[1] |
Liu Liu, Wang Yuyao, Ni Qixuan, Cao Jie, Bu Zhan.
A Link Prediction Approach in Temporal Networks Based on Game Theory
[J]. Journal of Computer Research and Development, 2019, 56(9): 1953-1964.
|
[2] |
Yu Yaxin, Wang Lei.
An Advertising Game Theory Decision-Making Mechanism for Overlapping Seeds in Geo-Social Network
[J]. Journal of Computer Research and Development, 2019, 56(6): 1302-1311.
|
[3] |
Fei Ning, Xu Lijie, Cheng Xiaohui.
Implementation and Evaluation of Cooperative Routing in Software Defined Wireless Networking
[J]. Journal of Computer Research and Development, 2019, 56(5): 967-976.
|
[4] |
Liu Yiran, Ke Junming, Jiang Han, Song Xiangfu.
Improvement of the PoS Consensus Mechanism in Blockchain Based on Shapley Value
[J]. Journal of Computer Research and Development, 2018, 55(10): 2208-2218.
|
[5] |
Zhou Mosong, Dong Xiaoshe, Chen Heng, Zhang Xingjun.
Improving Cloud Platform Based on the Runtime Resource Capacity Evaluation
[J]. Journal of Computer Research and Development, 2017, 54(11): 2516-2533.
|
[6] |
Hu Qing, Lü Shichao, Shi Zhiqiang, Sun Limin, Xiao Liang.
Advanced Persistent Threats Detection Game with Expert System for Cloud
[J]. Journal of Computer Research and Development, 2017, 54(10): 2344-2355.
|
[7] |
Meng Fei, Lan Julong, Hu Yuxiang.
A Cooperative Game Based Data Center Backbone Network Bandwidth Allocation Policy
[J]. Journal of Computer Research and Development, 2016, 53(6): 1306-1313.
|
[8] |
Su Hui, Xu Ke, Shen Meng, Wang Yong, Zhong Yifeng, Li Tong.
Mobile Data Subsidy Model and Case Study
[J]. Journal of Computer Research and Development, 2016, 53(4): 861-872.
|
[9] |
Wang Tiefeng, Cai Ying, Zhang Yujie.
Reputation-Based Defense Scheme Against Pollution Attacks on Network Coding
[J]. Journal of Computer Research and Development, 2016, 53(11): 2491-2499.
|
[10] |
Wang Yichuan, Ma Jianfeng, Lu Di,Zhang Liumei,Meng Xianjia.
Game Optimization for Internal DDoS Attack Detection in Cloud Computing
[J]. Journal of Computer Research and Development, 2015, 52(8): 1873-1882.
|
[11] |
Zhao Jing, Li Xin, Deng Lingjuan, Li Xinghua, Ma Jianfeng.
A Selection Method for User Authentication Protocols in Wireless Networks
[J]. Journal of Computer Research and Development, 2015, 52(3): 671-680.
|
[12] |
Lin Hui1, Ma Jianfeng2, and Xu Li1.
A Secure Routing Protocol for MWNs Based on Cross-Layer Dynamic Reputation Mechanism
[J]. 计算机研究与发展, 2014, 51(7): 1486-1496.
|
[13] |
Dong Rongsheng, Sun Dongdong, Guo Yunchuan, and Liu Jianming.
Power Control and Vertical Handoff Based on Evolutionary Game Theory
[J]. Journal of Computer Research and Development, 2014, 51(6): 1185-1198.
|
[14] |
Yang Yutuo, Liang Wei, Zhang Xiaoling, and Liu Shuai.
Time Synchronization Method of Wireless Network for Factory Automation
[J]. Journal of Computer Research and Development, 2014, 51(3): 511-518.
|
[15] |
Tian Youliang, Peng Chenggen, Ma Jianfeng, Jiang Qi, and Zhu Jianming.
Game-Theoretic Mechanism for Cryptographic Protocol
[J]. Journal of Computer Research and Development, 2014, 51(2): 344-352.
|