Computer Science ›› 2015, Vol. 42 ›› Issue (11): 134-137.doi: 10.11896/j.issn.1002-137X.2015.11.028
Previous Articles Next Articles
MU Li-wen, PENG Xian-bo and HUANG Lan
[1] Zhu Q Y,Yang X F,Yang L X,et al.Optimal control of computervirus under a delayed model [J].Applied Mathematics and Computation,2012,218(23):11613-11619 [2] Miorandi D,Sicari S,Pellegrini F D,et al.Internet of things:vision,applications and research challenges[J].Ad Hoc Networks,2012,10(7):1497-1516 [3] Chen L,Brian K,Jamie E.Theoretical Characterization of Nonlinear Clipping Effects in IM/DD Optical OFDM Systems[J].IEEE Transactions on Communications,2012,60(8):2304-2312 [4] 饶雨泰,杨凡.网络入侵搅动下的网络失稳控制方法研究[J].科技通报,2014,0(1):185-188 Rao Yu-tai,Yang fan.Network Intrusion Stir the Network Instability Control Methods of the Research[J].Bulletin of Scie-nce and Technology,2014,0(1):185-188 [5] 王光浩,吴越.一种车载自组织网络路况信息的数据信任模型[J].计算机科学,2014,1(6):89-93 Wang Guang-hao,Wu Yue.Data Trust Model for Road Information in Vehicular Ad hoc Network[J].Computer Science,2014,1(6):89-93 [6] 王瑞,马艳.基于分数阶傅里叶变换的线性调频脉冲信号波达方向估计[J].兵工学报,2014,5(3):421-427 Wang Rui,Ma Yan.DOA Estimation of Wideband Linear Frequency Modulated Pulse Signals Based on Fractional Fourier Transform[J].Acta Armamentarii,2014,5(3):421-427 [7] 罗亮,吴文峻,张飞.面向云计算数据中心的能耗建模方法[J].软件学报,2014,5(7):1371-1387 Luo Liang,Wu Wen-jun,Zhang Fei.Energy Modeling Based on Cloud Data Center[J].Journal of Software,2014,5(7):1371-1387 [8] 陈昊,杨俊安,庄镇泉.变精度粗糙集的属性核和最小属性约简算法[J] 计算机学报,2012,35(5):1011-1017Chen Hao,Yang Jun-an,Zhuang Zhen-quan.The Core of Attri-butes and Minimal Attributes reduction in Variable Precision Rough Set[J].Chinese Journal of Computers,2012,35(5):1011-1017 [9] Zhou Yan,Li Jian-xun,Wang Dong-li.Target tracking in wireless sensor networks using adaptive measurement quantization [J].Science China Information Sciences,2012,55(4):827-838 [10] Xu Jian,Li Jian-xun,Xu Sheng.Data fusion for target tracking in wireless sensor networks using quantized innovations and Kalman filtering [J].Science China Information Sciences,2012,55(3):530-544 [11] 黄志宏,巫莉莉,张波.基于云计算的网络安全威胁及防范[J].重庆理工大学学报(自然科学版),2012,26(8):85-90 Huang Zhi-hong,Wu Li-li,Zhang Bo.Network Security Threats and Prevention on Cloud Computing[J].Journal of Chongqing Niversity of Technology(Natural Science),2012,6(8):85-90 |
No related articles found! |
|