[1] |
XU Guoyu, XU Gang, JIANG Tao, HU Haitao.
Research on Quantitative Analysis of Authentication Mechanism Performance for Space-Ground Integrated Information Network
[J]. Computer Engineering and Applications, 2020, 56(21): 108-114.
|
[2] |
SHI Hui, CAI Yueming, YANG Weiwei, XIANG Zhongwu, CHEN Dechuan.
Secure Performance Analysis on Untrusted Relay Network with TSR over Nakagami-[m] Channel
[J]. Computer Engineering and Applications, 2020, 56(12): 98-104.
|
[3] |
CONG Yihao, YU Yanhua.
Online Distributed Recommendation Algorithm Based on Data Stream and Peer-to-Peer Network
[J]. Computer Engineering and Applications, 2019, 55(1): 64-69.
|
[4] |
JIANG Jieqi, YANG Geng, LI Peng.
Analysis of users’ behavior under cloud computing environment
[J]. Computer Engineering and Applications, 2018, 54(14): 127-132.
|
[5] |
CUI Jiaqi, YANG Jianfeng, XU Jun, GUO Chengcheng.
CSMA/CA performance analysis in hybrid CSMA/CA and TDMA networks
[J]. Computer Engineering and Applications, 2017, 53(20): 83-88.
|
[6] |
FU Fa1, ZHOU Xing1, TAN Yuyin1, Thomas Dreibholz2, Hakim Adhari3, Erwin P. Rathgeb3.
Performance analysis of MPTCP protocol in multiple scenarios
[J]. Computer Engineering and Applications, 2016, 52(5): 89-93.
|
[7] |
LI Yang1, JIN Lisha2, HOU Yukan2, ZHANG Jie2.
Rapid configuration method of production status for assembly station based on performance analysis
[J]. Computer Engineering and Applications, 2016, 52(24): 229-235.
|
[8] |
ZHENG Xiaoyao, LUO Yonglong, CHEN Fulong, SUN Liping.
New dynamic trust model for P2P network with detection
[J]. Computer Engineering and Applications, 2016, 52(2): 135-140.
|
[9] |
GUO Yanyifu1, LIU Hongli1, XU Kun1, MA Ziji1, LIU Shugang2.
Performance analysis of RSSI in underground tunnel based on WSN
[J]. Computer Engineering and Applications, 2016, 52(17): 128-132.
|
[10] |
WANG Yuhua, JIANG Lin, HU Zhigang, YANG Liu.
Load balancing algorithm for DHT-based P2P system
[J]. Computer Engineering and Applications, 2015, 51(23): 100-105.
|
[11] |
LIU Hao.
Access control model of P2P based on trust in multi-domain environments
[J]. Computer Engineering and Applications, 2014, 50(21): 116-120.
|
[12] |
LIAO Liefa, ZHANG Weinan.
Trust model of P2P system based on trade characteristics and transaction feedback
[J]. Computer Engineering and Applications, 2014, 50(20): 100-104.
|
[13] |
LI Zhanbo, ZHANG Zhe.
New ONS resolution mechanism based on DHT-P2P
[J]. Computer Engineering and Applications, 2013, 49(3): 91-95.
|
[14] |
DU Lei1, JIN Zhigang1, WANG Xiaohai2.
Skipping optimization for P2P video on demand system
[J]. Computer Engineering and Applications, 2013, 49(24): 65-69.
|
[15] |
YANG Zhixing, TANG Hongbo, BAI Yi, YANG Sen.
Distributed trust model for mobile P2P networks
[J]. Computer Engineering and Applications, 2013, 49(23): 75-80.
|