[1] |
Yali WANG, Jiachao CHEN, Junna ZHANG.
Cache cooperation strategy for maximizing revenue in mobile edge computing
[J]. Journal of Computer Applications, 2022, 42(11): 3479-3485.
|
[2] |
TANG Chen, HUANG Guorui, JIN Peiquan.
NVM-LH: non-volatile memory-friendly linear hash index
[J]. Journal of Computer Applications, 2021, 41(3): 623-629.
|
[3] |
LIU Xing, YANG Zhen, WANG Xinjun, ZHU Heng.
Content distribution acceleration strategy in mobile edge computing
[J]. Journal of Computer Applications, 2020, 40(5): 1389-1391.
|
[4] |
ZHANG Chao, LI Ke, FAN Pingzhi.
Online-hot video cache replacement policy based on cooperative small base stations and popularity prediction
[J]. Journal of Computer Applications, 2019, 39(7): 2044-2050.
|
[5] |
TU Daxi, JIANG Yuhao, XU Cheng, YU Linchen.
Dynamic adaptive step-wise bitrate switching algorithm for HTTP streaming
[J]. Journal of Computer Applications, 2019, 39(4): 1127-1132.
|
[6] |
ZHANG Zhen, FU Yinjin, HU Guyu.
Bloom filter-based wear-leveling scheme for novel hybrid memory architecture
[J]. Journal of Computer Applications, 2018, 38(8): 2230-2235.
|
[7] |
CHEN Bo, HE Lianyue, YAN Weiwei, XU Zhaomiao, XU Jun.
Portable operating system interface of UNIX compatibility technology in mass small distributed file system
[J]. Journal of Computer Applications, 2018, 38(5): 1389-1392.
|
[8] |
LONG Yanshan, WU Dan, CAI Yueming, WANG Meng, GUO Jibin.
Cache placement optimization scheme in D2D networks with heterogeneous cache capacity
[J]. Journal of Computer Applications, 2018, 38(5): 1453-1457.
|
[9] |
DAI Chengrui, CHEN Wei.
Defense strategy against browser cache pollution
[J]. Journal of Computer Applications, 2018, 38(3): 693-698.
|
[10] |
LIU Boning, ZHAI Donghai.
Image completion method of generative adversarial networks based on two discrimination networks
[J]. Journal of Computer Applications, 2018, 38(12): 3557-3562.
|
[11] |
JI Lianen, ZHANG Xiaolin, LIANG Shiyi, WANG Bin.
Optimizing multi-slice real-time interactive visualization for out-of-core seismic volume
[J]. Journal of Computer Applications, 2017, 37(9): 2621-2625.
|
[12] |
CHEN Zhen, LIU Wenjie, ZHANG Xiao, BO Hailong.
Review on HDD-SSD hybrid storage
[J]. Journal of Computer Applications, 2017, 37(5): 1217-1222.
|
[13] |
CHEN Jian, SHEN Xiaojun, YAO Yiyang, XING Yafei, JU Xiaoming.
Cache replacement strategy based on access mechanism of ciphertext policy attribute based encryption
[J]. Journal of Computer Applications, 2017, 37(10): 2964-2967.
|
[14] |
LOU Ziting, ZHANG Yaping.
Mesh layout algorithm based on greedy optimization strategy
[J]. Journal of Computer Applications, 2016, 36(7): 1954-1958.
|
[15] |
ZHANG Bing, SUN Hui, FAN Xu, LI Cuiping, CHEN Hong, WANG Wen.
Supersonic-based parallel group-by aggregation
[J]. Journal of Computer Applications, 2016, 36(1): 13-20.
|