{"id":11,"date":"2019-12-05T04:53:29","date_gmt":"2019-12-04T20:53:29","guid":{"rendered":"http:\/\/47.94.221.113\/index.php\/%e5%be%90%e6%81%aa-thuxukegroup\/"},"modified":"2021-05-13T19:07:42","modified_gmt":"2021-05-13T11:07:42","slug":"xuke-chinese","status":"publish","type":"page","link":"http:\/\/thucsnet.com\/index.php\/xuke-chinese\/","title":{"rendered":"\u5f90\u606a"},"content":{"rendered":"<div>\r\n<div class=\"wsite-multicol\">\r\n<div class=\"wsite-multicol-table-wrap\" style=\"margin: 0 -15px;\">\r\n<table class=\"wsite-multicol-table\">\r\n<tbody class=\"wsite-multicol-tbody\">\r\n<tr class=\"wsite-multicol-tr\">\r\n<td class=\"wsite-multicol-col\" style=\"width: 45.445344129555%; padding: 0 15px;\">\r\n<h2 class=\"wsite-content-title\" style=\"text-align: left;\">\u5f90\u606a\r\n<span style=\"line-height: 19px; font-size: medium;\">\u6559\u6388\uff0c\u535a\u58eb\u751f\u5bfc\u5e08<\/span>\r\n<span style=\"font-size: medium;\">\u4e2d\u56fd \u5317\u4eac\u00a0<\/span><span style=\"font-size: medium;\">\u6e05\u534e\u5927\u5b66\u8ba1\u7b97\u673a\u79d1\u5b66\u6280\u672f\u7cfb<\/span><span style=\"font-size: medium;\">\u00a0100084<\/span>\r\n<span style=\"font-size: medium;\">\u529e\u516c\u5730\u70b9\uff1a \u6e05\u534e\u5927\u5b66 FIT\u697c<\/span><span style=\"font-size: medium; line-height: 17.454545974731445px;\">4-104<\/span><\/h2>\r\n<div>\r\n<div class=\"wsite-multicol\">\r\n<div class=\"wsite-multicol-table-wrap\" style=\"margin: 0 -15px;\">\r\n<table class=\"wsite-multicol-table\">\r\n<tbody class=\"wsite-multicol-tbody\">\r\n<tr class=\"wsite-multicol-tr\">\r\n<td class=\"wsite-multicol-col\" style=\"width: 50%; padding: 0 15px;\">\r\n<h2 class=\"wsite-content-title\" style=\"text-align: left;\"><span style=\"font-size: medium;\"><strong><span style=\"color: #818181;\">\u7535\u8bdd\/\u4f20\u771f<\/span><\/strong><strong><span style=\"color: #818181;\">:\u00a0 +86 10 62603056<\/span><\/strong><\/span><\/h2>\r\n<h2 class=\"wsite-content-title\" style=\"text-align: left;\"><span style=\"font-size: medium;\"><strong><span style=\"color: #818181;\">\u90ae\u7bb1: xuke@tsinghua.edu.cn<\/span><\/strong><\/span><\/h2>\r\n<div>\r\n<div class=\"wsite-image wsite-image-border-none \" style=\"padding-top: 0; padding-bottom: 0; margin-left: 0; margin-right: 10px; text-align: left;\">\r\n<div style=\"display: block; font-size: 90%;\"><\/div>\r\n<\/div>\r\n<\/div><\/td>\r\n<td class=\"wsite-multicol-col\" style=\"width: 50%; padding: 0 15px;\">\r\n<h2 class=\"wsite-content-title\" style=\"text-align: left;\"><u><span style=\"font-size: large;\"><a title=\"\" href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/xukecv.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u7b80\u5386\u4e0b\u8f7d<\/a><\/span><\/u>\r\n<span style=\"font-size: large;\"><u><a title=\"\" href=\"http:\/\/scholar.google.com\/citations?user=_XXLtZgAAAAJ&amp;hl=en\" target=\"_blank\" rel=\"noopener noreferrer\">\u8c37\u6b4c\u5b66\u672f\u5f15\u7528<\/a><\/u><\/span><\/h2>\r\n<div>\r\n<div id=\"404509397467335410\" class=\"wcustomhtml\" style=\"width: 100%; overflow-y: hidden;\" align=\"left\">\r\n<div id=\"clustrmaps-widget\"><\/div>\r\n<script type=\"text\/javascript\">var _clustrmaps = {'url' : 'http:\/\/www.thucsnet.org\/xuke_chs.html', 'user' : 1137310, 'server' : '2', 'id' : 'clustrmaps-widget', 'version' : 1, 'date' : '2014-03-25', 'lang' : 'zh', 'corners' : 'square' };(function (){ var s = document.createElement('script'); s.type = 'text\/javascript'; s.async = true; s.src = 'http:\/\/www2.clustrmaps.com\/counter\/map.js'; var x = document.getElementsByTagName('script')[0]; x.parentNode.insertBefore(s, x);})();<\/script><noscript><a href=\"http:\/\/www2.clustrmaps.com\/user\/998115a9e\"><img decoding=\"async\" src=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2019\/12\/www.thucsnet.org-xuke_chs.html-thumb.jpg\" alt=\"Locations of visitors to this page\"><\/a><\/noscript>\r\n\r\n<\/div>\r\n<\/div><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\n<\/div>\r\n<\/div><\/td>\r\n<td class=\"wsite-multicol-col\" style=\"width: 54.554655870445%; padding: 0 15px;\">\r\n<div>\r\n<div class=\"wsite-multicol\">\r\n<div class=\"wsite-multicol-table-wrap\" style=\"margin: 0 -15px;\">\r\n<table class=\"wsite-multicol-table\" style=\"height: 276px;\" width=\"344\">\r\n<tbody class=\"wsite-multicol-tbody\">\r\n<tr class=\"wsite-multicol-tr\">\r\n<td class=\"wsite-multicol-col\" style=\"width: 85.84729981378%; padding: 0 15px;\">\r\n<h2 class=\"wsite-content-title\" style=\"text-align: right;\"><span style=\"font-size: large;\"><a title=\"\" href=\"\/index.php\/xuke\/\"><u>English Homepage<\/u><\/a><\/span><\/h2>\r\n<\/td>\r\n<td class=\"wsite-multicol-col\" style=\"width: 14.15270018622%; padding: 0 15px;\"><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\n<\/div>\r\n<\/div><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"paragraph\" style=\"text-align: justify;\">\r\n\r\n<span style=\"font-size: medium;\"><strong>1. \u90e8\u5206\u5b66\u672f\u671f\u520a\u8bba\u6587\uff08<\/strong><\/span><span style=\"color: #777777;\">\u5b8c\u6574\u5217\u8868\u8bf7\u70b9\u51fb<\/span><u style=\"color: #777777;\"><a href=\"\/publications.html\">\u8fd9\u91cc<\/a><\/u><span style=\"font-size: medium;\"><strong>\uff09<\/strong><\/span>\r\n<ul>\r\n \t<li>Yi Zhao, Ke Xu, Haiyang Wang, Bo Li, Meina Qiao, Haobin Shi. \u201cMEC-Enabled Hierarchical Emotion Recognition and Perturbation-Aware Defense in Smart Cities\u201d, <em>IEEE IoTJ<\/em>, 2021.<\/li>\r\n \t<li>Peizhuang Cong, Yuchao Zhang, Zheli Liu, Thar Baker, Hissam Tawfik, Wendong Wang, Ke Xu, Ruidong Li, Fuliang Li. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_cn21.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Deep Reinforcement Learning-based Multi-optimality Routing Scheme for Dynamic IoT Networks<\/a>\u201d,\u00a0<em>Computer Networks<\/em>, 2021.<\/li>\r\n \t<li>Yuchao Zhang, Xiaohui Nie, Junchen Jiang, Wendong Wang, Ke Xu, Youjian Zhao, Martin J. Reed, Kai Chen, Haiyang Wang, Guang Yao. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_ton21.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">BDS+: An Inter-Datacenter Data Replication System With Dynamic Bandwidth Separation<\/a>\u201d,\u00a0<em>IEEE ToN<\/em>, 2021.<\/li>\r\n \t<li>Meng Shen, Huan Wang, Bin Zhang, Liehuang Zhu, Ke Xu, Qi Li, Xiaojiang Du. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_iotj21.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Exploiting Unintended Property Leakage in Blockchain-Assisted Federated Learning for Intelligent Edge Computing<\/a>\u201d,\u00a0<em>IEEE IoTJ<\/em>, vol. 8, no. 4, pp. 2265-2275, 2021.<\/li>\r\n \t<li>Meng Shen, Jianpeng Zhang, Liehuang Zhu, Ke Xu, Xiaojiang Du. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_tifs21.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks<\/a>\u201d,<em>\u00a0IEEE TIFS<\/em>, vol. 16, pp. 2367-2380, 2021.<\/li>\r\n \t<li>Suiming Guo, Chao Chen, Jingyuan Wang, Yan Ding, Yaxiao Liu, Ke Xu, Zhiwen Yu, Daqing Zhang. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/suiming_tmc20_early_access.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Force-directed Approach to Seeking Route Recommendation in Ride-on-demand Service Using Multi-source Urban Data\u201d<\/a>,\u00a0<em>IEEE TMC<\/em>, 2020.<\/li>\r\n \t<li>Suiming Guo, Chao Chen, Jingyuan Wang, Yaxiao Liu, Ke Xu, Zhiwen Yu, Daqing Zhang, Dah-Ming Chiu.\u00a0\u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/suiming_tmc20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">ROD-Revenue: Seeking Strategies Analysis and Revenue Prediction in Ride-on-demand Service Using Multi-source Urban Data<\/a>\u201d,\u00a0<em>IEEE TMC<\/em>, vol. 19, no. 9, pp. 2202-2220, 2020.<\/li>\r\n \t<li>Yi Zhao, Ke Xu, Yifeng Zhong, Xiang-Yang Li, Ning Wang, Hui Su, Meng Shen, Ziwei Li.\u00a0\u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_cn20.pdf\">Incentive Mechanisms for Mobile Data Offloading Through Operator-owned WiFi Access Points<\/a>\u201d,\u00a0<em>Computer Networks<\/em>, vol. 174, 2020.<\/li>\r\n \t<li>Laizhong Cui, Shu Yang, Ziteng Chen, Yi Pan, Mingwei Xu, Ke Xu.\u00a0\u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/laizhong_TII20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">An Efficient and Compacted DAG-based Blockchain Protocol for Industrial Internet of Things<\/a>\u201d,\u00a0<em>IEEE TII<\/em>, vol.16, no. 6, pp. 4143-4145, 2020.<\/li>\r\n \t<li>Meng Shen, Jie Zhang, Liehuang Zhu, Ke Xu, Xiangyun Tang. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_tvt20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Secure SVM Training over Vertically-Partitioned Datasets using Consortium Blockchain for Vehicular Social Networks<\/a>\u201d,\u00a0<em>IEEE TVT<\/em>, vol. 69, no. 6, pp. 5773-5783, 2020.<\/li>\r\n \t<li>Meng Shen, Huisen Liu, Liehuang Zhu, Ke Xu, Hongbo Yu, Xiaojiang Du, Mohsen Guizani.\u00a0\u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_jsac20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT<\/a>\u201d,\u00a0<em>IEEE JSAC<\/em>, vol. 38, no. 5, pp. 942-954, 2020.<\/li>\r\n \t<li>Yi Zhao, Haiyang Wang, Hui Su, Liang Zhang, Rui Zhang, Dan Wang, Ke Xu.\u00a0\u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_jsac20.pdf\">Understand Love of Variety in Wireless Data Market under Sponsored Data Plans<\/a>\u201d,\u00a0<em>IEEE JSAC, vol. 38, no. 4, pp. 766-781, 2020.<\/em><\/li>\r\n \t<li>Qi Tan, Yi Qu, Ke Xu, Haiyang Wang, Dan Wang, Meng Shen. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/qi_ccfton19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Interference\u2011aware lifetime maximization with joint routing and charging in wireless sensor networks<\/a>\u201d,\u00a0<em>CCF Trans. Netw.<\/em>, vol. 2, no. 3, 2019.<\/li>\r\n \t<li>Wenlong Chen, Heyang Chen, Zhiliang Wang, Chengang Zhao, Mingwei Xu, Ke Xu, Yingya Guo. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/wenlong_fgcs19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Congestion avoidance transmission mechanism based on two-dimensional forwarding<\/a>\u201d,\u00a0<em>Future Generation Computer System<\/em>, vol. 102, pp. 1-13, 2019.<\/li>\r\n \t<li>Ke Xu, Liang Lv, Tong Li, Meng Shen, Haiyang Wang, Kun Yang. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_tpds19.pdf\">Minimizing Tardiness for Data-intensive Applications in Heterogeneous Systems: A Matching Theory Perspective<\/a>\u201d,\u00a0<em>IEEE TPDS<\/em>, vol. 31, no. 1, pp. 144-158, 2019.