[1] |
Li Qian, Hu Yupeng, Ye Zhenyu, Xiao Ye, Qin Zheng.
An Ant Colony Optimization Algorithms Based Data Update Scheme for Erasure-Coded Storage Systems
[J]. Journal of Computer Research and Development, 2021, 58(2): 305-318.
|
[2] |
Yang Fan, Zhang Peng, Wang Zhan, Yuan Guojun, An Xuejun.
Accelerating Byzantine Fault Tolerance with In-Network Computing
[J]. Journal of Computer Research and Development, 2021, 58(1): 164-177.
|
[3] |
Wang Guizhi, Lü Guanghong, Jia Wucai, Jia Chuanghui, Zhang Jianshen.
A Review on the Application of Machine Learning in SDN Routing Optimization
[J]. Journal of Computer Research and Development, 2020, 57(4): 688-698.
|
[4] |
Bao Han, Wang Yijie, Xu Fangliang.
A Cross-Datacenter Erasure Code Writing Method Based on Generator Matrix Transformation
[J]. Journal of Computer Research and Development, 2020, 57(2): 291-305.
|
[5] |
Zhang Yao, Chu Jiajia, Weng Chuliang.
Survey on Data Updating in Erasure-Coded Storage Systems
[J]. Journal of Computer Research and Development, 2020, 57(11): 2419-2431.
|
[6] |
Zhang Long, Wang Jinsong.
DDoS Attack Detection Model Based on Information Entropy and DNN in SDN
[J]. Journal of Computer Research and Development, 2019, 56(5): 909-918.
|
[7] |
Liu Pei, Jiang Ziyi, Cao Xiu.
Node Selection Algorithm During Multi-Nodes Repair Progress in Distributed Storage System
[J]. Journal of Computer Research and Development, 2018, 55(7): 1557-1568.
|
[8] |
Wang Yuwei, Liu Min, Ma Cheng, Li Pengfei.
High Performance Load Balancing Mechanism for Network Function Virtualization
[J]. Journal of Computer Research and Development, 2018, 55(4): 689-703.
|
[9] |
Chen Wenlong, Zhao Yirong, Xiao Rong, Tang Xiaolan, Xu Ke.
Packets Transmission with Multiple Levels of Credibility and Routing Calculation Based on Virtual Topologies
[J]. Journal of Computer Research and Development, 2018, 55(4): 729-737.
|
[10] |
Xu Ran, Wang Wendong, Gong Xiangyang, Que Xirong.
Delay-Aware Resource Scheduling Optimization in Network Function Virtualization
[J]. Journal of Computer Research and Development, 2018, 55(4): 738-747.
|
[11] |
Zheng Peng, Hu Chengchen, Li Hao.
Reducing the Southbound Interface Overhead for OpenFlow Based on the Flow Volume Characteristics
[J]. Journal of Computer Research and Development, 2018, 55(2): 346-357.
|
[12] |
Fu Yingxun, Wen Shilin, Ma Li, Shu Jiwu.
Survey on Single Disk Failure Recovery Methods for Erasure Coded Storage Systems
[J]. Journal of Computer Research and Development, 2018, 55(1): 1-13.
|
[13] |
Fu Bin, Zha Lijia, Li Renfa, Xiao Xiongren.
A Flow Table Usage-Aware QoS Routing Mechanism in Software Defined VANET
[J]. Journal of Computer Research and Development, 2017, 54(11): 2628-2638.
|
[14] |
Wang Zhenpeng, Hu Hongchao, Cheng Guozhen.
Design and Implementation of Mimic Network Operating System
[J]. Journal of Computer Research and Development, 2017, 54(10): 2321-2333.
|
[15] |
Wang Tao, Chen Hongchang, Cheng Guozhen.
A Dynamic Defense Mechanism for SDN DoS Attacks Based on Network Resource Management Technology
[J]. Journal of Computer Research and Development, 2017, 54(10): 2356-2368.
|