[1] |
YANG Song, WANG Xin-ru, LI Fan, ZHU Lie-huang, ZHAO Bo.
A blockchain-based crowdsourcing incentive mechanism
[J]. Computer Engineering & Science, 2024, 46(11): 1960-1970.
|
[2] |
LI Bao, ZHU Shu, WANG Xiao-chuan, REN Yi, TAN Yu-song.
A time-aware dominant resource fair scheduling algorithm for edge function computing
[J]. Computer Engineering & Science, 2024, 46(10): 1711-1719.
|
[3] |
GU Ying-cheng, WEI Liu, JIANG Ning, CHENG Huan-yu, LIU Kai, SONG Yu, LIU Mei-zhao, TANG Lei, CHEN Yu, ZHANG Sheng.
Edge server assignment for distributed interactive applications in edge environments
[J]. Computer Engineering & Science, 2024, 46(10): 1748-1756.
|
[4] |
GUO Chang-hao, TANG Xiang-yun, WENG Yu.
A data heterogeneity processing method based on asynchronous hierarchical federated learning
[J]. Computer Engineering & Science, 2024, 46(07): 1237-1244.
|
[5] |
WU Xia, ZHENG Hong-ying, XIAO Di.
A dual-verification model watermarking scheme based on certification files
[J]. Computer Engineering & Science, 2024, 46(04): 647-656.
|
[6] |
LI Lei, ZHENG Li-ming, WANG Hong-yi, CHAI Yong-yi, LIU Pei-guo.
A 6H parallel computing architecture for edge computing
[J]. Computer Engineering & Science, 2023, 45(09): 1544-1552.
|
[7] |
FU Wei, XIE Zhen-jie, ZHU Ting-ting, REN Zheng-wei.
An assured deletion scheme of cloud data based on strongly non-separable cipher
[J]. Computer Engineering & Science, 2023, 45(03): 434-442.
|
[8] |
BAI Jian-jing, GU Rui-chun, LIU Qing-he.
A DDoS attack detection scheme based on Bi-LSTM in SDN
[J]. Computer Engineering & Science, 2023, 45(02): 277-285.
|
[9] |
KOU Guang-yue, WEI Guo-heng, PING Yuan, LIU Peng.
Overview of RFID security authentication protocols
[J]. Computer Engineering & Science, 2023, 45(01): 77-84.
|
[10] |
DING Yan, WANG Chuang, FENG Liao-liao, WANG Feng, CHANG Jun-sheng.
Trusted data circulation between alliances based on supervision of blockchain
[J]. Computer Engineering & Science, 2022, 44(10): 1771-1780.
|
[11] |
GONG Rui, SHI Wei, LIU Wei, ZHANG Jian-feng, WANG Lei.
Design and implementation of CPU secure boot based on NAND Flash
[J]. Computer Engineering & Science, 2022, 44(06): 971-978.
|
[12] |
CHEN Xiang-guo, SHANG Fan, SONG Jun-qiang.
Comparison among embedded system security protection schemes and their application case analysis
[J]. Computer Engineering & Science, 2022, 44(03): 417-426.
|
[13] |
CAO Shou-qi, HE Xin, LIU Wan-rong.
An improved remote user authentication scheme
[J]. Computer Engineering & Science, 2021, 43(11): 1960-1965.
|
[14] |
ZHAO Guo-sheng, WANG Tian-tian, WANG Jian.
A dynamic trust evaluation model for edge devices
[J]. Computer Engineering & Science, 2021, 43(09): 1574-1583.
|
[15] |
JI Zi-hao, JIANG Ling-yun.
A genetic-based multi-site collaborative computation offloading algorithm
[J]. Computer Engineering & Science, 2021, 43(03): 426-434.
|