[1] |
XU Guoyu, XU Gang, JIANG Tao, HU Haitao.
Research on Quantitative Analysis of Authentication Mechanism Performance for Space-Ground Integrated Information Network
[J]. Computer Engineering and Applications, 2020, 56(21): 108-114.
|
[2] |
SHI Hui, CAI Yueming, YANG Weiwei, XIANG Zhongwu, CHEN Dechuan.
Secure Performance Analysis on Untrusted Relay Network with TSR over Nakagami-[m] Channel
[J]. Computer Engineering and Applications, 2020, 56(12): 98-104.
|
[3] |
JIANG Jieqi, YANG Geng, LI Peng.
Analysis of users’ behavior under cloud computing environment
[J]. Computer Engineering and Applications, 2018, 54(14): 127-132.
|
[4] |
CUI Jiaqi, YANG Jianfeng, XU Jun, GUO Chengcheng.
CSMA/CA performance analysis in hybrid CSMA/CA and TDMA networks
[J]. Computer Engineering and Applications, 2017, 53(20): 83-88.
|
[5] |
FU Fa1, ZHOU Xing1, TAN Yuyin1, Thomas Dreibholz2, Hakim Adhari3, Erwin P. Rathgeb3.
Performance analysis of MPTCP protocol in multiple scenarios
[J]. Computer Engineering and Applications, 2016, 52(5): 89-93.
|
[6] |
LI Yang1, JIN Lisha2, HOU Yukan2, ZHANG Jie2.
Rapid configuration method of production status for assembly station based on performance analysis
[J]. Computer Engineering and Applications, 2016, 52(24): 229-235.
|
[7] |
GUO Yanyifu1, LIU Hongli1, XU Kun1, MA Ziji1, LIU Shugang2.
Performance analysis of RSSI in underground tunnel based on WSN
[J]. Computer Engineering and Applications, 2016, 52(17): 128-132.
|
[8] |
FU Fa1, ZHOU Xing1, YANG Xiong1, Hakim Adhari2, Erwin P.Rathgeb2.
Performance analysis of MPTCP and CMT-SCTP multi-path transport protocols
[J]. Computer Engineering and Applications, 2013, 49(21): 79-82.
|
[9] |
WANG Huaqiu1, LUO Jiang1, Michael GERNDT2, Ventsislav PETKOV2.
Research and application of harmony search fuzzy clustering with feature selection
[J]. Computer Engineering and Applications, 2013, 49(19): 112-118.
|
[10] |
JIN Ying1, WU Qilin2, ZHANG Yiwen3.
Research on performance analysis for MAC protocol in wireless local area network
[J]. Computer Engineering and Applications, 2012, 48(17): 105-113.
|
[11] |
ZHANG Xiao-hong1,2,FAN Zhong-kui1,ZHONG Xiao-yong3.
Double identity authentication system of one-time pad based on Schnorr protocol
[J]. Computer Engineering and Applications, 2010, 46(19): 81-84.
|
[12] |
YIN Zhi-zhong1,2,ZHANG Long1,ZHOU Xian-wei1.
Performance analysis of inter-layer ISLs in triple-layered LEO/HEO/GEO satellite networks
[J]. Computer Engineering and Applications, 2010, 46(12): 9-13.
|
[13] |
WU Zheng-zhi,ZHANG Kao,DING Zuo-hua.
Performance analysis of programs using ordinary differential equations
[J]. Computer Engineering and Applications, 2009, 45(13): 78-80.
|
[14] |
LIU Yi,MAO Jun-peng,SHEN Chang-xiang,CUI Yan-li.
Resource service performance analysis of P2P network
[J]. Computer Engineering and Applications, 2008, 44(36): 7-10.
|
[15] |
WU Hua-feng,DAI Xin-fa,OU Zhong-hong,XU Huo-sheng.
Network layer handoff delay analysis for hierarchical mobile IP
[J]. Computer Engineering and Applications, 2008, 44(20): 128-130.
|