[1] |
XU Xiaoyuan, LI Haibo, HUANG Li.
Convex Optimization Analysis of Joint Delay Tail Probability of Multi-heterogeneous Files in Cloud Storage
[J]. Computer Engineering and Applications, 2021, 57(5): 88-94.
|
[2] |
LI Ya, HOU Yandong, LIU Chang.
Adaptive Optimal Fault-Tolerant Control Based on Fault Degree
[J]. Computer Engineering and Applications, 2021, 57(23): 295-302.
|
[3] |
WANG Rihong, XING Congying, XU Quanqing, YUAN Shanshan.
Efficient Byzantine Fault Tolerant Algorithm with Supervision Mechanism
[J]. Computer Engineering and Applications, 2021, 57(18): 142-148.
|
[4] |
WU Bo, LIU Yi.
Data Deduplication Scheme with Dynamic Ownership Management Based on RCE in Cloud Storage
[J]. Computer Engineering and Applications, 2020, 56(5): 101-108.
|
[5] |
HAN Bang, LI Zichen, TANG Yongli.
Design and Implementation of Full Text Retrieval Scheme Based on Homomorphic Encryption
[J]. Computer Engineering and Applications, 2020, 56(21): 103-107.
|
[6] |
LIANG Yanli, LING Jie.
Encrypted Data Sharing Scheme in Cloud Storage Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(17): 41-47.
|
[7] |
LI Rengang, REN Zhixin, WANG Jiangwei, KAN Hongwei, ZHANG Chuang, GONG Weifeng.
Design and Implementation of Memory Data Protection Technology Based on FPGA
[J]. Computer Engineering and Applications, 2020, 56(13): 72-76.
|
[8] |
ZHANG Guipeng, KUANG Zhenxi, CHEN Pinghua.
Cloud Storage Deduplication Scheme Using Signature and Hash Technology
[J]. Computer Engineering and Applications, 2020, 56(1): 76-82.
|
[9] |
TIAN Hua1, YAN Xiai2, YANG Jinmin3.
Adaptive Fault Tolerance Schemes for Cloud Storage of Library
[J]. Computer Engineering and Applications, 2019, 55(7): 95-99.
|
[10] |
CHEN Guosheng, JIANG Lei, LI Tao.
Fault-Tolerant Control of Track Tracking for Quadrotor UAV
[J]. Computer Engineering and Applications, 2019, 55(24): 259-264.
|
[11] |
HOU Limin, GU Haiwang, JIANG Shangkun, LIU Yu.
Research on Dual-Loop Predictive Control for PMSM Fed By Fault-Tolerant Inverter
[J]. Computer Engineering and Applications, 2019, 55(18): 212-217.
|
[12] |
YUAN Ying, ZHU Hongliang, CHEN Yuling, OUYANG Zhi, XIN Yang, YANG Yixian.
Survey of Data Integrity Verification Technology Based on Provable Data Possession
[J]. Computer Engineering and Applications, 2019, 55(18): 1-7.
|
[13] |
LIU Yi, WANG Pingyan.
Secure Data Deduplication Scheme Based on Storage Gateway
[J]. Computer Engineering and Applications, 2019, 55(17): 112-116.
|
[14] |
LIU Zhusong, HE Zhe.
Deduplication with encrypted data based on Merkle Hash tree in cloud storage
[J]. Computer Engineering and Applications, 2018, 54(5): 85-90.
|
[15] |
WANG Tianqi, PANG Xiaoqiong, REN Mengqi.
Batch remote data integrity checking protocol with corrupted data location
[J]. Computer Engineering and Applications, 2018, 54(4): 90-97.
|