<\/li>\r\n \t<li>Suiming Guo, Chao Chen, Jingyuan Wang, Yaxiao Liu, Ke Xu, Dah Ming Chiu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/suiming_mna19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Fine-grained Dynamic Price Prediction in Ride-on-demand Services: Models and Evaluations<\/a>\u201d,\u00a0<em>Mobile Networks and Applications<\/em>, 2019.<\/li>\r\n \t<li>Bo Wu, Ke Xu, Qi Li, Bingyang Liu, Shoushou Ren, Fan Yang, Meng Shen, Kui Ren. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/bo_cn19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">RFL: Robust Fault Localization on Unreliable Communication Channels<\/a>\u201d,\u00a0<em>Computer Networks<\/em>, vol. 158, pp. 158-174, 2019.<\/li>\r\n \t<li>Liang Lv, Yuchao Zhang, Yusen Li, Ke Xu, Dan Wang, Wenlong Wang, Minghui Li, Xuan Cao, Qingqing Liang. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/liang_jsac19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Communication-aware Container Placement and Reassignment in Large-scale Internet Data Centers<\/a>\u201d,\u00a0<em>IEEE JSAC<\/em>, vol. 37, no. 3, pp.540-555, 2019.<\/li>\r\n \t<li>Tong Li, Kezhi Wang, Ke Xu, Kun Yang, Chathura Sarathchandra Magurawalage, Haiyang Wang. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/tong_ccfton18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Communication and computation cooperation in cloud radio access network with mobile edge computing<\/a>\u201d,\u00a0<em>CCF Trans. Netw.<\/em>,\u00a0 vol.2, no.1, pp. 43-56, 2019.<\/li>\r\n \t<li>Meng Shen, Baoli Ma,\u00a0Liehuang Zhu,\u00a0Xiaojiang Du,\u00a0Ke Xu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_IoTJ18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT<\/a>\u201d, \u00a0<em>IEEE Internet of Things Journal<\/em>, vol. 6, no. 2, pp. 1998-2008, 2019.<\/li>\r\n \t<li>Xiaoliang Wang, Ke Xu, Bo Mao. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xiaoliang_wcmc18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">GreenLink: An Energy Efficient Scatternet Formation for BLE Devices<\/a>\u201d,\u00a0<em>Wireless Communications and Mobile Computing<\/em>, 2018.<\/li>\r\n \t<li>Fei Chen, Haitao Li, Jiangchuan Liu, Bo Li, Ke Xu, Yuemin Hu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/fei_p2pna18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Migrating big video data to cloud: a peer-assisted approach for VoD<\/a>\u201d,\u00a0Peer-to-Peer Networking and Applications, vol. 11, no. 5,\u00a0pp. 1060\u20131074, 2018.<\/li>\r\n \t<li>Yuchao Zhang, Ke Xu, Haiyang Wang, Jiangchuan Liu, Yifeng Zhong, Yong Wang. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_ijcs18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Design, modeling, and analysis of online combinatorial double auction for mobile cloud computing markets<\/a>\u201d,\u00a0<em>International Journal of Communication Systems\u00a0<\/em>31 (7), e3460\u00a0, 2018.<\/li>\r\n \t<li>Ke Xu, Tong Li, Haiyang Wang, Haitao Li, Wei Zhu, Jiangchuan Liu, Song Lin, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_tsc16.pdf\">Modeling, Analysis, and Implementation of Universal Acceleration Platform Across Online Video Sharing Sites<\/a>\u201d,\u00a0<em>IEEE Transactions on Services Computing<\/em>\u00a0(TSC), vol.11, no. 3, pp. 534-548,\u00a02018.<\/li>\r\n \t<li>\u200bHaiyang Wang, Tong Li, Ryan Shea, Xiaoqiang Ma, Feng Wang, Jiangchuan Liu, Ke Xu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haiyang_ton17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Toward Cloud-Based Distributed Interactive Applications: Measurement, Modeling, and Analysis<\/a>\u201d,\u00a0<em>IEEE\/ACM Transaction on Networking (TON)<\/em>, 2017.<\/li>\r\n \t<li>Guangwu Hu, Wenlong Chen, Qi Li, Yong Jiang, Ke Xu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/guangwu_fgcs17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code<\/a>\u201d,\u00a0<em>Future Generation Computer Systems<\/em>, pp. 219-226, 2017.<\/li>\r\n \t<li>Lei Xu, Ke Xu, Yong Jiang, Fengyuan Ren, Haiyang Wang. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/lei_cn17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Throughput optimization of TCP incast congestion control in large-scale datacenter networks<\/a>\u201d,\u00a0<em>Computer Networks<\/em>, pp. 46-60, 2017.<\/li>\r\n \t<li>Li Li, Ke Xu, Dan Wang, Chunyi Peng, Kai Zheng, Rashid Mijumbi, Qiangyang Xiao. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/li_ton17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Longitudinal Measurement Study of TCP Performance and Behavior in 3G\/4G Networks over High Speed Rails<\/a>\u201d,\u00a0<em>IEEE\/ACM Transactions on Networking (TON),<\/em>\u00a0vol. 25, no. 4, pp. 2195-2208, 2017.<\/li>\r\n \t<li>Guopeng Zhang, Kun Yang, Haifeng Jiang, Xiaofeng Lu, Ke Xu, Lianming Zhang. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/guopeng_mna16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Equilibrium Price and Dynamic Virtual Resource Allocation for Wireless Network Virtualization<\/a>\u201d,\u00a0<em>Mobile Networks and Applications<\/em>, pp. 1-13, 2016.<\/li>\r\n \t<li>Guangwu Hu, \u00a0Wenlong Chen, Qi Li, Yong Jiang, Ke Xu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/guangwu_fgcs16.pdf\">TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code<\/a>\u201d,\u00a0<em>Future Generation Computer Systems<\/em>, pp.\u00a0219-226, 2016.<\/li>\r\n \t<li>Kao Wan, XueFeng Luo, Yong Jiang, Ke Xu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/kao_cjc16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">The Flow-oriented Scheduling Algorithms In SDN System<\/a>\u201d,\u00a0<em>Chinese Journal of Computers<\/em>\u00a0(in Chinese), vol.39, no. 6, pp.1208-1223, 2016.<\/li>\r\n \t<li>Ke Xu, Fan Yang, Bo Wu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_ccfc16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Secure Packet Forwarding Verification for the Authentication of Source and Path<\/a>\u201d,<em>\u00a0Communications of the CCF<\/em>,\u00a0vol. 12, no. 5, pp. 14-19, 2016<\/li>\r\n \t<li>Hui Su, Ke Xu, Meng Shen, Yong Wang, Yifeng Zhong, Tong Li. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/hui_jcrd16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Research on Mobile Data Subsidy Model and Case Study<\/a>\u201d, \u00a0<em>Journal of Computer Research and Development<\/em>\u00a0\u00a0(in Chinese), \u00a0vol. 53, no. 4, pp. 861-872, 2016. (EI)<\/li>\r\n \t<li>Ke Xu, Meng Shen, Hongying Liu, Jiangchuan Liu, Fan Li, Tong Li, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_tpds16.pdf\">Achieving Optimal Traffic Engineering Using a Generalized Routing Framework<\/a>\u201d,<a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/achieving%C2%A0optimal%C2%A0traffic%C2%A0engineering%C2%A0using%C2%A0a%C2%A0generalized%C2%A0routing%C2%A0framework.pdf\">\u00a0<\/a><em><em>IEEE Transactions on\u00a0<\/em>Parallel and Distributed Systems (TPDS)<\/em>, 27(1): 51-65, 2016.<\/li>\r\n \t<li>Hewu Li, Qian Wu, Ke Xu, Jiangping Wu, Zengyin Yang, Zhuo Jiang, Liang Zhu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/hewu_str16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Progress and tendency of space and earth integrated network<\/a>\u201d,\u00a0<em>Science &amp; Technology Review<\/em>\u00a0(in Chinese), vol.34, no. 14, pp.95-106, 2016.<\/li>\r\n \t<li>Jianhua Tao, Ruiting Liu, Ke Xu, Weili Han, Huaping Zhang, Jian Yu, Feng Tian, Xiaohui Liang. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/jianhua_str16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A brief history of computer development in China<\/a>\u201d,\u00a0<em>Science &amp; Technology Review<\/em>\u00a0(in Chinese), vol.34, no. 14, pp.12-21,\u00a02016.<\/li>\r\n \t<li>Guodong Zhao, Ke Xu, Lei Xu, Bo Wu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/guodong_access15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis<\/a>\u201d,\u00a0<em>IEEE Access<\/em>, vol.3, pp.1132-1142, 2015.<\/li>\r\n \t<li>Ke Xu, Meng Shen, Wenlong Chen. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_ccfc15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Routing and Switching Paradigm for Construction of Secure and Trustworthy Networks<\/a>\u201d,\u00a0<em>CCCF<\/em>\u00a0(in Chinese), vol.11, no.1, 29-35, 2015.<\/li>\r\n \t<li>Yi Qu, Ke Xu, Jiangchuan Liu, Wenlong Chen, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_IoTJ14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Towards a Practical Energy Conservation Mechanism with Assistance of Resourceful Mules<\/a>\u201d,\u00a0<em>IEEE Internet of Things Journal<\/em>, 2014.<\/li>\r\n \t<li>Rashid Mijumbi, Juan-Luis Gorricho, Joan Serrat, Meng Shen, Ke Xu, Kun Yang, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/rashid_esa15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Neuro-fuzzy Approach to Self-management of Virtual Resources<\/a>\u201d,\u00a0<em>Elsevier Expert System with Applications<\/em>, 42(2015):1376-1390, 2014.<\/li>\r\n \t<li>Ke Xu, Yifeng Zhong, Huan He, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_tpds14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Can P2P Technology Benefit Eyeball ISPs A Cooperative Profit<\/a>\u201d,\u00a0<em><em>IEEE Transactions on\u00a0<\/em>Parallel and Distributed Systems (TPDS)<\/em>, 25(11): 2783-2793, 2014.<\/li>\r\n \t<li>Ke Xu, Meng Shen, Yong Cui, Mingjiang Ye, Yifeng Zhong, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_tpds14_.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices<\/a>\u201d,\u00a0<em><em>IEEE Transactions on\u00a0<\/em>Parallel and Distributed Systems (TPDS)<\/em>, 25(5): 1101-1111, 2014.<\/li>\r\n \t<li>Ke Xu, Haiyang Wang, Jiangchuan Liu, Song Lin, Lei Xu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_tnsm14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Pushing Server Bandwidth Consumption to the Limit: Modeling and Analysis of Peer-assisted VoD<\/a>\u201d,\u00a0\u00a0<em>IEEE Transactions on Network and Service Management (TNSM)<\/em>, 2014.<\/li>\r\n \t<li>Wei Tan, Ke Xu, Dan Wang, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/wei_IoTJ14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">An anti-tracking source-location privacy protection protocol in WSNs based on path extension<\/a>\u201d,\u00a0<em>IEEE Internet of Things Journal<\/em>, 1(5): 461-471, 2014.<\/li>\r\n \t<li>Chang Ge, Zhili Sun, Ning Wang, Ke Xu, Jinsong Wu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/chang_tnsm14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Energy management in cross-domain content delivery networks: a theoretical perspective<\/a>\u201d,\u00a0<em>IEEE Transactions on Network and Service Management (TNSM)<\/em>, 11(3): 264-277, 2014.