Computer Science ›› 2016, Vol. 43 ›› Issue (7): 111-114.doi: 10.11896/j.issn.1002-137X.2016.07.019
Previous Articles Next Articles
ZHANG Tao and ZHANG Ying-jiang
[1] Yang Lei,Li Gui-peng,Zhang Ping.Improvement of Wolf step by step prediction of network anomaly traffic detection [J].Technology Bulletin,2014,30(2):47-49(in Chinese) 杨雷,李贵鹏,张萍.改进的Wolf一步预测的网络异常流量检测[J].科技通报,2014,30(2):47-49 [2] Li Zhen-gang.Network traffic forecasting model based on Gaus-sian process regression[J].Journal of Computer Applications,2014,34(5):1251-1254(in Chinese) 李振刚.基于高斯过程回归的网络流量预测模型[J].计算机应用,2014,34(5):1251-1254 [3] Chang Y C,Lin Z S,Chen J L.Cluster based self organization management protocols for wireless sensor networks[J].IEEE Transactions on Consumer Electronics,2006,52(1):75-80 [4] Kolhe J P,Shaheed M,Chandar T S,et al.Robust control of robot manipulators based on uncertainty and disturbance estimation[J].International Journal of Robust and Nonlinear Control,2013,23(1):104-122 [5] Liu Yun-tong.K-pruning algorithm for semantic relevancy calculating model of natural language[J].Journal of Theoretical and Applied Information Technology,2013,8(3),231-235 [6] Lu Xing-hua,Chen Ping-hua.Traffic Prediction Algorithm inBuffer Based on Recurrence Quantification Union Entropy Feature Reconstruction[J].Computer Science,2015,2(4):68-71(in Chinese) 陆兴华,陈平华.基于定量递归联合熵特征重构的缓冲区流量预测算法[J].计算机科学,2015,2(4):68-71 [7] Zhai Hai-bin,Zhang Hong,Liu Xin-ran,et al.A P2P Cache Capacity Design Method to Minimize the Total Traffic Cost of Access ISPs[J].Acta Electronica Sinica,2015,43(5):879-887(in Chinese) 翟海滨,张鸿,刘欣然,等.最小化出口流量花费的接入级P2P缓存容量设计方法[J].电子学报,2015,43(5):879-887 [8] Ma You-zhong,Meng Xiao-feng.Research on index technologyof cloud data management[J].Journal of Software,2015,6(1):145-166(in Chinese) 马友忠,孟小峰.云数据管理索引技术研究[J].软件学报,2015,6(1):145-166 [9] Sahu P K,Wu E H K,Sahoo J,et al.BAHG:Back-Bone-Assisted Hop Greedy Routing for VANET's City Environments[J].IEEE Transactions on Intelligent Transportation Systems,2013,4(1):199-213 [10] Barrachina J,Garrido P,Fogue M,et al.VEACON:A Vehicular Accident Ontology Designed to Improve Safety on the Roads[J].Journal of Network and Computer Applications,2012,5(6):1891-1900 [11] Shi Gui-min,Lin Hong-ji.Research on Network Flow Monitoring Pattern Based on Bypass[J].Journal of Chongqing University of Technology(Natural Science),2011,5(9):63-69(in Chinese) 石贵民,林宏基.基于旁路的网络流量监控模式[J].重庆理工大学学报(自然科学),2011,5(9):63-69 |
No related articles found! |
|