[1] |
Xinyan FANG, Yanxia ZHANG, Ruilin CUI, Siwei LUO.
Research on technology mechanism used in P2P network video surveillance system
[J]. Telecommunications Science, 2022, 38(12): 152-162.
|
[2] |
DING Yizhi,XIAO Ziyu,LI Shaoping,LV Hongwei,NIU Yingxia.
Application of high-performance 4K live broadcast service in 5G network
[J]. Telecommunications Science, 2019, 35(6): 150-156.
|
[3] |
Panpan LI,Zhengxia XIE,Guangxue YUE,Bolin MA,Li CHEN,Jianhua LIU.
SSDHT:social network-based secure DHT mechanism
[J]. Telecommunications Science, 2018, 34(11): 10-20.
|
[4] |
Hongkai WANG,Hanyong HAO,Botao YU,Linqing LI.
New electric power CDN based on the technology of SDN and NFV
[J]. Telecommunications Science, 2016, 32(9): 152-161.
|
[5] |
Lifang MA,Weifeng CHEN,Shizhan LAN,Song LU,Yulan ZHANG,Xiaobin MO,Changzhi HE.
Routing selection algorithm based on ant colony optimization in mobile P2P network
[J]. Telecommunications Science, 2016, 32(7): 121-125.
|
[6] |
Wumaier HENIGULI.
Sinkhole attack detection based on fusion of ACO and P2P trust model in WSN
[J]. Telecommunications Science, 2016, 32(4): 52-58.
|
[7] |
Guohui ZHU,Chunlan LU,Rui ZHANG.
Guided evolutionary game algorithm of unstructured P2P network
[J]. Telecommunications Science, 2016, 32(1): 60-65.
|
[8] |
Jianwei REN,Chunyan AN,Yun LIU,Jian LI.
Security on peer to peer networking in energy internet
[J]. Telecommunications Science, 2015, 31(Z1): 74-78.
|
[9] |
Weijia Shi,Guanzhong Lv.
Key Tecbnology Discussion of Live and VOD Streaming Service Provided on tbe 4G Network
[J]. Telecommunications Science, 2015, 31(4): 27-31.
|
[10] |
Lin Wei and Zheng Xianghan.
Private Cloud Assistant Trust Model for P2P Secure Transactions
[J]. Telecommunications Science, 2015, 31(1): 2015015-.
|
[11] |
Wei Lin,Xianghan Zheng.
Private Cloud Assistant Trust Model for P2P Secure Transactions
[J]. Telecommunications Science, 2015, 31(1): 46-52.
|
[12] |
Hongjiao Peng,Shangdong Liu,Xiamei Chen.
QoS Guarantee for Next Generation Network in the VoIP System
[J]. Telecommunications Science, 2014, 30(8): 73-78.
|
[13] |
Yaguan Qian,Min Zhang.
P2P Traffic Identification Based Over-Sampling Technique
[J]. Telecommunications Science, 2014, 30(4): 109-113.
|
[14] |
Tao Li,Hua Hu,Haiyang Hu.
Random Dissemination Algorithm of Stete-Updating Message for Distributed Virtual Environments of P2P Architecture
[J]. Telecommunications Science, 2014, 30(10): 78-88.
|
[15] |
Chuanfen Feng.
Discussion on IMS Network Architecture Based on P2P Content Switching
[J]. Telecommunications Science, 2013, 29(9): 79-82.
|