[1] |
YANG Kunqiao, WANG Yuxiang, GUO Bing, LI Qiang.
Improvement and Research of Delegated Proof of Stake Consensus Mechanism
[J]. Computer Engineering and Applications, 2021, 57(24): 107-114.
|
[2] |
WANG Juan, WANG Liqing, MA Wenqian, XU Yongyue.
Survey on Incentive Mechanisms for Crowd-Based Cooperative Computing
[J]. Computer Engineering and Applications, 2020, 56(6): 1-9.
|
[3] |
XU Jian, WEN Mi, ZHANG Kai.
Improved [K]-Anonymous Incentive Mechanism Scheme Combined with Blockchain Technology
[J]. Computer Engineering and Applications, 2020, 56(6): 111-116.
|
[4] |
WU Hang, JIANG Hong.
Collaborative Filtering Recommendation Integrating Potential Social Trust Model
[J]. Computer Engineering and Applications, 2019, 55(20): 114-121.
|
[5] |
SUN Ling1, LUO Changyuan2.
Secure Geographic Information Based Routing Protocol of Aeronautical Ad Hoc Networks
[J]. Computer Engineering and Applications, 2019, 55(12): 77-82.
|
[6] |
WU Jun, MO Weiwei, YIN Xinqi, BAI Guangwei.
Research on opportunitstic routing incentive mechanism based on repeated game in WMNs
[J]. Computer Engineering and Applications, 2018, 54(10): 110-114.
|
[7] |
LV Junling, SONG Hui, HE Zhili, PAN Daru.
Survey of research on node’s selfish behavior in opportunistic networks
[J]. Computer Engineering and Applications, 2017, 53(18): 7-16.
|
[8] |
ZHAO Zhiguo, TAN Bang, XIA Shiying, TAN Minsheng.
P2P network comprehensive trust model based on time series
[J]. Computer Engineering and Applications, 2017, 53(15): 127-131.
|
[9] |
ZHANG Fei1, WEI Yingjun2.
Car Ad Hoc network communication protocol with multi-link sensing
[J]. Computer Engineering and Applications, 2016, 52(8): 102-105.
|
[10] |
HE Zheng1,2, CHEN Juhong1, LI Xiaohui1.
Game analysis about incentive of customer participation in service innovation of manufacturing enterprise
[J]. Computer Engineering and Applications, 2016, 52(3): 241-246.
|
[11] |
ZHENG Xiaoyao, LUO Yonglong, CHEN Fulong, SUN Liping.
New dynamic trust model for P2P network with detection
[J]. Computer Engineering and Applications, 2016, 52(2): 135-140.
|
[12] |
FENG Huifang, WANG Rui.
Connectivity analysis for vehicular ad hoc networks in fading channels
[J]. Computer Engineering and Applications, 2016, 52(18): 133-138.
|
[13] |
ZHANG Gang, SHI Runhua, ZHONG Hong.
Anonymous authentication scheme based on identity in VANET
[J]. Computer Engineering and Applications, 2016, 52(17): 101-106.
|
[14] |
YANG Bo1,2, WANG Shan1, SHI Xinxin1.
Vehicle-speed-and-network-status-sensing based backoff algorithm for vehicular netwok access
[J]. Computer Engineering and Applications, 2016, 52(14): 105-109.
|
[15] |
CUI Miao1,2, LI Lan2, ZHANG Guangchi1.
PHY/MAC combination simulation research of MIMO MAC protocol
[J]. Computer Engineering and Applications, 2015, 51(14): 84-88.
|