<\/li>\r\n \t<li>Sai Zhang,\u00a0Ke Xu,\u00a0Xi Chen,\u00a0Xue Liu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/sai_arxiv14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Dynamics of Information Spreading in Online Social Network<\/a>\u201d, arXiv:1404.5562, 2014.<\/li>\r\n \t<li>Jiangchuan Liu, Ke Xu, Yongqiang Xiong, Dongchao Ma, Kai Shuang, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/jiangchuan_p2pna14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Peer-to-peer as an infrastructure service<\/a>\u201d,\u00a0<em>Peer-to-Peer Networking and Applications<\/em><em>\u00a0(PPNA)<\/em>, 2014.<\/li>\r\n \t<li>Ke Xu, Xin Liu, Zhen Ma, Yifeng Zhong, Wenlong Chen, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_p2pna14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Exploring the policy selection of the P2P VoD system: A simulation-based research<\/a>\u201d,<em>\u00a0<\/em><em>Peer-to-Peer Networking and Applications (PPNA)<\/em>, 2014.<\/li>\r\n \t<li>Ke Xu, Min Zhu, Guangwu Hu, Liang Zhu, Yifeng\u00a0Zhong, Ying\u00a0Liu, Jianping\u00a0Wu, Ning\u00a0Wang, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_scis14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Towards Evolvable Internet Architecture-Design Constraints and Models Analysis<\/a>\u201d,\u00a0<em>Science China<\/em>, 2014.<\/li>\r\n \t<li>Haiyang Wang, Feng Wang, Jiangchuan Liu, Chuang Lin, Ke Xu, and Chonggang Wang, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haiyang_jsac13.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Accelerating Peer-to-Peer File Sharing with Social Relations<\/a>\u201d,\u00a0<em>IEEE Journal on\u00a0Selected Areas in Communications (JSAC)<\/em>, 2013, 31(9): 66-74.<\/li>\r\n \t<li>Ying Liu, Jianping Wu, Qian Wu, Ke Xu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ying_ptrs13.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Recent progress in the study of the next generation Internet in China<\/a>\u201d,\u00a0<em>Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Science<\/em>, 2013, 371(1987): 20120387.<\/li>\r\n \t<li>Zhen Ma, Ke Xu, Jiangchuan Liu, Haiyang Wang, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/zhen_cn12.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Measurement, modeling and enhancement of BitTorrent-based VoD system<\/a>\u201d,\u00a0<em>Computer Networks,<\/em>\u00a02012, 56: 1103\u20131117.<\/li>\r\n \t<li>Huan He, Ke Xu, Ying Liu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/huan_ns12.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Internet resource pricing models, mechanisms, and methods<\/a>\u201d,\u00a0<em>Networking Science,<\/em>\u00a02012, 1(1-4): 48-66.<\/li>\r\n \t<li>Yan Huang, Ke Xu,\u00a0Haitao Li, Yang Cao, Xin Yao, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yan_scis11.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Large-scale P2PVOD system: Focusing on clients<\/a>\u201d,\u00a0<em>SCIENCE CHINA INFORMATION SCIENCES,<\/em>\u00a02011, 54(8):1677-1690.<\/li>\r\n \t<li>Ke Xu, Hongying Liu, Jiangchuan Liu, Jixiu Zhang, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_tpds11.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">LBMP: A Logarithm-Barrier-based Multipath Protocol for Internet Traffic Management<\/a>\u201d,\u00a0<em>IEEE Transactions on Parallel and Distributed Systems (TPDS),<\/em>\u00a02011, 22(3): 476-488.<\/li>\r\n \t<li>Dan Li, Jianping Wu, Jiangchuan Liu, Yong Cui, Ke Xu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/dan_ton11.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Defending Against Distance Cheating in Link-Weighted Application-Layer Multicast<\/a>\u201d,\u00a0<em>IEEE\/ACM Transactions on Networking (TON),<\/em>\u00a02011, 19(5):1448-1457.<\/li>\r\n \t<li>Ke Xu, Ming Zhang, Jiangchuan Liu, Zhijing Qin, Mingjiang Ye, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_cn10.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Proxy Caching for Peer-to-Peer Live Streaming<\/a>\u201d,\u00a0<em>Computer Networks,<\/em>\u00a02010, 54(7):1229-1241.<\/li>\r\n \t<li>Haiyang Wang, Jiangchuan Liu, Ke Xu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haiyang_p2pna10.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Measurement and Enhancement of BitTorrent-based Video File Swarming<\/a>\u201d,\u00a0<em>Peer-to-Peer Networking and Applications (PPNA)<\/em>, 2010, 3(3): 237-253.<\/li>\r\n \t<li>Ke Xu, Ming Zhang, Mingjiang Ye, Dah Ming Chiu, Jianping Wu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_cc10.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Identify P2P Traffic by Inspecting Data Transfer Behavior<\/a>\u201d,\u00a0<em>Computer Communications,<\/em>\u00a02010, 33(10):1141-1150.<\/li>\r\n \t<li>Taoyu Li, Yuncheng Zhu, Ke Xu, Maoke Chen, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/taoyu_cc09.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Performance Model and Evaluation on Geographic-based Routing<\/a>\u201d,\u00a0<em>Computer Communications<\/em>, 2009, 32(2): 343-348.<\/li>\r\n \t<li>Ke Xu, Mingwei Xu, Qi Li, Song Lin, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_scis08.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Analysis and Case Study on Multi-dimensional Scalability of the Internet Architecture<\/a>\u201d,\u00a0<em>Science in China Series F: Information Sciences,<\/em>\u00a02008, 51(11):1661-1680.<\/li>\r\n \t<li>Ke Xu, Huan He, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_jcupt08.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">BGP Parallel Computing Model Based on the Iteration Tree<\/a>\u201d,\u00a0<em>The Journal of China, Universities of Posts and Telecommunications,<\/em>\u00a015(Suppl.): 1\u20138, 2008.<\/li>\r\n \t<li>Suogang Li, Ke Xu, Ying Liu, Jianping Wu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/suogang_jhsn08.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Edge Overlay Multicast to Support Comparable Multi-class Services<\/a>\u201d,\u00a0<em>Journal of High Speed Networks,\u00a0<\/em>2008,\u00a017(1):13-36.<\/li>\r\n \t<li>Chunyu Liu, Ke Xu,\u00a0\u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/chunyu_jcn07.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Framework for End-to-End Optimal Traffic Control Law Based on Overlay Mesh<\/a>\u201d,\u00a0<em>Journal of Communications and Networks,<\/em>\u00a02007, 9(4): 428-437.<\/li>\r\n \t<li>Lijun Wang, Jianping Wu, Ke Xu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/lijun_cc07.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Modified Flap Damping Mechanism to Improve Inter-domain Routing Convergence<\/a>\u201d,\u00a0<em>Computer Communications<\/em>, 2007, 30(7): 1588-1599.<\/li>\r\n \t<li>Jianping Wu, Ke Xu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/jianping_jcst06.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Research on\u00a0Next-generation Internet Architecture<\/a>\u201d,\u00a0<em>Journal of Computer Science and Technology,<\/em>\u00a021 (5): 723-731, 2006.<\/li>\r\n<\/ul>\r\n<ul>\r\n \t<li>\u5f90\u606a, \u4ed8\u677e\u6d9b, \u674e\u7426, \u5218\u51b0\u6d0b, \u6c5f\u4f1f\u7389, \u5434\u6ce2, \u51af\u5b66\u4f1f. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_computer20_1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u4e92\u8054\u7f51\u5185\u751f\u5b89\u5168\u4f53\u7cfb\u7ed3\u6784\u7814\u7a76\u8fdb\u5c55<\/a>\u201d,<em>\u8ba1\u7b97\u673a\u5b66\u62a5<\/em>, 2020.<\/li>\r\n \t<li>\u6c88\u8499, \u5f20\u6770, \u795d\u70c8\u714c, \u5f90\u606a, \u5f20\u5f00\u7fd4, \u5510\u6e58\u4e91. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_computer20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u9762\u5411\u5f81\u4fe1\u6570\u636e\u5b89\u5168\u5171\u4eab\u7684SVM\u8bad\u7ec3\u673a\u5236<\/a>\u201d,\u00a0<em>\u8ba1\u7b97\u673a\u5b66\u62a5<\/em>, 2020.<\/li>\r\n \t<li>\u675c\u946b\u4e50, \u5f90\u606a, \u674e\u5f64, \u90d1\u51ef, \u4ed8\u677e\u6d9b, \u6c88\u8499. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xinle_computer20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u6570\u636e\u4e2d\u5fc3\u7f51\u7edc\u7684\u6d41\u91cf\u63a7\u5236: \u7814\u7a76\u73b0\u72b6\u4e0e\u8d8b\u52bf<\/a>\u201d,\u00a0<em>\u8ba1\u7b97\u673a\u5b66\u62a5<\/em>, 2020, 43(17): 1-23.<\/li>\r\n \t<li>\u5f90\u606a, \u51cc\u601d\u901a, \u674e\u7426, \u5434\u6ce2, \u6c88\u8499, \u5f20\u667a\u8d85, \u59da\u82cf, \u5218\u6615, \u674e\u7433. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_computer20_2.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u57fa\u4e8e\u533a\u5757\u94fe\u7684\u7f51\u7edc\u5b89\u5168\u4f53\u7cfb\u7ed3\u6784\u4e0e\u5173\u952e\u6280\u672f\u7814\u7a76\u8fdb\u5c55<\/a>\u201d,\u00a0<em>\u8ba1\u7b97\u673a\u5b66\u62a5<\/em>, 2020, 43(15): 1-30.<\/li>\r\n \t<li>\u845b\u5fd7\u8bda, \u5f90\u606a, \u9648\u9753, \u674e\u5f64, \u59da\u9f99, \u6c88\u8499.\u00a0\u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/zhicheng_cjc18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u4e00\u79cd\u79fb\u52a8\u5185\u5bb9\u5206\u53d1\u7f51\u7edc\u7684\u5206\u5c42\u534f\u540c\u7f13\u5b58\u673a\u5236<\/a>\u201d,\u00a0<em>\u8ba1\u7b97\u673a\u5b66\u62a5<\/em>, 2018, 41(12): 2769-2786.<\/li>\r\n \t<li>\u5f90\u78ca, \u5f90\u606a. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/lei_jtu18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u8303\u5f0f\u8def\u7531\u5668: \u89c4\u8303\u8def\u7531\u5668\u6570\u636e\u5c42\u7684\u52a8\u6001\u884c\u4e3a<\/a>\u201d,\u00a0<em>\u6e05\u534e\u5927\u5b66\u5b66\u62a5\uff08\u81ea\u7136\u79d1\u5b66\u7248\uff09<\/em>, 2018, 58(8): 693-697.<\/li>\r\n \t<li>\u5f90\u606a, \u5434\u6ce2, \u6c88\u8499. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_zte18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u533a\u5757\u94fe: \u63cf\u7ed8\u7269\u8054\u7f51\u5b89\u5168\u65b0\u613f\u666f<\/a>\u201d,\u00a0<em>\u4e2d\u5174\u901a\u8baf\u6280\u672f<\/em>, 2018, 24(6): 52-55.<\/li>\r\n \t<li>\u6731\u4eae, \u5f90\u606a, \u51af\u6885. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/liang_aes18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u4e92\u8054\u7f51\u52a8\u6001\u5730\u5740\u547d\u540d\u4e0e\u89e3\u6790\u670d\u52a1<\/a>\u201d,\u00a0<em>\u7535\u5b50\u5b66\u62a5<\/em>, 2018, 46(5): 1089-1094.<\/li>\r\n \t<li>\u82cf\u8f89, \u8c2d\u5d0e, \u8d75\u4e59, \u5f90\u606a. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/hui_jtu18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u79fb\u52a8\u8865\u8d34\u5e02\u573a\u8fd0\u8425\u5546\u5b9a\u4ef7\u7b56\u7565\u4e0e\u6536\u76ca\u5206\u914d<\/a>\u201d,\u00a0<em>\u6e05\u534e\u5b66\u62a5\uff08\u81ea\u7136\u79d1\u5b66\u7248\uff09<\/em>, 2018, 58(1): 8-13.