Deep search:Searching for "cloud computing" in 'ABSTRACT and KEYWORDGot 25 items.
index Title
1Important developments for the digital library: Data Ocean and Smart Library
Author(s):Yun-he Pan   Clicked:5543  Download:3030  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.11 P.837-843  DOI:10.1631/jzus.C1001000
2Optimizing storage performance in public cloud platforms
Author(s):Jian-zong Wang, Peter Varman, Chan...  Clicked:10442  Download:4837  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.12 P.951-964  DOI:10.1631/jzus.C1100097
3From Semantic Grid to Knowledge Service Cloud
Author(s):Zhao-hui Wu, Hua-jun Chen  Clicked:5691  Download:2851  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2012 Vol.13 No.4 P.253-256  DOI:10.1631/jzus.C1101006
4A mixture of HMM, GA, and Elman network for load prediction in cloud-oriented data centers
Author(s):Da-yu Xu, Shan-lin Yang, Ren-ping ...  Clicked:8336  Download:3393  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.11 P.845-858  DOI:10.1631/jzus.C1300109
5NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:11088  Download:5118  Cited:7  <Full Text>  <PPT> 2413
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
6Data center network architecture in cloud computing: review, taxonomy, and open research issues
Author(s):Han Qi, Muhammad Shiraz, Jie-yao L...  Clicked:11969  Download:4581  Cited:9  <Full Text>  <PPT> 2701
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.776-793  DOI:10.1631/jzus.C1400013
7Analyzing the service availability of mobile cloud computing systems by fluid-flow approximation
Author(s):Hong-wu Lv, Jun-yu Lin, Hui-qiang ...  Clicked:8191  Download:2821  Cited:2  <Full Text>  <PPT> 2263
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.7 P.553-567  DOI:10.1631/FITEE.1400410
8Towards adaptable and tunable cloud-based map-matching strategy for GPS trajectories
Author(s):Aftab Ahmed Chandio, Nikos Tzirita...  Clicked:8653  Download:3231  Cited:0  <Full Text>  <PPT> 2164
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.12 P.1305-1319  DOI:10.1631/FITEE.1600027
9Scientific workflow execution system based on mimic defense in the cloud environment
Author(s):Ya-wen Wang, Jiang-xing Wu, Yun-fe...  Clicked:6410  Download:2386  Cited:0  <Full Text>  <PPT> 1914
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1522-1536  DOI:10.1631/FITEE.1800621
10Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He,...  Clicked:8690  Download:2883  Cited:0  <Full Text>  <PPT> 2270
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
11Special issue on future network: software-defined networking
Author(s):Tao Huang, F. Richard Yu, Yun-jie ...  Clicked:3466  Download:1934  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.7 P.603-605  DOI:10.1631/FITEE.SDN2016
12The rise of high-throughput computing
Author(s):Ning-hui Sun, Yun-gang Bao, Dong-r...  Clicked:3803  Download:2722  Cited:0  <Full Text>  <PPT> 1816
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.10 P.1245-1250  DOI:10.1631/FITEE.1800501
13Post-exascale supercomputing: research opportunities abound
Author(s):Zuo-ning Chen, Jack Dongarra, Zhi-...  Clicked:5298  Download:2746  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.10 P.1203-1208  DOI:10.1631/FITEE.1830000
14SIoTFog: Byzantine-resilient IoT fog networking
Author(s):Jian-wen Xu, Kaoru Ota, Mian-xiong...  Clicked:5896  Download:3194  Cited:0  <Full Text>  <PPT> 1800
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1546-1557  DOI:10.1631/FITEE.1800519
15Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual mach...
Author(s):Chao Yang, Yun-fei Guo, Hong-chao ...  Clicked:6400  Download:2452  Cited:0  <Full Text>  <PPT> 1891
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.5 P.731-748  DOI:10.1631/FITEE.1800526
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE