[1] |
XIE Guoqi, LI Renfa, LIU Lin, et al.DAG Reliability Model and Fault-Tolerant Algorithm for Heterogeneous Distributed Systems[J]. Chinese Journal of Computers, 2013, 36(10): 2019-2032.
|
|
谢国琪, 李仁发, 刘琳, 等. 异构分布式系统DAG可靠性模型与容错算法[J]. 计算机学报, 2013, 36(10): 2019-2032.
|
[2] |
LI Haoliang,YANG Rennong,XI Xi, et al.Consensus of Multi-agent Systems with Time-varying Delays Based on Distributed PID Control[EB/OL]. .
|
|
李浩亮, 杨任农, 席茜, 等. 基于分布式PID控制的时变时延多智能体系统的一致性[EB/OL]. ,2018-6-15.
|
[3] |
GONG ZiJie.Design of Task Scheduling Algorithm in the Distributed Computing Platform[D]. Tianjin: Tianjin University, 2014.
|
|
巩子杰. 分布式计算平台中任务调度算法的设计[D]. 天津: 天津大学, 2014.
|
[4] |
SONG Junhui, FENG Yan.Task Scheduling Optimization Algorithm in Distributed System with Load Balancing[J]. Journal of Jilin University :Science Edition, 2017, 55(2): 383-387.
|
|
宋俊辉, 冯岩. 负载均衡的分布式系统任务调度优化算法[J]. 吉林大学学报:理学版, 2017, 55(2): 383-387.
|
[5] |
LI Songze, YU Qian, MADDAH-ALI M A, et al.A Scalable Framework for Wireless Distributed Computing[J]. IEEE/ACM Transactions on Networking, 2017, 25(5): 2643-2654.
|
[6] |
QIN Gaode, WEN Gaojin.Hierarchical Scheduling of Large Scale Distributed Computation[J]. Computer Science, 2013, 40(4): 91-95.
|
|
秦高德, 文高进. 大型分布式计算中的分级节能调度[J]. 计算机科学, 2013, 40(4): 91-95.
|
[7] |
YIN Xinming, CAO Zhiwei, HUANG Haiye, et al.Application of SSL VPN Technology in Mobile Police Video Access Link[J]. Netinfo Security, 2017,17(9):1-4.
|
|
尹心明, 曹志威, 黄海晔, 等. SSL VPN 技术在移动警务视频接入链路中的应用[J]. 信息网络安全, 2017,17(9): 1-4.
|
[8] |
BARANYI S, Sainsiné Y.The Development of the National Police, Public Security and the Rule of Law in Haiti[J]. Powder Technology, 2014, 256(2): 361-366.
|
[9] |
GU Ke, WU Na, LIU Yongzhi,et al.WPKI Certificate Verification Scheme Based on Certificate Digest Signature-online Certificate Status Protocol[J]. Mathematical Problems in Engineering, 2018,2018:364-383.
|
[10] |
CHAN Yu, WELLINGS A, GRAY I,et al.A Distributed Stream Library for Java 8[J]. IEEE Transactions on Big Data, 2017, 3(3): 262-275.
|
[11] |
YIN Jun, WANG Haiyan, PAN Xianmeng.Network Security Audit System Based on Redirection of DNS[J]. Computer Science, 2016, 43(11): 407-410.
|
|
殷俊, 王海燕, 潘显萌. 基于DNS重定向技术的网络安全审计系统[J]. 计算机科学, 2016, 43(11): 407-410.
|
[12] |
FENG Da, WANG Qiang, ZHAO Yiwen, et al.SGX-based Certificate Credibility Verification and Secure Software Issuance System[J]. Netinfo Security, 2018,18(3) : 63-69.
|
|
冯达, 王强, 赵译文, 等. 基于SGX 的证书可信性验证与软件安全签发系统[J]. 信息网络安全, 2018,18(3): 63-69.
|
[13] |
XU Qian, TAN Chengxiang, FENG Jun, et al.Lattice-Based Forward Secure and Certificateless Signature Scheme[J]. Journal of Computer Research and Development, 2017, 54(7): 1510-1524.
|
|
徐潜, 谭成翔, 冯俊, 等. 基于格的前向安全无证书数字签名方案[J]. 计算机研究与发展, 2017, 54(7): 1510-1524.
|
[14] |
YOU Lina, LI Yujun, WANG Yue, et al.A Deep Learning-based RNNs Model for Automatic Security Audit of Short Messages[C]//IEEE. 2016 16th International Symposium on Communications and Information Technologies (ISCIT), September 26-28 ,2016 , Qingdao, China .NJ:IEEE,2016: 225-229.
|
[15] |
XIANG Chuan, PAN Wuqiong, LI Huorong, et al.Research and Implementation of TLS Browser Supporting Commercial Cryptographic Algorithm[J]. Netinfo Security, 2017 ,17(4) : 26-33.
|
|
项川, 潘无穷, 黎火荣, 等. 支持商密算法TLS浏览器的设计与实现[J]. 信息网络安全, 2017,17(4): 26-33.
|