Articles by Qinghua Zheng (2)

Resource Occupation of Peer-to-Peer Multicasting

Ting Peng and Qinghua Zheng

Information Technology Journal 9 ( 3 ): 438 - 445 , 2010

Using Renyi Cross Entropy to Analyze Traffic Matrix and Detect DDoS Attacks

Ruoyu Yan and Qinghua Zheng

Information Technology Journal 8 ( 8 ): 1180 - 1188 , 2009