| index | Title |
| 1 | KRBKSS: a keyword relationship based keyword-set search system for peer-to-peer networks Author(s):ZHANG Liang, ZOU Fu-tai, MA Fan-yuan Clicked:8204 Download:3868 Cited:0 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.6 P.577-582 DOI:10.1631/jzus.2005.A0577 |
| 2 | Relationship of public preferences and behavior in residential outdoor spaces using analytic hierarchy process and principal component analysis—a case study of Hangzhou City, China Author(s):SHI Jian-ren, ZHAO Xiu-min, GE Jian, HOKAO Kazunori, WANG Zhu Clicked:12938 Download:4078 Cited:0 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.8 P.1372-1385 DOI:10.1631/jzus.2006.A1372 |
| 3 | Automatic relational database compression scheme design based on swarm evolution Author(s):HU Tian-lei, CHEN Gang, LI Xiao-yan, DONG Jin-xiang Clicked:8820 Download:4174 Cited:0 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.10 P.1642-1651 DOI:10.1631/jzus.2006.A1642 |
| 4 | A mathematical model of symmetry based on mathematical definition Author(s):LIU Yusheng, YANG Jiangxin, WU Zhaotong, Gao Shuming Clicked:6332 Download:3365 Cited:0 <Full Text> Journal of Zhejiang University Science 2002 Vol.3 No.1 P.24-29 DOI:10.1631/jzus.2002.0024 |
| 5 | A reference model for database security proxy Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-xiang Clicked:5646 Download:3335 Cited:0 <Full Text> Journal of Zhejiang University Science 2002 Vol.3 No.1 P.30-36 DOI:10.1631/jzus.2002.0030 |
| 6 | Optimizing radial basis function neural network based on rough sets and affinity propagation clustering algorithm Author(s):Xin-zheng Xu, Shi-fei Ding, Zhong-zhi Shi, Hong Zhu Clicked:12237 Download:5167 Cited:12 <Full Text> Journal of Zhejiang University Science C 2012 Vol.13 No.2 P.131-138 DOI:10.1631/jzus.C1100176 |
| 7 | Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren Clicked:12844 Download:10152 Cited:14 <Full Text> Journal of Zhejiang University Science C 2013 Vol.14 No.2 P.85-97 DOI:10.1631/jzus.C1200240 |
| 8 | Knowledge modeling based on interval-valued fuzzy rough set and similarity inference: prediction of welding distortion Author(s):Zhi-qiang Feng, Cun-gen Liu, Hu Huang Clicked:9927 Download:5020 Cited:1 <Full Text> <PPT> 2930 Journal of Zhejiang University Science C 2014 Vol.15 No.8 P.636-650 DOI:10.1631/jzus.C1300370 |
| 9 | Resampling methods for particle filtering: identical distribution, a new method, and comparable study Author(s):Tian-cheng Li, Gabriel Villarrubia, Shu-dong Sun, Juan M. Corchado, Javier Bajo Clicked:17541 Download:10580 Cited:8 <Full Text> <PPT> 3676 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.11 P.969-984 DOI:10.1631/FITEE.1500199 |
| 10 | Attribute reduction in interval-valued information systems based on information entropies Author(s):Jian-hua Dai, Hu Hu, Guo-jie Zheng, Qing-hua Hu, Hui-feng Han, Hong Shi Clicked:8524 Download:4170 Cited:4 <Full Text> <PPT> 2545 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.9 P.919-928 DOI:10.1631/FITEE.1500447 |
| 11 | Additive effects due to biochar and endophyte application enable soybean to enhance nutrient uptake and modulate nutritional parameters Author(s):Muhammad Waqas, Yoon-Ha Kim, Abdul Latif Khan, Raheem Shahzad, Sajjad Asaf, Muhammad Hamayun, Sang-Mo Kang, Muhammad Aaqil Khan, In-Jung Lee Clicked:7999 Download:4742 Cited:2 <Full Text> <PPT> 2459 Journal of Zhejiang University Science B 2017 Vol.18 No.2 P.109-124 DOI:10.1631/jzus.B1500262 |
| 12 | Theoretical foundation of a decision network for urban development Author(s):Shih-kung Lai, Jhong-you Huang Clicked:12516 Download:8890 Cited:1 <Full Text> <PPT> 2691 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.8 P.1033-1039 DOI:10.1631/FITEE.1510000 |
| 13 | Generic user revocation systems for attribute-based encryption in cloud storage Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li Clicked:8978 Download:4400 Cited:0 <Full Text> <PPT> 2786 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.11 P.1362-1384 DOI:10.1631/FITEE.1800405 |
| 14 | Generic attribute revocation systems for attribute-based encryption in cloud storage Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang Clicked:10087 Download:3889 Cited:0 <Full Text> <PPT> 2593 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.6 P.773-786 DOI:10.1631/FITEE.1800512 |
| 15 | TDIVis: visual analysis of tourism destination images Author(s):Meng-qi Cao, Jing Liang, Ming-zhao Li, Zheng-hao Zhou, Min Zhu Clicked:8787 Download:3967 Cited:0 <Full Text> <PPT> 2445 Frontiers of Information Technology & Electronic Engineering 2020 Vol.21 No.4 P.536-557 DOI:10.1631/FITEE.1900631 |
