[1] |
WENG Xiaoyong.
Research on Blockchain Based Cloud Computing Data Sharing System
[J]. Computer Engineering and Applications, 2021, 57(3): 120-124.
|
[2] |
TIAN Zhuojing, HUANG Zhenchun, ZHANG Yinong.
Review of Task Scheduling Methods in Cloud Computing Environment
[J]. Computer Engineering and Applications, 2021, 57(2): 1-11.
|
[3] |
HU Heng, JIN Fenglin, LANG Siqi.
Survey of Research on Computation Offloading Technology in Mobile Edge Computing Environment
[J]. Computer Engineering and Applications, 2021, 57(14): 60-74.
|
[4] |
YU Bo, TAI Xianqing, MA Zhijie.
Study on Attribute and Trust-Based RBAC Model in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(9): 84-92.
|
[5] |
TONG Le, HAO Rong, YU Jia.
Secure Outsourcing Scheme for Bilinear Pairing Based on Single Untrusted Server
[J]. Computer Engineering and Applications, 2020, 56(9): 131-135.
|
[6] |
JIANG Jiao, CAI Linqin, WEI Pengcheng, LI Li.
Aretrieval Scheme Supporting Verifiable Ciphertext Fuzzy Keyword
[J]. Computer Engineering and Applications, 2020, 56(7): 74-80.
|
[7] |
WANG Jie, CHEN Zhigang, LIU Jialing, CHENG Hongbing.
Privacy Behavior Mining Technology for Cloud Computing Based on Clustering
[J]. Computer Engineering and Applications, 2020, 56(5): 80-84.
|
[8] |
DU Wei, FU You.
GPU-Based Least Squares Monte Carlo Algorithm Option Pricing
[J]. Computer Engineering and Applications, 2020, 56(4): 225-229.
|
[9] |
JIN Zhiyan, YANG Lei, LIN Junmin, WANG Zhe.
Communication Avoiding Algorithm of Generalized Conjugate Residual Method
[J]. Computer Engineering and Applications, 2020, 56(3): 74-79.
|
[10] |
LIU Jiahua, CHEN Jingyu.
Design of Multi-core Parallel Spiking Neural Network Simulator
[J]. Computer Engineering and Applications, 2020, 56(22): 244-250.
|
[11] |
KE Changbo, WU Jiayu, CAO Yan.
Research on Oriented Application Layer Evolution Privacy Protection Method in Cloud Computing
[J]. Computer Engineering and Applications, 2020, 56(11): 60-66.
|
[12] |
CHEN Xiang, HE Heng, LI Peng, JIN Yu, NIE Lei.
Ciphertext Image Retrieval Scheme Based on Target Detection in Cloud Environment
[J]. Computer Engineering and Applications, 2020, 56(11): 75-82.
|
[13] |
ZHOU Liang, YING Huan, DAI Bo, QIU Yimin.
Security and Efficient Biometric Identification Outsourcing Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 127-135.
|
[14] |
WU Yangyang, TANG Jianguo.
Research Progress of Attribute Reduction Based on Rough Set in Context of Big Data
[J]. Computer Engineering and Applications, 2019, 55(6): 31-38.
|
[15] |
WU Bo, XU Daoqiang, ZOU Yunfeng, WANG Tiantian, LI Xin.
Stage-Aware Geo-Distributed Data Analytics Job Insurance Mechanism
[J]. Computer Engineering and Applications, 2019, 55(23): 78-85.
|