计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
  Office Online
  Journal Online
   Forthcoming Articles
   Advanced Search
   Archive
   Read Articles
   Download Articles
   Email Alert
   
  Download
 
 
 
 
 
 
More>>  
 
Other articles related with "TP393":
1587 Wang Jiye, Zhou Biyu, Zhang Fa, Shi Xiang, Zeng Nan, Liu Zhiyong
  Data Center Energy Consumption Models and Energy Efficient Algorithms
    Journal of Computer Research and Development   2019 Vol.56 (8): 1587-1603 [Abstract] (157) [HTML 1 KB] [PDF 1055 KB] (156)
1470 Feng Xinyue, Yang Qiusong, Shi Lin, Wang Qing, Li Mingshu
  Critical Memory Data Access Monitor Based on Dynamic Strategy Learning
    Journal of Computer Research and Development   2019 Vol.56 (7): 1470-1487 [Abstract] (60) [HTML 108 KB] [PDF 1478 KB] (53)
1219 He Rongxi, Lei Tianying, Lin Ziwei
  Multi-Constrained Energy-Saving Routing Algorithm in Software-Defined Data Center Networks
    Journal of Computer Research and Development   2019 Vol.56 (6): 1219-1230 [Abstract] (75) [HTML 90 KB] [PDF 3038 KB] (128)
1252 Li Zhen, Tang Zhanyong, Li Zhengqiao, Wang Hai, Gong Xiaoqing, Chen Feng, Chen Xiaojiang, Fang Dingyi
  An Automatic Detection Method for Privacy Leakage Across Application Components
    Journal of Computer Research and Development   2019 Vol.56 (6): 1252-1262 [Abstract] (53) [HTML 69 KB] [PDF 1171 KB] (69)
1275 Xiao Meihua, Li Yanan, Song Jiawen, Wang Xizhong, Li Wei, Zhong Xiaomei
  Security Analysis of Authentication Protocol of WMN Client and LTCA Based on Logic of Events
    Journal of Computer Research and Development   2019 Vol.56 (6): 1275-1289 [Abstract] (66) [HTML 157 KB] [PDF 1140 KB] (54)
909 Zhang Long, Wang Jinsong
  DDoS Attack Detection Model Based on Information Entropy and DNN in SDN
    Journal of Computer Research and Development   2019 Vol.56 (5): 909-918 [Abstract] (213) [HTML 61 KB] [PDF 2034 KB] (209)
919 Chen Li, Deng Kun,Jiang Tao,Yue Guangxue,Li Panpan,Yang Jun, Xu Xubao
  Delay Tolerant Access Control Method Based on Spatio-Temporal Distribution of Access Requests
    Journal of Computer Research and Development   2019 Vol.56 (5): 919-928 [Abstract] (98) [HTML 77 KB] [PDF 2908 KB] (123)
929 Wang Shuo, Wang Jianhua, Tang Guangming, Pei Qingqi, Zhang Yuchen, Liu Xiaohu
  Intelligent and Efficient Method for Optimal Penetration Path Generation
    Journal of Computer Research and Development   2019 Vol.56 (5): 929-941 [Abstract] (96) [HTML 100 KB] [PDF 3954 KB] (118)
942 Yang Junnan, Zhang Hongqi, Zhang Chuanfu
  Network Defense Decision-Making Method Based on Stochastic Game and Improved WoLF-PHC
    Journal of Computer Research and Development   2019 Vol.56 (5): 942-954 [Abstract] (141) [HTML 128 KB] [PDF 4280 KB] (134)
967 Fei Ning, Xu Lijie, Cheng Xiaohui
  Implementation and Evaluation of Cooperative Routing in Software Defined Wireless Networking
    Journal of Computer Research and Development   2019 Vol.56 (5): 967-976 [Abstract] (97) [HTML 59 KB] [PDF 1947 KB] (94)
1048 Xi Liang, Wang Yong, Zhang Fengbin
  Anomaly Detection Algorithm Based on FCM with Adaptive Artificial Fish-Swarm
    Journal of Computer Research and Development   2019 Vol.56 (5): 1048-1059 [Abstract] (83) [HTML 100 KB] [PDF 3003 KB] (103)
453 Shi Yahu, Shi Hailong, Cui Li
  EasiDARM: Distributed Based Adaptive Register Method for Internet of Things
    Journal of Computer Research and Development   2019 Vol.56 (3): 453-466 [Abstract] (77) [HTML 104 KB] [PDF 4936 KB] (80)
467 Li Mingyue, Luo Xiangyang, Chai Lixiang, Yuan Fuxiang, GanYong
  City-Level IP Geolocation Method Based on Network Node Clustering
    Journal of Computer Research and Development   2019 Vol.56 (3): 467-479 [Abstract] (79) [HTML 69 KB] [PDF 4791 KB] (75)
533 Wu Jiaxin, Wu Jigang, Chen Long, Sui Xiufeng
  Secrecy Capacity Optimization Technique for Energy Harvest Cooperative Cognitive Radio Network
    Journal of Computer Research and Development   2019 Vol.56 (3): 533-543 [Abstract] (41) [HTML 100 KB] [PDF 3187 KB] (50)
566 Ren Jiadong, Liu Xinqian, Wang Qian, He Haitao, Zhao Xiaolin
  An Multi-Level Intrusion Detection Method Based on KNN Outlier Detection and Random Forests
