[1] |
LIU Qilie, QIN Qingwei, XIA Yuanpeng, LI Yun.
Novel caching replacement strategy based on popularity in named data networking
[J]. Computer Engineering and Applications, 2018, 54(11): 76-80.
|
[2] |
WU Jun, MO Weiwei, YIN Xinqi, BAI Guangwei.
Trusted opportunistic routing forwarding model based on feedback credibility
[J]. Computer Engineering and Applications, 2017, 53(8): 23-28.
|
[3] |
LIU Yi1, BAI Xuefeng1, YANG Yubin2.
Privacy protection strategy in content-centric networking based on multi-layer encryption mechanism
[J]. Computer Engineering and Applications, 2017, 53(5): 1-5.
|
[4] |
LIU Qilie1, XIA Yuanpeng1, QIN Qingwei1, FENG Zhiyu1, WU Fengyang2.
Neighbor collaborative based polymorphic ant colony algorithm for CCN
[J]. Computer Engineering and Applications, 2017, 53(24): 106-112.
|
[5] |
HE Wei, XU Du.
Improved uneven cluster routing algorithm for wireless sensor network
[J]. Computer Engineering and Applications, 2017, 53(24): 136-141.
|
[6] |
YANG Xiaofei, NIU Cuicui, DING Zhipeng, ZHANG Hongyu.
Fast greedy name lookup strategy for NDN
[J]. Computer Engineering and Applications, 2016, 52(11): 44-49.
|
[7] |
WANG Min, ZHOU Zhurong.
Context search based on faceted ontology
[J]. Computer Engineering and Applications, 2013, 49(5): 127-131.
|
[8] |
SUN Jianzhi1, YUN Bing2, HAN Zhongming1, ZHANG Yingxin1, CHEN Dan1.
Robustness analysis of opportunistic network routing algorithms under flooding attacks
[J]. Computer Engineering and Applications, 2012, 48(5): 54-58.
|
[9] |
FAN Zifu,YANG Junrong,WAN Xiaoyu.
SIP DoS attack defense mechanism based on custom weighted fair queue scheming
[J]. Computer Engineering and Applications, 2011, 47(8): 62-65.
|
[10] |
LEI Yang,LI Shu-rong,ZHANG Qiang,ZHANG Xiao-dong.
Novel hybrid GA based on bare bones PSO and its application
[J]. Computer Engineering and Applications, 2010, 46(36): 7-10.
|
[11] |
WANG Jian-yong1,GONG Fu-ting2,LI Yu-ling3.
Resource searching strategy of reducing redundancy in unstructured P2P network
[J]. Computer Engineering and Applications, 2010, 46(36): 122-125.
|
[12] |
PAN Yun-hong1,ZHANG Yun1,WU Zhi-fang2,ZHONG Ling1.
Mesocyclone recognition based on new flooding algorithm
[J]. Computer Engineering and Applications, 2010, 46(21): 171-174.
|
[13] |
YANG Lin,ZHANG Yong-sheng,XING Chang-ming.
Information retrieval algorithm based on unstructured P2P network
[J]. Computer Engineering and Applications, 2009, 45(20): 122-124.
|
[14] |
LIAN Jin1,2,LI La-yuan2,ZHU Xiao-yan1.
Research of entropy-based QoS routing algorithm with directed flooding for MANET
[J]. Computer Engineering and Applications, 2009, 45(12): 98-100.
|
[15] |
GU Xue-mai,CAO He-qiu,SHI Shuo.
Localization arithmetic based on directions in Ad Hoc network
[J]. Computer Engineering and Applications, 2008, 44(7): 155-157.
|