[1] |
Liu Chenyi, Xu Mingwei, Geng Nan, Zhang Xiang.
A Survey on Machine Learning Based Routing Algorithms
[J]. Journal of Computer Research and Development, 2020, 57(4): 671-687.
|
[2] |
Wang Guizhi, Lü Guanghong, Jia Wucai, Jia Chuanghui, Zhang Jianshen.
A Review on the Application of Machine Learning in SDN Routing Optimization
[J]. Journal of Computer Research and Development, 2020, 57(4): 688-698.
|
[3] |
Wu Hua, Wang Ling, Cheng Guang.
Optimization of TCP Congestion Control Algorithm in Dynamic Adaptive Streaming over HTTP
[J]. Journal of Computer Research and Development, 2019, 56(9): 1965-1976.
|
[4] |
Zhang Long, Wang Jinsong.
DDoS Attack Detection Model Based on Information Entropy and DNN in SDN
[J]. Journal of Computer Research and Development, 2019, 56(5): 909-918.
|
[5] |
Tang Yingjie, Wang Fang, Xie Yanwen.
An Efficient Failure Reconstruction Based on In-Network Computing for Erasure-Coded Storage Systems
[J]. Journal of Computer Research and Development, 2019, 56(4): 767-778.
|
[6] |
Zhang Yiwen, Cui Guangming, Yan Yuanting, Zhao Shu, Zhang Yanping.
Quality Constraints-Aware Service Composition Based on Task Granulating
[J]. Journal of Computer Research and Development, 2018, 55(6): 1345-1355.
|
[7] |
Wang Yuwei, Liu Min, Ma Cheng, Li Pengfei.
High Performance Load Balancing Mechanism for Network Function Virtualization
[J]. Journal of Computer Research and Development, 2018, 55(4): 689-703.
|
[8] |
Chen Wenlong, Zhao Yirong, Xiao Rong, Tang Xiaolan, Xu Ke.
Packets Transmission with Multiple Levels of Credibility and Routing Calculation Based on Virtual Topologies
[J]. Journal of Computer Research and Development, 2018, 55(4): 729-737.
|
[9] |
Xu Ran, Wang Wendong, Gong Xiangyang, Que Xirong.
Delay-Aware Resource Scheduling Optimization in Network Function Virtualization
[J]. Journal of Computer Research and Development, 2018, 55(4): 738-747.
|
[10] |
Zheng Peng, Hu Chengchen, Li Hao.
Reducing the Southbound Interface Overhead for OpenFlow Based on the Flow Volume Characteristics
[J]. Journal of Computer Research and Development, 2018, 55(2): 346-357.
|
[11] |
Li Yang, Wang Zhe, Zhang Chuwen, Dai Huichen, Xu Wenquan, Ji Xuefeng, Wan Ying, Liu Bin.
Trajectory Prediction Algorithm in VANET Routing
[J]. Journal of Computer Research and Development, 2017, 54(11): 2421-2433.
|
[12] |
He Qian, Liu Peng, Wang Yong.
Attribute Based Encryption Method with Revocable Dynamic and Static Attributes for VANETs
[J]. Journal of Computer Research and Development, 2017, 54(11): 2456-2466.
|
[13] |
Wang Zhenpeng, Hu Hongchao, Cheng Guozhen.
Design and Implementation of Mimic Network Operating System
[J]. Journal of Computer Research and Development, 2017, 54(10): 2321-2333.
|
[14] |
Wang Tao, Chen Hongchang, Cheng Guozhen.
A Dynamic Defense Mechanism for SDN DoS Attacks Based on Network Resource Management Technology
[J]. Journal of Computer Research and Development, 2017, 54(10): 2356-2368.
|
[15] |
Ma Jiuyue, Yu Zihao, Bao Yungang, Sun Ninghui.
A Programmable Data Plane Design in Computer Architecture
[J]. Journal of Computer Research and Development, 2017, 54(1): 123-133.
|