<\/li>\r\n \t<li>\u738b\u6653\u4eae, \u5f90\u606a, \u6768\u94ee, \u845b\u5fd7\u8bda. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xiaoliang_cjc17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">TinyLoc: \u4e00\u79cd\u9762\u5411\u80fd\u8017\u53d7\u9650\u7684\u53ef\u7a7f\u6234\u8bbe\u5907\u7684\u5ba4\u5185\u5b9a\u4f4d\u7b97\u6cd5<\/a>\u201d,\u00a0<em>\u8ba1\u7b97\u673a\u5b66\u62a5<\/em>, 2017, 40(8): 1813-1828.<\/li>\r\n \t<li>\u6bdb\u535a, \u5f90\u606a, \u91d1\u8dc3\u8f89, \u738b\u6653\u4eae. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/bo_cjc17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">DeepHome: \u4e00\u79cd\u57fa\u4e8e\u6df1\u5ea6\u5b66\u4e60\u7684\u667a\u80fd\u5bb6\u5c45\u7ba1\u63a7\u6a21\u578b<\/a>\u201d,\u00a0<em>\u8ba1\u7b97\u673a\u5b66\u62a5<\/em>, 2017,40(8): 1-15.\u200b<\/li>\r\n \t<li>\u5f90\u606a, \u8d75\u7389\u4e1c, \u9648\u6587\u9f99, \u6c88\u8499. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_cjc17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u9632\u5fa1\u6570\u636e\u7a83\u542c\u653b\u51fb\u7684\u8def\u7531\u4ea4\u6362\u8303\u5f0f\u4f53\u7cfb<\/a>\u201d,\u00a0<em>\u8ba1\u7b97\u673a\u5b66\u62a5<\/em>, 2017, 40(7): 1649-1663.<\/li>\r\n \t<li>\u5f20\u6b23\u6b23, \u5f90\u606a, \u949f\u5b9c\u5cf0, \u82cf\u8f89. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xinxin_jzu17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u7f51\u7edc\u670d\u52a1\u63d0\u4f9b\u5546\u5408\u4f5c\u884c\u4e3a\u7684\u6f14\u5316\u535a\u5f08\u5206\u6790<\/a>\u201d,\u00a0<em>\u6d59\u6c5f\u5927\u5b66\u5b66\u62a5\uff08\u5de5\u5b66\u7248\uff09<\/em>, 2017, 51(6): 1214-1224.<\/li>\r\n \t<li>\u6731\u4eae, \u5f90\u606a, \u5f90\u78ca. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/liang_jcrd17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u4e00\u79cd\u5f62\u5f0f\u5316\u7684\u4e92\u8054\u7f51\u5730\u5740\u673a\u5236\u901a\u7528\u6846\u67b6<\/a>\u201d,\u00a0<em>\u8ba1\u7b97\u673a\u7814\u7a76\u4e0e\u53d1\u5c55<\/em>, 2017, 54(5): 940-951.<\/li>\r\n \t<li>\u200b\u6731\u4eae, \u5f90\u606a. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/liang_jxju17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u4e92\u8054\u7f51\u901a\u7528\u5730\u5740\u4f53\u7cfb\u6846\u67b6<\/a>\u201d,\u00a0<em>\u897f\u5b89\u4ea4\u901a\u5927\u5b66\u5b66\u62a5<\/em>,\u00a0 2017, 51(2): 6-12.<\/li>\r\n \t<li><span style=\"font-size: medium;\">\u82cf\u8f89, \u5f90\u606a, \u6c88\u8499, \u738b\u52c7, \u949f\u5b9c\u5cf0, \u674e\u5f64. <a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/%E4%BA%92%E8%81%94%E7%BD%91%E6%B5%81%E9%87%8F%E8%A1%A5%E8%B4%B4%E6%A8%A1%E5%9E%8B%E7%A0%94%E7%A9%B6%E4%B8%8E%E5%AE%9E%E4%BE%8B%E5%88%86%E6%9E%90.pdf\">\u4e92\u8054\u7f51\u6d41\u91cf\u8865\u8d34\u6a21\u578b\u7814\u7a76\u4e0e\u5b9e\u4f8b\u5206\u6790<\/a>. \u8ba1\u7b97\u673a\u7814\u7a76\u4e0e\u53d1\u5c55, 2016, 53(4): 861-872.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium;\">\u5f90\u606a, \u6731\u654f, \u6c88\u8499. <a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/%E9%9D%A2%E5%90%91%E5%BA%94%E7%94%A8%E7%9A%84%E5%8F%AF%E6%BC%94%E8%BF%9B%E4%BA%92%E8%81%94%E7%BD%91%E4%BD%93%E7%B3%BB%E7%BB%93%E6%9E%84.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u9762\u5411\u5e94\u7528\u7684\u53ef\u6f14\u8fdb\u4e92\u8054\u7f51\u4f53\u7cfb\u7ed3\u6784<\/a>. \u4e2d\u56fd\u8ba1\u7b97\u673a\u5b66\u4f1a\u901a\u8baf, 2015, 11(6): 37-42.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium;\">\u5f90\u606a, \u6731\u4eae, \u6731\u654f.\u00a0<a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/zhuliang.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u4e92\u8054\u7f51\u5730\u5740\u5b89\u5168\u4f53\u7cfb\u4e0e\u5173\u952e\u6280\u672f<\/a>. \u8f6f\u4ef6\u5b66\u62a5, 2014, 25(1):78\u221297.\u00a0<\/span><\/li>\r\n \t<li><span style=\"font-size: medium;\">\u5f90\u606a, \u5f20\u8d5b, \u9648\u660a, \u7b49.\u00a0<a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/zhangsai.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u5728\u7ebf\u793e\u4f1a\u7f51\u7edc\u7684\u6d4b\u91cf\u4e0e\u5206\u6790<\/a>. \u8ba1\u7b97\u673a\u5b66\u62a5, 2014, 37(1).<\/span><\/li>\r\n \t<li><span style=\"font-size: medium;\">\u6731\u654f, \u5f90\u606a, \u6797\u5d69.\u00a0<a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/zhumin1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u9762\u5411\u5e94\u7528\u9002\u5e94\u80fd\u529b\u7684\u4e92\u8054\u7f51\u4f53\u7cfb\u7ed3\u6784\u8bc4\u4f30\u65b9\u6cd5<\/a>. \u8ba1\u7b97\u673a\u5b66\u62a5, 2013, 36(9): 1785-1798.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium;\">\u5f20\u6625\u71d5, \u5f90\u606a, \u949f\u5b9c\u5cf0, \u7b49.\u00a0<a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/zhangchunyan.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u591a\u63a5\u53e3\u79fb\u52a8\u4e3b\u673a\u7528\u6237\u4e0e\u7f51\u7edc\u670d\u52a1\u63d0\u4f9b\u5546\u95f4\u7684\u52a8\u6001\u535a\u5f08\u8fc7\u7a0b\u5206\u6790\u4e0e\u6c42\u89e3<\/a>. \u8ba1\u7b97\u673a\u5b66\u62a5, 2013, 36(7).<\/span><\/li>\r\n \t<li><span style=\"font-size: medium;\">\u5f90\u606a, \u6797\u5d69, \u5434\u5efa\u5e73.\u00a0<a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/linsong.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u57fa\u4e8e\u7528\u6237\u6548\u7528\u7684\u4e09\u7f51\u878d\u5408\u6f14\u5316\u6a21\u578b\u4e0e\u5206\u6790<\/a>. \u8ba1\u7b97\u673a\u5b66\u62a5, 2013, 36(5): 9039-9039.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium;\">\u5e08\u96ea\u9716, \u5f90\u606a.\u00a0<a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/shixuelin.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u4e91\u865a\u62df\u673a\u8d44\u6e90\u5206\u914d\u7684\u6548\u7528\u6700\u5927\u5316\u6a21\u578b<\/a>. \u8ba1\u7b97\u673a\u5b66\u62a5, 2013, 36(2): 252-262.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium;\">\u5b9b\u8003, \u7f57\u96ea\u5cf0, \u6c5f\u52c7, \u5f90\u606a. <a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/wk-201665122158.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u8f6f\u4ef6\u5b9a\u4e49\u7f51\u7edc\u4e2d\u9762\u5411\u6d41\u7684\u8c03\u5ea6\u7b97\u6cd5<\/a>. \u8ba1\u7b97\u673a\u5b66\u62a5, 2012, 35(10): 1985-1985.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium;\">\u5f90\u606a, \u6731\u654f, \u6797\u95ef.\u00a0<a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/zhumin2.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u4e92\u8054\u7f51\u4f53\u7cfb\u7ed3\u6784\u8bc4\u4f30\u6a21\u578b, \u673a\u5236\u53ca\u65b9\u6cd5\u7814\u7a76\u7efc\u8ff0<\/a>. \u8ba1\u7b97\u673a\u5b66\u62a5, 2012, 35(10): 1985-1985.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium;\">\u9648\u6587\u9f99, \u5f90\u660e\u4f1f, \u5f90\u606a.\u00a0<a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/cwl.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u53ef\u91cd\u6784\u96c6\u7fa4\u8def\u7531\u5668\u5e76\u884c\u8def\u7531\u5206\u53d1\u6a21\u578b<\/a>. \u901a\u4fe1\u5b66\u62a5, 2012, 33(6): 118-124.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium;\">\u5434\u5efa\u5e73, \u6797\u5d69, \u5f90\u606a, \u7b49.\u00a0<a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/wjp.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u53ef\u6f14\u8fdb\u7684\u65b0\u4e00\u4ee3\u4e92\u8054\u7f51\u4f53\u7cfb\u7ed3\u6784\u7814\u7a76\u8fdb\u5c55<\/a>. \u8ba1\u7b97\u673a\u5b66\u62a5, 2012, 35(6): 1094-1108.<\/span><\/li>\r\n<\/ul>\r\n<\/div>\r\n<div class=\"paragraph\" style=\"text-align: justify;\">\r\n\r\n<span style=\"font-size: medium;\"><strong>2. \u90e8\u5206\u5b66\u672f\u4f1a\u8bae\u8bba\u6587<\/strong><\/span><span style=\"color: #777777; font-size: medium;\"><strong>\uff08<\/strong><\/span><span style=\"color: #777777;\">\u5b8c\u6574\u5217\u8868\u8bf7\u70b9\u51fb<\/span><u style=\"color: #777777;\"><a href=\"\/publications.html\">\u8fd9\u91cc<\/a><\/u><span style=\"color: #777777; font-size: medium;\"><strong>\uff09<\/strong><\/span>\r\n<ul>\r\n \t<li>Chuanpu Fu, Qi Li, Meng Shen, Ke Xu. \u201cRealtime Robust Malicious Traffic Detection via Frequency Domain Analysis\u201d,\u00a0<em>ACM CCS<\/em>, 2021.<\/li>\r\n \t<li>Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, Ke Xu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xuewei_ccs20.pdf\">Off-Path TCP Exploits of the Mixed IPID Assignment<\/a>\u201d,\u00a0<em>ACM CCS<\/em>, 2020. (Distinguished Paper Award Nomination)<\/li>\r\n \t<li>Tong Li, Kai Zheng, Ke Xu, Rahul Arvind Jadhav, Tao Xiong, Keith Winstein, Kun Tan.\u00a0\u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/tong_sigcomm20.pdf\">TACK: Improving Wireless Transport Performance by Taming Acknowledgments<\/a>\u201d,\u00a0<em>ACM SIGCOMM<\/em>, 2020.<\/li>\r\n \t<li>Meng Shen,\u00a0Jinpeng Zhang, Ke Xu, Liehuang Zhu, Jiangchuan Liu, Xiaojiang Du.\u00a0\u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_iwqos20.pdf\">DeepQoE: Real-time Measurement of Video QoE from Encrypted Traffic with Deep Learning<\/a>\u201d,\u00a0<em>IEEE\/ACM IWQoS<\/em>, 2020.<\/li>\r\n \t<li>Fan Yang, Ke Xu, Qi Li, Rongxing Lu, Bo Wu, Tong Zhang, Yi Zhao, Meng Shen.\u00a0\u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/fan_iwqos20.pdf\">I Know If the Journey Changes: Flexible Source and Path Validation<\/a>\u201d,\u00a0<em>IEEE\/ACM IWQoS<\/em>, 2020.<\/li>\r\n \t<li>Yi Zhao, Ke Xu, Feng Yan, Yuchao Zhang, Yao Fu, Haiyang Wang. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_icc20.pdf\">Auction-based High Timeliness Data Pricing under Mobile and Wireless Networks<\/a>\u201d,\u00a0<em>IEEE ICC<\/em>, 2020.<\/li>\r\n \t<li>Yi Zhao, Wei Bao, Dan Wang, Ke Xu, Liang Lv. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_infocom20.pdf\">Connection-based Pricing for IoT Devices: Motivation, Comparison, and Potential Problems<\/a>\u201c,<em>\u00a0IEEE INFOCOM poster<\/em>, 2020.<\/li>\r\n \t<li>Liang Lv, Ke Xu, Haiyang Wang, Meng Shen, Yi Zhao, Minghui Li, Guanhui Geng, Zhichao Liu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/liang_infocom20.pdf\">Analysis, Modeling, and Implementation of Publisher-side Ad Request Filtering<\/a>\u201d,\u00a0<em>IEEE INFOCOM<\/em>, 2020.<\/li>\r\n \t<li>Meng Shen, Zelin Liao, Liehuang Zhu, Ke Xu, Xiaojiang Du. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_ubicomp19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">VLA: A Practical Visible Light-based Attack on Face Recognition Systems in Physical World<\/a>\u201d,\u00a0<em>ACM UbiComp<\/em>, 2019.<\/li>\r\n \t<li>Wenbin Yao, Ke Xu, Qi Li. