[1] |
LI Weiping1,2,WU Haiyan2,YANG Jie1.
A dynamically coordinated allocation mechanism of
cloud computing resources based on benefit game
[J]. J4, 20160101, 38(01): 57-61.
|
[2] |
ZHAO Wen-tao, GUAN Li-he, HE Jian-guo, TANG Hao.
A privacy protection recommendation algorithm in block chain environment
[J]. Computer Engineering & Science, 2024, 46(06): 1032-1040.
|
[3] |
XU Jia, ZHANG Ji-xian, WANG Zhe-min, LIU Lin-jie.
Truthful auction mechanisms for multi-resource allocation based on NUMA architecture of cloud computing
[J]. Computer Engineering & Science, 2024, 46(05): 761-775.
|
[4] |
ZHANG Feng, WEN Bin, YAN Yi-fei, ZENG Zhao-wu, ZHOU Wei, .
An identity-encryption multi-cloud multi-copy integrity auditing protocol
[J]. Computer Engineering & Science, 2024, 46(03): 453-462.
|
[5] |
MA Ke-fan, LI Bao-feng, ZHOU Yue-jin, WU Yuan-yuan, YU Yong-lan, DUO Rui-hua.
Design and implementation of a baseboard management controller on ZYNQ chip
[J]. Computer Engineering & Science, 2024, 46(02): 217-223.
|
[6] |
YE Xi, ZHANG Yu-shu, ZHAO Ruo-yu, XIAO Xiang-li, WEN Wen-ying.
Usability-enhanced thumbnail-preserving encryption
[J]. Computer Engineering & Science, 2023, 45(09): 1563-1571.
|
[7] |
FU Wei, XIE Zhen-jie, ZHU Ting-ting, REN Zheng-wei.
An assured deletion scheme of cloud data based on strongly non-separable cipher
[J]. Computer Engineering & Science, 2023, 45(03): 434-442.
|
[8] |
LI Wen-qing, MA Rui, ZHANG Wen-tao.
An efficient multi-key homomorphic encryption scheme based on common key
[J]. Computer Engineering & Science, 2023, 45(02): 252-260.
|
[9] |
ZHENG Si-fei, FENG Zi-jing, LIU Cheng-yu, CHEN Ri-qing, LIU Xiao-long.
An image camouflage encryption method based on vector quantization in cloud storage environment
[J]. Computer Engineering & Science, 2022, 44(06): 1030-1036.
|
[10] |
YANG Bo-ai, ZHAO Shan, LIU Fang.
A survey on serverless computing
[J]. Computer Engineering & Science, 2022, 44(04): 611-619.
|
[11] |
LI Bo, HOU Peng, NIU Li, WU Hao, DING Hong-wei.
Survey of cloud-edge collaborative architecture research based on software defined network
[J]. Computer Engineering & Science, 2021, 43(02): 242-257.
|
[12] |
LIAO Jianjin, SUN Qingxiao, YANG Hailong, LUAN Zhongzhi, QIAN Depei.
Configuration and scheduling mechanism of spot instances meeting the execution time limit of workflow
[J]. Computer Engineering & Science, 2020, 42(11): 1956-1964.
|
[13] |
NIU Shufen, WANG Jinfeng, WANG Bobin, CHEN Jingmin, DU Xiaoni.
A searchable encryption scheme supporting multi-keyword retrieval on blockchain
[J]. Computer Engineering & Science, 2020, 42(11): 2005-2012.
|
[14] |
LIN Tao, FENG Jing-kai, HAO Zhang-xiao, HUANG Shao-qun.
Cloud computing resource load prediction based on combined prediction model
[J]. Computer Engineering & Science, 2020, 42(07): 1168-1173.
|
[15] |
SHI Wen-jie,ZHANG Yu-qi,LI Kui.
A modeling and scheduling algorithm
for multi-platform avionic resources
[J]. Computer Engineering & Science, 2019, 41(11): 1976-1984.
|