Citation: | Si Tiange, Tan Zhiyong, and Dai Yiqi. A Security Proof Method for Multilevel Security Models[J]. Journal of Computer Research and Development, 2008, 45(10): 1711-1717. |
[1] | Zhai Ennan, Cao Jiamin, Qian Kun, Guan Yu. Towards Network Infrastructure Research for the Era of Large Language Models: Challenges, Practices, and Prospects[J]. Journal of Computer Research and Development, 2024, 61(11): 2664-2677. DOI: 10.7544/issn1000-1239.202440576 |
[2] | Wang Ting, Liu Gang. Software Defined Virtualized Access Network Supporting Network Slicing and Green Communication[J]. Journal of Computer Research and Development, 2021, 58(6): 1291-1306. DOI: 10.7544/issn1000-1239.2021.20201079 |
[3] | Xu Ran, Wang Wendong, Gong Xiangyang, Que Xirong. Delay-Aware Resource Scheduling Optimization in Network Function Virtualization[J]. Journal of Computer Research and Development, 2018, 55(4): 738-747. DOI: 10.7544/issn1000-1239.2018.20170926 |
[4] | Wang Junxiao, Qi Heng, Li Keqiu, Zhou Xiaobo. Real-Time Link Fault Detection as a Service for Datacenter Network[J]. Journal of Computer Research and Development, 2018, 55(4): 704-716. DOI: 10.7544/issn1000-1239.2018.20170941 |
[5] | Zhou Weilin, Yang Yuan, Xu Mingwei. Network Function Virtualization Technology Research[J]. Journal of Computer Research and Development, 2018, 55(4): 675-688. DOI: 10.7544/issn1000-1239.2018.20170937 |
[6] | Deng Xiaoheng, Cao Dejuan, Pan Yan, Shen Hailan, Chen Zhigang. An Optimized Credit Distribution Model in Social Networks with Time-Delay Constraint[J]. Journal of Computer Research and Development, 2017, 54(2): 382-393. DOI: 10.7544/issn1000-1239.2017.20151118 |
[7] | Wang Cong, Yuan Ying, Peng Sancheng, Wang Xingwei, Wang Cuirong, Wan Cong. Fair Virtual Network Embedding Algorithm with Topology Pre-Configuration[J]. Journal of Computer Research and Development, 2017, 54(1): 212-220. DOI: 10.7544/issn1000-1239.2017.20150785 |
[8] | Li Jianzhong and Gao Hong. Survey on Sensor Network Research[J]. Journal of Computer Research and Development, 2008, 45(1): 1-15. |
[9] | Cai Zhiping, Yin Jianping, Liu Xianghui, Liu Fang, and Lü Shaohe. A Distributed Network Monitoring Model with Link Constraint[J]. Journal of Computer Research and Development, 2006, 43(4): 601-606. |
[10] | Yang Peng and Wu Jiagao. Research on Network Service Architecture and Its Formal Model[J]. Journal of Computer Research and Development, 2005, 42(7): 1115-1122. |