[1] |
Na WANG, Lin JIANG, Yuancheng LI, Yun ZHU.
Optimization of tensor virtual machine operator fusion based on graph rewriting and fusion exploration
[J]. Journal of Computer Applications, 2024, 44(9): 2802-2809.
|
[2] |
Ming ZHANG, Le FU, Haifeng WANG.
Relay control model for concurrent data flow in edge computing
[J]. Journal of Computer Applications, 2024, 44(12): 3876-3883.
|
[3] |
Yunfei SHEN, Fei SHEN, Fang LI, Jun ZHANG.
Deep neural network model acceleration method based on tensor virtual machine
[J]. Journal of Computer Applications, 2023, 43(9): 2836-2844.
|
[4] |
Shaofa SHANG, Lin JIANG, Yuancheng LI, Yun ZHU.
Adaptive partitioning and scheduling method of convolutional neural network inference model on heterogeneous platforms
[J]. Journal of Computer Applications, 2023, 43(9): 2828-2835.
|
[5] |
Jiaxing LU, Hua DAI, Yuanlong LIU, Qian ZHOU, Geng YANG.
Dictionary partition vector space model for ciphertext ranked search in cloud environment
[J]. Journal of Computer Applications, 2023, 43(7): 1994-2000.
|
[6] |
Yanan SUN, Jiehong WU, Junling SHI, Lijun GAO.
Multi-UAV collaborative task assignment method based on improved self-organizing map
[J]. Journal of Computer Applications, 2023, 43(5): 1551-1556.
|
[7] |
Yunbo LONG, Dan TANG.
Load balancing method based on local repair code in distributed storage
[J]. Journal of Computer Applications, 2023, 43(3): 767-775.
|
[8] |
Li YANG, Jianting CHEN, Yang XIANG.
Performance optimization strategy of distributed storage for industrial time series big data based on HBase
[J]. Journal of Computer Applications, 2023, 43(3): 759-766.
|
[9] |
Yayi WANG, Chen LIU, Tianbo HUANG, Weiping WEN.
Improved instruction obfuscation framework based on obfuscator low level virtual machine
[J]. Journal of Computer Applications, 2023, 43(2): 490-498.
|
[10] |
Kun YOU, Qinhui WANG, Xin LI.
General multi-unit false-name-proof auction mechanism for cloud computing
[J]. Journal of Computer Applications, 2023, 43(11): 3351-3357.
|
[11] |
Dajiang TIAN, Chengyang LI, Tianbo HUANG, Weiping WEN.
Identifier obfuscation method based on low level virtual machine
[J]. Journal of Computer Applications, 2022, 42(8): 2540-2547.
|
[12] |
Jingyu SUN, Jiayu ZHU, Ziqiang TIAN, Guozhen SHI, Chuanjiang GUAN.
Attribute based encryption scheme based on elliptic curve cryptography and supporting revocation
[J]. Journal of Computer Applications, 2022, 42(7): 2094-2103.
|
[13] |
Jinquan ZHANG, Shouwei XU, Xincheng LI, Chongyang WANG, Jingzhi XU.
Cloud computing task scheduling based on orthogonal adaptive whale optimization
[J]. Journal of Computer Applications, 2022, 42(5): 1516-1523.
|
[14] |
ZHAO Quan, TANG Xiaochun, ZHU Ziyu, MAO Anqi, LI Zhanhuai.
Low-latency cluster scheduling framework for large-scale short-time tasks
[J]. Journal of Computer Applications, 2021, 41(8): 2396-2405.
|
[15] |
CHEN Jiahao, YIN Xinchun.
Traceable and revocable ciphertext-policy attribute-based encryption scheme based on cloud-fog computing
[J]. Journal of Computer Applications, 2021, 41(6): 1611-1620.
|