[1] |
Wang Guizhi, Lü Guanghong, Jia Wucai, Jia Chuanghui, Zhang Jianshen.
A Review on the Application of Machine Learning in SDN Routing Optimization
[J]. Journal of Computer Research and Development, 2020, 57(4): 688-698.
|
[2] |
Zhang Long, Wang Jinsong.
DDoS Attack Detection Model Based on Information Entropy and DNN in SDN
[J]. Journal of Computer Research and Development, 2019, 56(5): 909-918.
|
[3] |
Fei Ning, Xu Lijie, Cheng Xiaohui.
Implementation and Evaluation of Cooperative Routing in Software Defined Wireless Networking
[J]. Journal of Computer Research and Development, 2019, 56(5): 967-976.
|
[4] |
Tang Yingjie, Wang Fang, Xie Yanwen.
An Efficient Failure Reconstruction Based on In-Network Computing for Erasure-Coded Storage Systems
[J]. Journal of Computer Research and Development, 2019, 56(4): 767-778.
|
[5] |
Wang Yuwei, Liu Min, Ma Cheng, Li Pengfei.
High Performance Load Balancing Mechanism for Network Function Virtualization
[J]. Journal of Computer Research and Development, 2018, 55(4): 689-703.
|
[6] |
Chen Wenlong, Zhao Yirong, Xiao Rong, Tang Xiaolan, Xu Ke.
Packets Transmission with Multiple Levels of Credibility and Routing Calculation Based on Virtual Topologies
[J]. Journal of Computer Research and Development, 2018, 55(4): 729-737.
|
[7] |
Xu Ran, Wang Wendong, Gong Xiangyang, Que Xirong.
Delay-Aware Resource Scheduling Optimization in Network Function Virtualization
[J]. Journal of Computer Research and Development, 2018, 55(4): 738-747.
|
[8] |
Lu Liang, Yu Jiong, Bian Chen, Liu Yuechao, Liao Bin, Li Huijuan.
A Task Migration Strategy in Big Data Stream Computing with Storm
[J]. Journal of Computer Research and Development, 2018, 55(1): 71-92.
|
[9] |
Li Junfei, Hu Yuxiang, Wu Jiangxing.
Research on Improving the Control Plane’s Reliability in SDN Based on Byzantine Fault-Tolerance
[J]. Journal of Computer Research and Development, 2017, 54(5): 952-960.
|
[10] |
Fu Bin, Zha Lijia, Li Renfa, Xiao Xiongren.
A Flow Table Usage-Aware QoS Routing Mechanism in Software Defined VANET
[J]. Journal of Computer Research and Development, 2017, 54(11): 2628-2638.
|
[11] |
Wang Zhenpeng, Hu Hongchao, Cheng Guozhen.
Design and Implementation of Mimic Network Operating System
[J]. Journal of Computer Research and Development, 2017, 54(10): 2321-2333.
|
[12] |
Wang Tao, Chen Hongchang, Cheng Guozhen.
A Dynamic Defense Mechanism for SDN DoS Attacks Based on Network Resource Management Technology
[J]. Journal of Computer Research and Development, 2017, 54(10): 2356-2368.
|
[13] |
Wen Xuemin, Han Yanni, Yu Bing, Sun Jianpeng, Xu Zhen.
A Topology-Aware VDC Embedding Algorithm in Software-Defined Datacenter
[J]. Journal of Computer Research and Development, 2016, 53(4): 785-797.
|
[14] |
Liu Yi, Lei Cheng, Zhang Hongqi, Yang Yingjie.
MapReduce-Based Network Property Verification Technique for OpenFlow Network
[J]. Journal of Computer Research and Development, 2016, 53(11): 2500-2511.
|
[15] |
Guo He, Chen Zheng, Yu Yulong, Wang Yuxin, Chen Xin.
A Communication Aware DAG Workflow Cost Optimization Model and Algorithm
[J]. Journal of Computer Research and Development, 2015, 52(6): 1400-1408.
|