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/wenbin_iscc19.pdf\">Exploring the Influence of News Articles on Bitcoin Price with Machine Learning<\/a>\u201d,\u00a0<em>IEEE ISCC<\/em>, 2019.<\/li>\r\n \t<li>Yi Zhao, Hui Su, Liang Zhang, Dan Wang, Ke Xu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_jsac20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Variety Matters: A New Model for the Wireless Data Market under Sponsored Data Plans<\/a>\u201d,\u00a0<em>IEEE\/ACM IWQoS<\/em>, 2019.<\/li>\r\n \t<li>Meng Shen, Jinpeng Zhang, Liehuang Zhu, Ke Xu, Xiaojiang Du, Yiting Liu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_iwqos19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Encrypted Traffic Classification of Decentralized Applications on Ethereum using Feature Fusion<\/a>\u201d,\u00a0<em>IEEE\/ACM IWQoS<\/em>, 2019.<\/li>\r\n \t<li>Shu Yang, Ziteng Chen, Laizhong Cui, Mingwei Xu, Zhongxing Ming, Ke Xu.\u00a0\u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/shuyang_blockchain19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">CoDAG: An Efficient and Compacted DAG-Based Blockchain Protocol<\/a>\u201d,\u00a0<em>IEEE Blockchain<\/em>, 2019.<\/li>\r\n \t<li>Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Zhichao Zhang, Xinle Du, Bingyang Liu, Shoushou Ren.\u00a0\u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/bo_icdcs19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection<\/a>\u201d,\u00a0<em>IEEE ICDCS<\/em>, 2019.<\/li>\r\n \t<li>Yi Zhao, Meina Qiao, Haiyang Wang, Rui Zhang, Dan Wang, Ke Xu, Qi Tan. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_infocom19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">TDFI: Two-stage Deep Learning Framework for Friendship Inference via Multi-source Information<\/a>\u201d,\u00a0<em>IEEE INFOCOM<\/em>, 2019.<\/li>\r\n \t<li>Bo Wu, Qi Li, Ke Xu, Ruoyu Li, Zhuotao Liu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/bo_mass18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">SmartRetro: Blockchain-based Incentives for Distributed IoT Retrospective Detection<\/a>\u201d,\u00a0<em>IEEE MASS,<\/em>\u00a02018. (Invited Paper)<\/li>\r\n \t<li>\u200bSuiming Guo, Chao Chen, Jingyuan Wang, Yaxiao Liu, Ke Xu, Daqing Zhang, Dah Ming Chiu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/suiming_ubicomp18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Simple but Quantifiable Approach to Dynamic Price Prediction in Ride-on-demand Services Leveraging Multi-source Urban Data<\/a>\u201d,\u00a0<em>ACM UbiComp<\/em>, 2018.<\/li>\r\n \t<li>Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Martin J. Reed, Meng Shen, Fan Yang. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/bo_iwqos18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Enabling Efficient Source and Path Verification via Probabilistic Packet Marking<\/a>\u201d,\u00a0<em>IEEE\/ACM IWQoS<\/em>, 2018.<\/li>\r\n \t<li>Li Li, Ke Xu, Tong Li, Kai Zheng, Chunyi Peng, Dan Wang, Xiangxiang Wang, Meng Shen, Rashid Mijumbi. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/li_sigcomm18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Measurement Study on Multi-path TCP with Multiple Cellular Carriers on High-speed Rails<\/a>\u201d,\u00a0<em>ACM SIGCOMM<\/em>, 2018.<\/li>\r\n \t<li>Yuchao Zhang, Junchen Jiang, Ke Xu, Xiaohui Nie, Martin J Reed, Haiyang Wang, Guang Yao, Miao Zhang, Kai Chen. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_eurosys18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">BDS: a centralized near-optimal overlay network for inter-datacenter data replication<\/a>\u201d,\u00a0<em>ACM\u00a0<\/em><em>EuroSys<\/em>, 2018.<\/li>\r\n \t<li>Suiming Guo, Chao Chen, Yaxiao Liu, Ke Xu, Dah Ming Chiu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/suiming_ubicomp18_.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Modelling Passengers\u2019 Reaction to Dynamic Prices in Ride-on-demand Services: A Search for the Best Fare<\/a>\u201d,\u00a0<em>ACM UbiComp,<\/em>\u00a02018.<\/li>\r\n \t<li>Bo Wu, Ke Xu, Qi Li, Fang Yang. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/bo_ipccc17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Robust and Lightweight Fault Localization<\/a>\u201d,<em>\u00a0IEEE IPCCC<\/em>, 2017.\u00a0(Best Paper Candidate)\u200b<\/li>\r\n \t<li>Lei Xu, Ke Xu, Meng Shen, Kui Ren, Jingyuan Fan, Chaowen Guan, Wen-Long Chen. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/lei_turc17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">MINOS: regulating router dataplane actions in dynamic runtime environments<\/a>\u201d,\u00a0Proceedings of the ACM Turing 50th Celebration Conference-China, 2017.<\/li>\r\n \t<li>Li Li, Ke Xu, Dan Wang, Chunyi Peng, Kai Zheng, Haiyang Wang, Rashid Mijumbi, Xiangxiang Wang. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/li_iwqos17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Measurement Study on Skype Voice and Video Calls in LTE Networks on High Speed Rails<\/a>\u201d,\u00a0<em>IEEE\/ACM\u00a0IWQoS,<\/em>\u00a02017.<\/li>\r\n \t<li>Yuchao Zhang, Yusen Li, Ke Xu, Dan Wang, Minghui Li, Xuan Cao and Qingqing Liang. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_icdcs17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Communication-aware Container Re-distribution Approach for High Performance VNFs<\/a>\u201d.\u00a0<em>IEEE ICDCS<\/em>,\u00a02017.<\/li>\r\n \t<li>Tong Li, Chathura Sarathchandra Magurawalage, Kezhi Wang, Ke Xu, Kun Yang, Haiyang Wang. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/tong_icdcs17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">On efficient offloading control in cloud radio access network with mobile edge computing<\/a>\u201d.\u00a0<em>IEEE ICDCS<\/em>,\u00a02017.<\/li>\r\n \t<li>Yuchao Zhang, Ke Xu, Guang Yao, Miao Zhang, Xiaohui Nie. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_sigcomm16.pdf\">PieBridge: A Cross-DR scale Large Data Transmission Scheduling System<\/a>\u201d,\u00a0<em>ACM SIGCOMM poster<\/em>, 2016.<\/li>\r\n \t<li>Qingfang Liu, Ke Xu, Haiyang Wang, Meng Shen, Li Li, Qingyang Xiao. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/qingfang_icdcs16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Measurement, Modeling, and Analysis of TCP in High-Speed Mobility Scenarios<\/a>\u201d,\u00a0<em>IEEE ICDCS<\/em>, 2016.<\/li>\r\n \t<li>Yuchao Zhang, Ke Xu, Xuelin Shi, Haiyang Wang, Jiangchuan Liu, Yong Wang. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_wcnc16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Continuous double auction for cloud market: Pricing and bidding analysis<\/a>\u201d,<em>\u00a0IEEE WCNC<\/em>, 2016.<\/li>\r\n \t<li>Tong Li, Ke Xu, Meng Shen, Haiyang Wang, Kun Yang, Yuchao Zhang. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/tong_icccn16.pdf\">Towards Minimal Tardiness of Data-intensive Applications in Heterogeneous Networks<\/a>\u201d,\u00a0<em>IEEE ICCCN<\/em>, 2016.<\/li>\r\n \t<li>Lei Zhang, Cong Zhang, Jiangchuan Liu, Xiaowen Chu, Ke Xu, Haiyang Wang, Yong Jiang. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/lei_icccn16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Power-Aware Wireless Transmission for Computation Offloading in Mobile Cloud<\/a>\u201d,\u00a0<em>IEEE ICCCN<\/em>, 2016.<\/li>\r\n \t<li>Qingfang Liu, Ke Xu, Haiyang Wang, Lei Xu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/qingfang_mswim15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Modeling Multi-path TCP Throughput with Coupled Congestion Control and Flow Control<\/a>\u201d,\u00a0<em>ACM MSWiM,\u00a0<\/em>2015.<\/li>\r\n \t<li>Yifeng Zhong, Ke Xu, Xiang-Yang Li, Hui Su, Qingyang Xiao. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yifeng_globecom15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">ESTRA: Incentivizing Storage Trading for Edge Caching in Mobile Content Delivery<\/a>\u201d,\u00a0<em>IEEE GLOBECOM,\u00a0<\/em>2015. (Best Paper Award)<\/li>\r\n \t<li>Yi Qu, Ke Xu, Haiyang Wang, Dan Wang, Bo Wu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_ipccc15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Lifetime Maximization in Rechargeable Wireless Sensor Networks with Charging Interference<\/a>\u201d,\u00a0<em>IEEE IPCCC<\/em>, 2015.<\/li>\r\n \t<li>Menghan Li, Dan Pei, Xiaoping Zhang, Beichuang Zhang, Ke Xu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/menghan_icccn15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">NDN Live Video Broadcasting over Wireless LAN<\/a>\u201d,\u00a0<em>IEEE ICCCN,\u00a0<\/em>2015.<\/li>\r\n \t<li>Meng Shen, Ke Xu, Fan Li, Kun Yang, Liehuang Zhu, Lei Guan, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_icpp15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Elastic and Efficient Virtual Network Provisioning for Cloud-Based Multi-Tier Applications<\/a>\u201d,\u00a0<em>IEEE ICPP,\u00a0<\/em>2015.<\/li>\r\n \t<li>Lei Xu, Ke Xu, Yong Jiang, Fengyuan Ren, Haiyang Wang, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/lei_iwqos15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Enhancing TCP Incast Congestion Control Over Large-scale Datacenter Networks<\/a>\u201d,\u00a0<em>IEEE\/ACM\u00a0IWQoS,\u00a0<\/em>2015.<\/li>\r\n \t<li>Yuchao Zhang, Ke Xu, Haiyang Wang, Jiangchuan Liu, Yifeng Zhong, Wenlong Chen, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_iwqos15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Performance and Incentive of Teamwork-based Channel Allocation in Spectrum Access Networks<\/a>\u201d,\u00a0<em>IEEE IWQoS,\u00a0<\/em>2015.<\/li>\r\n \t<li>Haitao Li, Yanfang Le, Feng Wang, Jiangchuan Liu, Ke Xu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haitao_cloud15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">SNACS: Social Network-Aware Cloud Assistance for Online Propagated Video Sharing<\/a>\u201d,\u00a0<em>IEEE CLOUD,\u00a0<\/em>2015.<\/li>\r\n \t<li>Li Li, Ke Xu, Dan Wang, Chunyi Peng, Qingyang Xiao, Rashid Mijumbi, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/li_infocom15.pdf\">A Measurement Study on the TCP Behaviors in HSPA+ Networks on High-speed Rails<\/a>\u201d,\u00a0<em>IEEE INFOCOM,<\/em>\u00a02015.<\/li>\r\n \t<li>Meng Shen, Lixin Gao, Ke Xu, Liehuang Zhu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_ipccc14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Achieving Bandwidth Guarantees in Multi-tenant Cloud Networks Using A Dual-Hose Model<\/a>\u201c,\u00a0<em>IEEE IPCCC<\/em>\u00a02014.<\/li>\r\n \t<li>Ke Xu, Yuchao Zhang, Xuelin Shi, Haiyang Wang, Yong Wang, Meng Shen, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_ipccc14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Online Combinatorial Double Auction for Mobile Cloud Computing Markets<\/a>\u201d,\u00a0<em>IEEE IPCCC<\/em>\u00a02014.