[1] |
ZHANG Chi, WANG Yuxin, FENG Zhen, GUO He.
Energy-Efficient Task Scheduling Algorithm in Two-Layer Virtualized Cloud Architecture
[J]. Computer Engineering and Applications, 2021, 57(3): 103-111.
|
[2] |
WENG Xiaoyong.
Research on Blockchain Based Cloud Computing Data Sharing System
[J]. Computer Engineering and Applications, 2021, 57(3): 120-124.
|
[3] |
TIAN Zhuojing, HUANG Zhenchun, ZHANG Yinong.
Review of Task Scheduling Methods in Cloud Computing Environment
[J]. Computer Engineering and Applications, 2021, 57(2): 1-11.
|
[4] |
HU Heng, JIN Fenglin, LANG Siqi.
Survey of Research on Computation Offloading Technology in Mobile Edge Computing Environment
[J]. Computer Engineering and Applications, 2021, 57(14): 60-74.
|
[5] |
YU Bo, TAI Xianqing, MA Zhijie.
Study on Attribute and Trust-Based RBAC Model in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(9): 84-92.
|
[6] |
TONG Le, HAO Rong, YU Jia.
Secure Outsourcing Scheme for Bilinear Pairing Based on Single Untrusted Server
[J]. Computer Engineering and Applications, 2020, 56(9): 131-135.
|
[7] |
JIANG Jiao, CAI Linqin, WEI Pengcheng, LI Li.
Aretrieval Scheme Supporting Verifiable Ciphertext Fuzzy Keyword
[J]. Computer Engineering and Applications, 2020, 56(7): 74-80.
|
[8] |
WANG Jie, CHEN Zhigang, LIU Jialing, CHENG Hongbing.
Privacy Behavior Mining Technology for Cloud Computing Based on Clustering
[J]. Computer Engineering and Applications, 2020, 56(5): 80-84.
|
[9] |
HE Huanye, LIN Guoyuan, GU Hao, FANG Menghua.
Improved LOF Algorithm in Cloud Virtual Machine Anomaly Detection Scenario
[J]. Computer Engineering and Applications, 2020, 56(23): 80-86.
|
[10] |
KE Changbo, WU Jiayu, CAO Yan.
Research on Oriented Application Layer Evolution Privacy Protection Method in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(11): 60-66.
|
[11] |
CHEN Xiang, HE Heng, LI Peng, JIN Yu, NIE Lei.
Ciphertext Image Retrieval Scheme Based on Target Detection in Cloud Environment
[J]. Computer Engineering and Applications, 2020, 56(11): 75-82.
|
[12] |
ZHOU Liang, YING Huan, DAI Bo, QIU Yimin.
Security and Efficient Biometric Identification Outsourcing Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 127-135.
|
[13] |
LI Shuailong1,2,3, ZHANG Huiwen1,2,3, ZHOU Weijia1,2.
Review of Imitation Learning Methods and Its Application in Robotics
[J]. Computer Engineering and Applications, 2019, 55(4): 17-30.
|
[14] |
WU Bo, XU Daoqiang, ZOU Yunfeng, WANG Tiantian, LI Xin.
Stage-Aware Geo-Distributed Data Analytics Job Insurance Mechanism
[J]. Computer Engineering and Applications, 2019, 55(23): 78-85.
|
[15] |
WANG Dezheng1, ZHANG Yinong1, YANG Fan2.
Implementation of parallel PLS algorithm of process monitoring using MapReduce
[J]. Computer Engineering and Applications, 2018, 54(24): 61-65.
|