Li Xu, Deng Yanli, Amiya Nayak, Ivan Stojmenovic, Venkat Narasimhan. LaConf: A Localized Address Autoconfiguration Scheme for Wireless Ad Hoc Networks[J]. Tsinghua Science and Technology, 2011, 16(5): 529-538.
[7]
Sun Yizhou and Han Jiawei. Meta-Path-Based Search and Mining in Heterogeneous Information Networks[J]. Tsinghua Science and Technology, 2013, 18(4): 329-338.
[8]
Tang Lu-An, Han Jiawei, and Jiang Guofei. Mining Sensor Data in Cyber-Physical Systems[J]. Tsinghua Science and Technology, 2014, 19(3): 225-234.
[9]
Jiang Rong, Lu Rongxing, Wang Ye, Luo Jun, Shen Changxiang, and (Sherman) Shen Xuemin. Energy-Theft Detection Issues for Advanced Metering Infrastructure in Smart Grid[J]. Tsinghua Science and Technology, 2014, 19(2): 105-120.
[10]
Li Baochun, Feng Yuan, Li Bo. Rise and Fall of the Peer-to-Peer Empire[J]. Tsinghua Science and Technology, 2012, 17(1): 1-16.
[11]
Michael Ralph Fellows. Some Open Problems in Parameterized Complexity Related to the Work of Jianer Chen [J]. Tsinghua Science and Technology, 2014, 19(4): 325-328.
[12]
Chen Zhen, Han Fuye, Cao Junwei, Jiang Xin, and Chen Shuo. Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System[J]. Tsinghua Science and Technology, 2013, 18(1): 40-50.