<\/li>\r\n \t<li>Qingyang Xiao, Ke Xu, Dan Wang, Li Li, Yifeng Zhong, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/qingyang_icnp14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">TCP Performance over Mobile Networks in High-speed Mobility Scenarios<\/a>\u201d,\u00a0<em>IEEE ICNP<\/em>\u00a02014.<\/li>\r\n \t<li>Meng Shen, Ke Xu, Kun Yang, Hsiao-Hwa Chen, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_iwqos14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Towards Efficient Virtual Network Embedding Across Multiple Network Domains<\/a>\u201d,\u00a0<em>IEEE\/ACM\u00a0<\/em><em>IWQoS\u00a0<\/em>2014.<\/li>\r\n \t<li>Haiyang Wang, Jiangchuan Liu, Ke Xu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haiyang_icc14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">On Incentive of Customer-Provided Resource Sharing in Cloud<\/a>\u201c,<em>\u00a0IEEE ICC<\/em>\u00a02014.<\/li>\r\n \t<li>Haitao Li, Haiyang Wang, Jiangchuan Liu, Ke Xu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haitao_infocom13.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Video Requests from Online Social Networks: Characterization, Analysis and Generation<\/a>\u201d,\u00a0<em>IEEE INFOCOM 2013<\/em>.<\/li>\r\n \t<li>Haitao Li, Xiaoqiang Ma, Feng Wang, Jiangchuan Liu, Ke Xu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haitao_cikm13.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">On Popularity Prediction of Videos Shared in Online Social Networks<\/a>\u201d,\u00a0<em>ACM International Conference on Information &amp; Knowledge Management (CIKM)<\/em>, 2013: 169-178.<\/li>\r\n \t<li>Guangwu Hu, Ke Xu, Jianping Wu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/guangwu_hpcc13.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">SuperFlow: A Reliable, Controllable, Manageable and Scalable Architecture for Large-scale Enterprise Networks<\/a>\u201d,\u00a0<em>IEEE HPCC\u00a0<\/em>2013.<\/li>\r\n \t<li>Ke Xu, Min Zhu, Ning Wang, Song Lin, Haiyang Wang, Tong Li, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_iscc13.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">The 2ACT Model-based Evaluation for In-network Caching Mechanism<\/a>\u201d,\u00a0<em>The IEEE symposium on Computers and Communications (ISCC),<\/em>\u00a02013.<\/li>\r\n \t<li>Haitao Li, Haiyang Wang, Jiangchuan Liu, Ke Xu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haitao_nossdav12.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Video Sharing in Online Social Networks: Measurement and Analysis<\/a>\u201d,\u00a0<em>ACM NOSSDAV 2012<\/em>.<\/li>\r\n \t<li>Zhen Ma, Ke Xu, Yifeng Zhong, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/zhen_iwqos12.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Exploring the Policy Selection of P2P VoD System-A Simulation based Research<\/a>\u201d,\u00a0<em>IEEE\/ACM IWQoS<\/em>\u00a02012.<\/li>\r\n \t<li>Meng Shen, Hongying Liu, Ke Xu, Ning Wang, Yifeng Zhong, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_ifip12.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Routing on Demand: Toward the Energy-aware Traffic Engineering with OSPF<\/a>\u201c,\u00a0<em>IFIP\/TC6 Networking<\/em>, 2012: 232-246.<\/li>\r\n \t<li>Haiyang Wang, Feng Wang, Jiangchuan Liu, Ke Xu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haiyang_ifip12.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Enhancing Efficiency for Peer-to-Peer Traffic Locality: Measurement, Design and \u00a0Future Trends<\/a>\u201d,\u00a0<em>IFIP\/TC6 Networking<\/em>, 2012.<\/li>\r\n \t<li>Ke Xu, Hongying Liu, Jiangchuan Liu, Meng Shen,\u00a0\u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_icdcs11.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">One More Weight is Enough: Toward the Optimal Traffic Engineering with OSPF<\/a>\u201d,\u00a0<em>IEEE ICDCS<\/em>\u00a02011.<\/li>\r\n \t<li>Ke Xu, Meng Shen, Mingjiang Ye, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_infocom11.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Model Approach to Estimate Peer-to-Peer Traffic Matrices<\/a>\u201d,\u00a0<em>IEEE INFOCOM<\/em>\u00a02011.<\/li>\r\n \t<li>Ke Xu, Haitao Li, Jiangchuan Liu, Wei Zhu, Wenyu Wang, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_iwqos10.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PPVA: A Universal and Transparent Peer-to-Peer Accelerator for Interactive Online Video Sharing<\/a>\u201d,\u00a0<em>IEEE IWQoS<\/em>\u00a02010.<\/li>\r\n \t<li>Haiyang Wang, Jiangchuan Liu, Bo Chen, Ke Xu, Zhen Ma, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haiyang_p2p10.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">On Tracker Selection for Peer-to-Peer Traffic Locality<\/a>\u201d,\u00a0<em>IEEE P2P\u00a0<\/em>2010.<\/li>\r\n \t<li>Haitao Li, Ke Xu, James Seng, Po Hu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haitao_ipccc09.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Towards health of replication in large-scale P2P-VoD systems<\/a>\u201d,\u00a0<em>IEEE IPCCC<\/em>\u00a02009.<\/li>\r\n \t<li>Ke Xu, Xiaowei Ma, Chunyu Liu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_icc08.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Hash Tree Based Authentication Scheme in SIP Applications<\/a>\u201d,\u00a0<em>IEEE ICC<\/em>\u00a02008.<\/li>\r\n \t<li>Ke Xu, Minpeng Qi, Haitao Li, Peng Yang, Hui Deng, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_icc08_.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Novel Interfacing Solution to Make IKEv2 Work in MIPv6 Environment<\/a>\u201d,\u00a0<em>IEEE ICC<\/em>\u00a02008.<\/li>\r\n \t<li>Ke Xu, Yahui Yang, Tao Chen, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_euc08.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Improving BitTorrent Network\u2019s Performance via Deploying Helpers<\/a>\u201d,\u00a0<em>IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing (EUC),<\/em>\u00a02008.<\/li>\r\n \t<li>Ke Xu, Jiangchuang Liu, Lizheng Fu, Chunyu Liu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_lncs06.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">On the Stability of Application-layer Multicast Tree<\/a>\u201d,\u00a0<em>ISCIS 2006, LNCS 4263<\/em>\u00a02006.<\/li>\r\n \t<li><\/li>\r\n<\/ul>\r\n<\/div>\r\n<div class=\"paragraph\" style=\"text-align: left;\">\r\n\r\n<strong><span style=\"font-size: medium;\">3. \u6559\u6750\u548c\u4e13\u8457<\/span><\/strong>\r\n<ul>\r\n \t<li><span style=\"font-size: medium;\">Ke Xu, Yifeng Zhong, Huan He,\u00a0<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/internet_resource_pricing_models.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Internet Resource Pricing Models<\/a><\/span>[M]. Springer, 2013.<\/span><\/li>\r\n \t<li>\u5f90\u606a, \u5f90\u660e\u4f1f, \u674e\u7426. <span style=\"color: #3366ff;\">\u9ad8\u7ea7\u8ba1\u7b97\u673a\u7f51\u7edc\uff08\u7b2c2\u7248\uff09<\/span>[M]. \u6e05\u534e\u5927\u5b66\u51fa\u7248\u793e, 2021.<\/li>\r\n \t<li><span style=\"font-size: medium;\">\u5f90\u606a, \u674e\u6c81.\u00a0<span style=\"color: #3366ff;\">\u7b97\u6cd5\u7edf\u6cbb\u4e16\u754c \u667a\u80fd\u7ecf\u6d4e\u7684\u9690\u5f62\u79e9\u5e8f<\/span><\/span><span style=\"font-size: medium;\">[M]. \u6e05\u534e\u5927\u5b66\u51fa\u7248\u793e, 2017.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium;\">\u5f90\u606a,\u00a0\u738b\u52c7, \u674e\u6c81.\u00a0<span style=\"color: #3366ff;\">\u8d5b\u535a\u65b0\u7ecf\u6d4e\uff1a\u201c\u4e92\u8054\u7f51+\u201d\u7684\u65b0\u7ecf\u6d4e\u65f6\u4ee3<\/span>[M]. \u6e05\u534e\u5927\u5b66\u51fa\u7248\u793e, 2016.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium;\">\u5f90\u606a, \u4efb\u4e30\u539f, \u5218\u7ea2\u82f1.\u00a0<span style=\"color: #3366ff;\">\u8ba1\u7b97\u673a\u7f51\u7edc\u4f53\u7cfb\u7ed3\u6784-\u8bbe\u8ba1\uff0c\u5efa\u6a21\uff0c\u5206\u6790\u4e0e\u4f18\u5316<\/span>[M].\u00a0\u6e05\u534e\u5927\u5b66\u51fa\u7248\u793e, 2014.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium;\">\u5f90\u606a, \u5f90\u660e\u4f1f, \u9648\u6587\u9f99, \u7b49.\u00a0<span style=\"color: #3366ff;\">\u9ad8\u7ea7\u8ba1\u7b97\u673a\u7f51\u7edc<\/span>[M]. \u6e05\u534e\u5927\u5b66\u51fa\u7248\u793e, 2012.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium;\">\u5f90\u606a, \u5434\u5efa\u5e73, \u5f90\u660e\u4f1f.\u00a0<span style=\"color: #3366ff;\">\u9ad8\u7b49\u8ba1\u7b97\u673a\u7f51\u7edc: \u4f53\u7cfb\u7ed3\u6784, \u534f\u8bae\u673a\u5236, \u7b97\u6cd5\u8bbe\u8ba1\u4e0e\u8def\u7531\u5668\u6280\u672f\uff08\u7b2c2\u7248\uff09<\/span>[M]. \u673a\u68b0\u5de5\u4e1a\u51fa\u7248\u793e, 2009.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium;\">\u5f90\u606a, \u5434\u5efa\u5e73, \u5f90\u660e\u4f1f.\u00a0<span style=\"color: #3366ff;\">\u9ad8\u7b49\u8ba1\u7b97\u673a\u7f51\u7edc: \u4f53\u7cfb\u7ed3\u6784, \u534f\u8bae\u673a\u5236, \u7b97\u6cd5\u8bbe\u8ba1\u4e0e\u8def\u7531\u5668\u6280\u672f<\/span>[M]. \u673a\u68b0\u5de5\u4e1a\u51fa\u7248\u793e, 2003.