Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zhou Shijie is active.

Publication


Featured researches published by Zhou Shijie.


international conference on communications, circuits and systems | 2006

Adaptive Flooding Routing Algorithm in Unstructured P2P

Luo Jiaqing; Zhou Shijie; Wu Chunjiang; Deng Yiyi; Yang Xiaoqian

Flooding is widely used in unstructured peer to peer (P2P) systems, such as Gnutella. Although it is effective in content search, flooding among peers or super-peers causes large volume of unnecessary traffic. To address this problem, we propose an efficient and adaptive search mechanism, adaptive flooding routing algorithm (AFRA). AFRA provides the flexibility to adaptively adjust the number of relay neighbors and TTL value to meet different performance requirements. The effectiveness of AFRA is demonstrated through simulation studies. Primary experimental results show that our new AFRA solution reduces about 65% of the flooding messages while maintaining the acceptable high searching quality


parallel and distributed computing: applications and technologies | 2003

Cost-based intelligent intrusion detection and response: design and implement

Zhou Shijie; Qin Zhiguang; Luo Xucheng; Zhang Xianfeng; Zhang Feng; Liu Jinde

A flexible intrusion detection and response system (ID&R) needs to maximize security while minimizing cost and making response automatically. CI/sup 2/D&R, the cost-based intelligent intrusion detection and response system, is proposed, which is originally developed as a facility to deal with network-based attacks and to make effective response automatically and intelligently. The networking environment deployed with the CI/sup 2/D&R consists of two major parts: guard, which runs on the specific guarded host (GH), and spy, which runs in guarded network (GN). The components of the CI/sup 2/D&R are introduced, which include intrusion detection, attack classification, damage analysis, attack path rebuilding, resources automatically safeguarding, calamity recovery, and security officer. The several kinds of data flow in CI/sup 2/D&R are discussed, too. While CI/sup 2/&R is only a prototype, some experimental results are also presented.


international conference on algorithms and architectures for parallel processing | 2002

CI 2 D&R: Cost-based Intelligent Intrusion Detection and Response System

Zhou Shijie; Qin Zhiguang; Lu Qin; Luo Xucheng; Liu Jinde

Intrusion detection and response system (ID&R) need to maximize security while minimizing cost and taking response automatically. CI/sup 2/D&R, the Cost-based Intelligent Intrusion Detection and Response System, is originally developed as facilities for deal with network-based attacks automatically and intelligently. This paper provides an overview of CI/sup 2/D&R architecture. The primary components of CI/sup 2/D&R and their functions are also probed into. What is more, the data flow of CI/sup 2/D&R is discussed and compared. Finally, the related work is touched on and conclusions are drawn.


web intelligence | 2006

An Experimental Study of the Active Recommendation Mechanism Based Distributed Approximate Indexing in Unstructured P2P Networks

Luo Jiaqing; Zhou Shijie; Wu Chunjiang

In unstructured P2P systems, it is hard to find the desired files without distributing queries, since there is neither a centralized directory nor any precise control over the network topology or file placement. Many valuable efforts have been done towards improving search efficiency and increasing the scalability of unstructured P2P systems while guaranteeing endurable resource consumptions. In this paper, we purpose an Active Recommendation Mechanism (ARM) which aims to provide efficient searching services and enhance benign competitions in P2P networks. We also build a two-tier proxy architecture consisting of reputation evaluating proxies and content indexing proxies. Based on the ARM and the new architecture, we purpose a Distributed Approximate Indexing (DAI) method to support an efficient search without the need for a single centralized index host.


advanced industrial conference on telecommunications | 2006

Interconnected Peer-to-Peer Network: A Community Based Scheme

Zhou Shijie; Qin Zhiguang; Zhao Xiaomei; Luo Xucheng


Archive | 2012

Simulation method compatible with PeerCast network

He Xinggao; Li Yalong; Lu Qing; Qin Zhiguang; Yang Wenjun; Zhou Shijie


中国电子科技(英文版) | 2005

Study on the Distributed Routing Algorithm and Its Security for Peer-to-Peer Computing

Zhou Shijie


Archive | 2014

Guiderail type passive RFID indoor positioning system architecture and method

Luo Jiaqing; Zhou Shijie; Chen Chao; Deng Weiwei; Zhang Yuehan; Zhang Mengjie; Zhang Wenqing; Wu Dou


Archive | 2017

OD matrix generation technology based on IC card data and application research thereof

Zhou Shijie; Luo Jiaqing; Li Wang


Archive | 2017

Dynamic load-balancing algorithm research and application for distributed traffic network simulation platform

Zhou Shijie; Liao Yongjian; Li Zhipeng

Collaboration


Dive into the Zhou Shijie's collaboration.

Top Co-Authors

Avatar

Luo Jiaqing

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Qin Zhiguang

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Luo Xucheng

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Zhang Mengjie

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Wu Chunjiang

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Deng Yiyi

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Yang Xiaoqian

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Zhao Xiaomei

University of Electronic Science and Technology of China

View shared research outputs
Researchain Logo
Decentralizing Knowledge