[1] |
LI Hong, ZHU Xuan, LIU Yunfei, LI Junhui.
Improved TORA Protocol with Low Overhead and Load Balancing
[J]. Computer Engineering and Applications, 2019, 55(11): 67-73.
|
[2] |
LV Xuezhi1,2, FAN Baoxin2, ZHAO Xinhui2, YIN Jian2, WANG Xianwen2, YAO Yao2.
Availability analysis of complex redundancy system based on discrete event simulation
[J]. Computer Engineering and Applications, 2018, 54(15): 255-261.
|
[3] |
WANG Xiaosa1, FU Xiaodong1, LIU Li1, YUE Kun2, LIU Lijun1.
Probabilistic analysis for stochastic QoS of Web service composition
[J]. Computer Engineering and Applications, 2017, 53(14): 70-75.
|
[4] |
JIA Zhichun1, XING Xing1,2.
Automated verification of compositional compatibility for multiple Web service
[J]. Computer Engineering and Applications, 2016, 52(7): 67-73.
|
[5] |
LI Hao1,2, ZHOU Senxin2, LU Yang1.
Research on trusted measurement of trusted industry control networks with Markov
[J]. Computer Engineering and Applications, 2016, 52(6): 248-252.
|
[6] |
ZHANG Chi, CHU Chu, TANG Yingjun, CHEN Sheng.
Research on behavioral compatibility of Web service composition based on behavioral projection
[J]. Computer Engineering and Applications, 2016, 52(20): 46-51.
|
[7] |
CHEN Yu, WANG Yadi, WANG Jindong, WANG Kun.
Method for information system risk management based on Markov logic networks
[J]. Computer Engineering and Applications, 2016, 52(18): 104-110.
|
[8] |
ZHUANG Yaou, XU Hanchuan, XU Xiaofei, WANG Zhongjie, HE Ting.
Research on service pattern-based rapid service composition approach
[J]. Computer Engineering and Applications, 2016, 52(1): 1-6.
|
[9] |
ZHANG Yanhong1, GENG Yongjun1, WU Changze2.
Dynamic redundancy strategy to assure availability of services
[J]. Computer Engineering and Applications, 2013, 49(8): 43-47.
|
[10] |
WANG Wei1, YU Lihua2.
RPCI:RPC for Internet applications
[J]. Computer Engineering and Applications, 2013, 49(21): 106-110.
|
[11] |
WU Jun, CHANG Jiang, JIANG Yong.
Simulations and analysis of performance for GPS enhanced by GEO and IGSO
[J]. Computer Engineering and Applications, 2012, 48(9): 242-244.
|
[12] |
LIU Zhizhong, XUE Xiao, AN Jiyu, LU Baoyun.
Research on manufacturing cloud service optimal composition based on CL-MMAS algorithm
[J]. Computer Engineering and Applications, 2012, 48(25): 239-242.
|
[13] |
LI Yeda1, LIN Weiwei2.
Method for optimization of data replication in Hadoop
[J]. Computer Engineering and Applications, 2012, 48(21): 58-61.
|
[14] |
ZHANG Hong1, LU Songfeng1, ZHAO Youqiao1, XU Yongkang2, HU Heping1.
Research on file-slice model for data security storage
[J]. Computer Engineering and Applications, 2012, 48(18): 66-70.
|
[15] |
HAO Shengang, ZHANG Li.
Research on service composition based on bounded model checking
[J]. Computer Engineering and Applications, 2012, 48(10): 111-114.
|