Journal of Shanghai Jiao Tong University ›› 2017, Vol. 51 ›› Issue (1): 98-.
Previous Articles Next Articles
Published:
2017-01-31
CLC Number:
YANG Bin,LU Yuliang,YANG Guozheng,ZHU Kailong. An Artificial Immune Network Classification Algorithm Based on VirtualForce Direction and Cell Differentiation[J]. Journal of Shanghai Jiao Tong University, 2017, 51(1): 98-.
[1]朱颢东, 钟勇. 基于并行免疫克隆算法的特征选择方法[J].上海交通大学学报, 2009, 43(12): 1847-1851. |
[1] | WEN Zhicheng1,2,CHEN Zhigang1,DENG Xiaoheng1,LIU Anfeng1. Network Security Situation Awareness Method Based on Multi-Source and Multi-Level Information Fusion [J]. Journal of Shanghai Jiaotong University, 2015, 49(08): 1144-1152. |
[2] | XU Bo,MIN Huaqing,XIAO Fangxiong. Ant Colony Algorithm for Solving Discrete Minimum Constraint Removal (MCR) Problem [J]. Journal of Shanghai Jiaotong University, 2015, 49(03): 383-386. |
[3] | WANG Xin1,JIA Qingxuan1,GAO Xin1,CHEN Gang1,ZHAO Bing2. Adaptive N Tree Anti-Collision Algorithm Based on Bitmap Construction [J]. Journal of Shanghai Jiaotong University, 2015, 49(02): 150-157. |
[4] | ZHANG Keli1,LI Zhongxian1,2,YANG Yixian1. A Trust Model for Identifying and Tracing Malicious Anonymous Feedback Providers [J]. Journal of Shanghai Jiaotong University, 2014, 48(07): 899-906. |
[5] | ZHANG Ying,JI Changgang,LI Junfu. A Routing Algorithm Based on Energy and Distance for Heterogeneous Sensor Networks with Multilevel Energies [J]. Journal of Shanghai Jiaotong University, 2014, 48(07): 953-958. |
[6] |
CHEN Jianhong1,2,SHAN Jingsong1,YANG Ronggen1,GONG Lejun1,CHEN Kefei 2,YU Kun1,CHEN Liqing1,SUN Chengfu1.
Identity-based Threshold Key-insulated Signature Without Random Oracles
|
[7] | XIE Jing, LIU Gong-Shen, SU Bo, MENG Kui. Prediction of User’s Retweet Behavior in Social Network [J]. Journal of Shanghai Jiaotong University, 2013, 47(04): 583-588. |
[8] | LIU Chen-Yan-1, 2 , PAN Li-1, 2 , ZI Xiao-Chao-2. A Binary-String-Set-Based Algebraic Framework for Policy Composition [J]. Journal of Shanghai Jiaotong University, 2013, 47(04): 579-583. |
[9] | QIAO Yu-Ran, WU Nan, YANG Qian-Ming, WEN Mei, ZHANG Chun-Yuan. Deadlock Detection and Recovery Based on Topological Order for NoC [J]. Journal of Shanghai Jiaotong University, 2013, 47(01): 92-97. |
[10] | CHEN Gui-Rong-1, 2 , CAI Wan-Dong-1, XU Hui-Jie-1, YAN Pei-Xiang-3, WANG Jian-Ping-1. High-Effect Priority Bounded Confidence Model for Network Opinion Evolution [J]. Journal of Shanghai Jiaotong University, 2013, 47(01): 155-160. |
[11] | FANG Ming-1, CHEN Song-Qiao-1, WANG Ke-Fei-2. High Radix Router Design Based on Asymmetric Crossbar [J]. Journal of Shanghai Jiaotong University, 2013, 47(01): 138-143. |
[12] | ZHOU Gui-Yin, HE Chen, JIANG Ling-Ge. Single Transceiver and Network Characteristics Based MAC Protocol for Cognitive Radio Wireless Sensor Networks [J]. Journal of Shanghai Jiaotong University, 2012, 46(11): 1729-1735. |
[13] | LIU Su-Na-1, 2 , PAN Li-1, 2 , 3 , YAO Li-Hong-2. BLP Based Access Control Mechanism in Multi-level Network Systems [J]. Journal of Shanghai Jiaotong University, 2012, 46(09): 1387-1391. |
[14] | XIAO Rong, JIANG Ling-Ge, HE Chen. A Channel Reliability Based Multi-channel MAC Protocol in Wireless Sensor Networks [J]. Journal of Shanghai Jiaotong University, 2012, 46(09): 1382-1386. |
[15] | ZHENG Bo-1, 2 , ZHANG Heng-Yang-1, SUN Peng-1, HUANG Guo-Ce-1. Connectivity on One-and Two-Way Flight Routes in Aeronautical Ad hoc Networks [J]. Journal of Shanghai Jiaotong University, 2012, 46(04): 624-629. |
Viewed | ||||||||||||||||||||||||||||||||||||||||||||||||||
Full text 181
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Abstract 906
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||