[1] |
LI Jing,YAO Yiyang,LU Xindai,QIAO Yong.
Large-scale Malicious P2P Botnet Node Detection Technology Based on Challenge Strategy
[J]. Computer Engineering, 2016, 42(10): 158-163.
|
[2] |
RONG Xing,JIANG Rong,TIAN Liye.
A Group Access Authentication Protocol for Things of Internet
[J]. Computer Engineering, 2015, 41(3): 15-20.
|
[3] |
TANG Chaowei,ZHANG Xi,WANG Xuefeng,ZHOU Xu,SONG Junping.
SVC Fragment Schedule Algorithm Based on User Behavior Characteristic
[J]. Computer Engineering, 2015, 41(2): 248-252,257.
|
[4] |
XIE Huang,ZHANG Yu,WANG Yun-kai.
Design and Implementation of Node-based MQR Alogorithm in Unstructured P2P Networks
[J]. Computer Engineering, 2014, 40(9): 111-116,123.
|
[5] |
WANG Jun, JI Chang-peng, WANG Yang, WANG Lian-peng.
Research on Trust Mechanism Based on Cloud Model in P2P Network
[J]. Computer Engineering, 2014, 40(5): 124-128.
|
[6] |
ZHANG Qian, LIANG Hong, SHI Jin, GUAN Xin-quan.
Implementation Method of General Virtual Computing Platform Based on Framework Technology
[J]. Computer Engineering, 2013, 39(9): 88-93,108.
|
[7] |
WANG Jian-jun, YU Ce, SUN Ji-zhou, SUN Chao, JIN Zhou, CHENG Gang.
Research and Application of P2P Multithread Dynamic Fault-tolerance Model
[J]. Computer Engineering, 2013, 39(9): 104-108.
|
[8] |
YAN Fa-Wen, HUANG Min, WANG Zhong-Fei.
Network Abnormal Flow Behavior Detection Based on BF Algorithm
[J]. Computer Engineering, 2013, 39(7): 165-168,172.
|
[9] |
LI Li-Miao, CHEN Zhi-Gang, GUI Jin-Song, DENG Xiao-Heng.
P2P Network Trust Model Based on Priority
[J]. Computer Engineering, 2013, 39(5): 148-151,155.
|
[10] |
DING Ye-Beng, LIU Qing, WEN Yu-Mei, YANG Jin, LIN Xue-Feng.
Application Study on Time Synchronization in Pipeline Leakage Detection
[J]. Computer Engineering, 2013, 39(5): 273-276.
|
[11] |
HUANG Guo-Wei, CHEN Zhi.
Optimized Scheduling Strategy for Data Block in P2P Streaming Media
[J]. Computer Engineering, 2013, 39(2): 90-93.
|
[12] |
LIU Jian-hui, WANG Jun, JI Chang-peng.
Study of Free-riding Behavior Suppression Based on File Replication in P2P Network
[J]. Computer Engineering, 2013, 39(10): 301-304.
|
[13] |
CHEN Zhuo, LI Pan.
P2P-based Short Video Sharing System
[J]. Computer Engineering, 2012, 38(3): 273-275.
|
[14] |
LIU Gao.
P2P Hierarchical Searching Mechanism with Social Network Feature
[J]. Computer Engineering, 2012, 38(24): 86-89.
|
[15] |
LIU Zhi-Meng, MO E-Beng, JIANG Hui, YANG Xiao-Hua, SHA Ji-Chang.
A P2P Metadata Management Mechanism Based on Interest Aggregation
[J]. Computer Engineering, 2012, 38(22): 47-49.
|