[1] |
XU Guoyu, XU Gang, JIANG Tao, HU Haitao.
Research on Quantitative Analysis of Authentication Mechanism Performance for Space-Ground Integrated Information Network
[J]. Computer Engineering and Applications, 2020, 56(21): 108-114.
|
[2] |
SHI Hui, CAI Yueming, YANG Weiwei, XIANG Zhongwu, CHEN Dechuan.
Secure Performance Analysis on Untrusted Relay Network with TSR over Nakagami-[m] Channel
[J]. Computer Engineering and Applications, 2020, 56(12): 98-104.
|
[3] |
JIANG Jieqi, YANG Geng, LI Peng.
Analysis of users’ behavior under cloud computing environment
[J]. Computer Engineering and Applications, 2018, 54(14): 127-132.
|
[4] |
CUI Jiaqi, YANG Jianfeng, XU Jun, GUO Chengcheng.
CSMA/CA performance analysis in hybrid CSMA/CA and TDMA networks
[J]. Computer Engineering and Applications, 2017, 53(20): 83-88.
|
[5] |
FU Fa1, ZHOU Xing1, TAN Yuyin1, Thomas Dreibholz2, Hakim Adhari3, Erwin P. Rathgeb3.
Performance analysis of MPTCP protocol in multiple scenarios
[J]. Computer Engineering and Applications, 2016, 52(5): 89-93.
|
[6] |
LI Yang1, JIN Lisha2, HOU Yukan2, ZHANG Jie2.
Rapid configuration method of production status for assembly station based on performance analysis
[J]. Computer Engineering and Applications, 2016, 52(24): 229-235.
|
[7] |
GUO Yanyifu1, LIU Hongli1, XU Kun1, MA Ziji1, LIU Shugang2.
Performance analysis of RSSI in underground tunnel based on WSN
[J]. Computer Engineering and Applications, 2016, 52(17): 128-132.
|
[8] |
FU Fa1, ZHOU Xing1, YANG Xiong1, Hakim Adhari2, Erwin P.Rathgeb2.
Performance analysis of MPTCP and CMT-SCTP multi-path transport protocols
[J]. Computer Engineering and Applications, 2013, 49(21): 79-82.
|
[9] |
WANG Huaqiu1, LUO Jiang1, Michael GERNDT2, Ventsislav PETKOV2.
Research and application of harmony search fuzzy clustering with feature selection
[J]. Computer Engineering and Applications, 2013, 49(19): 112-118.
|
[10] |
JIN Ying1, WU Qilin2, ZHANG Yiwen3.
Research on performance analysis for MAC protocol in wireless local area network
[J]. Computer Engineering and Applications, 2012, 48(17): 105-113.
|
[11] |
WANG Gaining, WU Zhenqiang, MA Yalei, SHAO Zhiyi.
Secure network coding model on low bandwidth network
[J]. Computer Engineering and Applications, 2012, 48(11): 93-96.
|
[12] |
LI Ting-yi1,2,WANG Jin-lin2.
Transferring platform for media data based on SCTP
[J]. Computer Engineering and Applications, 2010, 46(4): 59-61.
|
[13] |
YIN Zhi-zhong1,2,ZHANG Long1,ZHOU Xian-wei1.
Performance analysis of inter-layer ISLs in triple-layered LEO/HEO/GEO satellite networks
[J]. Computer Engineering and Applications, 2010, 46(12): 9-13.
|
[14] |
JIN Yong,BAI Guang-wei.
Kalman filter-based adaptive link-level FEC mechanism for wireless media streaming
[J]. Computer Engineering and Applications, 2009, 45(7): 129-134.
|
[15] |
LI Xiao-xia,DU Zhong-jun,JIA Zhao.
Research about false-sharing of SCTP based on QoS
[J]. Computer Engineering and Applications, 2009, 45(15): 130-131.
|