[1] |
Xue HAN.
Damage toughness assessment method of power backbone communication network based on power big data
[J]. Telecommunications Science, 2023, 39(5): 136-143.
|
[2] |
Ming WAN.
Business model stakeholders and boundary reconstruction of 5GtoB
[J]. Telecommunications Science, 2022, 38(Z1): 60-66.
|
[3] |
Shiliang HU.
Thinking and understanding of six major problems in the large-scale development of 5GtoB
[J]. Telecommunications Science, 2022, 38(Z1): 67-76.
|
[4] |
Keqiang GUO, Feng CHENG, Zhenlong TAN.
5G empowers digital transformation of industries:scenario, pathway and business model
[J]. Telecommunications Science, 2022, 38(Z1): 101-107.
|
[5] |
Jiangxing WU.
Revolution of the development paradigm of network technology system—network of networks
[J]. Telecommunications Science, 2022, 38(6): 3-12.
|
[6] |
Wenjuan XING, Bo LEI, Qianying ZHAO.
Development status and trend prospect of computing power infrastructure
[J]. Telecommunications Science, 2022, 38(6): 51-61.
|
[7] |
Pingke DENG, Tongxu ZHANG, Nanxiang SHI, Tong ZHANG, Tianzhu SHAO, Shaowen ZHENG.
Computing satellite networks—the novel development of computing-empowered space-air-ground integrated networks
[J]. Telecommunications Science, 2022, 38(6): 71-81.
|
[8] |
Kun MA, Lingyu XU, Xiaoping SHEN, Zhicheng GONG, Jianping LAN, Shuangxi CHEN, Jun QIAN.
Virtual machine scheduling model based on Shapley value modified genetic algorithm in cloud computing
[J]. Telecommunications Science, 2022, 38(12): 1-10.
|
[9] |
Xiaozhong LIU, Junyu FANG, Yongbin JIANG.
Analysis of telecom operators’ IoT strategy from the perspective of 2G/3G transition
[J]. Telecommunications Science, 2022, 38(10): 153-162.
|
[10] |
Zhiyong LIU, Zhongjiang HE, Yilong RUAN, Junfeng SHAN, Chao ZHANG.
Big data security features and operation practices
[J]. Telecommunications Science, 2021, 37(5): 160-169.
|
[11] |
Yuan ZHAO,Bing XIN,Hongyuan MA,Lifeng CHEN.
Edge computing business model and key solutions for its landing and deployment
[J]. Telecommunications Science, 2020, 36(9): 160-171.
|
[12] |
Jian XU,Li JIN.
A quantifiable cloud computing platform security evaluation model
[J]. Telecommunications Science, 2020, 36(7): 163-167.
|
[13] |
Sining LUO,Hualong WANG,Hongyu LI,Wei PENG.
Improved ant colony algorithm based cloud computing user task scheduling algorithm
[J]. Telecommunications Science, 2020, 36(2): 95-100.
|
[14] |
Xiaoxia WANG,Hui ZHAO,Yufei CUI,Kun LI,Xiao WANG.
Research on B2B business model of operators in 5G era
[J]. Telecommunications Science, 2020, 36(11): 149-155.
|
[15] |
Bo LEI, Zengyi LIU, Xuliang WANG, Mingchuan ·ANG, ·unqing CHEN.
Computing network:a new multi-access edge computing
[J]. Telecommunications Science, 2019, 35(9): 44-51.
|