Journal of Computer Applications ›› 2009, Vol. 29 ›› Issue (05): 1238-1240.
• Network and communications • Previous Articles Next Articles
Xiao-Lin Shi
Received:2008-11-04
Revised:2008-12-10
Online:2009-06-09
Published:2009-05-01
Contact:
Xiao-Lin Shi
师小琳
通讯作者:
师小琳
基金资助:| [1] | Limei DONG, Yanzi LI, Jiayin LI, Li XU. Neighborhood-enhanced unsupervised graph anomaly detection [J]. Journal of Computer Applications, 2026, 46(2): 458-466. |
| [2] | Junrui WU, Jiangchuan YANG, Haisheng YU, Sai ZOU, Wenyong WANG. Performance evaluation method for deterministic networks based on complex-enhanced attention graph neural network [J]. Journal of Computer Applications, 2026, 46(2): 505-517. |
| [3] | . UAV trajectory planning for wireless sensor networks based on nonlinear age of information [J]. Journal of Computer Applications, 0, (): 0-0. |
| [4] | . RDMA based edge computing cloud-edge data communication technology [J]. Journal of Computer Applications, 0, (): 0-0. |
| [5] | Zifen HE, Deze ZENG, Lifeng TIAN, Yuepeng LI, Jiayu ZHANG. Low-latency data transmission routing method for LEO satellites considering laser antenna alignment overhead [J]. Journal of Computer Applications, 2026, 46(1): 198-206. |
| [6] | LI Huaijin, ZHANG Shibing, YANG Min. DDoS attack detection method based on DeepInsight and hybrid quantum convolutional neural network [J]. Journal of Computer Applications, 0, (): 0-0. |
| [7] | Xiang KUANG, Zhen MA, Wanchun ZHU, Zhi ZHANG, Yunfei CUI. Secure and reliable service function chain deployment based on encoder-decoder structured reinforcement learning [J]. Journal of Computer Applications, 2025, 45(12): 3947-3956. |
| [8] | Lin WEI, Shihao ZHANG, Mengyang HE. Workflow task optimization and energy-efficient offloading method for computing power network [J]. Journal of Computer Applications, 2025, 45(12): 3916-3924. |
| [9] | Haoqun ZHENG, Lizhi CAI, Kang YANG, Xiaoyu WANG. Intrusion detection method with multi-stage fusion for internet of medical things [J]. Journal of Computer Applications, 2025, 45(12): 3909-3915. |
| [10] | Ruilong CHEN, Peng YI, Tao HU, Youjun BU. Encrypted traffic classification method based on federated prototypical incremental learning [J]. Journal of Computer Applications, 2025, 45(12): 3888-3895. |
| [11] | . ADS-B attack detection method based on improved DeepLabV3+ [J]. Journal of Computer Applications, 0, (): 0-0. |
| [12] | Jingjing WANG, Mengze CHEN, Ziwei YAN, Jiaxun WANG, Zan LUO, Yakun REN, Kai LEI. Open chain-network integration architecture with semantic-rich non-fungible data element [J]. Journal of Computer Applications, 2025, 45(11): 3502-3509. |
| [13] | Lin WEI, Jinyang LI, Yajie WANG, Mengyang HE. Highly reliable matching method based on multi-dimensional resource measurement and rescheduling in computing power network [J]. Journal of Computer Applications, 2025, 45(11): 3632-3641. |
| [14] | . DCSFFuzzer:Dual-channel semantic feature fusion-based fuzz testing method for industrial control protocols [J]. Journal of Computer Applications, 0, (): 0-0. |
| [15] | . Trajectory-Aware Multi-Agent Cooperative Task Offloading Method for Vehicular Edge Computing [J]. Journal of Computer Applications, 0, (): 0-0. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||