Advanced Search



20 results found in all.
index Title
1A flexible architecture for job management in a grid environment
Author(s):LUAN Cui-ju, SONG Guang-hua, ZHENG Yao, ZHANG Ji-fa  Clicked:6349  Download:3750  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2007 Vol.8 No.1 P.95-105  DOI:10.1631/jzus.2007.A0095
2Multiple hashes of single key with passcode for multiple accounts
Author(s):LEE Kok-wah, EWE Hong-tat  Clicked:6531  Download:4016  Cited:2  <Full Text>
Journal of Zhejiang University Science A  2007 Vol.8 No.8 P.1183-1190  DOI:10.1631/jzus.2007.A1183
3An XPath-based OWL storage model for effective ontology management in Semantic Web environment
Author(s):Jinhyung KIM, Dongwon JEONG, Doo-kwon BAIK  Clicked:6537  Download:4004  Cited:2  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.6 P.843-857  DOI:10.1631/jzus.A0820355
4Extending attributes page: a scheme for enhancing the reliability of storage system metadata
Author(s):Juan WANG, Dan FENG, Fang WANG, Cheng-tao LU  Clicked:6539  Download:3413  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.8 P.1106-1113  DOI:10.1631/jzus.A0820485
5Is playing-as-downloading feasible in an eMule P2P file sharing system?
Author(s):Wen-yi Wang, Yao-wu Chen  Clicked:8259  Download:3796  Cited:0  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.6 P.465-475  DOI:10.1631/jzus.C0910408
6An immune local concentration based virus detection approach
Author(s):Wei Wang, Peng-tao Zhang, Ying Tan, Xin-gui He  Clicked:9844  Download:3837  Cited:5  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.6 P.443-454  DOI:10.1631/jzus.C1000445
7A generic approach of integrating 3D models into virtual manufacturing
Author(s):Hwa-Jen Yap, Zahari Taha, Siti Zawiah Md Dawal  Clicked:9070  Download:4484  Cited:3  <Full Text>
Journal of Zhejiang University Science A  2012 Vol.13 No.1 P.20-28  DOI:10.1631/jzus.C11a0077
8Automatic recovery from resource exhaustion exceptions by collecting leaked resources
Author(s):Zi-ying Dai, Xiao-guang Mao, Li-qian Chen, Yan Lei  Clicked:7411  Download:3312  Cited:0  <Full Text>
Journal of Zhejiang University Science C  2014 Vol.15 No.8 P.622-635  DOI:10.1631/jzus.C1300352
9Exploring optimal combination of a file system and an I/O scheduler for underlying solid state disks
Author(s):Hui Sun, Xiao Qin, Chang-sheng Xie  Clicked:9618  Download:3754  Cited:0  <Full Text>  <PPT> 3123
Journal of Zhejiang University Science C  2014 Vol.15 No.8 P.607-621  DOI:10.1631/jzus.C1300314
10ImgFS: a transparent cryptography for stored images using a filesystem in userspace
Author(s):Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan  Clicked:7861  Download:3737  Cited:0  <Full Text>  <PPT> 2681
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.1 P.28-42  DOI:10.1631/FITEE.1400133
11Dr. Hadoop: an infinite scalable metadata management for Hadoop—How the baby elephant becomes immortal
Author(s):Dipayan Dev, Ripon Patgiri  Clicked:10260  Download:10321  Cited:1  <Full Text>  <PPT> 2481
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.1 P.15-31  DOI:10.1631/FITEE.1500015
12ONFS: a hierarchical hybrid file system based on memory, SSD, and HDD for high performance computers
Author(s):Xin Liu, Yu-tong Lu, Jie Yu, Peng-fei Wang, Jie-ting Wu, Ying Lu  Clicked:11273  Download:4268  Cited:0  <Full Text>  <PPT> 2446
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1940-1971  DOI:10.1631/FITEE.1700626
13A novel non-volatile memory storage system for I/O-intensive applications
Author(s):Wen-bing Han, Xiao-gang Chen, Shun-fen Li, Ge-zi Li, Zhi-tang Song, Da-gang Li, Shi-yan Chen  Clicked:5436  Download:3050  Cited:0  <Full Text>  <PPT> 2186
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.10 P.1291-1302  DOI:10.1631/FITEE.1700061
14MDLB: a metadata dynamic load balancing mechanism based on reinforcement learning
Author(s):Zhao-qi Wu, Jin Wei, Fan Zhang, Wei Guo, Guang-wei Xie  Clicked:7472  Download:12168  Cited:0  <Full Text>  <PPT> 1899
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.7 P.1034-1046  DOI:10.1631/FITEE.1900121
15Identity-based threshold proxy re-encryption scheme from lattices and its applications
Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG  Clicked:8021  Download:11971  Cited:0  <Full Text>  <PPT> 1045
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.2 P.258-277  DOI:10.1631/FITEE.2000366
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE