[1] |
Xu LI, Yulin HE, Laizhong CUI, Zhexue HUANG, Fournier‑Viger PHILIPPE.
Distributed observation point classifier for big data with random sample partition
[J]. Journal of Computer Applications, 2024, 44(6): 1727-1733.
|
[2] |
Meihong CHEN, Lingyun YUAN, Tong XIA.
Data classified and graded access control model based on master-slave multi-chain
[J]. Journal of Computer Applications, 2024, 44(4): 1148-1157.
|
[3] |
Ruixuan NI, Miao CAI, Baoliu YE.
DFS-Cache: memory-efficient and persistent client cache for distributed file systems
[J]. Journal of Computer Applications, 2024, 44(4): 1172-1180.
|
[4] |
Xiaoyu DU, Shuaiqi LIU, Zhijie HAN, Zhenxiang HUO, Yujing WANG.
Patient-centric medical information sharing scheme based on IPFS and blockchain
[J]. Journal of Computer Applications, 2024, 44(10): 3122-3133.
|
[5] |
Jiaxing LU, Hua DAI, Yuanlong LIU, Qian ZHOU, Geng YANG.
Dictionary partition vector space model for ciphertext ranked search in cloud environment
[J]. Journal of Computer Applications, 2023, 43(7): 1994-2000.
|
[6] |
Kun YOU, Qinhui WANG, Xin LI.
General multi-unit false-name-proof auction mechanism for cloud computing
[J]. Journal of Computer Applications, 2023, 43(11): 3351-3357.
|
[7] |
Jingyu SUN, Jiayu ZHU, Ziqiang TIAN, Guozhen SHI, Chuanjiang GUAN.
Attribute based encryption scheme based on elliptic curve cryptography and supporting revocation
[J]. Journal of Computer Applications, 2022, 42(7): 2094-2103.
|
[8] |
Jinquan ZHANG, Shouwei XU, Xincheng LI, Chongyang WANG, Jingzhi XU.
Cloud computing task scheduling based on orthogonal adaptive whale optimization
[J]. Journal of Computer Applications, 2022, 42(5): 1516-1523.
|
[9] |
CHEN Jiahao, YIN Xinchun.
Traceable and revocable ciphertext-policy attribute-based encryption scheme based on cloud-fog computing
[J]. Journal of Computer Applications, 2021, 41(6): 1611-1620.
|
[10] |
GE Lina, HU Yugu, ZHANG Guifen, CHEN Yuanyuan.
Reverse hybrid access control scheme based on object attribute matching in cloud computing environment
[J]. Journal of Computer Applications, 2021, 41(6): 1604-1610.
|
[11] |
YANG Ling, JIANG Chunmao.
Strategy of energy-aware virtual machine migration based on three-way decision
[J]. Journal of Computer Applications, 2021, 41(4): 990-998.
|
[12] |
ZHANG Guochao, TANG Huayun, CHEN Jianhai, SHEN Rui, HE Qinming, HUANG Butian.
Digital music copyright management system based on blockchain
[J]. Journal of Computer Applications, 2021, 41(4): 945-955.
|
[13] |
Xiaoling SUN, Guang YANG, Yanping SHEN, Qiuge YANG, Tao CHEN.
Searchable encryption scheme based on splittable inverted index
[J]. Journal of Computer Applications, 2021, 41(11): 3288-3294.
|
[14] |
DONG Haoyu, CHEN Kang.
RUFS: a pure userspace network file system
[J]. Journal of Computer Applications, 2020, 40(9): 2577-2585.
|
[15] |
GOU Zi'an, ZHANG Xiao, WU Dongnan, WANG Yanqiu.
Log analysis and workload characteristic extraction in distributed storage system
[J]. Journal of Computer Applications, 2020, 40(9): 2586-2593.
|