Advanced Search

    column
    Research on Space Internetworking Service Based on DTN
    Lin Chuang, Dong Yangwei, Shan Zhiguang
    2014, 51(5): 931-943.
    Abstract PDF
    Data and Protocol Optimization Techniques in Wide Area Networks
    Dong Pingping, Wang Lezhi, Sun Jun, and Wang Jianxin
    2014, 51(5): 944-958.
    Abstract PDF
    EasiSHA: A Reconfigurable Node Architecture for IoT Based on Joint Design of Software and Hardware
    Shi Hailong, Li Dong, Qiu Jiefan, Cui Li
    2014, 51(5): 959-973.
    Abstract PDF
    RBSA: Repeatedly-Woken Based Scanning Algorithm for Road Network Surveillance
    Chen Liangyin, Li Zhanghua, Wang Chaolong, Zhang Jingyu, Yan Bingshu, Liu Yan, Yin Feng, Chen Pengpeng
    2014, 51(5): 974-983.
    Abstract PDF
    A Low-Power FIS Mechanism and Energy Analysis for Green Router
    Yuan Bo, Dai Yi, Wang Binqiang
    2014, 51(5): 984-996.
    Abstract PDF
    An Efficient Fault-Tolerant Event and Event Boundary Detection Algorithm for Wireless Sensor Networks
    Xu Xiaolong, Geng Weijian, Yang Geng, Li Lingjuan, Yang Zhen
    2014, 51(5): 997-1008.
    Abstract PDF
    DCent: A High Extensible Data Center Networking Structure Using Dual-port Servers
    Zhu Guiming, Xie Xianghui, Guo Deke, Lu Feifei, Tao Zhirong
    2014, 51(5): 1009-1017.
    Abstract PDF
    ECG Signal Recovery Problem Based on Compressed Sensing Theory
    Zhang Yingchao, Mao Dan, Hu Kai
    2014, 51(5): 1018-1027.
    Abstract PDF
    A Behavior-Based System Resources Access Control Scheme for Android
    Lei Lingguang, Jing Jiwu, Wang Yuewu, Zhang Zhongwen
    2014, 51(5): 1028-1038.
    Abstract PDF
    A Real-time Network Threat Recognition and Assessment Method Based on Association Analysis of Time and Space
    Lü Huiying, Peng Wu, Wang Ruimei, Wang Jie
    2014, 51(5): 1039-1049.
    Abstract PDF
    A Sensitivity Measurement for Sensitive Information Processing
    Sha Letian, Fu Jianming, Chen Jing, and Huang Shiyong
    2014, 51(5): 1050-1060.
    Abstract PDF
    Fine-Grained Parallel Regular Expression Matching for Deep Packet Inspection
    Liu Xingkui, Shao Zongyou, Liu Xinchun, Sun Ninghui
    2014, 51(5): 1061-1070.
    Abstract PDF
    Spampot: A Spam Capture System Based on Distributed Honeypot
    Guo Junquan, Zhuge Jianwei, Sun Donghong, Duan Haixin
    2014, 51(5): 1071-1080.
    Abstract PDF
    Strong Key-Insulated Signature Scheme Supporting Multi-Helpers in the Standard Model
    Ge Lirong, Yu Jia, Cheng Xiangguo, Hao Rong, Zhao Huiyan, Li Meng
    2014, 51(5): 1081-1088.
    Abstract PDF
    An Efficient Rainbow Table Structure and Faster Cryptanalytic Time-Memory Trad-off Attack
    Gu Chunxiang, Zhu Yuefei, Zheng Yonghui, and Li Zheng
    2014, 51(5): 1089-1094.
    Abstract PDF
    Load Balancing Degree First Algorithm on Phase Space for Cloud Computing Cluster
    Wang Peng, Huang Yan, Li Kun, Guo Youming
    2014, 51(5): 1095-1107.
    Abstract PDF
    User-Aware Resource Provision Policy for Cloud Computing
    Zhou Jingcai, Zhang Huyin, Zha Wenliang, and Chen Yibo
    2014, 51(5): 1108-1119.
    Abstract PDF
    Random Task-Oriented User Utility Optimization Model in the Cloud Environment
    Tang Zhuo, Zhu Min, Yang Li, Tang Xiaoyong, Li Kenli
    2014, 51(5): 1120-1128.
    Abstract PDF
    A Splitting-Based Cloud Storage Mechanism for Digital Images
    Lü Xiaobo, Guo Yao, and Chen Xiangqun
    2014, 51(5): 1129-1135.
    Abstract PDF
    A Fast Processing Algorithm on Section Disjoint Query of Data Stream
    Wang Shaopeng, Wen Yingyou, Li Zhi, and Zhao Hong
    2014, 51(5): 1136-1148.
    Abstract PDF
    A Cyclic Memory Race Recording Algorithm Implemented with Hardware Signatures
    Zhu Suxia, Ji Zhenzhou, Li Dong, Zhang Hao
    2014, 51(5): 1149-1157.
    Abstract PDF