| index | Title |
| 1 | KRBKSS: a keyword relationship based keyword-set search system for peer-to-peer networks Author(s):ZHANG Liang, ZOU Fu-tai, MA Fan-yuan Clicked:8403 Download:3898 Cited:0 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.6 P.577-582 DOI:10.1631/jzus.2005.A0577 |
| 2 | Relationship of public preferences and behavior in residential outdoor spaces using analytic hierarchy process and principal component analysis—a case study of Hangzhou City, China Author(s):SHI Jian-ren, ZHAO Xiu-min, GE Jian, HOKAO Kazunori, WANG Zhu Clicked:13137 Download:4137 Cited:0 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.8 P.1372-1385 DOI:10.1631/jzus.2006.A1372 |
| 3 | Automatic relational database compression scheme design based on swarm evolution Author(s):HU Tian-lei, CHEN Gang, LI Xiao-yan, DONG Jin-xiang Clicked:8889 Download:4200 Cited:0 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.10 P.1642-1651 DOI:10.1631/jzus.2006.A1642 |
| 4 | A mathematical model of symmetry based on mathematical definition Author(s):LIU Yusheng, YANG Jiangxin, WU Zhaotong, Gao Shuming Clicked:6423 Download:3400 Cited:0 <Full Text> Journal of Zhejiang University Science 2002 Vol.3 No.1 P.24-29 DOI:10.1631/jzus.2002.0024 |
| 5 | A reference model for database security proxy Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-xiang Clicked:5715 Download:3363 Cited:0 <Full Text> Journal of Zhejiang University Science 2002 Vol.3 No.1 P.30-36 DOI:10.1631/jzus.2002.0030 |
| 6 | Optimizing radial basis function neural network based on rough sets and affinity propagation clustering algorithm Author(s):Xin-zheng Xu, Shi-fei Ding, Zhong-zhi Shi, Hong Zhu Clicked:12337 Download:5189 Cited:12 <Full Text> Journal of Zhejiang University Science C 2012 Vol.13 No.2 P.131-138 DOI:10.1631/jzus.C1100176 |
| 7 | Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren Clicked:12928 Download:10331 Cited:14 <Full Text> Journal of Zhejiang University Science C 2013 Vol.14 No.2 P.85-97 DOI:10.1631/jzus.C1200240 |
| 8 | Knowledge modeling based on interval-valued fuzzy rough set and similarity inference: prediction of welding distortion Author(s):Zhi-qiang Feng, Cun-gen Liu, Hu Huang Clicked:10010 Download:5218 Cited:1 <Full Text> <PPT> 2963 Journal of Zhejiang University Science C 2014 Vol.15 No.8 P.636-650 DOI:10.1631/jzus.C1300370 |
| 9 | Resampling methods for particle filtering: identical distribution, a new method, and comparable study Author(s):Tian-cheng Li, Gabriel Villarrubia, Shu-dong Sun, Juan M. Corchado, Javier Bajo Clicked:17636 Download:10842 Cited:8 <Full Text> <PPT> 3723 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.11 P.969-984 DOI:10.1631/FITEE.1500199 |
| 10 | Attribute reduction in interval-valued information systems based on information entropies Author(s):Jian-hua Dai, Hu Hu, Guo-jie Zheng, Qing-hua Hu, Hui-feng Han, Hong Shi Clicked:8604 Download:4349 Cited:4 <Full Text> <PPT> 2576 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.9 P.919-928 DOI:10.1631/FITEE.1500447 |
| 11 | Additive effects due to biochar and endophyte application enable soybean to enhance nutrient uptake and modulate nutritional parameters Author(s):Muhammad Waqas, Yoon-Ha Kim, Abdul Latif Khan, Raheem Shahzad, Sajjad Asaf, Muhammad Hamayun, Sang-Mo Kang, Muhammad Aaqil Khan, In-Jung Lee Clicked:8099 Download:4924 Cited:2 <Full Text> <PPT> 2512 Journal of Zhejiang University Science B 2017 Vol.18 No.2 P.109-124 DOI:10.1631/jzus.B1500262 |
| 12 | Theoretical foundation of a decision network for urban development Author(s):Shih-kung Lai, Jhong-you Huang Clicked:12632 Download:9052 Cited:1 <Full Text> <PPT> 2739 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.8 P.1033-1039 DOI:10.1631/FITEE.1510000 |
| 13 | Generic user revocation systems for attribute-based encryption in cloud storage Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li Clicked:9102 Download:4581 Cited:0 <Full Text> <PPT> 2827 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.11 P.1362-1384 DOI:10.1631/FITEE.1800405 |
| 14 | Generic attribute revocation systems for attribute-based encryption in cloud storage Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang Clicked:10197 Download:4070 Cited:0 <Full Text> <PPT> 2649 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.6 P.773-786 DOI:10.1631/FITEE.1800512 |
| 15 | TDIVis: visual analysis of tourism destination images Author(s):Meng-qi Cao, Jing Liang, Ming-zhao Li, Zheng-hao Zhou, Min Zhu Clicked:8970 Download:4148 Cited:0 <Full Text> <PPT> 2488 Frontiers of Information Technology & Electronic Engineering 2020 Vol.21 No.4 P.536-557 DOI:10.1631/FITEE.1900631 |
