Citation: | Zhu Guiming, Jin Shiyao, Guo Deke, Wei Hailiang. SOSC:A Self-Organizing Semantic Cluster Based P2P Query Routing Algorithm[J]. Journal of Computer Research and Development, 2011, 48(5): 736-745. |
[1] | Liu Junling, Liu Baihe, Zou Xinyuan, Sun Huanliang. Spatial Region of Interests Oriented Route Query[J]. Journal of Computer Research and Development, 2022, 59(11): 2569-2580. DOI: 10.7544/issn1000-1239.20210762 |
[2] | Han Meng, Wang Zhihai, Yuan Jidong. A Method to Set Decay Factor Based on Gaussian Function[J]. Journal of Computer Research and Development, 2015, 52(12): 2834-2843. DOI: 10.7544/issn1000-1239.2015.20131883 |
[3] | Huang Chengquan, Wang Shitong, Jiang Yizhang. A New Fuzzy Clustering Algorithm with Entropy Index Constraint[J]. Journal of Computer Research and Development, 2014, 51(9): 2117-2129. DOI: 10.7544/issn1000-1239.2014.20130305 |
[4] | Hua Guichun, Zhang Min, Liu Yiqun, Ma Shaoping, and Ru Liyun. Query Clustering Based on Query Requirements for Ranking[J]. Journal of Computer Research and Development, 2012, 49(11): 2407-2413. |
[5] | Liao Guoqiong, Wu Lingqin, Wan Changxuan. Frequent Patterns Mining over Uncertain Data Streams Based on Probability Decay Window Model[J]. Journal of Computer Research and Development, 2012, 49(5): 1105-1115. |
[6] | Tian Hongbo, Zhang Xingjun, Zhao Xiaoyi, Dong Xiaoshe, and Wu Weiguo. Reliability and Performance Model of Tree-Structured Grid Services Based on Multivariate Exponential Distribution[J]. Journal of Computer Research and Development, 2011, 48(7): 1190-1201. |
[7] | Wang Xiaohai, Peng Yuxing, and Li Dongsheng. A Construction Technique of Constant Degree P2P Systems towards Efficient Complex Queries[J]. Journal of Computer Research and Development, 2011, 48(3): 374-381. |
[8] | Qiao Baiyou, Wang Guoren, and Ding Linlin. TBSN: A Taxonomy Hierarchy Based P2P Network[J]. Journal of Computer Research and Development, 2008, 45(5): 803-809. |
[9] | Shi Zhiguo, He Yeping, Zhang Hong. A Time Self-Decay Trust Management Algorithm for P2P Computing Security[J]. Journal of Computer Research and Development, 2007, 44(1): 1-10. |
[10] | Zhao Xuemi, Lu Hongyi, Dai Kui, Tong Yuanman, and Wang Zhiying. SEA: A High-Performance Modular Long Integer Exponentiation Coprocessor[J]. Journal of Computer Research and Development, 2005, 42(6): 924-929. |