Advanced Search



10 results found in all.
index Title
1Consistency maintenance for constraint in role-based access control model
Author(s):HAN Wei-li, CHEN Gang, YIN Jian-wei, DONG Jin-xiang  Clicked:6284  Download:3216  Cited:0  <Full Text>
Journal of Zhejiang University Science  2002 Vol.3 No.3 P.292-297  DOI:10.1631/jzus.2002.0292
2A Chebyshev/Legendre polynomial interpolation approach for fingerprint orientation estimation smoothing and prediction
Author(s):Ashkan Tashk, Mohammad Sadegh Helfroush, Mohammad Javad Dehghani  Clicked:9848  Download:4189  Cited:2  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.12 P.976-988  DOI:10.1631/jzus.C0910749
3An approach to optimize the batch mixing process for improving the quality consistency of the products made from traditional Chinese medicines
Author(s):Bin-jun Yan, Hai-bin Qu  Clicked:7081  Download:3962  Cited:0  <Full Text>
Journal of Zhejiang University Science B  2013 Vol.14 No.11 P.1041-1048  DOI:10.1631/jzus.B1300059
4Quantitative evaluation of model consistency evolution in compositional service-oriented simulation using a connected hyper-digraph
Author(s):Lin-jun Fan, Yun-xiang Ling, Xing-tao Zhang, Jun Tang  Clicked:10578  Download:4619  Cited:0  <Full Text>
Journal of Zhejiang University Science C  2014 Vol.15 No.1 P.1-12  DOI:10.1631/jzus.C1300089
5A multiscale-contour-based interpolation framework for generating a time-varying quasi-dense point cloud sequence
Author(s):Chu-hua Huang, Dong-ming Lu, Chang-yu Diao  Clicked:9888  Download:4233  Cited:0  <Full Text>  <PPT> 2738
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.5 P.422-434  DOI:10.1631/FITEE.1500316
6Big data storage technologies: a survey
Author(s):Aisha Siddiqa, Ahmad Karim, Abdullah Gani  Clicked:30710  Download:23879  Cited:0  <Full Text>  <PPT> 11576
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.8 P.1040-1070  DOI:10.1631/FITEE.1500441
7On the principles of Parsimony and Self-consistency for the emergence of intelligence
Author(s):Yi MA, Doris TSAO, Heung-Yeung SHUM  Clicked:6177  Download:25370  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.9 P.1298-1323  DOI:10.1631/FITEE.2200297
8DDUC: an erasure-coded system with decoupled data updating and coding
Author(s):Yaofeng TU, Rong XIAO, Yinjun HAN, Zhenghua CHEN, Hao JIN, Xuecheng QI, Xinyuan SUN  Clicked:4195  Download:10750  Cited:0  <Full Text>  <PPT> 1014
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.5 P.716-730  DOI:10.1631/FITEE.2200466
9HADF: a hash-adaptive dual fusion implicit network for super-resolution of turbulent flows
Author(s):Yunfei LIU, Xinhai CHEN, Gen ZHANG, Qingyang ZHANG, Qinglin WANG, Jie LIU  Clicked:384  Download:228  Cited:0  <Full Text>  <PPT> 260
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.11 P.2159-2175  DOI:10.1631/FITEE.2500419
10Multi-perspective consistency checking for large language model hallucination detection: a black-box zero-resource approach
Author(s):Linggang KONG, Xiaofeng ZHONG, Jie CHEN, Haoran FU, Yongjie WANG  Clicked:506  Download:272  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.11 P.2298-2309  DOI:10.1631/FITEE.2500180
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE