Citation: | Tian Daxin, Liu Yanheng, Li Yongli, Tang Yi. A Fast Matching Algorithm and Conflict Detection for Packet Filter Rules[J]. Journal of Computer Research and Development, 2005, 42(7): 1128-1135. |
[1] | Wu Haibo, Liu Hui, Sun Yi, Li Jun. A Concurrent Conflict Transaction Optimization Method for Consortium Blockchain Hyperledger Fabric[J]. Journal of Computer Research and Development, 2024, 61(8): 2110-2126. DOI: 10.7544/issn1000-1239.202220644 |
[2] | Yang Bo, Guo Haoran, Feng Junhui, Li Ge, Jin Zhi. A Rule Conflict Detection Approach for Intelligent System of Internet of Things[J]. Journal of Computer Research and Development, 2023, 60(3): 592-605. DOI: 10.7544/issn1000-1239.202110941 |
[3] | Cai Tao, Wang Jie, Niu Dejiao, Liu Peiyao, Chen Fuli. A High Throughput NVM Storage System Based on Access Request Conflict Detection[J]. Journal of Computer Research and Development, 2020, 57(2): 257-268. DOI: 10.7544/issn1000-1239.2020.20190526 |
[4] | Zhu Suxia, Ji Zhenzhou, Li Dong, Zhang Hao. A Cyclic Memory Race Recording Algorithm Implemented with Hardware Signatures[J]. Journal of Computer Research and Development, 2014, 51(5): 1149-1157. |
[5] | Zhou Hang, Huang Zhiqiu, Hu Jun, Zhu Yi. Real-Time System Resource Conflict Checking Based on Time Petri Nets[J]. Journal of Computer Research and Development, 2009, 46(9): 1578-1585. |
[6] | Zhang Xiaoqiang, Peng Lin, Peng Yuanxi, and Xie Lunguo. A Lightweight Directory Based Algorithm for STM[J]. Journal of Computer Research and Development, 2008, 45(9): 1517-1523. |
[7] | Li Lin and Lu Xianliang. An Algorithm for Detecting Filters Conflicts Based on the Intersection of Bit Vectors[J]. Journal of Computer Research and Development, 2008, 45(2): 237-245. |
[8] | Li Xiangjun, Meng Luoming, and Jiao Li. Problems in Results of Policy Conflict Resolutions and Detection and Resolution Methods in Network Management Systems[J]. Journal of Computer Research and Development, 2006, 43(7): 1297-1303. |
[9] | Mao Tianlu, Wang Zhaoqi, Xia Shihong. An Algorithm for Collision Detection and Response Between Human Body Model and Cloth in 3D Garment Simulation[J]. Journal of Computer Research and Development, 2006, 43(2): 356-361. |
[10] | Yao Jian, Mao Bing, and Xie Li. A DAG-Based Security Policy Conflicts Detection Method[J]. Journal of Computer Research and Development, 2005, 42(7): 1108-1114. |