Advanced Search



29 results found in all.
index Title
1Surface reconstruction by offset surface filtering
Author(s):DONG Chen-shi, WANG Guo-zhao  Clicked:4937  Download:3130  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2005 Vol.6 No.100 P.137-143  DOI:10.1631/jzus.2005.AS0137
2Important developments for the digital library: Data Ocean and Smart Library
Author(s):Yun-he Pan   Clicked:6701  Download:3511  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.11 P.837-843  DOI:10.1631/jzus.C1001000
3Optimizing storage performance in public cloud platforms
Author(s):Jian-zong Wang, Peter Varman, Chang-sheng Xie  Clicked:11385  Download:5384  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.12 P.951-964  DOI:10.1631/jzus.C1100097
4From Semantic Grid to Knowledge Service Cloud
Author(s):Zhao-hui Wu, Hua-jun Chen  Clicked:6894  Download:3428  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2012 Vol.13 No.4 P.253-256  DOI:10.1631/jzus.C1101006
5A mixture of HMM, GA, and Elman network for load prediction in cloud-oriented data centers
Author(s):Da-yu Xu, Shan-lin Yang, Ren-ping Liu  Clicked:9673  Download:4079  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.11 P.845-858  DOI:10.1631/jzus.C1300109
6NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:12392  Download:8705  Cited:7  <Full Text>  <PPT> 3028
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
7Data center network architecture in cloud computing: review, taxonomy, and open research issues
Author(s):Han Qi, Muhammad Shiraz, Jie-yao Liu, Abdullah Gani, Zulkanain ABDUL Rahman, Torki A. Altameem  Clicked:14190  Download:5806  Cited:9  <Full Text>  <PPT> 3319
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.776-793  DOI:10.1631/jzus.C1400013
8Analyzing the service availability of mobile cloud computing systems by fluid-flow approximation
Author(s):Hong-wu Lv, Jun-yu Lin, Hui-qiang Wang, Guang-sheng Feng, Mo Zhou  Clicked:9963  Download:3836  Cited:2  <Full Text>  <PPT> 2856
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.7 P.553-567  DOI:10.1631/FITEE.1400410
9Scientific workflow execution system based on mimic defense in the cloud environment
Author(s):Ya-wen Wang, Jiang-xing Wu, Yun-fei Guo, Hong-chao Hu, Wen-yan Liu, Guo-zhen Cheng  Clicked:8526  Download:3511  Cited:0  <Full Text>  <PPT> 2413
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1522-1536  DOI:10.1631/FITEE.1800621
10Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He, Muhammad-Khurram Khan  Clicked:9913  Download:3988  Cited:0  <Full Text>  <PPT> 2936
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
11Special issue on future network: software-defined networking
Author(s):Tao Huang, F. Richard Yu, Yun-jie LIU  Clicked:4411  Download:2886  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.7 P.603-605  DOI:10.1631/FITEE.SDN2016
12The rise of high-throughput computing
Author(s):Ning-hui Sun, Yun-gang Bao, Dong-rui Fan  Clicked:5087  Download:3936  Cited:0  <Full Text>  <PPT> 2469
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.10 P.1245-1250  DOI:10.1631/FITEE.1800501
13Post-exascale supercomputing: research opportunities abound
Author(s):Zuo-ning Chen, Jack Dongarra, Zhi-wei Xu  Clicked:6969  Download:3924  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.10 P.1203-1208  DOI:10.1631/FITEE.1830000
14SIoTFog: Byzantine-resilient IoT fog networking
Author(s):Jian-wen Xu, Kaoru Ota, Mian-xiong Dong, An-feng Liu, Qiang Li  Clicked:7684  Download:4378  Cited:0  <Full Text>  <PPT> 2349
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1546-1557  DOI:10.1631/FITEE.1800519
15A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
Author(s):Xin Wang, Bo Yang, Zhe Xia, Hong-xia Hou  Clicked:9894  Download:3637  Cited:0  <Full Text>  <PPT> 2443
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.787-800  DOI:10.1631/FITEE.1800066
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE