[1] |
DAI Qing-da, YE Mao.
Design of Double-Chain Three-Route Time-to-Digital Converter Based on FPGA
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(4): 88-94.
|
[2] |
YIN Bi-bai, LIU Jiang, ZHANG Ran, HUANG Tao, LIU Yun-jie.
NDN Routing Strategy Based on SDN Centralized Topology Update
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(4): 1-8.
|
[3] |
FENG Xia, ZHANG Jiang, ZUO Hai-chao.
A Dynamic Adjustment Strategy of Materialized Views Based on Query Clustering
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(4): 16-22.
|
[4] |
ZHANG Zi, HUANG Ting-lei.
A Mechanism of Router Nodes Movement for WM2N
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(4): 7-12.
|
[5] |
ZHU Jing-hua, YIN Xu-ming, WANG Nan, LI Jin-bao, WU Zhi-qiang.
Routes Planning Algorithm for Mobile Data Collecting in Wireless Sensor Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(3): 110-113.
|
[6] |
ZHANG Shu-guang, ZHOU Xue-hai, YANG Feng, XU Jun.
En-Route Filtering Strategy Against Selective Discarding in Wireless Sensor Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 68-73.
|
[7] |
WANG Le-fei, ZHANG Li, PENG Tao, WANG Wen-bo.
Multi-Hop Route Selection of D2D Communication under Analysis of Outage Probability
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(5): 23-27.
|
[8] |
LIU Sheng-li, PENG Fei, WU Dong-ying, ZOU Rui, XIAO Da.
CHoney: a New Honeypot for Capturing Attacks Against Cisco Routers
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(5): 47-53.
|
[9] |
WANG Jian, ZHANG Zi-jian, YUAN Jian.
A Broadcast Authentication System Applied in Controller Area Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(4): 24-28.
|
[10] |
SUN Wei, ZHANG He-sheng, PAN Cheng, YANG Jun.
Modeling and Analyzing of IEEE 802.11p for VANETs Based on HSCPN
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(2): 127-130.
|
[11] |
KUI Xiao-yan, DU Hua-kun, XIAO Xue-feng, LI Yong.
Realistic Vehicular Mobility Trace Driven RSU Deployment Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(1): 114-118.
|
[12] |
LIU Ying-chun, ZHENG Xiao-lin, CHEN De-ren.
Trust Predicting Using Roles-Based Reputation in Trust Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(1): 72-76.
|
[13] |
.
Comparison and Evaluation of Internet Topology Generators
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(3): 53-57.
|
[14] |
WU Rui-qing GU Qing-shui CHEN Wei CHEN Tian-qi .
Research and Implement of Router in Logging Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(2): 116-120.
|
[15] |
DU Hui-jun,YANG Ning.
A Kind of Non-Key Words Index B-Tree Mechanism in High-End Router CIDR List
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(5): 104-108.
|