[1] |
LU Weifeng, LI Xueqing, XU Jia, CHEN Siguang.
Combined Multi-Resource Task Offloading Algorithm for P2P in Edge Computing
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(4): 98-103.
|
[2] |
MA Jian, LIU Feng, FAN Jian-ping.
Object-Oriented Software Coupling Metrics
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(1): 109-114.
|
[3] |
WANG Yang, ZENG Peng, ZHANG Yan-yu, Ashish Umre.
Maintenance Semantic Metrics for WIA-PA Wireless Sensor Networks in the Device Layer of Smart Grids
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(2): 27-32.
|
[4] |
ZHANG Chun-hong, HU Qing-yuan, CHENG Shi-duan.
A Distributed Semantic Resources Search Based on Dimensionality Reduction Algorithm
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(2): 74-78.
|
[5] |
.
A Comprehensive Load Balance Mechanism for Structured P2P Systems
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(3): 87-90.
|
[6] |
.
Measurement of the Characteristics of the BitTorrent Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2012, 35(3): 125-128.
|
[7] |
LU Feng;ZHENG Kang-feng;NIU Xin-xin;YANG Yi-xian.
Construct a Risk-Aware Peer-to-Peer Security Trust Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(1): 33-37.
|
[8] |
GONG Yan1,2,YANG Fang-chun1,ZOU Hua1,SHUANG Kai1.
A Resource Discovery Approach Based on the Trust and Social Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(5): 84-87.
|
[9] |
.
A novel network coding-aware routing metrics for wireless multi-hop network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(3): 22-26.
|
[10] |
GUAN Zhi-tao1, 2, CAO Yuan-da2, LI Jian3.
Incentive-Based Search Algorithm in Hybrid Peer-to-Peer Networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(2): 42-45.
|
[11] |
WANG Jiao, ZHOU Ya-jian, YANG Yi-xian .
A Heuristic Traffic Identification Method Based on Trusted List
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(2): 95-98.
|
[12] |
WEI An-ming, WANG Hong-bo, CHENG Shi-duan, LIN Yu.
A Method for P2P Detection and Control at High Speed
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(5): 117-120.
|
[13] |
TIAN Chun-qi, ZOU Shi-hong, WANG Wen-dong, CHENG Shi-duan.
A new attack resistant trust model for distributed P2P networks
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(3): 62-65.
|
[14] |
CAI Ming1,SUN Le-chang1,PAN Zu-lie1,JIANG Xin2,LI Yong-xiang3 .
A Method Based on Intelligent Vaccine to Prevent Multi Networm
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(2): 114-118.
|
[15] |
HAN Li, LEI Zhen-ming, LIU Fang.
A New Peer-to-Peer Network Constitution Based on DHT
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(1): 118-122.
|