[1] |
ZHENG Lianghan, HE Heng, TONG Qian, YANG Xiang, CHEN Xiang.
Multi-authority Access Control Scheme in Cloud Environment
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(11): 1865-1878.
|
[2] |
ZHANG Shengxia, TIAN Chengliang.
Security Outsourcing Algorithms by Unimodular Matrix Encryption Method
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(1): 73-82.
|
[3] |
CHEN Yantong, PEI Shujun, MIAO Hui.
Cost-Optimized Scheduling Algorithm for Cloud Scientific Workflow with Deadline Constraint
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(8): 1307-1318.
|
[4] |
REN Xiaoli, YANG Jianwei, LI Naiqian.
Secure Storage Based on Dynamic Virtualization of Electronic Stream Cipher Oriented Cloud Computing
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(8): 1331-1340.
|
[5] |
ZHAO Qian, XIE Shangqin, HAN Ke, GONG Qingze, FENG Guangsheng, LIN Junyu.
Container Migration Based on Combination of Remote Direct Memory Access and Check Point
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(12): 1995-2007.
|
[6] |
LI Yong, TENG Fei, HUANG Qichuan, LI Tianrui.
Parallel Time Series Decomposition Algorithm Based on Spark
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(7): 1055-1063.
|
[7] |
PEI Shujun, SONG Dongmei, KONG Dekai.
Application of Fast Pruning Algorithm in Map/Reduce for Complex Tasks Scheduling
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(1): 72-81.
|
[8] |
LIU Peidong, AN Bo, ZHONG Yehong, WANG Hu, CAO Donggang.
Virtual Cluster Based Resource Sharing Approach for Private Cloud Environment
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(8): 1204-1213.
|
[9] |
WANG Hongxu, WU Bin, LIU Yang.
Parallel Graph Data Analysis System Based on Spark
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(9): 1066-1074.
|
[10] |
SONG Baoyan, LI Xuecheng, REN Cai, DING Linlin.
Layered Intermediate Data Fault-Tolerance Approach in Cloud
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(5): 546-554.
|
[11] |
LIU Wenmao, QIU Xiaofeng, CHEN Pengcheng, WEN Xutao, HE Xinxin, WANG Dongsheng, LI Jun.
SDN Oriented Software-Defined Security Architecture
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(1): 63-70.
|
[12] |
YANG Rong, LI Bing, DU Baotong, XIONG Wei, HE Peng.
Adaptive Service Selection Method with Atomic Transactions and QoS Constraints
[J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(5): 582-592.
|
[13] |
SHI Jingang, ZHENG Yan, SUN Huanliang, LUAN Fangjun.
Parallel Processing of Block Cipher for Massive Data in Cloud Computing
[J]. Journal of Frontiers of Computer Science and Technology, 2014, 8(2): 161-170.
|
[14] |
CHENG Zhendong1+, LUAN Zhongzhi1, MENG You, LI Liangshu, HE Rong, YANG Tingting, QIAN Depei, GUAN Gang, CHEN Wei.
Research and Implementation on Erasure Code in Cloud File System
[J]. Journal of Frontiers of Computer Science and Technology, 2013, 7(4): 315-325.
|
[15] |
HAO Shuixia1,2+, XU Jinchao2.
Similarity-Driven Parallel Task Partitioning Method for Cloud Computing
[J]. Journal of Frontiers of Computer Science and Technology, 2012, 6(8): 752-759.
|