Huang Qingfeng, Li, Lu Chuiwei. Cost analysis of DHT jitter processing. Computer Research and Development, 2008, (S 1):
Huang Qingfeng, Li, Lu Chuiwei. Cost analysis of DHT jitter processing. Computer Research and Development, 2008, (S 1):
Huang Qingfeng, Li, Lu Chuiwei, Cost analysis of DHT jitter processing. Computer research and development, 2008, (0 1):
Ber Ber. Tree chain hybrid multicast source authentication protocol. Computer Science, 2008, 35 (06): 99- 102 36 Li. A garbage collection and scheduling method based on neural network. Microcomputer System, 2007,28 (07):1178.
35 Li Liuling. IPSec-compatible TCP performance optimization mechanism based on wired/wireless hybrid network. Microcomputer system, 28, 2007 (10):1760-1763.
Zeng Bin, Li, Xu. TCP proxy for satellite network. Journal of Software, 2007,18 (07):1695-1704.
Tang Zhi 33 Li. Analysis of a new VPN system model supporting multicast tunnel. Microcomputer System, 2007,28 (05): 774-778
No.32, Songmei Street, Tangzhi, Li Xiaoling. Research on WindowsVPN architecture based on virtual network card. Miniature Microcomputer System, 2007,28 (09):1586-1590.
3 1 Zeng Wang. Research on QoS monitoring algorithm of space-based real-time system. Computer Science, 2007,34 (01): 74-77
30 Lin Huaiqing, Li, Huang Qingfeng. Trust relationship management protocol in P2P system. Computer Engineering, 2007,33 (18): 20-22
Li. Research on a new VPN communication based on IPSec over Http protocol. Miniature Microcomputer System, 2007,28 (06):1021-1025.
Lin Huaiqing and Li. Research progress on key technologies of P2P trust model. Miniature Microcomputer System, 2007,28 (09):1599-1603.
27 Li Li Zhanchun. BitTorrent traffic measurement method based on Netfilter. Computer Science, 2007,34 (04): 38-4126 Li. Model analysis of a new high performance VPN system. Microcomputer System, 2006,27 (05): 793-797.
25 Li Lijia Chunmei. Unified network security monitoring system model based on heterogeneous system. Small Microcomputer System, 2006,27 (09):1682-1686.
24 and Li. Research on LO-KO attack of Y-00 protocol. Microcomputer system, 2006,27 (12): 2276-2279 22 Li Jiachun, Li. Correlation analysis of distributed intrusion alarm. Computer research and development, April 20041(65438+)
2 1 Shishi. A new security protocol analysis logic. Miniature Microcomputer System, 2004,25 (12): 2182-2185 20 Li Tan Yunmeng Wu Shizhong. Joint signature and its application in electronic cash. Small microcomputer system, 2004.
19 Zeng Bin Xing Jifeng Li. Adaptive network service quality support framework. Computer Engineering, 29 (22), 2003:124-12618 Application of Lie Fuzzy Neural Network in Intrusion Detection. Microcomputer system, 2002, 208.
17 plum. A VPN model based on IP encapsulation directly. Computer Research and Development, 2002,39 (07): 775-780.
16 Li Heng. Theoretical research on VPN group policy. Microcomputer System, 2002,23 (05): 532-535
Jiang 15. Design and implementation of firewall SNMP agent. Small Microcomputer System, 2002,23 (06): 679-682
14 Li Shu. Survivability model of dual systems based on information redundancy and dispersion. Computer research and development, 2002,39 (07): 769-77413 Li Huang Huilong. Parallel PC: a new PC architecture design centered on switching network. Small microcomputer system, 20065438.
12 Li Huang Huilong. Research on operating system model based on parallel PC structure. Computer Science, 200 1, 28 (04): 42-46.
Li Zheng. Research on an optimized billing model IAS. Microcomputer system, 200 1, 22 (03): 355-357 10 Xu. Traffic analysis of multimedia server based on gigabit network. Computer Engineering, 2000, (000)
9. Hao Li Tang Zhi Xiaoling. Research on the Implementation of News System Based on IPv6. Computer Engineering, 2000, (0 1): 7 Li. Structural design of multi-level optical interconnection multi-computer system. Small microcomputer system, 197, 18 (02): 2 1-.
6 Li Tangzhi. Structural design of optical dynamic direct full interconnection multi-computer system. Computer research and development,1997,34 (03):166-1715 Zhang Jiangling Li. Research on mixed access of long and short data in striped disk array. China chinese journal of computers, 65438+.
4 Li Li Hanju. Performance analysis of distributed disk display. Computer research and development, 1995, (11);
3 Li Li Hanju A.D. Performance analysis of centralized disk array. Computer research and development,1995,32 (11): 55-60.
Li Hanju, Li Chengpeng and Tang Zhi. Hash bit array deduplication algorithm and its performance analysis. Computer Engineering, 1995, (0 1): 1 Li Li Hanju. Two kinds of problems applicable to functional disk system. Computer research and development,1993,30 (08): 650.