[1] |
ZHENG Lianghan, HE Heng, TONG Qian, YANG Xiang, CHEN Xiang.
Multi-authority Access Control Scheme in Cloud Environment
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(11): 1865-1878.
|
[2] |
ZHANG Shengxia, TIAN Chengliang.
Security Outsourcing Algorithms by Unimodular Matrix Encryption Method
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(1): 73-82.
|
[3] |
CHEN Yantong, PEI Shujun, MIAO Hui.
Cost-Optimized Scheduling Algorithm for Cloud Scientific Workflow with Deadline Constraint
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(8): 1307-1318.
|
[4] |
REN Xiaoli, YANG Jianwei, LI Naiqian.
Secure Storage Based on Dynamic Virtualization of Electronic Stream Cipher Oriented Cloud Computing
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(8): 1331-1340.
|
[5] |
ZHAO Qian, XIE Shangqin, HAN Ke, GONG Qingze, FENG Guangsheng, LIN Junyu.
Container Migration Based on Combination of Remote Direct Memory Access and Check Point
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(12): 1995-2007.
|
[6] |
LI Yong, TENG Fei, HUANG Qichuan, LI Tianrui.
Parallel Time Series Decomposition Algorithm Based on Spark
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(7): 1055-1063.
|
[7] |
PEI Shujun, SONG Dongmei, KONG Dekai.
Application of Fast Pruning Algorithm in Map/Reduce for Complex Tasks Scheduling
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(1): 72-81.
|
[8] |
LIU Peidong, AN Bo, ZHONG Yehong, WANG Hu, CAO Donggang.
Virtual Cluster Based Resource Sharing Approach for Private Cloud Environment
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(8): 1204-1213.
|
[9] |
YANG Songlin, ZHANG Guangyan.
Review of Data Recovery in Storage Systems Based on Erasure Codes
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(10): 1531-1544.
|
[10] |
WANG Hongxu, WU Bin, LIU Yang.
Parallel Graph Data Analysis System Based on Spark
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(9): 1066-1074.
|
[11] |
SONG Baoyan, LI Xuecheng, REN Cai, DING Linlin.
Layered Intermediate Data Fault-Tolerance Approach in Cloud
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(5): 546-554.
|
[12] |
LIU Wenmao, QIU Xiaofeng, CHEN Pengcheng, WEN Xutao, HE Xinxin, WANG Dongsheng, LI Jun.
SDN Oriented Software-Defined Security Architecture
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(1): 63-70.
|
[13] |
YU Jiong, LIAO Bin, ZHANG Tao, SUN Hua, GUO Binglei, YANG Xingyao.
A Survey on Energy-Efficient Cloud Storage System
[J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(9): 1025-1040.
|
[14] |
GUO Husheng, WANG Wenjian, BAI Longfei.
Support Vector Machine Active Learning Strategy Based on Vector Cosine
[J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(7): 868-876.
|
[15] |
YANG Rong, LI Bing, DU Baotong, XIONG Wei, HE Peng.
Adaptive Service Selection Method with Atomic Transactions and QoS Constraints
[J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(5): 582-592.
|