[1] |
WENG Xiaoyong.
Research on Blockchain Based Cloud Computing Data Sharing System
[J]. Computer Engineering and Applications, 2021, 57(3): 120-124.
|
[2] |
TIAN Zhuojing, HUANG Zhenchun, ZHANG Yinong.
Review of Task Scheduling Methods in Cloud Computing Environment
[J]. Computer Engineering and Applications, 2021, 57(2): 1-11.
|
[3] |
LIU Jinghua, TAI Xianqing, MA Zhijie, CHEN Dapeng.
Study on User Requirement-Based Dynamic QoS Service Selection Method
[J]. Computer Engineering and Applications, 2021, 57(17): 106-115.
|
[4] |
HU Heng, JIN Fenglin, LANG Siqi.
Survey of Research on Computation Offloading Technology in Mobile Edge Computing Environment
[J]. Computer Engineering and Applications, 2021, 57(14): 60-74.
|
[5] |
YU Bo, TAI Xianqing, MA Zhijie.
Study on Attribute and Trust-Based RBAC Model in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(9): 84-92.
|
[6] |
TONG Le, HAO Rong, YU Jia.
Secure Outsourcing Scheme for Bilinear Pairing Based on Single Untrusted Server
[J]. Computer Engineering and Applications, 2020, 56(9): 131-135.
|
[7] |
JIANG Jiao, CAI Linqin, WEI Pengcheng, LI Li.
Aretrieval Scheme Supporting Verifiable Ciphertext Fuzzy Keyword
[J]. Computer Engineering and Applications, 2020, 56(7): 74-80.
|
[8] |
WANG Jie, CHEN Zhigang, LIU Jialing, CHENG Hongbing.
Privacy Behavior Mining Technology for Cloud Computing Based on Clustering
[J]. Computer Engineering and Applications, 2020, 56(5): 80-84.
|
[9] |
ZHENG Zupeng, WANG Zumin, PENG Yang, JI Changqing, QIN Jing.
Survey of MAC Protocols for Energy Harvesting Sensor Networks
[J]. Computer Engineering and Applications, 2020, 56(15): 24-29.
|
[10] |
KE Changbo, WU Jiayu, CAO Yan.
Research on Oriented Application Layer Evolution Privacy Protection Method in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(11): 60-66.
|
[11] |
CHEN Xiang, HE Heng, LI Peng, JIN Yu, NIE Lei.
Ciphertext Image Retrieval Scheme Based on Target Detection in Cloud Environment
[J]. Computer Engineering and Applications, 2020, 56(11): 75-82.
|
[12] |
ZHOU Liang, YING Huan, DAI Bo, QIU Yimin.
Security and Efficient Biometric Identification Outsourcing Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 127-135.
|
[13] |
WU Bo, XU Daoqiang, ZOU Yunfeng, WANG Tiantian, LI Xin.
Stage-Aware Geo-Distributed Data Analytics Job Insurance Mechanism
[J]. Computer Engineering and Applications, 2019, 55(23): 78-85.
|
[14] |
WANG Dezheng1, ZHANG Yinong1, YANG Fan2.
Implementation of parallel PLS algorithm of process monitoring using MapReduce
[J]. Computer Engineering and Applications, 2018, 54(24): 61-65.
|
[15] |
LIU Jun.
Selection of cloud computing service provider based on hesitant fuzzy group decision making model
[J]. Computer Engineering and Applications, 2018, 54(23): 109-114.
|