[1] |
LI Huadong,ZHANG Xueliang,WANG Xiaolei,LIU Hui,WANG Pengcheng,DU Junzhao.
Multi-node cooperative game load balancing strategy in the Kubernetes cluster
[J]. Journal of Xidian University, 2021, 48(6): 16-22.
|
[2] |
WANG Ruyan,WU He,CUI Yaping,WU Dapeng,ZHANG Hong.
Edge offloading strategy for the multi-base station game in ultra-dense networks
[J]. Journal of Xidian University, 2021, 48(4): 1-10.
|
[3] |
FENG Xiangchu,WANG Ping,HE Ruiqiang.
Method for inpainting blind images using the game and L0 constraint
[J]. Journal of Xidian University, 2021, 48(4): 103-112.
|
[4] |
LAI Chengzhe,CHEN Yao,GUO Qili,ZHENG Dong.
Game theory based incentive scheme for cooperative downloading in the internet of vehicles
[J]. Journal of Xidian University, 2021, 48(3): 9-20.
|
[5] |
HE Bin,SU Hongtao.
Study of game strategy between multiple targets and multistatics radars
[J]. Journal of Xidian University, 2021, 48(2): 125-132.
|
[6] |
CHENG Yukun,XU Zhiqi.
Study on the block withholding attack based on the evolutionary game
[J]. Journal of Xidian University, 2020, 47(5): 77-85.
|
[7] |
WANG Zengguang,LU Yu,LI Xi,LI Zhiwei.
Optimal defense strategy selection based on the static Bayesian game
[J]. Journal of Xidian University, 2019, 46(5): 55-61.
|
[8] |
PANG Ce,SHAN Ganlin,DUAN Xiusheng.
Sensor management method under target threat level risk control
[J]. Journal of Xidian University, 2019, 46(2): 95-100.
|
[9] |
YANG Hongyu;NING Yuguang.
Cloud platform dynamic risk access control model
[J]. Journal of Xidian University, 2018, 45(5): 80-88.
|
[10] |
LI Qiuni;YANG Rennong;LI Haoliang;ZHANG Huan;FENG Chao.
Research on the non-cooperative game strategy of suppressing IADS for multiple fighters cooperation
[J]. Journal of Xidian University, 2017, 44(6): 129-137.
|
[11] |
ZHOU Yanguo;ZHANG Hailin;CHEN Ruirui.
Two-layered game-theoretic based resource allocation in femtocell networks
[J]. Journal of Xidian University, 2017, 44(4): 62-68.
|
[12] |
LI Zhao;CAI Shenjin.
Relay incentive in cooperative communication by exploiting link imbalance
[J]. Journal of Xidian University, 2016, 43(6): 15-20+115.
|
[13] |
ZHANG Hengwei;YU Dingkun;HAN Jihong;WANG Jindong;KOU Guang.
Network security threat assessment based on the signaling game
[J]. Journal of Xidian University, 2016, 43(3): 137-143.
|
[14] |
DU Bai;LI Hongyan.
Network selection algorithm in heterogeneous wireless networks based on residual service time
[J]. J4, 2016, 43(1): 7-11.
|
[15] |
NIU Ke;LI Jun;LIU Jia;YANG Xiaoyuan.
Strategic adaptive steganography based on the game theory model
[J]. J4, 2015, 42(4): 165-170.
|