    Journal of Computer Research and Development   2019 Vol.56 (3): 566-575 [Abstract] (115) [HTML 66 KB] [PDF 2117 KB] (97)
576 Zhang Shaobo, Wang Guojun, Liu Qin, Liu Jianxun
  Trajectory Privacy Protection Method Based on Multi-Anonymizer
    Journal of Computer Research and Development   2019 Vol.56 (3): 576-584 [Abstract] (90) [HTML 87 KB] [PDF 2532 KB] (64)
585 Lin Weiwei, Yao Yingbiao, Zou Ke, Feng Wei, Yan Junrong
  Correction Vector Based Distributed DV-Hop Localization Refinement Algorithm
    Journal of Computer Research and Development   2019 Vol.56 (3): 585-593 [Abstract] (92) [HTML 61 KB] [PDF 2417 KB] (58)
349 Li Chunqiang, Dong Yongqiang, Wu Guoxin
  Elephant Flow Detection Algorithm Based on Lowest Rate Eviction Integrated with d-Left Hash
    Journal of Computer Research and Development   2019 Vol.56 (2): 349-362 [Abstract] (147) [HTML 103 KB] [PDF 5967 KB] (126)
363 Wei Songjie, Wu Chao, Luo Na, Zhang Gongxuan
  Traffic Latency Characterization and Fingerprinting in Mobile Cellular Networks
    Journal of Computer Research and Development   2019 Vol.56 (2): 363-374 [Abstract] (137) [HTML 84 KB] [PDF 3228 KB] (149)
90 Xu Zhiwei, Zeng Chen, Chao Lu, Peng Xiaohui
  Zone-Oriented Architecture: An Architectural Style for Smart Web of Everything
    Journal of Computer Research and Development   2019 Vol.56 (1): 90-102 [Abstract] (299) [HTML 88 KB] [PDF 3814 KB] (289)
2620 Wang Shuo, Tang Guangming , Wang Jianhua, Sun Yifeng, Kou Guang
  Attack Scenario Construction Method Based on Causal Knowledge Net
    Journal of Computer Research and Development   2018 Vol.55 (12): 2620-2636 [Abstract] (181) [HTML 112 KB] [PDF 3673 KB] (177)
2685 Ma Haiyan, Liang Yongquan, Ji Shujuan, Li Da
  A Trust-Distrust Based Reputation Attacks Defending Strategy and Its Stability Analysis
    Journal of Computer Research and Development   2018 Vol.55 (12): 2685-2702 [Abstract] (241) [HTML 118 KB] [PDF 3085 KB] (183)
2482 Li Shuai, Fu Anmin, Su Mang, Chen Zhenzhu, Sun Yinxia3
  Secure and Verifiable Protocol for Outsourcing Group Power Exponent to a Single Server
    Journal of Computer Research and Development   2018 Vol.55 (11): 2482-2489 [Abstract] (152) [HTML 115 KB] [PDF 1708 KB] (256)
2490 Ma Xingpo, Liang Junbin, Ma Wenpeng, Li Yin, Li Ran, Kui Xiaoyan
  A Secure Top-k Query Processing Protocol for Two-Tiered Wireless Sensor Networks
    Journal of Computer Research and Development   2018 Vol.55 (11): 2490-2500 [Abstract] (158) [HTML 131 KB] [PDF 2598 KB] (198)
2511 Zhang Degan, Zhang Ting, Zhang Jie, Zhou Shan
  A New Power-Resource Allocation Algorithm with Interference Restraining Based on FBMC-OQAM
    Journal of Computer Research and Development   2018 Vol.55 (11): 2511-2521 [Abstract] (150) [HTML 133 KB] [PDF 2598 KB] (155)
2522 Guo Shuai, Guo Zhongwen, Qiu Zhijin
  HSMA: Hierarchical Schema Matching Algorithm for IoT Heterogeneous Data
    Journal of Computer Research and Development   2018 Vol.55 (11): 2522-2531 [Abstract] (180) [HTML 95 KB] [PDF 3227 KB] (188)
2099 Pan Chen, Liu Zhiqiang, Liu Zhen, Long Yu
  Research on Scalability of Blockchain Technology: Problems and Methods
    Journal of Computer Research and Development   2018 Vol.55 (10): 2099-2110 [Abstract] (937) [HTML 99 KB] [PDF 2158 KB] (666)
2111 Wang Jice, Li Yilian, Jia Yan, Zhou Wei, Wang Yucheng, Wang He, Zhang Yuqing
  Survey of Smart Home Security
    Journal of Computer Research and Development   2018 Vol.55 (10): 2111-2124 [Abstract] (697) [HTML 105 KB] [PDF 2535 KB] (590)
2219 Zhang Jianyi, Wang Zhiqiang, Xu Zhili, Ouyang Yafei, Yang Tao
  A Regulatable Digital Currency Model Based on Blockchain
    Journal of Computer Research and Development   2018 Vol.55 (10): 2219-2232 [Abstract] (783) [HTML 107 KB] [PDF 3824 KB] (409)
2233 Xu Wenyu, Wu Lei, Yan Yunxue
  Privacy-Preserving Scheme of Electronic Health Records Based on Blockchain and Homomorphic Encryption
    Journal of Computer Research and Development   2018 Vol.55 (10): 2233-2243 [Abstract] (549) [HTML 115 KB] [PDF 1970 KB] (512)
First page | Prev page | Next page | Last pagePage 1 of 7, 205 records
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech