[1] |
Xiaohan GUO, Zhongyuan YAO, Yong ZHANG, Shangkun GUO, Chao WANG, Xueming SI.
Cross-chain privacy protection scheme of consortium blockchain based on improved notary mechanism
[J]. Journal of Computer Applications, 2023, 43(10): 3028-3037.
|
[2] |
Yangnan GUO, Wenbao JIANG, Shuai YE.
Supervisable blockchain anonymous transaction system model
[J]. Journal of Computer Applications, 2022, 42(9): 2757-2764.
|
[3] |
XIANG Xiong, TIAN Jian.
P2P transmission scheduling optimization based on software defined network
[J]. Journal of Computer Applications, 2020, 40(3): 777-782.
|
[4] |
XIN Yingying, LIU Xiaojuan, FANG Chunlin, LUO Huan.
Optimization of data retransmission algorithm in information centric networking
[J]. Journal of Computer Applications, 2019, 39(3): 829-833.
|
[5] |
LONG Dan, LI Xiaohui, DING Yuemin.
Multicast routing of power grid based on demand response constraints
[J]. Journal of Computer Applications, 2018, 38(4): 1102-1105.
|
[6] |
XU Guangxian, ZHAO Yue, LAI Junning.
Deterministic layered construction algorithm based on network coding
[J]. Journal of Computer Applications, 2018, 38(3): 769-775.
|
[7] |
CHEN Hao, WU Qiwu, LI Fang, JIANG Lingzhi.
Hierarchical PCE-based and bimatrix game-based multicast dedicated protection algorithm in multi-domain optical network under static state
[J]. Journal of Computer Applications, 2018, 38(11): 3299-3304.
|
[8] |
ZHOU Kunxiao, ZHAO Hui, YUAN Huaqiang.
Multicast routing in cognitive radio networks: algorithms and protocols
[J]. Journal of Computer Applications, 2017, 37(2): 422-426.
|
[9] |
WANG Xiong, DENG Lunzhi.
Provably secure undeniable signature scheme based on identity
[J]. Journal of Computer Applications, 2016, 36(10): 2738-2741.
|
[10] |
HUANG Ping, YANG Xiaodong, LI Yan, WANG Caifen.
Identity-based proxy re-signature scheme without bilinear pairing
[J]. Journal of Computer Applications, 2015, 35(6): 1678-1682.
|
[11] |
PU Baoxing, ZHU Hongpeng, ZHAO Chenglin.
Achievable information rate region of multi-source multi-sink multicast network coding
[J]. Journal of Computer Applications, 2015, 35(6): 1546-1551.
|
[12] |
PU Baoxing, ZHAO Chenglin.
Tradeoff between multicast rate and number of coding nodes based on network coding
[J]. Journal of Computer Applications, 2015, 35(4): 929-933.
|
[13] |
WANG Chongnan, WANG Zongtao, BAO Zhonggui, XING Hongwei.
Design of telemetry and command message-oriented middleware system with publish/subscribe model
[J]. Journal of Computer Applications, 2015, 35(3): 878-881.
|
[14] |
XU Jianzhen HE Tingting HE Dan ZHOU Tong.
Building algorithm for tree-ring application layer multicast based on ant colony algorithm
[J]. Journal of Computer Applications, 2013, 33(12): 3449-3452.
|
[15] |
SHEN Hua FENG Jing YIN Min MA Weijun JIANG Lei.
Optimization methods for application layer multicast
[J]. Journal of Computer Applications, 2013, 33(12): 3389-3393.
|