[1] |
Pu Yonglin, Yu Jiong, Lu Liang, Li Ziyang, Guo Binglei, Liao Bin.
Energy-Efficient Strategy Based on Data Recovery in Storm
[J]. Journal of Computer Research and Development, 2021, 58(3): 479-496.
|
[2] |
Lin Xiao, Ji Shuo, Yue Shengnan, Sun Weiqiang, Hu Weisheng.
Node-Constraint Store-and-Forward Scheduling Method for Inter-Datacenter Networks
[J]. Journal of Computer Research and Development, 2021, 58(2): 319-337.
|
[3] |
Du Ming, Yang Yun, Zhou Junfeng, Chen Ziyang, Yang Anping.
Efficient Methods for Label-Constraint Reachability Query
[J]. Journal of Computer Research and Development, 2020, 57(9): 1949-1960.
|
[4] |
Xu Danya, Wang Jing, Wang Li, Zhang Weigong.
A Cross-Layer Memory Tracing Toolkit for Big Data Application Based on Spark
[J]. Journal of Computer Research and Development, 2020, 57(6): 1179-1190.
|
[5] |
Shen Yijie, Zeng Dan, Xiong Jin.
A Benefit Model Based Data Reuse Mechanism for Spark SQL
[J]. Journal of Computer Research and Development, 2020, 57(2): 318-332.
|
[6] |
Chen Yewang, Shen Lianlian, Zhong Caiming, Wang Tian, Chen Yi, Du Jixiang.
Survey on Density Peak Clustering Algorithm
[J]. Journal of Computer Research and Development, 2020, 57(2): 378-394.
|
[7] |
Hu Xuegang, Liu Fei, Bu Chenyang.
Research Advances on Knowledge Tracing Models in Educational Big Data
[J]. Journal of Computer Research and Development, 2020, 57(12): 2523-2546.
|
[8] |
Xu Yaoli, Li Zhanhuai, Chen Qun, Wang Yanyan, Fan Fengfeng.
An Approach for Reconciling Inconsistent Pairs Based on Factor Graph
[J]. Journal of Computer Research and Development, 2020, 57(1): 175-187.
|
[9] |
Luo Sheng, Miao Duoqian, Zhang Zhifei, Zhang Yuanjian, Hu Shengdan.
A Link Prediction Model Based on Hierarchical Information Granular Representation for Attributed Graphs
[J]. Journal of Computer Research and Development, 2019, 56(3): 623-634.
|
[10] |
Zhao Xinyi, Huang Xiangdong, Qiao Jialin, Kang Rong, Li Na, Wang Jianmin.
A Spatio-Temporal Index Based on Skew Spatial Coding and R-Tree
[J]. Journal of Computer Research and Development, 2019, 56(3): 666-676.
|
[11] |
Yang Guoqiang, Ding Hangchao, Zou Jing, Jiang Han, Chen Yanqin.
A Big Data Security Scheme Based on High-Performance Cryptography Implementation
[J]. Journal of Computer Research and Development, 2019, 56(10): 2207-2215.
|
[12] |
Zheng Qinghua, Dong Bo, Qian Buyue, Tian Feng, Wei Bifan, Zhang Weizhan, Liu Jun.
The State of the Art and Future Tendency of Smart Education
[J]. Journal of Computer Research and Development, 2019, 56(1): 209-224.
|
[13] |
Wang Yishu,Yuan Ye,Liu Meng,Wang Guoren.
Survey of Query Processing and Mining Techniques over Large Temporal Graph Database
[J]. Journal of Computer Research and Development, 2018, 55(9): 1889-1902.
|
[14] |
Xu Zhiwei, Zhang Yujun.
Efficient Detection of False Data Fusion in IoT
[J]. Journal of Computer Research and Development, 2018, 55(7): 1488-1497.
|
[15] |
Pan Fengfeng, Xiong Jin.
NV-Shuffle: Shuffle Based on Non-Volatile Memory
[J]. Journal of Computer Research and Development, 2018, 55(2): 229-245.
|