[1] |
WU Hang, JIANG Hong.
Collaborative Filtering Recommendation Integrating Potential Social Trust Model
[J]. Computer Engineering and Applications, 2019, 55(20): 114-121.
|
[2] |
ZHAO Zhiguo, TAN Bang, XIA Shiying, TAN Minsheng.
P2P network comprehensive trust model based on time series
[J]. Computer Engineering and Applications, 2017, 53(15): 127-131.
|
[3] |
ZHENG Xiaoyao, LUO Yonglong, CHEN Fulong, SUN Liping.
New dynamic trust model for P2P network with detection
[J]. Computer Engineering and Applications, 2016, 52(2): 135-140.
|
[4] |
WANG Yuhua, JIANG Lin, HU Zhigang, YANG Liu.
Load balancing algorithm for DHT-based P2P system
[J]. Computer Engineering and Applications, 2015, 51(23): 100-105.
|
[5] |
LIAO Liefa, ZHANG Weinan.
Trust model of P2P system based on trade characteristics and transaction feedback
[J]. Computer Engineering and Applications, 2014, 50(20): 100-104.
|
[6] |
LI Zhanbo, ZHANG Zhe.
New ONS resolution mechanism based on DHT-P2P
[J]. Computer Engineering and Applications, 2013, 49(3): 91-95.
|
[7] |
DU Lei1, JIN Zhigang1, WANG Xiaohai2.
Skipping optimization for P2P video on demand system
[J]. Computer Engineering and Applications, 2013, 49(24): 65-69.
|
[8] |
YANG Zhixing, TANG Hongbo, BAI Yi, YANG Sen.
Distributed trust model for mobile P2P networks
[J]. Computer Engineering and Applications, 2013, 49(23): 75-80.
|
[9] |
LIU Xiaohui, JIN Zhigang, WEI Jinjin, ZHAO Ximan.
Chunk scheduling strategy for P2P network multi-view stereoscopic video transmission
[J]. Computer Engineering and Applications, 2013, 49(11): 6-10.
|
[10] |
CHEN Xinghao1,2, LI Taoshen1.
Research on algorithm for Web service discovery based on ontology
[J]. Computer Engineering and Applications, 2012, 48(5): 121-123.
|
[11] |
WANG Weisheng 1, ZHANG Yong2.
Efficient and Robust Peer-to-Peer Authentication(ER2PA) scheme for Wireless Sensor Networks(WSN)
[J]. Computer Engineering and Applications, 2012, 48(5): 66-70.
|
[12] |
KANG Songlin, WANG Yandong, LI Hui.
Application of trust model in wireless sensor networks intrusion detection
[J]. Computer Engineering and Applications, 2012, 48(5): 89-92.
|
[13] |
ZHOU Lipeng, Moydin Kamil.
Cluster head selection algorithm in WSN considering security and remaining energy
[J]. Computer Engineering and Applications, 2012, 48(3): 88-90.
|
[14] |
CHENG Fan, WANG Xiaoming.
Access control based on clustering in Ad Hoc networks
[J]. Computer Engineering and Applications, 2012, 48(28): 97-100.
|
[15] |
LUO Weimin1, XIONG Jiang1, LIU Jing2, LIU Jingbo1.
Trust mechanism based on negative evaluation dissemination for P2P networks
[J]. Computer Engineering and Applications, 2012, 48(26): 104-108.
|