[1] |
Jiong LI, Yuxiang HU, Pengshuai CUI, Le TIAN, Yongji DONG.
Research on incremental deployment mechanism of network modality for polymorphic network environment
[J]. Telecommunications Science, 2023, 39(6): 33-43.
|
[2] |
Xue HAN.
Damage toughness assessment method of power backbone communication network based on power big data
[J]. Telecommunications Science, 2023, 39(5): 136-143.
|
[3] |
Furong XU, Hang CUI, Tianyi YU, Long ZHANG, Jinxia CHENG, Feng XING, Wuneng GUAN, Jing LIU, Wei DENG, Haiyu DING.
5G nomadic deployment proposal of base station integrated with cloud and service
[J]. Telecommunications Science, 2022, 38(Z1): 120-127.
|
[4] |
Jiangxing WU.
Revolution of the development paradigm of network technology system—network of networks
[J]. Telecommunications Science, 2022, 38(6): 3-12.
|
[5] |
Wenjuan XING, Bo LEI, Qianying ZHAO.
Development status and trend prospect of computing power infrastructure
[J]. Telecommunications Science, 2022, 38(6): 51-61.
|
[6] |
Pingke DENG, Tongxu ZHANG, Nanxiang SHI, Tong ZHANG, Tianzhu SHAO, Shaowen ZHENG.
Computing satellite networks—the novel development of computing-empowered space-air-ground integrated networks
[J]. Telecommunications Science, 2022, 38(6): 71-81.
|
[7] |
Wen QIAO, Xiaozheng WANG, Zhenqiang SUN, Gan REN, Yunxin LIU, Aidong YANG, Peng WANG, Da WANG, Xiaozhou YE, Ye OUYANG.
A pilot study of Telco’s next generation IT architecture evolution: business function virtualization (BFV)
[J]. Telecommunications Science, 2022, 38(6): 143-155.
|
[8] |
Kun MA, Lingyu XU, Xiaoping SHEN, Zhicheng GONG, Jianping LAN, Shuangxi CHEN, Jun QIAN.
Virtual machine scheduling model based on Shapley value modified genetic algorithm in cloud computing
[J]. Telecommunications Science, 2022, 38(12): 1-10.
|
[9] |
Yunyi LIU, Jianmin ZHANG, Xiaoli FENG, Liwei ZHANG.
5G MEC system security capability deployment scheme
[J]. Telecommunications Science, 2022, 38(11): 143-152.
|
[10] |
Zilu GAO, Shaohui SUN, Li LI.
Overview of reconfigurable intelligent surface for new-generation mobile communication
[J]. Telecommunications Science, 2022, 38(10): 20-35.
|
[11] |
Zhiyong LIU, Zhongjiang HE, Yilong RUAN, Junfeng SHAN, Chao ZHANG.
Big data security features and operation practices
[J]. Telecommunications Science, 2021, 37(5): 160-169.
|
[12] |
Yin LIN, Xiaoxia QIN, Guodong WANG, Shutian WEI.
Precise deployment scheme of 10G PON based on different scenarios
[J]. Telecommunications Science, 2021, 37(12): 133-143.
|
[13] |
Jian XU,Li JIN.
A quantifiable cloud computing platform security evaluation model
[J]. Telecommunications Science, 2020, 36(7): 163-167.
|
[14] |
Jiahui QIU,Zhichao ZHOU,Xiaobo LIN,Yu XIAO,Chao CAI,Liu LIU.
Research and application of V2X based on MEC
[J]. Telecommunications Science, 2020, 36(6): 45-55.
|
[15] |
Sining LUO,Hualong WANG,Hongyu LI,Wei PENG.
Improved ant colony algorithm based cloud computing user task scheduling algorithm
[J]. Telecommunications Science, 2020, 36(2): 95-100.
|