[1] |
Li Qian, Hu Yupeng, Ye Zhenyu, Xiao Ye, Qin Zheng.
An Ant Colony Optimization Algorithms Based Data Update Scheme for Erasure-Coded Storage Systems
[J]. Journal of Computer Research and Development, 2021, 58(2): 305-318.
|
[2] |
Li Xuebing, Chen Yang, Zhou Mengying, Wang Xin.
Internet Data Transfer Protocol QUIC: A Survey
[J]. Journal of Computer Research and Development, 2020, 57(9): 1864-1876.
|
[3] |
Ma Aman, Jiang Xianliang, Jin Guang.
HDT: A Heuristic Dynamic Threshold Algorithm to Avoid Reprioritization of LEDBAT
[J]. Journal of Computer Research and Development, 2020, 57(6): 1292-1301.
|
[4] |
Zeng Gaoxiong, Hu Shuihai, Zhang Junxue, Chen Kai.
Transport Protocols for Data Center Networks: A Survey
[J]. Journal of Computer Research and Development, 2020, 57(1): 74-84.
|
[5] |
Wu Hua, Wang Ling, Cheng Guang.
Optimization of TCP Congestion Control Algorithm in Dynamic Adaptive Streaming over HTTP
[J]. Journal of Computer Research and Development, 2019, 56(9): 1965-1976.
|
[6] |
Hai Mo, Zhu Jianming.
A Propagation Mechanism Combining an Optimal Propagation Path and Incentive in Blockchain Networks
[J]. Journal of Computer Research and Development, 2019, 56(6): 1205-1218.
|
[7] |
Chen Li, Deng Kun,Jiang Tao,Yue Guangxue,Li Panpan,Yang Jun, Xu Xubao.
Delay Tolerant Access Control Method Based on Spatio-Temporal Distribution of Access Requests
[J]. Journal of Computer Research and Development, 2019, 56(5): 919-928.
|
[8] |
Deng Li, Wu Weinan, Zhu Zhengyi, Chen Ming.
DiffSec: A Differentiated Intelligent Network Security Service Model
[J]. Journal of Computer Research and Development, 2019, 56(5): 955-966.
|
[9] |
Wei Songjie, Wu Chao, Luo Na, Zhang Gongxuan.
Traffic Latency Characterization and Fingerprinting in Mobile Cellular Networks
[J]. Journal of Computer Research and Development, 2019, 56(2): 363-374.
|
[10] |
Wang Zhen, Jiang Jianhui, Chen Naijin, Lu Guangming,Zhang Ying.
Effects of Three Factors Under BTI on the Soft Error Rate of Integrated Circuits
[J]. Journal of Computer Research and Development, 2018, 55(5): 1108-1116.
|
[11] |
Zheng Zheng, Xu Mingwei, Li Qi, Zhang Yun.
Defending Against SDN Network Topology Poisoning Attacks
[J]. Journal of Computer Research and Development, 2018, 55(1): 207-215.
|
[12] |
Wang Wenhua, Wang Tian, Wu Qun, Wang Guojun, Jia Weijia.
Survey of Delay-Constrained Data Collection with Mobile Elements in WSNs
[J]. Journal of Computer Research and Development, 2017, 54(3): 474-492.
|
[13] |
Zhu Ziqing, Cao Jiuxin, Zhou Tao, Xu Shuai, Ma Zhuo, Liu Bo.
Multi-Feature Based Message Transmitting in Mobile Social Network
[J]. Journal of Computer Research and Development, 2017, 54(2): 369-381.
|
[14] |
Deng Xiaoheng, Cao Dejuan, Pan Yan, Shen Hailan, Chen Zhigang.
An Optimized Credit Distribution Model in Social Networks with Time-Delay Constraint
[J]. Journal of Computer Research and Development, 2017, 54(2): 382-393.
|
[15] |
Zhang Xiaoyu, Shang Tao, Liu Jianwei.
Detect-Defray Mechanism Based Motivation Scheme for Selfish Nodes of Network Coding
[J]. Journal of Computer Research and Development, 2017, 54(11): 2620-2627.
|