Deep search:Searching for "cloud computing" in 'ABSTRACT and KEYWORDGot 25 items.
index Title
1Important developments for the digital library: Data Ocean and Smart Library
Author(s):Yun-he Pan   Clicked:4862  Download:2534  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.11 P.837-843  DOI:10.1631/jzus.C1001000
2Optimizing storage performance in public cloud platforms
Author(s):Jian-zong Wang, Peter Varman, Chan...  Clicked:9070  Download:4358  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.12 P.951-964  DOI:10.1631/jzus.C1100097
3From Semantic Grid to Knowledge Service Cloud
Author(s):Zhao-hui Wu, Hua-jun Chen  Clicked:5080  Download:2504  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2012 Vol.13 No.4 P.253-256  DOI:10.1631/jzus.C1101006
4A mixture of HMM, GA, and Elman network for load prediction in cloud-oriented data centers
Author(s):Da-yu Xu, Shan-lin Yang, Ren-ping ...  Clicked:6916  Download:2968  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.11 P.845-858  DOI:10.1631/jzus.C1300109
5NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:9290  Download:4398  Cited:7  <Full Text>  <PPT> 2020
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
6Data center network architecture in cloud computing: review, taxonomy, and open research issues
Author(s):Han Qi, Muhammad Shiraz, Jie-yao L...  Clicked:10643  Download:3792  Cited:9  <Full Text>  <PPT> 2313
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.776-793  DOI:10.1631/jzus.C1400013
7Analyzing the service availability of mobile cloud computing systems by fluid-flow approximation
Author(s):Hong-wu Lv, Jun-yu Lin, Hui-qiang ...  Clicked:6429  Download:2330  Cited:2  <Full Text>  <PPT> 1927
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.7 P.553-567  DOI:10.1631/FITEE.1400410
8Towards adaptable and tunable cloud-based map-matching strategy for GPS trajectories
Author(s):Aftab Ahmed Chandio, Nikos Tzirita...  Clicked:6704  Download:2638  Cited:0  <Full Text>  <PPT> 1689
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.12 P.1305-1319  DOI:10.1631/FITEE.1600027
9Scientific workflow execution system based on mimic defense in the cloud environment
Author(s):Ya-wen Wang, Jiang-xing Wu, Yun-fe...  Clicked:5015  Download:1873  Cited:0  <Full Text>  <PPT> 1526
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1522-1536  DOI:10.1631/FITEE.1800621
10Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He,...  Clicked:6792  Download:2247  Cited:0  <Full Text>  <PPT> 1800
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
11Special issue on future network: software-defined networking
Author(s):Tao Huang, F. Richard Yu, Yun-jie ...  Clicked:3230  Download:1672  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.7 P.603-605  DOI:10.1631/FITEE.SDN2016
12The rise of high-throughput computing
Author(s):Ning-hui Sun, Yun-gang Bao, Dong-r...  Clicked:2794  Download:2138  Cited:0  <Full Text>  <PPT> 1486
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.10 P.1245-1250  DOI:10.1631/FITEE.1800501
13Post-exascale supercomputing: research opportunities abound
Author(s):Zuo-ning Chen, Jack Dongarra, Zhi-...  Clicked:4031  Download:2238  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.10 P.1203-1208  DOI:10.1631/FITEE.1830000
14SIoTFog: Byzantine-resilient IoT fog networking
Author(s):Jian-wen Xu, Kaoru Ota, Mian-xiong...  Clicked:4723  Download:2491  Cited:0  <Full Text>  <PPT> 1517
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1546-1557  DOI:10.1631/FITEE.1800519
15Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual mach...
Author(s):Chao Yang, Yun-fei Guo, Hong-chao ...  Clicked:4803  Download:1970  Cited:0  <Full Text>  <PPT> 1601
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.5 P.731-748  DOI:10.1631/FITEE.1800526
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE