Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Chinese Journal of Computers
0254-4164
2009 Issue 3
xin yi dai hu lian wang ti xi jie gou zhuan ji qian yan
lin chuang
..............page:357-358
New Transport Layer Architecture for Pervasive Service
YANG Dong;LI Shi-Yong;WANG Bo;ZHANG Hong-Ke
..............page:359-370
Research on Architecture of Universal Carrying Network
WANG Hao-Xue;WANG Bin-Qiang;YU Jing;JIANG Ming
..............page:371-376
Hidra: A Hierarchical Inter-Domain Routing Architecture
WANG Na;MA Hai-Long;CHENG Dong-Nian;WANG Bin-Qiang
..............page:377-390
Trustworthy and Controllable Network Architecture and Protocol Framework
LUO Jun-Zhou;HAN Zhi-Geng;WANG Liang-Min
..............page:391-404
Trust Quantitative Model with Multiple Decision Factors in Trusted Network
LI Xiao-Yong;GUI Xiao-Lin
..............page:405-416
Virtualization Technology for Trustworthy Network Research
ZHANG Yi;SUN Zhi-Gang
..............page:417-423
2-Terminal Reliability Computing Strategy for Backbone of Wireless Mesh Networks
ZHAO Yun-Long;SHAN Bao-Long;GAO Zhen-Guo;MEN Chao-Guang;MA Yan-Long
..............page:424-431
QoS Architecture in Wireless Sensor Network
WEN Hao;LIN Chuang;REN Feng-Yuan;ZHOU Jia;ZENG Rong-Fei
..............page:432-440
QoS Framework Design for WSN-Based Tracking of Moving Targets
YU Jing;WANG Zhi-Bo;LUO Ji-An;SUN Xi-Ce;WANG Zhi
..............page:441-462
A Parallel QoS Routing Optimization Based on Pareto Subsets
QIN Yong;XIAO Wen-Jun;HUANG Han;LIANG Ben-Lai;ZHAO Cheng-Gui;WEI Wen-Hong
..............page:463-472
Hybrid Content Distribution Network and Its Performance Modeling
JIANG Hai;LI Jun;LI Zhong-Cheng
..............page:473-482
A Cooperation Protocol for Ad Hoc Networks with Selfish Nodes Based on Mechanism Design
GUO Jian-Li;WU Zhi-Bo;DONG Jian;YANG Xiao-Zong;LIU Hong-Wei
..............page:483-492
DTM: A Dynamic Trust Management Model for Internet Computing Environments
LI Jian-Xin;HUAI Jin-Peng;LI Xian-Xian;LIN Li
..............page:493-505
GesBGP: A Good-Enough-Security BGP
LI Qi;WU Jian-Ping;XU Ming-Wei;XU Ke;ZHANG Xin-Wen
..............page:506-515
A Conflict and Redundancy Analysis Method for XACML Rules
WANG Ya-Zhe;FENG Deng-Guo
..............page:516-530
A Secured Access Router Mesh of Mobile Networks with Path Selection and Fast Handover Support
HUANG Song-Hua;SUN Yu-Xing;HUANG Hao;CHEN Gui-Hai
..............page:531-542
The Key Management Mechanism of IBE System
HU Liang;CHU Jian-Feng;LIN Hai-Qun;YUAN Wei;ZHAO Kuo
..............page:543-551
Refining the Inter-Domain IP Spoofing Prevention
LU Gao-Feng;SUN Zhi-Gang;LU Xi-Cheng
..............page:552-563
A Survey of the Research on ALM Stability Enhancement
SU Jin-Shu;CAO Ji-Jun;ZHANG Bo-Feng
..............page:576-590
Dynamic Hierarchical Multicast Routing with Delay-Bandwidth Constraints
HU Hong-Yu;LU Hui-Mei;CAO Yuan-Da;RAO Si-Min
..............page:564-575