[1] |
TAN Weiqian, WU Binwei, WANG Shuo.
Cross-Domain Deterministic Networking Architecture and DRL Flow Scheduling
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(3): 37-42.
|
[2] |
YANG Hua, GENG Xuan, KONG Ning.
A MAC Protocol for Wireless Networks Using Dueling-DDQN Algorithm
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(3): 25-30.
|
[3] |
Shuo WANG Wei-Qian TAN.
Mechanism design for the end-to-end deterministic transmissions with decoupled time domains
[J]. Journal of Beijing University of Posts and Telecommunications, 0, (): 0-0.
|
[4] |
.
Research on Intelligent Unloading Algorithm for Road Collaborative Tasks Based on SMDP Model
[J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(2): 15-21.
|
[5] |
YU Xiaosong, ZHU Qingcheng, GU Jiaming, ZHAO Yongli, ZHANG Jie.
Architecture and Resource Allocation of Cloud-Edge Collaboration Based Optical-Quantum Internet of Things
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(3): 50-56.
|
[6] |
JIA Jun, FENG Chun-yan, XIA Hai-lun, ZHANG Tian-kui, LI Cheng-gang.
Communication Networks Fault Prediction Method Based on Sample Equalization and Feature Interaction
[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(6): 59-66.
|
[7] |
ZHAO Fei-fei, ZHOU Mo-miao, HU Shu-kai, YANG Tao.
User Matching with Maximum Flow Algorithm for Full-Duplex Small Cells
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(6): 82-87.
|
[8] |
LIU Zhi-chao, ZHAO Yi-sheng, GAO Jin-cheng, CHEN Zhong-hui.
UAV-Assisted Time Division Power Allocation Strategy Based on RF Energy Harvesting
[J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(3): 24-31.
|
[9] |
SHUAI Qian-jun, WANG Run-ze, WANG Ke-qin, JIN Li-biao.
Load Balancing Algorithm Based on Buffer Prediction Mechanism for CDNs
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(4): 109-113.
|
[10] |
JI Xing, HUANG Tao, E Xin-hua, SUN Li.
A DNS Query Anomaly Detection Algorithm Based on Log Information
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(6): 83-89.
|
[11] |
XU Meng-meng, XU Heng-zhou, ZHU Hai, WANG Bao-feng.
Low-Cost Topology Control under Network Connectivity Constraint
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(5): 126-130.
|
[12] |
YIN Bi-bai, LIU Jiang, ZHANG Ran, HUANG Tao, LIU Yun-jie.
NDN Routing Strategy Based on SDN Centralized Topology Update
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(4): 1-8.
|
[13] |
WEI Rui-dong, YU Peng, GAO Song, ZHAO Pu-yuan, LI Wen-jing.
Multiple Ant Colony Algorithm-Based Routing Method in the Power Communication Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 89-92.
|
[14] |
LIU Song, QIN Xiao-jun, GAN Shui-tao, JIANG Hai-bo.
Analysis of SSP Security Based on Canary Reuse
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(s1): 122-125,129.
|
[15] |
ZHU Yi, KANG Hao-hao, HUANG Ru-hui, CAO Qing-hua.
Content Checking Mechanism Design in Named Data Networking
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(3): 97-103.
|