[1] |
XU Dayu1, 2, DING Shuai2.
Research on improved GWO-optimized SVM-based short-term load prediction for cloud computing
[J]. Computer Engineering and Applications, 2017, 53(7): 68-73.
|
[2] |
HE Wei, XU Du.
Improved uneven cluster routing algorithm for wireless sensor network
[J]. Computer Engineering and Applications, 2017, 53(24): 136-141.
|
[3] |
XUE Jin1, ZHANG Dong1, TANG Bin2.
Research on active detection forwarding strategy for Named Data Networking(NDN)
[J]. Computer Engineering and Applications, 2014, 50(18): 89-93.
|
[4] |
WANG Min, ZHOU Zhurong.
Context search based on faceted ontology
[J]. Computer Engineering and Applications, 2013, 49(5): 127-131.
|
[5] |
SUN Jianzhi1, YUN Bing2, HAN Zhongming1, ZHANG Yingxin1, CHEN Dan1.
Robustness analysis of opportunistic network routing algorithms under flooding attacks
[J]. Computer Engineering and Applications, 2012, 48(5): 54-58.
|
[6] |
FAN Zifu,YANG Junrong,WAN Xiaoyu.
SIP DoS attack defense mechanism based on custom weighted fair queue scheming
[J]. Computer Engineering and Applications, 2011, 47(8): 62-65.
|
[7] |
LEI Yang,LI Shu-rong,ZHANG Qiang,ZHANG Xiao-dong.
Novel hybrid GA based on bare bones PSO and its application
[J]. Computer Engineering and Applications, 2010, 46(36): 7-10.
|
[8] |
WANG Jian-yong1,GONG Fu-ting2,LI Yu-ling3.
Resource searching strategy of reducing redundancy in unstructured P2P network
[J]. Computer Engineering and Applications, 2010, 46(36): 122-125.
|
[9] |
YANG Lin,ZHANG Yong-sheng,XING Chang-ming.
Information retrieval algorithm based on unstructured P2P network
[J]. Computer Engineering and Applications, 2009, 45(20): 122-124.
|
[10] |
LIAN Jin1,2,LI La-yuan2,ZHU Xiao-yan1.
Research of entropy-based QoS routing algorithm with directed flooding for MANET
[J]. Computer Engineering and Applications, 2009, 45(12): 98-100.
|
[11] |
ZHANG Jun.
Steganalysis method for ±1 steganography
[J]. Computer Engineering and Applications, 2008, 44(9): 58-60.
|
[12] |
GU Xue-mai,CAO He-qiu,SHI Shuo.
Localization arithmetic based on directions in Ad Hoc network
[J]. Computer Engineering and Applications, 2008, 44(7): 155-157.
|
[13] |
ZHANG Xiao-dong,LI Shu-rong.
Algorithm design and implementation for solving optimal control problem of polymer flooding
[J]. Computer Engineering and Applications, 2008, 44(33): 239-242.
|
[14] |
WANG Hong1,XIN Da-xin1,CAO Jin-kun2,WU Xin1.
Decentralized resources discovery in grid environment based on P2P
[J]. Computer Engineering and Applications, 2008, 44(30): 96-99.
|
[15] |
GAO Yong-chao1,LIU Li-mei1,LI Qi-qiang2,WANG Yun-zheng1.
Backbone based extremal evolutionary optimization
[J]. Computer Engineering and Applications, 2008, 44(24): 36-39.
|