[1] |
TIAN Jingjing1,2, NIE Yufeng1.
Light chordal 4-cycle in IC-planar graphs with degree restrictions
[J]. Computer Engineering and Applications, 2016, 52(20): 26-28.
|
[2] |
WANG Yuhua, JIANG Lin, HU Zhigang, YANG Liu.
Load balancing algorithm for DHT-based P2P system
[J]. Computer Engineering and Applications, 2015, 51(23): 100-105.
|
[3] |
CHAI hua1, YANG Mingqiang2.
Object recognition based on chord location matrix
[J]. Computer Engineering and Applications, 2015, 51(1): 184-188.
|
[4] |
WANG Hui, WANG Zheng.
Bidirectional search chord routing algorithm based on new finger table
[J]. Computer Engineering and Applications, 2014, 50(23): 95-99.
|
[5] |
LIAO Liefa, ZHANG Weinan.
Trust model of P2P system based on trade characteristics and transaction feedback
[J]. Computer Engineering and Applications, 2014, 50(20): 100-104.
|
[6] |
HUANG Qiulan, WU Jie, CHENG Yaodong, CHEN Gang.
Research on data distribution policy for mass storage system
[J]. Computer Engineering and Applications, 2014, 50(10): 1-6.
|
[7] |
LI Zhanbo, ZHANG Zhe.
New ONS resolution mechanism based on DHT-P2P
[J]. Computer Engineering and Applications, 2013, 49(3): 91-95.
|
[8] |
DU Lei1, JIN Zhigang1, WANG Xiaohai2.
Skipping optimization for P2P video on demand system
[J]. Computer Engineering and Applications, 2013, 49(24): 65-69.
|
[9] |
YANG Zhixing, TANG Hongbo, BAI Yi, YANG Sen.
Distributed trust model for mobile P2P networks
[J]. Computer Engineering and Applications, 2013, 49(23): 75-80.
|
[10] |
LIU Xiaohui, JIN Zhigang, WEI Jinjin, ZHAO Ximan.
Chunk scheduling strategy for P2P network multi-view stereoscopic video transmission
[J]. Computer Engineering and Applications, 2013, 49(11): 6-10.
|
[11] |
CHEN Xinghao1,2, LI Taoshen1.
Research on algorithm for Web service discovery based on ontology
[J]. Computer Engineering and Applications, 2012, 48(5): 121-123.
|
[12] |
DONG Limeng, LI Qiang, GUAN Xin.
Research of chord recognition based on sparse representation classification
[J]. Computer Engineering and Applications, 2012, 48(29): 133-136.
|
[13] |
LUO Weimin1, XIONG Jiang1, LIU Jing2, LIU Jingbo1.
Trust mechanism based on negative evaluation dissemination for P2P networks
[J]. Computer Engineering and Applications, 2012, 48(26): 104-108.
|
[14] |
NIE Mingxing1,2, JIANG Xinhua1,2, CHEN Xingwu2.
Modified predictor-corrector NURBS interpolation algorithm
[J]. Computer Engineering and Applications, 2012, 48(21): 1-4.
|
[15] |
LI Jin1, ZHOU Zhurong2.
Search method of P2P resource based on user behavior and community discovery
[J]. Computer Engineering and Applications, 2012, 48(21): 94-98.
|