[1] |
WANG Yuhua, JIANG Lin, HU Zhigang, YANG Liu.
Load balancing algorithm for DHT-based P2P system
[J]. Computer Engineering and Applications, 2015, 51(23): 100-105.
|
[2] |
TANG Shanshan, ZHU Yuelong, ZHU Kai.
Parallel computation of shell fragments cube Map/Reduce-based
[J]. Computer Engineering and Applications, 2015, 51(22): 124-129.
|
[3] |
YANG Zhixing, TANG Hongbo, BAI Yi, YANG Sen.
Distributed trust model for mobile P2P networks
[J]. Computer Engineering and Applications, 2013, 49(23): 75-80.
|
[4] |
REN Feng, CAO Dun, FU Ming.
OLAP query algorithm based on real-time semantic dimension hierarchical
[J]. Computer Engineering and Applications, 2012, 48(4): 149-151.
|
[5] |
LUO Weimin1, XIONG Jiang1, LIU Jing2, LIU Jingbo1.
Trust mechanism based on negative evaluation dissemination for P2P networks
[J]. Computer Engineering and Applications, 2012, 48(26): 104-108.
|
[6] |
DU Min1, WANG Xiaoliang2.
P2P trust model of dynamic optimization for group competition based on entropy method
[J]. Computer Engineering and Applications, 2012, 48(17): 123-128.
|
[7] |
SHI Zhibin, WANG Bo.
Application research of reductive formal context on data cube
[J]. Computer Engineering and Applications, 2012, 48(15): 24-28.
|
[8] |
WEN Guofeng1,2,CHEN Liwen1.
Building and application of data warehouse of completed construction projects
[J]. Computer Engineering and Applications, 2011, 47(4): 245-248.
|
[9] |
NI Zhiwei1,2,ZHOU Zhiqiang1,2,GONG Weifeng1,2,MENG Jinhua1,2.
Metarule-guided mining of association rules based on classification of dimensions
[J]. Computer Engineering and Applications, 2011, 47(30): 140-143.
|
[10] |
WANG Jianyong1,LI Yuling2,JING Xiu1,LIU Feng1.
Dynamic load balancing scheduling strategy against vulnerability in P2P sub-domain network
[J]. Computer Engineering and Applications, 2011, 47(24): 84-87.
|
[11] |
PAN Ming-xia,WANG Yu.
Storage of hierarchical dimension in port data MOLAP
[J]. Computer Engineering and Applications, 2010, 46(3): 211-214.
|
[12] |
MA Li-li,HUANG Hong-bin,DENG Su.
Research on creating semantic overlay networks including association
[J]. Computer Engineering and Applications, 2009, 45(21): 153-155.
|
[13] |
LI Shi-qian1,GAO Ping1,SONG Shi-zhong1,SHI Qing-hua2.
Research in improving framework of counteracting free-riding in peer-to-peer networks
[J]. Computer Engineering and Applications, 2009, 45(19): 92-94.
|
[14] |
YANG Ke-hua,WEI Li.
OLAP patten matching method in P2P network
[J]. Computer Engineering and Applications, 2008, 44(9): 162-164.
|
[15] |
CHEN Fu-qiang1,2,XI Jian-qing1.
New algorithm for computing cover quotient cube
[J]. Computer Engineering and Applications, 2008, 44(17): 151-152.
|