吉林大学学报(工学版) ›› 2010, Vol. 40 ›› Issue (06): 1655-1662.
• paper • Previous Articles Next Articles
LIU Yan-heng1,2,SUN Xin1,2,WANG Jian1,2,LI Wei-ping3,ZHU Jian-qi1,2
CLC Number:
[1] | FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236. |
[2] | ZHAO Bo, QIN Gui-He, ZHAO Yong-Zhe, YANG Wen-Di. Public key cryptosystem based on semi-trapdoor one-way function [J]. 吉林大学学报(工学版), 2018, 48(1): 259-267. |
[3] | YU Bin-bin, WU Xin-yu, CHU Jian-feng, HU Liang. Signature protocol for wireless sensor network based on group key agreement [J]. 吉林大学学报(工学版), 2017, 47(3): 924-929. |
[4] | SHU Hao, SHI Jiang-yi, MA Pei-jun, PAN Wei-tao, YANG Lin-an. Torus-based shoot-through framework architecture for network-on-chip [J]. 吉林大学学报(工学版), 2017, 47(3): 988-995. |
[5] | WEI Xiao-hui, LI Xiang, LI Hong-liang, LI Cong, ZHUANG Yuan, YU Hong-mei. Flexible Online MapReduce model and topology protocols supporting large-scale stream data processing [J]. 吉林大学学报(工学版), 2016, 46(4): 1222-1231. |
[6] | CHE Xiang-jiu, LIANG Sen. Improved algorithm of SPIHT based on Max-Heap tree [J]. 吉林大学学报(工学版), 2016, 46(3): 865-869. |
[7] | WU Xiao, Nie Xiao, LIU Xiao-hui, GAO Shi-meng, QU Guan-nan, NIU Yan. Analysis of propagation characteristics of APPs based on weighted bipartite network [J]. 吉林大学学报(工学版), 2015, 45(6): 1946-1953. |
[8] | FU Shuai, MA Jian-feng, LI Hong-tao, WANG Chang-guang. Improved data aggregation algorithm based on clustered wireless sensor network [J]. 吉林大学学报(工学版), 2014, 44(4): 1118-1125. |
[9] | WEI Xiao-hui, ZOU Lei, LI Hong-liang. Virtual network embedding algorithm based on improved sub-graph isomorphism search [J]. 吉林大学学报(工学版), 2013, 43(01): 165-171. |
[10] | HU Liang, CHI Ling, YUAN Wei, CHU Jian-feng, XU Xiao-bo. Improvements against fault induction attack for RC4 algorithm [J]. , 2012, 42(05): 1231-1236. |
[11] | LIU San-min, SUN Zhi-xin. P2P traffic identification based on support vector data description [J]. , 2012, 42(04): 947-951. |
[12] | ZHANG Rui-Hua, CHENG He-You, JIA Zhi-Beng. Energyefficient clustering algorithm for wireless sensor networks [J]. 吉林大学学报(工学版), 2010, 40(06): 1663-1667. |
[13] | WEI Da, Gu-Xiang-Peng, WANG Jian, Liu-Yan-Hang. New access model and implementation of trusted network based on trusted certificate [J]. 吉林大学学报(工学版), 2010, 40(02): 496-0500. |
[14] | LIU Yan-Heng, SUN Lei, TIAN Da-Xin, WU Jing. Method of anomaly detection based on fusion principal components match [J]. 吉林大学学报(工学版), 2009, 39(05): 1314-1320. |
[15] | WANG Xiao-yan,LIU Shu-fen,YU Hai . Interface automata based approach to Web service composition [J]. 吉林大学学报(工学版), 2009, 39(03): 743-0748. |
|