal Optimistic Concept Generation Algorithm Based on Equivalent Relations [J]. Computer Science, 2021, 48(3): 163-167. |
[6] | ZHOU Sheng-yi, ZENG Hong-wei. Program Complexity Analysis Method Combining Evolutionary Algorithm with Symbolic Execution [J]. Computer Science, 2021, 48(12): 107-116. |
[7] | RAO Meng,MIAO Duo-qian,LUO Sheng. Rough Uncertain Image Segmentation Method [J]. Computer Science, 2020, 47(2): 72-75. |
[8] | FENG Jin-zhan, CAI Shu-qin. Helpfulness Degree Prediction Model of Online Reviews Fusing Information Gain and Gradient Decline Algorithms [J]. Computer Science, 2020, 47(10): 69-74. |
[9] | HUANG Zhao,HUANG Shu-guang,DENG Zhao-kun,HUANG Hui. Automatic Vulnerability Detection and Test Cases Generation Method for Vulnerabilities Caused by SEH [J]. Computer Science, 2019, 46(7): 133-138. |
[10] | ZHANG Long, ZHOU Yang, TIAN Jiang-peng, ZHAO Hai-peng. Design Method of Semantic-driven Cyberspace Resource Symbol [J]. Computer Science, 2019, 46(4): 83-88. |
[11] | FANG Hao, WU Li-fa, WU Zhi-yong. Automatic Return-to-dl-resolve Exploit Generation Method Based on Symbolic Execution [J]. Computer Science, 2019, 46(2): 127-132. |
[12] | YAN An, YAN Xin-yi, CHEN Ze-hua. Formal Vector Method of Rule Extraction for Consistent Decision Information System [J]. Computer Science, 2019, 46(10): 236-241. |
[13] | YE Zhi-bin,YAN Bo. Survey of Symbolic Execution [J]. Computer Science, 2018, 45(6A): 28-35. |
[14] | JI Hai-juan, ZHOU Cong-hua, LIU Zhi-feng. Symbolic Aggregate Approximation Method of Time Series Based on Beginning and End Distance [J]. Computer Science, 2018, 45(6): 216-221. |
[15] | LI Hang, ZANG Lie, GAN Lu. Search of Speculative Symbolic Execution Path Based on Ant Colony Algorithm [J]. Computer Science, 2018, 45(6): 145-150. |
|