[1] |
CONG Yihao, YU Yanhua.
Online Distributed Recommendation Algorithm Based on Data Stream and Peer-to-Peer Network
[J]. Computer Engineering and Applications, 2019, 55(1): 64-69.
|
[2] |
ZHANG Guoyun1,2,3, LI Yabin1,2,3, TU Bing1,2,3, LI Wentao1,3, LI Xiaochun1,3.
Hovering research of quadrotor based on VOD block matching criterion
[J]. Computer Engineering and Applications, 2017, 53(22): 208-211.
|
[3] |
ZHENG Xiaoyao, LUO Yonglong, CHEN Fulong, SUN Liping.
New dynamic trust model for P2P network with detection
[J]. Computer Engineering and Applications, 2016, 52(2): 135-140.
|
[4] |
SHEN Yuanzhong, WANG Xu, MENG Xianfu.
Two-layer-relation prefetching strategy in P2P VoD system
[J]. Computer Engineering and Applications, 2016, 52(19): 134-139.
|
[5] |
WANG Yuhua, JIANG Lin, HU Zhigang, YANG Liu.
Load balancing algorithm for DHT-based P2P system
[J]. Computer Engineering and Applications, 2015, 51(23): 100-105.
|
[6] |
LIU Hao.
Access control model of P2P based on trust in multi-domain environments
[J]. Computer Engineering and Applications, 2014, 50(21): 116-120.
|
[7] |
LIAO Liefa, ZHANG Weinan.
Trust model of P2P system based on trade characteristics and transaction feedback
[J]. Computer Engineering and Applications, 2014, 50(20): 100-104.
|
[8] |
LI Zhanbo, ZHANG Zhe.
New ONS resolution mechanism based on DHT-P2P
[J]. Computer Engineering and Applications, 2013, 49(3): 91-95.
|
[9] |
DU Lei1, JIN Zhigang1, WANG Xiaohai2.
Skipping optimization for P2P video on demand system
[J]. Computer Engineering and Applications, 2013, 49(24): 65-69.
|
[10] |
YANG Zhixing, TANG Hongbo, BAI Yi, YANG Sen.
Distributed trust model for mobile P2P networks
[J]. Computer Engineering and Applications, 2013, 49(23): 75-80.
|
[11] |
LIU Xiaohui, JIN Zhigang, WEI Jinjin, ZHAO Ximan.
Chunk scheduling strategy for P2P network multi-view stereoscopic video transmission
[J]. Computer Engineering and Applications, 2013, 49(11): 6-10.
|
[12] |
CHEN Xinghao1,2, LI Taoshen1.
Research on algorithm for Web service discovery based on ontology
[J]. Computer Engineering and Applications, 2012, 48(5): 121-123.
|
[13] |
HUANG Ping1, TAN Liang2.
Research of partially decentralized P2P Botnet command and control mechanism
[J]. Computer Engineering and Applications, 2012, 48(5): 75-77.
|
[14] |
WANG Weisheng 1, ZHANG Yong2.
Efficient and Robust Peer-to-Peer Authentication(ER2PA) scheme for Wireless Sensor Networks(WSN)
[J]. Computer Engineering and Applications, 2012, 48(5): 66-70.
|
[15] |
SUN Juanjuan1, YU Jiguo1, LIU Xiangtao2.
Similarity-computing model for P2P file-sharing networks
[J]. Computer Engineering and Applications, 2012, 48(4): 111-114.
|