Author:
Xu Fei,Shi Jinqiao,Chow K. P.,Chen Xiaojun,Liu Peipeng
Publisher
Springer Berlin Heidelberg
Reference6 articles.
1. Lecture Notes in Computer Science;K. Sugauchi,1999
2. Que, W.K., Zhange, G.Q., Wei, Z.H.: Model for IP Network Synthetically Performance Evaluation. Computer Engineering 34(8) (2008)
3. Cappelli, R., Maio, D., Maltoni, D., Wayman, J.L., Jain, A.K.: Performance Evaluation ofFingerprint Verification Systems. IEEE Transactions on Pattern Analysis and Machine Intelligence 28(1) (2006)
4. Fang, B.X., Guo, Y.C., Zhou, Y.: Information content security on the Internet: thecontrol model and its evaluation. Information Sciences Science China 53(1), 30–49 (2010)
5. Luo, F., Song, M., Ren, Z.J., Pan, Y.F., Song, J.D.: An Improved Evaluation Method in Mobile Network Management System. Journal of Beijing University of Posts and Telecommunications 27(4) (2004)