J4 ›› 2013, Vol. 48 ›› Issue (7): 79-84.
• Articles • Previous Articles Next Articles
DU Xiao-jun, LIN Bo-gang, LIN Zhi-yuan, LI Ying
CLC Number:
[1] | LIU Yang, QIN Feng-lin, GE Lian-sheng. Measurement study of cloud computing: a survey [J]. J4, 2013, 48(11): 27-35. |
[2] |
GUO Xiao-dong, JIAO Liang, QIU Yi-hong, GE Lian-sheng.
Design and implementation of a multi-path inter-domain routing simulator based on Click and NS2 [J]. J4, 2013, 48(11): 36-43. |
[3] | LIU Ai-Wen, LIU Fang-Ai. Research on a RP(k)based resource awareness model [J]. J4, 2009, 44(11): 57-62. |
[4] | SHU Zhi-Jiang, HU An-Yin, HU Lin, LIAN Jian. Research on the method of viral mobile communication cross entropy based on video service [J]. J4, 2009, 44(9): 32-34. |
[5] | ZHOU Shu-Wang, WANG Yang-Long, GUO Jiang, WEI Nuo. Particle swarm optimizationbasedwireless sensor network nodes localization method [J]. J4, 2009, 44(9): 52-55. |
[6] | LIU Ying-Hui, WANG Yang-Long, GUO Jiang, LI Dong-Yue. Channel sampling strategy of PTF with minimum time [J]. J4, 2009, 44(9): 56-59. |
[7] | DONG Yuan1, XU Ya-bin1,2*, LI Zhuo1,2, LI Yan-ping1. Research on spam identification based on social computing and machine learning [J]. J4, 2013, 48(7): 72-78. |
|