[1] |
WANG Yu, ZHANG Lian-cheng, ZHANG Hong-tao, GUO Yi.
A Failure Recovery Algorithm for Inter-Domain Routing System Based on Degree-Constrained Minimum Spanning Tree
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(4): 113-119.
|
[2] |
XU Xiao-bo, ZHANG Wen-bo, HE Chao, LUO Yi.
A Malicious Code Detection Method Based on Ensemble Learning of Behavior
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(4): 89-95.
|
[3] |
WANG Chuan-chuan, ZENG Yong-hu.
Research Status and Prospects of Underdetermined Blind Source Separation Algorithms
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(6): 103-109.
|
[4] |
NIU Dan-mei, RUI Lan-lan, HUANG Hao-qiu, QIU Xue-song.
A Dynamic Service Recovery Mechanism in Ubiquitous Stub Environment
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(s1): 42-45.
|
[5] |
XU Yan-ping, WU Chun-hua, HOU Mei-jia, ZHENG Kang-feng, YAO Shan.
Android Malware Detection Technology Based on Improved Naïve Bayesian
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(2): 43-47.
|
[6] |
ZHAO Sheng-mei, TANG Wen-juan, ZHENG Bao-yu.
Generalized Semi-Iterative Hard Thresholding Pursuit Algorithm and Its Application in Ghost Imaging
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 117-121.
|
[7] |
XIAO Da, SU Li-yu, WANG Jun-long, ZHENG Shi-hui, YANG Yu.
CSFS: Design and Implementation of Cloud Storage Service-Based File System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(s1): 77-81,86.
|
[8] |
YU Jun-yang, HU Zhi-gang, LIU Xiu-lei.
Smallfiles on HDFS Merging based on the Energy Efficiency
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(6): 34-38.
|
[9] |
WU Bin, LIN Xing, LI Wei-dong, LU Tian-liang, ZHANG Dong-mei.
Smartphone Malware Detection Model Based on Artificial Immune System in Cloud Computing
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(4): 34-38.
|
[10] |
LI Jing-hua, MU De-jun, YANG Ming-kun, HU Wei.
Design on Android Malware Behavior Analysis System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 104-107.
|
[11] |
HUANG Sheng, LI Jia-liang, LI Gen, LI Ling-xia, LIU Huan-lin.
Burst Encoding Mechanism for Low Delay and High Reliable Service in Optical Burst Switching Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(5): 26-30.
|
[12] |
DU Xiao-zhou, ZHANG Yu-hao, QIAO Jian-zhong, LIN Shu-kuan.
The File System of CPS Oriented Node Operating System
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(5): 100-104.
|
[13] |
LU Mei-lian, ZHU Liang-liang.
Load Balancing Strategy Based on CMM Model in HDFS
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(5): 20-25.
|
[14] |
DONG Hang, LI Qi, DONG Feng, PENG Yong, XU Guo-ai.
A Detection Model of Malware Behaviors on Android
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 58-61,88.
|
[15] |
LIU Bing-chao, LI Dao-ben.
Orthogonal Time-Frequency Code and Its Application
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(5): 46-50.
|