<\/span><\/li>\r\n<\/ul>\r\n<\/div>\r\n<div class=\"paragraph\" style=\"text-align: left;\">\r\n\r\n<strong>\u8bfe\u7a0b\u6559\u5b661\uff1a\u9ad8\u7ea7\u8ba1\u7b97\u673a\u7f51\u7edc<\/strong>\r\n<p style=\"padding-left: 40px;\"><span style=\"font-size: medium;\"><strong>\u8bfe\u7a0b\u76ee\u6807<\/strong>\uff1a\u6df1\u5165\u5b66\u4e60\u8ba1\u7b97\u673a\u7f51\u7edc\u4f53\u7cfb\u7ed3\u6784\u3001\u534f\u8bae\u548c\u7b97\u6cd5\uff1b\u4e86\u89e3\u638c\u63e1\u8ba1\u7b97\u673a\u7f51\u7edc\u7684\u6700\u65b0\u7814\u7a76\u6210\u679c\uff1b\u5b66\u4e60\u8ba1\u7b97\u673a\u7f51\u7edc\u7684\u57fa\u672c\u7814\u7a76\u65b9\u6cd5\uff1b\u521d\u6b65\u5f00\u5c55\u8ba1\u7b97\u673a\u7f51\u7edc\u9886\u57df\u7684\u76f8\u5173\u7814\u7a76\u3002<\/span><\/p>\r\n<p style=\"padding-left: 40px;\"><strong><span style=\"font-size: medium;\">\u4e3b\u8981\u6559\u5b66\u5185\u5bb9<\/span><\/strong><span style=\"font-size: small;\">\uff08pdf\u683c\u5f0f\u8bfe\u4ef6\u53ef\u4e0b\u8f7d\uff0c.pptx\u683c\u5f0f\u8bf7\u901a\u8fc7\u90ae\u4ef6\uff08xuke@tsinghua.edu.cn\uff09\u4e0e\u4f5c\u8005\u8054\u7cfb\uff09<\/span><span style=\"font-size: medium;\">\uff1a<\/span><\/p>\r\n\r\n<ul>\r\n \t<li style=\"list-style-type: none;\">\r\n<ul>\r\n \t<li>\u7b2c1\u7ae0 \u8ba1\u7b97\u673a\u7f51\u7edc\u4e0eInternet (<a href=\"http:\/\/www.thucsnet.com\/wp-content\/book_slides\/AdvancedComputerNetworking\/Chapter_1.pdf\">pdf<\/a>)<\/li>\r\n \t<li>\u7b2c2\u7ae0 Internet\u8def\u7531 (<a href=\"http:\/\/www.thucsnet.com\/wp-content\/book_slides\/AdvancedComputerNetworking\/Chapter_2.pdf\">pdf<\/a>)<\/li>\r\n \t<li>\u7b2c3\u7ae0 \u62e5\u585e\u63a7\u5236 (<a href=\"http:\/\/www.thucsnet.com\/wp-content\/book_slides\/AdvancedComputerNetworking\/Chapter_3.pdf\">pdf<\/a>)<\/li>\r\n \t<li>\u7b2c4\u7ae0 \u670d\u52a1\u8d28\u91cf\u63a7\u5236 <a href=\"http:\/\/www.thucsnet.com\/wp-content\/book_slides\/AdvancedComputerNetworking\/Chapter_4.pdf\">(pdf<\/a>)<\/li>\r\n \t<li>\u7b2c5\u7ae0 \u9ad8\u6027\u80fd\u8def\u7531\u5668\u4f53\u7cfb\u7ed3\u6784\u4e0e\u5173\u952e\u6280\u672f (<a href=\"http:\/\/www.thucsnet.com\/wp-content\/book_slides\/AdvancedComputerNetworking\/Chapter_5.pdf\">pdf<\/a>)<\/li>\r\n \t<li>\u7b2c6\u7ae0 \u7f51\u7edc\u5b89\u5168 (<a href=\"http:\/\/www.thucsnet.com\/wp-content\/book_slides\/AdvancedComputerNetworking\/Chapter_6.pdf\">pdf<\/a>)<\/li>\r\n \t<li>\u7b2c7\u7ae0 P2P\u7cfb\u7edf\u539f\u7406 (<a href=\"http:\/\/www.thucsnet.com\/wp-content\/book_slides\/AdvancedComputerNetworking\/Chapter_7.pdf\">pdf<\/a>)<\/li>\r\n \t<li>\u7b2c8\u7ae0 \u7269\u8054\u7f51\u6982\u8ff0 (<a href=\"http:\/\/www.thucsnet.com\/wp-content\/book_slides\/AdvancedComputerNetworking\/Chapter_8.pdf\">pdf<\/a>)<\/li>\r\n \t<li>\u7b2c9\u7ae0 \u8f6f\u4ef6\u5b9a\u4e49\u7f51\u7edc (<a href=\"http:\/\/www.thucsnet.com\/wp-content\/book_slides\/AdvancedComputerNetworking\/Chapter_9.pdf\">pdf<\/a>)<\/li>\r\n \t<li>\u7b2c10\u7ae0 IPv6\u4e0e\u65b0\u4e00\u4ee3\u4e92\u8054\u7f51 (<a href=\"http:\/\/www.thucsnet.com\/wp-content\/book_slides\/AdvancedComputerNetworking\/Chapter_10.pdf\">pdf<\/a>)<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<\/div>\r\n<div class=\"paragraph\" style=\"text-align: left;\">\r\n<p style=\"padding-left: 40px;\"><span style=\"font-size: medium;\">\u00a0 <strong>\u63a8\u8350\u6559\u6750<\/strong>\uff1a<\/span><\/p>\r\n<p style=\"padding-left: 80px;\">\u5f90\u606a, \u5f90\u660e\u4f1f, \u674e\u7426. <em>\u9ad8\u7ea7\u8ba1\u7b97\u673a\u7f51\u7edc\uff08\u7b2c2\u7248\uff09<\/em>[M]. \u6e05\u534e\u5927\u5b66\u51fa\u7248\u793e. 2021.<\/p>\r\n\r\n<\/div>\r\n<div>\r\n<div class=\"wsite-multicol\">\r\n<div class=\"wsite-multicol-table-wrap\" style=\"margin: 0 -15px;\">\r\n<table class=\"wsite-multicol-table\">\r\n<tbody class=\"wsite-multicol-tbody\">\r\n<tr class=\"wsite-multicol-tr\">\r\n<td class=\"wsite-multicol-col\" style=\"width: 26.618876489052%; padding: 0 15px;\">\r\n<div class=\"wsite-spacer\" style=\"height: 50px;\"><\/div><\/td>\r\n<td class=\"wsite-multicol-col\" style=\"width: 58.500800801035%; padding: 0 15px;\">\r\n<div class=\"paragraph\" style=\"text-align: left; display: block;\"><strong>\u9ad8\u7ea7\u8ba1\u7b97\u673a\u7f51\u7edc<\/strong>\r\n\u4f5c\u8005\uff1a\u5f90\u606a\uff0c\u5f90\u660e\u4f1f\uff0c\u674e\u7426\r\n\u51fa\u7248\u793e\uff1a\u6e05\u534e\u5927\u5b66\u51fa\u7248\u793e\r\n\u51fa\u7248\u65f6\u95f4\uff1a2021\u5e743\u6708\r\nISBN\uff1a978-7-302-56686-1\r\n\u8d2d\u4e70\u94fe\u63a5\uff1a<\/div>\r\n<div class=\"paragraph\" style=\"text-align: left; display: block;\"><u><a title=\"\" href=\"http:\/\/item.jd.com\/13226736.html\" target=\"_blank\" rel=\"noopener noreferrer\">\u4eac\u4e1c\u5546\u57ce<\/a><\/u>\r\n<u><a title=\"\" href=\"http:\/\/product.dangdang.com\/29237660.html\" target=\"_blank\" rel=\"noopener noreferrer\">\u5f53\u5f53\u7f51<\/a><\/u><\/div>\r\n\r\n<hr style=\"width: 100%; clear: both; visibility: hidden;\" \/>\r\n\r\n<\/td>\r\n<td class=\"wsite-multicol-col\" style=\"width: 14.880322709912%; padding: 0 15px;\">\r\n<div class=\"wsite-spacer\" style=\"height: 50px;\"><\/div><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"paragraph\" style=\"text-align: left;\">\r\n\r\n<strong>\u8bfe\u7a0b\u6559\u5b662: \u8ba1\u7b97\u673a\u7f51\u7edc\u524d\u6cbf\u7814\u7a76<\/strong>\r\n<p style=\"padding-left: 40px;\"><span style=\"font-size: medium;\"><strong>\u8bfe\u7a0b\u76ee\u6807<\/strong>\uff1a\u901a\u8fc7\u8bfe\u7a0b\u8bb2\u6388\u3001\u81ea\u5b66\u8bba\u6587\u548c\u8bfe\u5802\u8ba8\u8bba\uff0c\u7406\u89e3\u8ba1\u7b97\u673a\u7f51\u7edc\u4f53\u7cfb\u7ed3\u6784\u3001\u534f\u8bae\u548c\u5e94\u7528\u7814\u7a76\u9886\u57df\u7684\u6700\u65b0\u53d1\u5c55\uff1b\u4e86\u89e3\u548c\u638c\u63e1\u5728\u7f51\u7edc\u9886\u57df\u5982\u4f55\u8fdb\u884c\u7814\u7a76\u5de5\u4f5c\uff1b\u5728\u6559\u5e08\u7684\u6307\u5bfc\u4e0b\uff0c\u63d0\u51fa\u81ea\u5df1\u7684\u65b0\u601d\u60f3\u65b0\u89c1\u89e3\uff0c\u8fdb\u884c\u5b9e\u73b0\u6216\u8005\u6a21\u62df\uff0c\u5bf9\u7ed3\u679c\u8fdb\u884c\u603b\u7ed3\u63d0\u9ad8\uff0c\u5b8c\u6210\u4e00\u7bc7\u4f1a\u8bae\u8d28\u91cf\u7684\u8bba\u6587\u3002<\/span><\/p>\r\n<p style=\"padding-left: 40px;\"><strong><span style=\"font-size: medium;\">\u4e3b\u8981\u6559\u5b66\u5185\u5bb9<\/span><\/strong><span style=\"font-size: small;\">\uff08\u8bfe\u4ef6\u53ef\u4e0b\u8f7d\uff09<\/span><span style=\"font-size: medium;\">\uff1a<\/span><\/p>\r\n\r\n<ul>\r\n \t<li style=\"list-style-type: none;\">\r\n<ul>\r\n \t<li>\u5f15\u8a00(<a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/0201.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">pdf<\/a>)<\/li>\r\n \t<li>\u4ee3\u8868\u6027\u8bba\u6587\u4ecb\u7ecd(<a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/0200.rar\">pdf<\/a>)<\/li>\r\n \t<li>\u8ba1\u7b97\u673a\u7f51\u7edc\u57fa\u672c\u8bbe\u8ba1\u539f\u5219(<a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/0202.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">pdf<\/a>)<\/li>\r\n \t<li>\u8ba1\u7b97\u673a\u7f51\u7edc\u4f53\u7cfb\u7ed3\u6784\u7814\u7a76\u8fdb\u5c55\u4e0e\u8bc4\u4f30\u6a21\u578b(<a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/0203.part1.rar\">pdf_part1<\/a>,<a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/0203.part2.rar\">pdf_part2<\/a>)<\/li>\r\n \t<li>\u535a\u5f08\u8bba\u7b80\u4ecb(<a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/0204.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">pdf<\/a>)<\/li>\r\n \t<li>\u6700\u4f18\u5316\u7406\u8bba(<a href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/0205.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">pdf<\/a>)<span style=\"font-size: medium;\"> \u00a0<\/span><\/li>\r\n \t<li>\u8bba\u6587\u8ba8\u8bba\u548c\u8bfe\u7a0b\u9879\u76ee\u8ba8\u8bba<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<p style=\"padding-left: 40px;\"><span style=\"font-size: medium;\"><strong>\u63a8\u8350\u6559\u6750<\/strong>\uff1a<\/span><\/p>\r\n<p style=\"padding-left: 80px;\">\u5f90\u606a, \u4efb\u4e30\u539f, \u5218\u7ea2\u82f1. <em>\u8ba1\u7b97\u673a\u7f51\u7edc\u4f53\u7cfb\u7ed3\u6784-\u8bbe\u8ba1\uff0c\u5efa\u6a21\uff0c\u5206\u6790\u4e0e\u4f18\u5316<\/em>[M].\u00a0\u6e05\u534e\u5927\u5b66\u51fa\u7248\u793e. 2014.<\/p>\r\n\r\n<\/div>\r\n<div>\r\n<div class=\"wsite-multicol\">\r\n<div class=\"wsite-multicol-table-wrap\" style=\"margin: 0 -15px;\">\r\n<table class=\"wsite-multicol-table\">\r\n<tbody class=\"wsite-multicol-tbody\">\r\n<tr class=\"wsite-multicol-tr\">\r\n<td class=\"wsite-multicol-col\" style=\"width: 25.607031287426%; padding: 0 15px;\">\r\n<div class=\"wsite-spacer\" style=\"height: 50px;\"><\/div><\/td>\r\n<td class=\"wsite-multicol-col\" style=\"width: 59.311147566924%; padding: 0 15px;\">\r\n<div class=\"paragraph\" style=\"text-align: left; display: block;\"><strong>\u8ba1\u7b97\u673a\u7f51\u7edc\u4f53\u7cfb\u7ed3\u6784-\u8bbe\u8ba1\uff0c\u5efa\u6a21\uff0c\u5206\u6790\u4e0e\u4f18\u5316<\/strong>\r\n\u4f5c\u8005\uff1a\u5f90\u606a\uff0c\u4efb\u4e30\u539f\uff0c\u5218\u7ea2\u82f1\r\n\u51fa\u7248\u793e\uff1a\u6e05\u534e\u5927\u5b66\u51fa\u7248\u793e\r\n\u51fa\u7248\u65f6\u95f4\uff1a2014-2-1\r\nISBN\uff1a978-7-302-34039-3\r\n\u8d2d\u4e70\u94fe\u63a5\uff1a\r\n<u><a href=\"http:\/\/product.dangdang.com\/23439762.html#ddclick?act=click&amp;pos=23439762_0_1_q&amp;cat=&amp;key=%BC%C6%CB%E3%BB%FA%CD%F8%C2%E7%CC%E5%CF%B5%BD%E1%B9%B9-%C9%E8%BC%C6%A3%AC%BD%A8%C4%A3%A3%AC%B7%D6%CE%F6%D3%EB%D3%C5%BB%AF&amp;qinfo=1_1_48&amp;pinfo=&amp;minfo=&amp;ninfo=&amp;custid=&amp;permid=20140312172415924305529965181634031&amp;ref=http%3A%2F%2Fsearch.dangdang.com%2F%3Fkey%3D%25BC%25C6%25CB%25E3%25BB%25FA%25CD%25F8%25C2%25E7%25CC%25E5%25CF%25B5%25BD%25E1%25B9%25B9%2520%2520%25D0%25AD%25D2%25E9&amp;rcount=&amp;type=&amp;t=1395737224000\" target=\"_blank\" rel=\"noopener noreferrer\">\u5f53\u5f53\u7f51<\/a><\/u>\r\n<u><a href=\"http:\/\/item.jd.com\/11427424.html\" target=\"_blank\" rel=\"noopener noreferrer\">\u4eac\u4e1c\u5546\u57ce<\/a><\/u>\r\n<u><\/u><\/div>\r\n\r\n<hr style=\"width: 100%; clear: both; visibility: hidden;\" \/>\r\n\r\n<div class=\"paragraph\" style=\"text-align: left;\">\r\n\r\n<span style=\"font-size: medium;\">\u6559\u6750\u76f8\u5173\u6750\u6599 (<a href=\"http:\/\/pan.baidu.com\/s\/1sjG99uP\" target=\"_blank\" rel=\"noopener noreferrer\"><u>pdf<\/u><\/a>)<\/span>\r\n<ul>\r\n \t<li>\u7b2c1\u7ae0 \u8ba1\u7b97\u673a\u7f51\u7edc\u4f53\u7cfb\u7ed3\u6784<\/li>\r\n \t<li>\u7b2c2\u7ae0 \u4e92\u8054\u7f51\u4f53\u7cfb\u7ed3\u6784\u7814\u7a76\u8fdb\u5c55<\/li>\r\n \t<li>\u7b2c3\u7ae0 \u4e92\u8054\u7f51\u7edc\u4f53\u7cfb\u7ed3\u6784\u8bc4\u4f30\u6a21\u578b<\/li>\r\n \t<li>\u7b2c4\u7ae0 \u57fa\u4e8e\u5fae\u5206\u65b9\u7a0b\u7684\u4e92\u8054\u7f51\u7ed3\u6784\u6f14\u5316\u8bc4\u4f30<\/li>\r\n \t<li>\u7b2c5\u7ae0-\u6570\u5b66\u4f18\u5316<\/li>\r\n \t<li>\u7b2c6\u7ae0 \u535a\u5f08\u8bba<\/li>\r\n \t<li>\u7b2c7\u7ae0 \u63a7\u5236\u8bba\u4e0e\u7f51\u7edc\u6027\u80fd\u4f18\u5316<\/li>\r\n \t<li><span style=\"background-color: initial;\">\u7b2c8\u7ae0 \u968f\u673a\u6a21\u578b\u4e0e\u7f51\u7edc\u968f\u673a\u5316\u8bbe\u8ba1\u539f\u5219<\/span><\/li>\r\n<\/ul>\r\n<\/div><\/td>\r\n<td class=\"wsite-multicol-col\" style=\"width: 15.08182114565%; padding: 0 15px;\">\r\n<div class=\"wsite-spacer\" style=\"height: 50px;\"><\/div><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"paragraph\" style=\"text-align: left;\">\r\n\r\n<strong>\u8bfe\u7a0b\u6559\u5b663: \u7f51\u7edc\u79d1\u5b66\u4e0e\u7b56\u7565\u673a\u5236<\/strong>\r\n<p style=\"padding-left: 40px;\"><span style=\"font-size: medium;\"><strong>\u8bfe\u7a0b\u76ee\u6807<\/strong>\uff1a<\/span><span style=\"font-size: medium;\">\u901a\u8fc7\u5e94\u7528\u6570\u5b66\u548c\u8ba1\u7b97\u673a\u79d1\u5b66\u7684\u57fa\u7840\u77e5\u8bc6\uff0c\u5206\u6790\u63a8\u7406\u7f51\u7edc\u4f5c\u7528\u4e0b\u7684\u4e00\u7cfb\u5217\u7ecf\u5178\u793e\u4f1a\u4e0e\u7ecf\u6d4e\u884c\u4e3a\u7684\u8bfe\u7a0b\uff1b<\/span><span style=\"font-size: medium;\">\u4ee5\u4e0a\u8ff0\u4e3a\u8f7d\u4f53\uff0c\u5e2e\u52a9\u5b66\u751f\u4f53\u4f1a\u6587\u7406\u5b66\u79d1\u4ea4\u53c9\u7684<\/span><span style=\"font-size: medium;\">\u4e00\u79cd\u7cbe\u5f69\uff0c\u5e76\u8bad\u7ec3\u5b66\u751f\u4ee5\u201c\u8ba1\u7b97\u601d\u7ef4\u201d\u7684\u89c2\u5ff5\u5206\u6790\u793e\u4f1a\u5b66\u4e0e\u7ecf\u6d4e\u5b66\u95ee\u9898\u7684\u521d\u6b65\u80fd\u529b\u3002<\/span><\/p>\r\n<p style=\"padding-left: 40px;\"><span style=\"font-size: medium;\"><strong>\u4e3b\u8981\u6559\u5b66\u5185\u5bb9<\/strong>\uff08<\/span><span style=\"font-size: small;\">\u6682\u65e0\u8bfe\u4ef6\u4e0b\u8f7d<\/span><span style=\"font-size: medium;\">\uff09\uff1a<\/span><\/p>\r\n\r\n<ul>\r\n \t<li style=\"list-style-type: none;\">\r\n<ul>\r\n \t<li>\u7b2c\u4e00\u90e8\u5206 \u56fe\u8bba\u4e0e\u793e\u4f1a\u7f51\u7edc<\/li>\r\n \t<li>\u7b2c\u4e8c\u90e8\u5206 \u535a\u5f08\u8bba<\/li>\r\n \t<li>\u7b2c\u4e09\u90e8\u5206 \u7f51\u7edc\u4e2d\u7684\u5e02\u573a\u4e0e\u7b56\u7565\u6027\u4e92\u52a8<\/li>\r\n \t<li>\u7b2c\u56db\u90e8\u5206 \u4fe1\u606f\u7f51\u7edc\u4e0e\u4e07\u7ef4\u7f51<\/li>\r\n \t<li>\u7b2c\u4e94\u90e8\u5206 \u7f51\u7edc\u52a8\u529b\u5b66\uff1a\u603b\u4f53\u6a21\u578b<\/li>\r\n \t<li>\u7b2c\u516d\u90e8\u5206 \u7f51\u7edc\u52a8\u529b\u5b66\uff1a\u7ed3\u6784\u6a21\u578b<\/li>\r\n \t<li>\u7b2c\u4e03\u90e8\u5206 \u5236\u5ea6\u53ca\u5176\u805a\u5408\u884c\u4e3a<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<p style=\"padding-left: 40px;\"><span style=\"font-size: medium;\"><strong>\u63a8\u8350\u6559\u6750<\/strong>\uff1a<\/span><\/p>\r\n<p style=\"padding-left: 80px;\"><span style=\"font-size: medium;\">David Easley etc.