[1] |
CHEN Jiahao, YIN Xinchun.
Traceable and revocable ciphertext-policy attribute-based encryption scheme based on cloud-fog computing
[J]. Journal of Computer Applications, 2021, 41(6): 1611-1620.
|
[2] |
GE Lina, HU Yugu, ZHANG Guifen, CHEN Yuanyuan.
Reverse hybrid access control scheme based on object attribute matching in cloud computing environment
[J]. Journal of Computer Applications, 2021, 41(6): 1604-1610.
|
[3] |
YANG Ling, JIANG Chunmao.
Strategy of energy-aware virtual machine migration based on three-way decision
[J]. Journal of Computer Applications, 2021, 41(4): 990-998.
|
[4] |
Xiaoling SUN, Guang YANG, Yanping SHEN, Qiuge YANG, Tao CHEN.
Searchable encryption scheme based on splittable inverted index
[J]. Journal of Computer Applications, 2021, 41(11): 3288-3294.
|
[5] |
Fan PING, Xiaochun TANG, Yanyu PAN, Zhanhuai LI.
Scheduling strategy of irregular tasks on graphics processing unit cluster
[J]. Journal of Computer Applications, 2021, 41(11): 3295-3301.
|
[6] |
LYU Jiayu, ZHU Zhirong, YAO Zhiqiang.
Two-channel dynamic data encryption strategy in cloud computing environment
[J]. Journal of Computer Applications, 2020, 40(8): 2268-2273.
|
[7] |
CHEN Chengjun, MAO Yingchi, WANG Yichao.
CNN model compression based on activation-entropy based layer-wise iterative pruning strategy
[J]. Journal of Computer Applications, 2020, 40(5): 1260-1265.
|
[8] |
GUO Shujie, LI Zhihua, LIN Kaiqing.
Fuzzy membership degree based virtual machine placement algorithmin cloud environment
[J]. Journal of Computer Applications, 2020, 40(5): 1374-1381.
|
[9] |
XU Yingxin, SUN Lei, ZHAO Jiancheng, GUO Songhui.
Virtual field programmable gate array placement strategy based on ant colony optimization algorithm
[J]. Journal of Computer Applications, 2020, 40(3): 747-752.
|
[10] |
HUANG Dongyan, FU Zhongwei, WANG Bo.
Revenue maximization strategy for mobile-edge computing server with limited computing resources
[J]. Journal of Computer Applications, 2020, 40(3): 765-769.
|
[11] |
LIU Zhixiang, LIU Huichao, HUANG Dongmei, ZHOU Liping, SU Cheng.
IB-LBM parallel optimization method mixed with multiple task scheduling modes
[J]. Journal of Computer Applications, 2020, 40(2): 386-391.
|
[12] |
WANG Qingyong, MAO Yingchi, WANG Yichao, WANG Longbao.
Computing task offloading based on multi-cloudlet collaboration
[J]. Journal of Computer Applications, 2020, 40(2): 328-334.
|
[13] |
LIU Fuxin, LI Jingwei, WANG Yihong, LI Lin.
Design and implementation of cloud native massive data storage system based on Kubernetes
[J]. Journal of Computer Applications, 2020, 40(2): 547-552.
|
[14] |
HUANG Xiuli, HUANG Jin, YU Pengfei, MIAO Weiwei, YANG Ruxia, LI Yijing, YU Peng.
Security-risk-oriented distributed resource allocation method in power wireless private network
[J]. Journal of Computer Applications, 2020, 40(12): 3586-3593.
|
[15] |
LI Ziying, SHI Zhenguo.
Scheduling method for big data tasks
[J]. Journal of Computer Applications, 2020, 40(10): 2923-2928.
|