相似文献/References:
[1]沈武 王天芹 杨帅.基于门限完全分布式密钥管理方案[J].计算机技术与发展,2010,(02):175.
SHEN Wu,WANG Tian-qin,YANG Shuai.Fully- Distributed Key Management Scheme Based on Threshold[J].,2010,(03):175.
[2]王春枝 王骞.一种基于移动代理的服务器集群系统模型[J].计算机技术与发展,2009,(11):159.
WANG Chun-zhi,WANG Qian.A Model of Servers Cluster System Based on Mobile Agent[J].,2009,(03):159.
[3]张登银 闫雪飞.机会网络路由可靠性研究[J].计算机技术与发展,2010,(11):70.
ZHANG Deng-yin,YAN Xue-fei.Research on Routing Reliability in Opportunistic Networks[J].,2010,(03):70.
[4]刘业[] 刘林峰[].结构化P2P网络可用性增强问题研究[J].计算机技术与发展,2012,(03):222.
LIU Ye,LIU Lin-feng.Survey of Study on Availability Enhancement of Structured P2P Networks[J].,2012,(03):222.
[5]赵莉,李蜀瑜.基于DEC_POMDP的Web服务组合优化算法[J].计算机技术与发展,2014,24(03):74.
ZHAO Li,LI Shu-yu.Web Service Composition Optimization Algorithm Based on DEC_POMDP[J].,2014,24(03):74.