[1] |
LIU Jijun, ZOU Shanhua, LU Xianling.
Joint Optimization Scheme of Resource Allocation and Offloading Decision in Mobile Edge Computing
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(5): 848-858.
|
[2] |
ZHENG Lianghan, HE Heng, TONG Qian, YANG Xiang, CHEN Xiang.
Multi-authority Access Control Scheme in Cloud Environment
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(11): 1865-1878.
|
[3] |
WANG Yonggui, XU Shanshan, XIAO Chenglong.
Research on Wireless City Community Detection: Using Improved Association Rules to Achieve Community Detection Algorithm on Spark
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(9): 1582-1592.
|
[4] |
CHEN Yantong, PEI Shujun, MIAO Hui.
Cost-Optimized Scheduling Algorithm for Cloud Scientific Workflow with Deadline Constraint
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(8): 1307-1318.
|
[5] |
ZHANG Jing, ZHANG Jixian, LI Weidong, LIU Xudong, ZHANG Xuejie.
Auction Mechanism Design for Resources Allocation in Reservation Mode of Sharing Economy
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(6): 901-915.
|
[6] |
XU Meng, BAO Anping, LV Zhanshan.
Research on Access Control for Cloud Storage by Improved ABE
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(3): 437-445.
|
[7] |
TAO Lingling, HUANG Zhiqiu, CAO Yan, ZHANG Mengjiao.
Privacy Preserving Method for Supporting Access Purpose and Reputation Labeling
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(5): 719-729.
|
[8] |
WANG Cong, LI Ruixuan, GU Xiwu, TANG Junwei.
Approach of Detecting and Resolving XACML-Based Policy Conflicts
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(1): 1-16.
|
[9] |
LI Han, ZHENG Shang, CHEN Feng.
Research on Role Engineering of Legacy System
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(12): 1931-1940.
|
[10] |
REN Lu, YIN Qing, CHANG Rui, JIANG Hang.
Research Progress on Access Control Mechanisms for ARM-Android Platforms
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(10): 1545-1556.
|
[11] |
GAO Hanqing, QIN Xiaolin, SHI Wenhao.
Purpose and Context Reasoning Based Access Control Model on Databases
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(9): 1229-1239.
|
[12] |
JIANG Nan, HE Yanxiang, ZHANG Xiaotong, LIU RUI1, SHEN Yunfei.
Formal Analysis and Proof of Java Security Mechanisms
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(11): 1501-1511.
|
[13] |
SHI Wenhao, JIANG Guohua, QIN Xiaolin, WANG Sheng.
Access Control Model Research for HDFS Based on User Trust Value
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(1): 25-35.
|
[14] |
SUN Yanan, DU Yuyue, LIU Wei.
Highway Snow and Ice Emergency Response Process Mining and Model Improvement
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(12): 1523-1530.
|
[15] |
FENG Guangsheng, ZHAO Xiaoyu, MA Jun, GAO Rui, LV Hongwu,WANG Huiqiang, LIU Yongli.
Adaptive Resource Allocation Approach for Cloud Computing Platform Based on Mixed Prediction
[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(10): 1172-1179.
|