[1] |
WANG Yunye, CHENG Yage, JIA Zhijuan, FU Junjun, YANG Yanyan, HE Yuchu, MA Wei.
Auditable signature scheme for blockchain based on secure multi-party
[J]. Journal of Computer Applications, 2020, 40(9): 2639-2645.
|
[2] |
XIANG Xiong, TIAN Jian.
P2P transmission scheduling optimization based on software defined network
[J]. Journal of Computer Applications, 2020, 40(3): 777-782.
|
[3] |
ZHANG Ning, CHEN Qin.
Ensemble learning training method based on AUC and Q statistics
[J]. Journal of Computer Applications, 2019, 39(4): 935-939.
|
[4] |
XU Han, LUO Liang, SUN Peng, MENG Sa.
Cloud system security and performance modeling based on Markov model
[J]. Journal of Computer Applications, 2019, 39(11): 3304-3309.
|
[5] |
CAI Yongjia, LI Guanyu, GUAN Haoyuan.
Personalized recommendation algorithm based on graph entropy in trust social network
[J]. Journal of Computer Applications, 2019, 39(1): 176-180.
|
[6] |
ZHANG Ning, CHEN Qin.
P2P loan default prediction model based on TF-IDF algorithm
[J]. Journal of Computer Applications, 2018, 38(10): 3042-3047.
|
[7] |
YAN Binghao, HAN Guodong, HUANG Yajing, WANG Xiaolong.
New traffic classification method for imbalanced network data
[J]. Journal of Computer Applications, 2018, 38(1): 20-25.
|
[8] |
LIU Jing, ZHAO Wenju.
Fast content distribution method of integrating P2P technology in cloud platform
[J]. Journal of Computer Applications, 2017, 37(1): 31-36.
|
[9] |
ZHANG Xin, YANG Xiaoyuan, ZHU Shuaishuai, YANG Haibing.
Trusted access authentication protocol for mobile nodes in Internet of things
[J]. Journal of Computer Applications, 2016, 36(11): 3108-3112.
|
[10] |
ZHANG Qingfeng, WANG Sheng, LIAO Dan.
Nash bargaining based resource allocation in peer-to-peer network
[J]. Journal of Computer Applications, 2015, 35(9): 2424-2429.
|
[11] |
ZHANG Baojun, PAN Ruifang.
Architecture of new generation blog system with cloud storage
[J]. Journal of Computer Applications, 2015, 35(8): 2158-2163.
|
[12] |
TIAN Shuowei, YANG Yuexiang, HE Jie, WANG Xiaolei, JIANG Zhixiong.
Real-time detection system for stealthy P2P hosts based on statistical features
[J]. Journal of Computer Applications, 2015, 35(7): 1892-1896.
|
[13] |
LIU Wei, ZHANG Shuben, ZHU Ruiyi, YANG Jian.
Design and implementation of Wi-Fi Direct based multi-screen interaction system
[J]. Journal of Computer Applications, 2015, 35(6): 1801-1804.
|
[14] |
CHEN Zhuo, ZHOU Jiang.
Optimized bandwidth allocation mechanism in peer-to-peer streaming based on network coding
[J]. Journal of Computer Applications, 2015, 35(6): 1509-1513.
|
[15] |
LI Tengyao, ZHANG Shuiping, ZHANG Yueling, ZHANG Jingyi.
Design and implementation of cloud monitor system based on P2P monitor network
[J]. Journal of Computer Applications, 2015, 35(12): 3378-3382.
|