×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
湖南大学 [2]
大连理工大学 [1]
北京航空航天大学 [1]
山东大学 [1]
中南大学 [1]
安徽大学 [1]
更多...
内容类型
期刊论文 [8]
发表日期
2018 [8]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共8条,第1-8条
帮助
限定条件
发表日期:2018
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 卷号: 15, 页码: 54-68
作者:
Meng, Xianfu
;
Liu, Dongxu
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/02
Peer-to-peer
trust model
guarantee
reputation mortgage
incentive mechanism
computational complexity
A resource allocation model based on double-sided combinational auctions for transparent computing
期刊论文
Peer-to-Peer Networking and Applications, 2018, 卷号: 11, 期号: 4, 页码: 679-696
作者:
Wang, Jiaze
;
Liu, Anfeng
;
Yan, Tong
;
Zeng, Zhiwen*
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/03
Transparent computing
Communication bandwidth boundary
Double-sided auctions
Resources optimization
Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks
期刊论文
Peer-to-Peer Networking and Applications, 2018, 卷号: Vol.11 No.5, 页码: 1022-1037
作者:
Jie Cui
;
Yan Xu
;
Lili Shao
;
Lu Liu
;
Hong Zhong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/24
Data aggregation
Confidentiality
Integrity
Homomorphic encryption
Large-scale wireless sensor networks
Green communication mobile convergence mechanism for computing self-offloading in 5G networks
期刊论文
Peer-to-Peer Networking and Applications, 2018
作者:
Shu, Yuan
;
Zhu, Fuxi
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis
期刊论文
Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, 2018, 页码: 283-288
作者:
Wang, Pengfei
;
Wang, Fengyu
;
Lin, Fengbo
;
Cao, Zhenzhong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/11
botnet detection
P2P botnet
periodicity behavior
Spark
A software defined caching framework based on user access behavior analysis for transparent computing server
期刊论文
Peer-to-Peer Networking and Applications, 2018
作者:
Li, Weimin
;
Wang, Bin
;
Sheng, Jinfang
;
Hou, Xiangyu
;
Chen, Lin
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/26
Reliable and Cooperative Target Tracking Based on WSN and WiFi in Indoor Wireless Networks
期刊论文
IEEE Access, 2018, 卷号: Vol.6, 页码: 24846-24855
作者:
Luo, J
;
Zhang, ZY
;
Liu, C
;
Luo, HB
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/26
Target
tracking
Wireless
fidelity
Wireless
sensor
networks
Reliability
Indoor
environments
Databases
Peer-to-peer
computing
Indoor
localization
reliable
target
tracking
wireless
network
An evolvable and transparent data as a service framework for multisource data integration and fusion
期刊论文
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 卷号: 11, 页码: 697-710
作者:
Xie, Zhipu
;
Lv, Weifeng
;
Qin, Linfang
;
Du, Bowen
;
Huang, Runhe
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
Data as a service
Transparent computing
Linked data
RESTful Web Service
©版权所有 ©2017 CSpace - Powered by
CSpace