[1] |
LIU Jinghua, TAI Xianqing, MA Zhijie, CHEN Dapeng.
Study on User Requirement-Based Dynamic QoS Service Selection Method
[J]. Computer Engineering and Applications, 2021, 57(17): 106-115.
|
[2] |
SONG Fangzhen, XU Yanyan, TANG Xin, PAN Shaoming.
Emergency Communication Network Routing Protocol Based on Improved Ant Colony Algorithm
[J]. Computer Engineering and Applications, 2020, 56(18): 90-96.
|
[3] |
ZHENG Zupeng, WANG Zumin, PENG Yang, JI Changqing, QIN Jing.
Survey of MAC Protocols for Energy Harvesting Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(15): 24-29.
|
[4] |
TIAN Zejin, HUANG Ruilu, LV Yuejin.
Two Consistencies of Complementary Judgment Matrix Based on Interval Rough Numbers
[J]. Computer Engineering and Applications, 2019, 55(24): 235-240.
|
[5] |
JIA Zhichun, LU Yuan, LI Xiang, XING Xing.
Multi-Parameter Web Services Selection Method
[J]. Computer Engineering and Applications, 2019, 55(21): 74-78.
|
[6] |
YIN Qiao1,2, WEI Zhanchen1,2, HUANG Qiulan1, SUN Gongxing1, SHI Jingyan1.
Development and Application of Hadoop Massive Data Migration System
[J]. Computer Engineering and Applications, 2019, 55(13): 66-71.
|
[7] |
ZHENG Wenqing, JIN Hu, GUO Jianpeng, FENG Hui.
Backoff Algorithm for MAC Protocol Based on Channel Occupancy and Priority
[J]. Computer Engineering and Applications, 2019, 55(11): 80-84.
|
[8] |
TAN Zhaowen, ZONG Rong, XI Xianqiang, WU Hao.
QoS prediction based on Bayesian tensor decomposition
[J]. Computer Engineering and Applications, 2018, 54(20): 74-79.
|
[9] |
HAN Xiaolong, LI Shang, YANG Quanye.
Strategic supply chain integration research based on genetic algorithm
[J]. Computer Engineering and Applications, 2018, 54(2): 214-221.
|
[10] |
QIN Qiuyu1, LIU Dandan2, ZHANG Jian2.
Adaptive congestion control mechanism for delay tolerant networks
[J]. Computer Engineering and Applications, 2018, 54(11): 109-115.
|
[11] |
ZHANG Yang1,3, XU Chuanyun2,3.
Double-direction metrics model for QoS multilayer ontology
[J]. Computer Engineering and Applications, 2017, 53(20): 14-19.
|
[12] |
GAO Xiu’e1,2, LI Keqiu1.
Joint call admission control algorithm based on Markov chain
[J]. Computer Engineering and Applications, 2017, 53(2): 32-37.
|
[13] |
ZHOU Ketao, LIU Weiguo, SHI Ronghua.
K-degree anonymity scheme for preserving privacy based on similarity of neighborhood degree sequence
[J]. Computer Engineering and Applications, 2017, 53(19): 102-108.
|
[14] |
CAO Jing1, WU Junsheng2.
Cluster-based routing algorithm for video transmission over cognitive radio networks
[J]. Computer Engineering and Applications, 2017, 53(18): 1-6.
|
[15] |
LI Yanlai, YING Chengshuo.
Evaluation approach of logistics schemes based on multi-format information
[J]. Computer Engineering and Applications, 2017, 53(17): 229-233.
|