\uff0c\u674e\u6653\u660e\u7b49\u8bd1\uff0c<em>\u7f51\u7edc\u3001\u7fa4\u4f53\u4e0e\u5e02\u573a<\/em>\uff0c\u6e05\u534e\u5927\u5b66\u51fa\u7248\u793e\uff0c2011<\/span>\r\n<span style=\"font-size: medium;\">Ke Xu, Yifeng Zhong, Huan He, <em>Internet Resource Pricing Models<\/em>. Springer, 2013.<\/span><\/p>\r\n\r\n<\/div>\r\n<div>\r\n<div class=\"wsite-multicol\">\r\n<div class=\"wsite-multicol-table-wrap\" style=\"margin: 0 -15px;\">\r\n<table class=\"wsite-multicol-table\">\r\n<tbody class=\"wsite-multicol-tbody\">\r\n<tr class=\"wsite-multicol-tr\">\r\n<td class=\"wsite-multicol-col\" style=\"width: 11.334460582412%; padding: 0 15px;\">\r\n<div class=\"wsite-spacer\" style=\"height: 50px;\"><\/div><\/td>\r\n<td class=\"wsite-multicol-col\" style=\"width: 45.64858250837%; padding: 0 15px;\">\r\n<div class=\"paragraph\" style=\"text-align: left; display: block;\"><strong>\u7f51\u7edc\u7fa4\u4f53\u4e0e\u5e02\u573a<\/strong>\r\n\u4f5c\u8005\uff1aDavid Easley etc. \u8457 \u00a0\u674e\u6653\u660e\u7b49\u8bd1\r\n\u51fa\u7248\u793e\uff1a\u6e05\u534e\u5927\u5b66\u51fa\u7248\u793e\r\n\u51fa\u7248\u65f6\u95f4\uff1a2011-10-1\r\nISBN\uff1a978-7-302-26417-0\r\n\u8d2d\u4e70\u94fe\u63a5\uff1a\r\n<u><a title=\"\" href=\"http:\/\/product.dangdang.com\/22526779.html\" target=\"_blank\" rel=\"noopener noreferrer\">\u5f53\u5f53\u7f51<\/a><\/u>\r\n<u><a title=\"\" href=\"http:\/\/www.amazon.cn\/%E7%BD%91%E7%BB%9C-%E7%BE%A4%E4%BD%93%E4%B8%8E%E5%B8%82%E5%9C%BA-%E6%8F%AD%E7%A4%BA%E9%AB%98%E5%BA%A6%E4%BA%92%E8%81%94%E4%B8%96%E7%95%8C%E7%9A%84%E8%A1%8C%E4%B8%BA%E5%8E%9F%E7%90%86%E4%B8%8E%E6%95%88%E5%BA%94%E6%9C%BA%E5%88%B6-%E5%A4%A7%E5%8D%AB%C2%B7%E4%BC%8A%E6%96%AF%E5%88%A9\/dp\/B005XUJRKQ\/ref=pd_sim_b_3?ie=UTF8&amp;refRID=1S2FD56NNHVNEMC4H3MC\" target=\"_blank\" rel=\"noopener noreferrer\">\u4e9a\u9a6c\u900a<\/a><\/u>\r\n<u><a title=\"\" href=\"http:\/\/item.jd.com\/10854652.html\" target=\"_blank\" rel=\"noopener noreferrer\">\u4eac\u4e1c\u5546\u57ce<\/a><\/u>\r\n<u><a title=\"\" href=\"http:\/\/ishare.iask.sina.com.cn\/f\/34307372.html\" target=\"_blank\" rel=\"noopener noreferrer\">\u70b9\u6b64\u4e0b\u8f7d\u82f1\u6587\u539f\u7248<\/a><\/u><\/div>\r\n\r\n<hr style=\"width: 100%; clear: both; visibility: hidden;\" \/>\r\n\r\n<\/td>\r\n<td class=\"wsite-multicol-col\" style=\"width: 43.016956909218%; padding: 0 15px;\">\r\n<div class=\"paragraph\" style=\"text-align: left; display: block;\"><strong>Internet Resource Pricing Models<\/strong>\r\n\u4f5c\u8005\uff1aXU Ke, Yifeng Zhong, Huan He\r\n\u51fa\u7248\u793e\uff1aSpringer\r\n\u51fa\u7248\u65f6\u95f4\uff1a2013-1-1\r\nISBN\uff1a978-1-461-48408-0\r\n\u4e0b\u8f7d\u94fe\u63a5\uff1a<\/div>\r\n<div class=\"paragraph\" style=\"text-align: left; display: block;\"><u><a title=\"\" href=\"https:\/\/www.amazon.com\/-\/zh\/dp-1461484103\/dp\/1461484103\/ref=mt_other?_encoding=UTF8&amp;me=&amp;qid=1620902560\" target=\"_blank\" rel=\"noopener noreferrer\">\u4e9a\u9a6c\u900a<\/a><\/u>\r\n<u><a title=\"\" href=\"https:\/\/link.springer.com\/book\/10.1007\/978-1-4614-8409-7\" target=\"_blank\" rel=\"noopener noreferrer\">\u70b9\u6b64\u4e0b\u8f7dPDF<\/a><\/u><\/div>\r\n\r\n<hr style=\"width: 100%; clear: both; visibility: hidden;\" \/>\r\n\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"paragraph\" style=\"text-align: left;\">\r\n\r\n<strong>\u8bfe\u7a0b\u6559\u5b664: \u4e92\u8054\u7f51\u53d1\u5c55\u4e0e\u521b\u65b0\u7ecf\u6d4e<\/strong>\r\n<p style=\"padding-left: 40px;\"><span style=\"font-size: medium;\"><strong>\u8bfe\u7a0b\u76ee\u6807<\/strong>\uff1a\u901a\u8fc7\u8ba1\u7b97\u673a\u7f51\u7edc\u4ee5\u53ca\u65b0\u4e00\u4ee3\u4e92\u8054\u7f51\u7ecf\u6d4e\u7684\u4ecb\u7ecd\uff0c\u5e2e\u52a9\u5b66\u751f\u5bf9\u76ee\u524d\u606f\u606f\u76f8\u5173\u7684\u4e92\u8054\u7f51\u7ecf\u6d4e\u6709\u4e00\u4e2a\u65b0\u7684\u8ba4\u8bc6\uff0c\u540c\u65f6\u7b80\u8981\u5206\u6790\u5f53\u4eca\u7f51\u7edc\u7ecf\u6d4e\u8fd9\u4e00\u4ea4\u53c9\u5b66\u79d1\u7684\u7814\u7a76\u73b0\u72b6\uff0c\u4fc3\u8fdb\u5b66\u751f\u7684\u7efc\u5408\u53d1\u5c55\u3002<\/span><\/p>\r\n<p style=\"padding-left: 40px;\"><span style=\"font-size: medium;\"><strong>\u4e3b\u8981\u6559\u5b66\u5185\u5bb9<\/strong>\uff08<\/span>\u6682\u65e0\u8bfe\u4ef6\u4e0b\u8f7d<span style=\"font-size: medium;\">\uff09\uff1a<\/span><\/p>\r\n\r\n<ul>\r\n \t<li style=\"list-style-type: none;\">\r\n<ul>\r\n \t<li>\u7b2c\u4e00\u90e8\u5206 \u4ece\u9ed1\u5ba2\u5e1d\u56fd\u5230\u8d5b\u535a\u4e16\u754c<\/li>\r\n \t<li>\u7b2c\u4e8c\u90e8\u5206 \u8d5b\u535a\u7ecf\u6d4e\u7cfb\u7edf\u67b6\u6784<\/li>\r\n \t<li>\u7b2c\u4e09\u90e8\u5206 \u8d5b\u535a\u7ecf\u6d4e\u7684\u5f62\u6001\u7279\u70b9<\/li>\r\n \t<li>\u7b2c\u56db\u90e8\u5206 \u8d5b\u535a\u7ecf\u6d4e\u4e0b\u7684\u5e02\u573a\u5f62\u6001<\/li>\r\n \t<li>\u7b2c\u4e94\u90e8\u5206 \u8d5b\u535a\u7ecf\u6d4e\u4e0b\u4f01\u4e1a\u7684\u5e73\u53f0\u6218\u7565<\/li>\r\n \t<li>\u7b2c\u516d\u90e8\u5206 \u8d5b\u535a\u91d1\u878d<\/li>\r\n \t<li>\u7b2c\u4e03\u90e8\u5206 \u8d5b\u535a\u4e16\u754c\u4e2d\u7684\u652f\u4ed8<\/li>\r\n \t<li>\u7b2c\u516b\u90e8\u5206 \u4ece\u4e92\u8054\u7f51+\u8fc8\u5411\u8d5b\u535a\u7ecf\u6d4e<\/li>\r\n \t<li>\u7b2c\u4e5d\u90e8\u5206 \u672a\u6765\u662f\u9ecf\u7684<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<p style=\"padding-left: 40px;\"><span style=\"color: #777777;\"><span style=\"color: #777777;\"><span style=\"font-size: medium;\"><strong>\u63a8\u8350\u6559\u6750<\/strong>\uff1a<\/span><\/span><\/span><\/p>\r\n<p style=\"padding-left: 80px;\"><span style=\"font-size: medium;\">\u5f90\u606a, \u738b\u52c7, \u674e\u6c81. \u8d5b\u535a\u65b0\u7ecf\u6d4e\uff1a\u201c\u4e92\u8054\u7f51+\u201d\u7684\u65b0\u7ecf\u6d4e\u65f6\u4ee3[M]. \u6e05\u534e\u5927\u5b66\u51fa\u7248\u793e, 2016.<\/span><span style=\"font-size: small;\">\r\n<span style=\"font-size: medium;\">\u5f90\u606a, \u674e\u6c81. \u7b97\u6cd5\u7edf\u6cbb\u4e16\u754c \u667a\u80fd\u7ecf\u6d4e\u7684\u9690\u5f62\u79e9\u5e8f[M]. \u6e05\u534e\u5927\u5b66\u51fa\u7248\u793e, 2017.<\/span><\/span><\/p>\r\n\r\n<\/div>\r\n<div>\r\n<div class=\"wsite-multicol\">\r\n<div class=\"wsite-multicol-table-wrap\" style=\"margin: 0 -15px;\">\r\n<table class=\"wsite-multicol-table\">\r\n<tbody class=\"wsite-multicol-tbody\">\r\n<tr class=\"wsite-multicol-tr\">\r\n<td class=\"wsite-multicol-col\" style=\"width: 15.453431396027%; padding: 0 15px;\"><\/td>\r\n<td class=\"wsite-multicol-col\" style=\"width: 14.545818319665%; padding: 0 15px;\">\r\n<div class=\"wsite-image wsite-image-border-none \" style=\"padding-top: 10px; padding-bottom: 10px; margin-left: 0; margin-right: 0; text-align: center;\"><a>\r\n<\/a>\r\n<div style=\"display: block; font-size: 90%;\"><\/div>\r\n<\/div><\/td>\r\n<td class=\"wsite-multicol-col\" style=\"width: 22.896783706245%; padding: 0 15px;\">\r\n<div class=\"paragraph\" style=\"text-align: left;\"><strong>\u8d5b\u535a\u65b0\u7ecf\u6d4e\uff1a\u201c\u4e92\u8054\u7f51+\u201d\u7684\u65b0\u7ecf\u6d4e\u65f6\u4ee3<\/strong>\r\n<strong>\u200b<\/strong>\u4f5c\u8005\uff1a\u5f90\u606a, \u738b\u52c7, \u674e\u6c81\r\n\u51fa\u7248\u793e\uff1a\u6e05\u534e\u5927\u5b66\u51fa\u7248\u793e\r\n\u51fa\u7248\u65f6\u95f4\uff1a2016-3-1\r\nISBN\uff1a978-7-302-42303-4\r\n\u8d2d\u4e70\u94fe\u63a5\uff1a\r\n<u><a href=\"http:\/\/item.jd.com\/11892696.html#comment\" target=\"_blank\" rel=\"noopener noreferrer\">\u4eac\u4e1c\u5546\u57ce<\/a><\/u><\/div><\/td>\r\n<td class=\"wsite-multicol-col\" style=\"width: 20%; padding: 0 15px;\">\r\n<div class=\"wsite-image wsite-image-border-none \" style=\"padding-top: 10px; padding-bottom: 10px; margin-left: 0; margin-right: 0; text-align: center;\"><a>\r\n<\/a>\r\n<div style=\"display: block; font-size: 90%;\"><\/div>\r\n<\/div><\/td>\r\n<td class=\"wsite-multicol-col\" style=\"width: 27.103966578064%; padding: 0 15px;\">\r\n<div class=\"paragraph\" style=\"text-align: left;\"><strong>\u7b97\u6cd5\u7edf\u6cbb\u4e16\u754c \u667a\u80fd\u7ecf\u6d4e\u7684\u9690\u5f62\u79e9\u5e8f<\/strong>\r\n<strong>\u200b<\/strong>\u4f5c\u8005\uff1a\u5f90\u606a, \u674e\u6c81\r\n\u51fa\u7248\u793e\uff1a\u6e05\u534e\u5927\u5b66\u51fa\u7248\u793e\r\n\u51fa\u7248\u65f6\u95f4\uff1a2017-11-1\r\nISBN\uff1a978-7-302-48808-8\r\n\u8d2d\u4e70\u94fe\u63a5\uff1a\r\n<u><a href=\"https:\/\/item.jd.com\/12266292.html\" target=\"_blank\" rel=\"noopener noreferrer\">\u4eac\u4e1c\u5546\u57ce<\/a><\/u><\/div>\r\n<div class=\"wsite-spacer\" style=\"height: 50px;\"><\/div><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\n<\/div>\r\n<\/div>","protected":false},"excerpt":{"rendered":"\u5f90\u606a \u6559\u6388\uff0c\u535a\u58eb\u751f\u5bfc\u5e08 \u4e2d\u56fd \u5317\u4eac\u00a0\u6e05\u534e\u5927\u5b66\u8ba1\u7b97\u673a\u79d1\u5b66\u6280\u672f\u7cfb\u00a0100084 \u529e\u516c\u5730\u70b9\uff1a \u6e05\u534e\u5927\u5b66 FIT\u697c4- [&hellip;]","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/pages\/11"}],"collection":[{"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/comments?post=11"}],"version-history":[{"count":20,"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/pages\/11\/revisions"}],"predecessor-version":[{"id":256,"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/pages\/11\/revisions\/256"}],"wp:attachment":[{"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/media?parent=11"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}