[1] |
LU Weifeng, LI Xueqing, XU Jia, CHEN Siguang.
Combined Multi-Resource Task Offloading Algorithm for P2P in Edge Computing
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(4): 98-103.
|
[2] |
ZHANG Chun-hong, HU Qing-yuan, CHENG Shi-duan.
A Distributed Semantic Resources Search Based on Dimensionality Reduction Algorithm
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(2): 74-78.
|
[3] |
.
A Comprehensive Load Balance Mechanism for Structured P2P Systems
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(3): 87-90.
|
[4] |
.
Measurement of the Characteristics of the BitTorrent Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(3): 125-128.
|
[5] |
LU Feng;ZHENG Kang-feng;NIU Xin-xin;YANG Yi-xian.
Construct a Risk-Aware Peer-to-Peer Security Trust Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(1): 33-37.
|
[6] |
GONG Yan1,2,YANG Fang-chun1,ZOU Hua1,SHUANG Kai1.
A Resource Discovery Approach Based on the Trust and Social Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(5): 84-87.
|
[7] |
GUAN Zhi-tao1, 2, CAO Yuan-da2, LI Jian3.
Incentive-Based Search Algorithm in Hybrid Peer-to-Peer Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(2): 42-45.
|
[8] |
WANG Jiao, ZHOU Ya-jian, YANG Yi-xian .
A Heuristic Traffic Identification Method Based on Trusted List
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(2): 95-98.
|
[9] |
TIAN Chun-qi, ZOU Shi-hong, WANG Wen-dong, CHENG Shi-duan.
A new attack resistant trust model for distributed P2P networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(3): 62-65.
|
[10] |
CAI Ming1,SUN Le-chang1,PAN Zu-lie1,JIANG Xin2,LI Yong-xiang3 .
A Method Based on Intelligent Vaccine to Prevent Multi Networm
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(2): 114-118.
|
[11] |
HAN Li, LEI Zhen-ming, LIU Fang.
A New Peer-to-Peer Network Constitution Based on DHT
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(1): 118-122.
|
[12] |
GAO Chang-xi, ZHANG Fu-yuan, XIN Yang, NIU Xin-xin, YANG Yi-xian
.
Research on Worm’s Propagation and Defense Model in Different P2P Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(s2): 49-53.
|
[13] |
CHENG Jiu-jun1, LI Yu-hong1, CHENG Shi-duan1, MA Jian2.
The Architecture on the Mobile P2P System and the Study for the Key Technology
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(4): 86-89.
|
[14] |
LI Jiang-tao LEI Zhen-ming.
Performance Metrics and Measurement System model for Peer-to-Peer Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(3): 17-21.
|
[15] |
Wu Muqing, Xu Chunxiu, Ding Wei.
A Recursive Real-Time CAC Algorithm and Performance Analysis
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 1999, 22(3): 35-39.
|