• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Research on Space Internetworking Service Based on DTN
Lin Chuang, Dong Yangwei, Shan Zhiguang
2014, 51(5): 931-943.
Abstract PDF
Data and Protocol Optimization Techniques in Wide Area Networks
Dong Pingping, Wang Lezhi, Sun Jun, and Wang Jianxin
2014, 51(5): 944-958.
Abstract PDF
EasiSHA: A Reconfigurable Node Architecture for IoT Based on Joint Design of Software and Hardware
Shi Hailong, Li Dong, Qiu Jiefan, Cui Li
2014, 51(5): 959-973.
Abstract PDF
RBSA: Repeatedly-Woken Based Scanning Algorithm for Road Network Surveillance
Chen Liangyin, Li Zhanghua, Wang Chaolong, Zhang Jingyu, Yan Bingshu, Liu Yan, Yin Feng, Chen Pengpeng
2014, 51(5): 974-983.
Abstract PDF
A Low-Power FIS Mechanism and Energy Analysis for Green Router
Yuan Bo, Dai Yi, Wang Binqiang
2014, 51(5): 984-996.
Abstract PDF
An Efficient Fault-Tolerant Event and Event Boundary Detection Algorithm for Wireless Sensor Networks
Xu Xiaolong, Geng Weijian, Yang Geng, Li Lingjuan, Yang Zhen
2014, 51(5): 997-1008.
Abstract PDF
DCent: A High Extensible Data Center Networking Structure Using Dual-port Servers
Zhu Guiming, Xie Xianghui, Guo Deke, Lu Feifei, Tao Zhirong
2014, 51(5): 1009-1017.
Abstract PDF
ECG Signal Recovery Problem Based on Compressed Sensing Theory
Zhang Yingchao, Mao Dan, Hu Kai
2014, 51(5): 1018-1027.
Abstract PDF
A Behavior-Based System Resources Access Control Scheme for Android
Lei Lingguang, Jing Jiwu, Wang Yuewu, Zhang Zhongwen
2014, 51(5): 1028-1038.
Abstract PDF
A Real-time Network Threat Recognition and Assessment Method Based on Association Analysis of Time and Space
Lü Huiying, Peng Wu, Wang Ruimei, Wang Jie
2014, 51(5): 1039-1049.
Abstract PDF
A Sensitivity Measurement for Sensitive Information Processing
Sha Letian, Fu Jianming, Chen Jing, and Huang Shiyong
2014, 51(5): 1050-1060.
Abstract PDF
Fine-Grained Parallel Regular Expression Matching for Deep Packet Inspection
Liu Xingkui, Shao Zongyou, Liu Xinchun, Sun Ninghui
2014, 51(5): 1061-1070.
Abstract PDF
Spampot: A Spam Capture System Based on Distributed Honeypot
Guo Junquan, Zhuge Jianwei, Sun Donghong, Duan Haixin
2014, 51(5): 1071-1080.
Abstract PDF
Strong Key-Insulated Signature Scheme Supporting Multi-Helpers in the Standard Model
Ge Lirong, Yu Jia, Cheng Xiangguo, Hao Rong, Zhao Huiyan, Li Meng
2014, 51(5): 1081-1088.
Abstract PDF
An Efficient Rainbow Table Structure and Faster Cryptanalytic Time-Memory Trad-off Attack
Gu Chunxiang, Zhu Yuefei, Zheng Yonghui, and Li Zheng
2014, 51(5): 1089-1094.
Abstract PDF
Load Balancing Degree First Algorithm on Phase Space for Cloud Computing Cluster
Wang Peng, Huang Yan, Li Kun, Guo Youming
2014, 51(5): 1095-1107.
Abstract PDF
User-Aware Resource Provision Policy for Cloud Computing
Zhou Jingcai, Zhang Huyin, Zha Wenliang, and Chen Yibo
2014, 51(5): 1108-1119.
Abstract PDF
Random Task-Oriented User Utility Optimization Model in the Cloud Environment
Tang Zhuo, Zhu Min, Yang Li, Tang Xiaoyong, Li Kenli
2014, 51(5): 1120-1128.
Abstract PDF
A Splitting-Based Cloud Storage Mechanism for Digital Images
Lü Xiaobo, Guo Yao, and Chen Xiangqun
2014, 51(5): 1129-1135.
Abstract PDF
A Fast Processing Algorithm on Section Disjoint Query of Data Stream
Wang Shaopeng, Wen Yingyou, Li Zhi, and Zhao Hong
2014, 51(5): 1136-1148.
Abstract PDF
A Cyclic Memory Race Recording Algorithm Implemented with Hardware Signatures
Zhu Suxia, Ji Zhenzhou, Li Dong, Zhang Hao
2014, 51(5): 1149-1157.
Abstract PDF