[1] |
Xue HAN.
Damage toughness assessment method of power backbone communication network based on power big data
[J]. Telecommunications Science, 2023, 39(5): 136-143.
|
[2] |
Wenjuan XING, Bo LEI, Qianying ZHAO.
Development status and trend prospect of computing power infrastructure
[J]. Telecommunications Science, 2022, 38(6): 51-61.
|
[3] |
Pingke DENG, Tongxu ZHANG, Nanxiang SHI, Tong ZHANG, Tianzhu SHAO, Shaowen ZHENG.
Computing satellite networks—the novel development of computing-empowered space-air-ground integrated networks
[J]. Telecommunications Science, 2022, 38(6): 71-81.
|
[4] |
Jiangxing WU.
Revolution of the development paradigm of network technology system—network of networks
[J]. Telecommunications Science, 2022, 38(6): 3-12.
|
[5] |
Kun MA, Lingyu XU, Xiaoping SHEN, Zhicheng GONG, Jianping LAN, Shuangxi CHEN, Jun QIAN.
Virtual machine scheduling model based on Shapley value modified genetic algorithm in cloud computing
[J]. Telecommunications Science, 2022, 38(12): 1-10.
|
[6] |
Zhiyong LIU, Zhongjiang HE, Yilong RUAN, Junfeng SHAN, Chao ZHANG.
Big data security features and operation practices
[J]. Telecommunications Science, 2021, 37(5): 160-169.
|
[7] |
Bing HUANG, Bin TAN, Jian LUO, Yong GUO.
Future IP network architecture evolution for service and network collaboration
[J]. Telecommunications Science, 2021, 37(10): 39-46.
|
[8] |
Jingzhao XIE, Wei SHAN, Chang XIAO, Tie MA, Li CHEN, Hongfang YU, Gang SUN.
Klonet: a network emulation platform for the technology innovation
[J]. Telecommunications Science, 2021, 37(10): 66-75.
|
[9] |
Bo LEI,Jianglong WANG,Qianying ZHAO,Yongzhi YU,Mingchuan YANG.
Novel network virtualization architecture based on the convergence of computing,storage and transport resources
[J]. Telecommunications Science, 2020, 36(7): 42-54.
|
[10] |
Jian XU,Li JIN.
A quantifiable cloud computing platform security evaluation model
[J]. Telecommunications Science, 2020, 36(7): 163-167.
|
[11] |
Sining LUO,Hualong WANG,Hongyu LI,Wei PENG.
Improved ant colony algorithm based cloud computing user task scheduling algorithm
[J]. Telecommunications Science, 2020, 36(2): 95-100.
|
[12] |
Weiyu JIANG, Bingyang LIU, Chuang WANG.
Network architecture with intrinsic security
[J]. Telecommunications Science, 2019, 35(9): 20-28.
|
[13] |
Jingyi XU,Zeyu ZHAO,Minhu SHEN,·ibin ·ING,Weiqiang ZHOU.
Next generation IP network test system framework based on microservices architecture
[J]. Telecommunications Science, 2019, 35(9): 29-37.
|
[14] |
Huijuan ·AO, Liang GENG.
Trend of next generation network architecture:computing and networking convergence evolution
[J]. Telecommunications Science, 2019, 35(9): 38-43.
|
[15] |
Bo LEI, Zengyi LIU, Xuliang WANG, Mingchuan ·ANG, ·unqing CHEN.
Computing network:a new multi-access edge computing
[J]. Telecommunications Science, 2019, 35(9): 44-51.
|