[1] |
XU Xiaoyuan, LI Haibo, HUANG Li.
Convex Optimization Analysis of Joint Delay Tail Probability of Multi-heterogeneous Files in Cloud Storage
[J]. Computer Engineering and Applications, 2021, 57(5): 88-94.
|
[2] |
WANG Xiao, TANG Lun, HE Xiaoyu, CHEN Qianbin.
Multi-dimensional Resource Optimization of Service Function Chain Based on Deep Reinforcement Learning
[J]. Computer Engineering and Applications, 2021, 57(4): 68-76.
|
[3] |
WU Bo, LIU Yi.
Data Deduplication Scheme with Dynamic Ownership Management Based on RCE in Cloud Storage
[J]. Computer Engineering and Applications, 2020, 56(5): 101-108.
|
[4] |
HAN Bang, LI Zichen, TANG Yongli.
Design and Implementation of Full Text Retrieval Scheme Based on Homomorphic Encryption
[J]. Computer Engineering and Applications, 2020, 56(21): 103-107.
|
[5] |
LIANG Yanli, LING Jie.
Encrypted Data Sharing Scheme in Cloud Storage Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(17): 41-47.
|
[6] |
CHANG Haifeng, SONG Tian, YANG Yating.
Heuristic Method of Resource Allocation on Single Node in NFV
[J]. Computer Engineering and Applications, 2020, 56(11): 105-111.
|
[7] |
JIANG Shuli, LIU Yuan, WANG Xiaofeng.
Broadband User Behavior Emulation Technology for Space-Ground Integrated Information Network
[J]. Computer Engineering and Applications, 2020, 56(10): 75-82.
|
[8] |
ZHANG Guipeng, KUANG Zhenxi, CHEN Pinghua.
Cloud Storage Deduplication Scheme Using Signature and Hash Technology
[J]. Computer Engineering and Applications, 2020, 56(1): 76-82.
|
[9] |
TIAN Hua1, YAN Xiai2, YANG Jinmin3.
Adaptive Fault Tolerance Schemes for Cloud Storage of Library
[J]. Computer Engineering and Applications, 2019, 55(7): 95-99.
|
[10] |
XU Daoqiang, ZOU Yunfeng, DENG Junhua, LI Hao, QIAN Zhuzhong.
Research on Virtual Network Function Chain Deployment for NUMA Systems
[J]. Computer Engineering and Applications, 2019, 55(21): 115-121.
|
[11] |
YUAN Ying, ZHU Hongliang, CHEN Yuling, OUYANG Zhi, XIN Yang, YANG Yixian.
Survey of Data Integrity Verification Technology Based on Provable Data Possession
[J]. Computer Engineering and Applications, 2019, 55(18): 1-7.
|
[12] |
LIU Yi, WANG Pingyan.
Secure Data Deduplication Scheme Based on Storage Gateway
[J]. Computer Engineering and Applications, 2019, 55(17): 112-116.
|
[13] |
LIU Zhusong, HE Zhe.
Deduplication with encrypted data based on Merkle Hash tree in cloud storage
[J]. Computer Engineering and Applications, 2018, 54(5): 85-90.
|
[14] |
WANG Tianqi, PANG Xiaoqiong, REN Mengqi.
Batch remote data integrity checking protocol with corrupted data location
[J]. Computer Engineering and Applications, 2018, 54(4): 90-97.
|
[15] |
REN Mengqi, PANG Xiaoqiong, WANG Tianqi, NIE Mengfei.
Data integrity checking scheme with privacy protecting in multi-cloud storage
[J]. Computer Engineering and Applications, 2018, 54(22): 60-66.
|