Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Beijing University of Posts and Telecommunications
1007-5321
2014 Issue S1
RTDP Network System Framework and Key Technologies
SUN Sheng-li;ZHENG Zhi-gao;WANG Ping;LIU Jing;School of Software and Microelectronics;Peking University;School of Electronics Engineering and Computer Science;Peking University;National Engineering Research Center for Software Engineering;Peking University;
..............page:1-7
Random Virtual Network Embedding Algorithm Based on Maximum Independent Link Set
WANG Ying;XIONG Wen-cheng;LI Wen-jing;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;
..............page:8-11
Network Opinion Evolution with Considering the Herding Effect Influence
ZHANG Feng;GAO Feng;WU Bin;WANG Bai;Key Laboratory of Intelligent Telecommunications Software and Multimedia;Beijing University of Posts and Telecommunications;Network Technology Research Institute;China Unicom;
..............page:12-17
Analysis of Economic Theory Based Modeling for Distributed Resource Allocation
WANG En-ze;QIAO Jian-zhong;LIN Shu-kuan;College of Information Science and Engineering;Northeastern University;
..............page:18-22
A Fault Detection Algorithm for Wireless Sensor Networks Based on Support Vector Regression
MENG Luo-ming;ZHU Jie-hui;YANG Yang;MENG Ling-li;ZHANG Ping-ping;GAO Zhi-peng;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;State Grid TianJin Electric Power Company;
..............page:23-29
Applications of Coordinate Transformation in Mobile User Behavior Recognitions
WANG Zhong-min;CAO Dong;School of Computer Science and Technology;Xi’an University of Posts and Telecommunications;
..............page:30-34
Network Attack-Defense Strategies Selection Based on Stochastic Game Model
FU Yu;CHEN Yong-qiang;WU Xiao-ping;SONG Yan;Department of Information Security;Naval University of Engineering;Information Security Technology Key Laboratory;
..............page:35-39
Assessment of Users’ QoE for Mobile Internet Based on TCP Packet Layer Analysis
ZHU Kai;ZHANG Chao;ZHANG Kai;LI Wen-jing;MENG Luo-ming;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;Information Technology & E-Commerce Department;China United Network Communications Group Company. Limited;Beijing Branch;China United Network Communications Group Company;Limited;
..............page:40-45
Delay Analysis for Mobile Ad Hoc Networks with Two-Hop Relay Algorithm
XU Yang;SHENG Min;LIU Jia;State Key Laboratory of Integrated Services Network;Xidian University;
..............page:46-50
A Method of Key Node Ranking for Road Network Based on Tripartite Graph
XU Ming;WU Jian-ping;DU Yi-man;XIE Feng;XIAO Yun-peng;School of Computer Science;Beijing University of Posts and Telecommunications;School of Civil Engineering;Tsinghua University;Department of Automation;Tsinghua University;
..............page:51-54
Algorithm of Fault Locating on Impact Analysis in Power Communications Network
WANG Kai-xuan;YANG Zheng;QIU Xue-song;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;China Unicom Network Communications Company limited;
..............page:55-59
Duplicate Image Detection Based on Two-Dimensional Cloud Model Filter
CHEN Ming;WANG Shu-peng;YUN Xiao-chun;WU Guang-jun;National Engineering Laboratory for Disaster Backup and Recovery;Beijing University of Posts and Telecommunications;Zhengzhou University of Light Industry;Institute of Information Engineering;Chinese Academy of Sciences;National Computer Network Emergency Response Technical Team / Coordination Center of China;
..............page:60-65
Performance Evaluation of VANETs Wireless Link Transmitting Data Service
HUANG Xiao-min;WANG Yang;ZHANG Ji-liang;ZHANG Nai-tong;Shenzhen Graduate School;Harbin Institute of Technology;School of Electronics and Information Engineering;Harbin Institute of Technology;
..............page:66-71
A Hybrid Tag Number Estimation Scheme for Aloha Based Anti-Collision Algorithm in RFID Networks
YUAN Kai-guo;HAO Yu-wen;LI Zheng-ping;ZHANG Di-di;School of Computer Science;Beijing University of Posts and Telecommunications;General Hospital of Chinese People’s Armed Police Forces;College of Information Engineering;North China University of Technology;
..............page:72-76
Dynamic Intrusion Detections with Vaccination
ZHANG Ling;BAI Zhong-ying;XIE Kang;School of Computer Science;Beijing University of Posts and Telecommunications;Zhengzhou University of Light Industry;Shandong University;
..............page:77-82
Optimized Scalable Scheme for Server Selections in Cloud Computing Environments
WANG Ting;XU Ke;WANG Na;SONG Jun-de;School of Computer Science;Beijing University of Posts and Telecommunications;96630 Unit of the Chinese People’s Liberation Army;
..............page:83-86
Topology Design under the Constraint of Local Information
XU Meng-meng;YANG Qing-hai;School of Telecommunication Engineering;Xidian University;
..............page:87-91
Network Security Evaluation Based on Stochastic Game and Network Entropy
CHEN Yong-qiang;WU Xiao-ping;FU Yu;SONG Yan;Department of Information Security;Naval University of Engineering;Information Security Technology Key Laboratory;
..............page:92-96
End-to-End Delay Estimation Method in IP Networks
WANG Rui;XIAO Li-yuan;CAO Su-su;WANG Zheng;WANG Hai-ning;Service Development Center of the State Commission for Public Sector Reform;Air Traffic Management Bureau of Civil Aviation Administration of China;
..............page:97-103
Design on Android Malware Behavior Analysis System
LI Jing-hua;MU De-jun;YANG Ming-kun;HU Wei;School of Automation;Northwestern Polytechnical University;
..............page:104-107
A Novel Base Station Coverage Simulation Based on Intersection of Circle and Voronoi
QI Feng;LIU Kun;ZHANG Chao;WANG De-yuan;State Key Laboratory of Networking and Switching Technology;Beijing University of Posts and Telecommunications;Information Technology and E-Commerce Division;China United Network Communications Limited;
..............page:108-114
Resource Modeling and Performance Prediction of MapReduce in Cloud Computing Environment
QIAO Yuan-yuan;LIU Fang;LING Yan;YIN Jin-song;School of Information and Communication Engineering;Beijing University of Posts and Telecommunications;
..............page:115-119
Network Resource Personalized Recommendation Based on K-Means Clustering
WANG Xin;HUANG Zhong-yi;School of Computer Engineering;Weifang University;
..............page:120-124
A MANET Clustering Model Based on Trust Measurement
GAO Jian-xin;WU Xiao-ping;WU Xu-sheng;Department of Electrical Engineering;Naval University of Engineering;Department of Information Security;Naval University of Engineering;
..............page:125-130