Journal of Computer Applications ›› 2009, Vol. 29 ›› Issue (08): 2309-2311.
• Tyoical applications • Previous Articles Next Articles
Received:
2009-02-19
Revised:
2009-03-30
Online:
2008-08-01
Published:
2009-08-01
通讯作者:
贾冰
基金资助:
[1] | Yingqi LI, Weifeng JI, Jiang WENG, Xuan WU, Xiuyu SHEN, Yan SUN. Virus propagation model and stability analysis of heterogeneous backup network [J]. Journal of Computer Applications, 2023, 43(4): 1176-1182. |
[2] | Kai FENG, Tong LIU. Reliability of k-ary (n-m)-cube subnetworks under probabilistic fault condition [J]. Journal of Computer Applications, 2023, 43(4): 1198-1205. |
[3] | . Routing lookup algorithm with variable-length address based on AVL tree and Bloom filter [J]. Journal of Computer Applications, 0, (): 0-0. |
[4] | HUO Shanshan, LI Yanjun, LIU Jian, LI Yinshuang. Design and implementation of cipher component security criteria testing tool [J]. Journal of Computer Applications, 0, (): 0-0. |
[5] | Yuan GU, Zhen ZHANG, Tong DUAN. Fast link failure recovery method for software-defined internet of vehicles [J]. Journal of Computer Applications, 2023, 43(3): 853-859. |
[6] | Haiyan HU, Qiaoyan KANG, Shuo ZHAO, Jianfeng WANG, Youbin FU. Service function chain deployment optimization method based on node comprehensive importance ranking [J]. Journal of Computer Applications, 2023, 43(3): 860-868. |
[7] | Dong SUN, Biao WANG, Yun XU. Design and implementation of block transmission mechanism based on remote direct memory access [J]. Journal of Computer Applications, 2023, 43(2): 484-489. |
[8] | . Impact of non-persistent carrier sense multiple access mechanism on scalability of LoRa networks [J]. Journal of Computer Applications, 0, (): 0-0. |
[9] | Yuan SUN, Wenjian SHEN, Pengbo NI, Min MAO, Yaqi XIE, Chaonong XU. Sink location algorithm of power domain nonorthogonal multiple access for real-time industrial internet of things [J]. Journal of Computer Applications, 2023, 43(1): 209-214. |
[10] | Yongmin LIU, Yujin YANG, Haoyi LUO, Hao HUANG, Tieqiang XIE. Intrusion detection method for wireless sensor network based on bidirectional circulation generative adversarial network [J]. Journal of Computer Applications, 2023, 43(1): 160-168. |
[11] | Zhanli LI, Ying LI, Xiangyu LUO, Yingxiao LUO. Local community detection algorithm based on Monte-Carlo iterative solving strategy [J]. Journal of Computer Applications, 2023, 43(1): 104-110. |
[12] | . Temporal network motif discovery method based on null model [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | Yingzhi LI, Man LI, Ping DONG, Huachun ZHOU. Multi‑type application‑layer DDoS attack detection method based on integrated learning [J]. Journal of Computer Applications, 2022, 42(12): 3775-3784. |
[14] | Jiagui XIE, Zhiping LI, Jian JIN, Bo ZHANG, Jian GUO, Fanjie NIE. New permissioned public blockchain based on main-sub chain architecture [J]. Journal of Computer Applications, 2022, 42(12): 3822-3830. |
[15] | Rongrong DAI, Honghui LI, Xueliang FU. Data center flow scheduling mechanism based on differential evolution and ant colony optimization algorithm [J]. Journal of Computer Applications, 2022, 42(12): 3863-3869. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||