[1] |
Zhang Yao, Chu Jiajia, Weng Chuliang.
Survey on Data Updating in Erasure-Coded Storage Systems
[J]. Journal of Computer Research and Development, 2020, 57(11): 2419-2431.
|
[2] |
Fu Liguo, Pang Janming, Wang Jun, Zhang Jiahao, Yue Feng.
Optimization of Library Function Disposing in Dynamic Binary Translation
[J]. Journal of Computer Research and Development, 2019, 56(8): 1783-1791.
|
[3] |
Tang Yingjie, Wang Fang, Xie Yanwen.
An Efficient Failure Reconstruction Based on In-Network Computing for Erasure-Coded Storage Systems
[J]. Journal of Computer Research and Development, 2019, 56(4): 767-778.
|
[4] |
Li Xuejun, Yuan Yawen, Jin Chunhua.
An Attribute-Based Broadcast Encryption Scheme Suitable for the Broadcasting Network
[J]. Journal of Computer Research and Development, 2018, 55(7): 1409-1420.
|
[5] |
Zheng Peng, Hu Chengchen, Li Hao.
Reducing the Southbound Interface Overhead for OpenFlow Based on the Flow Volume Characteristics
[J]. Journal of Computer Research and Development, 2018, 55(2): 346-357.
|
[6] |
Lu Liang, Yu Jiong, Bian Chen, Liu Yuechao, Liao Bin, Li Huijuan.
A Task Migration Strategy in Big Data Stream Computing with Storm
[J]. Journal of Computer Research and Development, 2018, 55(1): 71-92.
|
[7] |
Li Tiantian, Yu Ge, Song Jie.
Optimization Research on Thermal and Power Management for Real-Time Systems
[J]. Journal of Computer Research and Development, 2016, 53(7): 1478-1492.
|
[8] |
Peng Hao, Han Jianghong, Wei Zhenchun, Wei Xing.
Fault Tolerant Global Scheduling with Backup Priority Promotion
[J]. Journal of Computer Research and Development, 2016, 53(2): 354-361.
|
[9] |
Guo He, Chen Zheng, Yu Yulong, Wang Yuxin, Chen Xin.
A Communication Aware DAG Workflow Cost Optimization Model and Algorithm
[J]. Journal of Computer Research and Development, 2015, 52(6): 1400-1408.
|
[10] |
Peng Hao, Han Jianghong, Lu Yang, Zhang Jianjun.
Multiprocessor Hard Real-Time Systems Preemption Threshold Scheduling
[J]. Journal of Computer Research and Development, 2015, 52(5): 1177-1186.
|
[11] |
Xu Qingui, Qin Yong, Yang Taolan.
Light-Weight Integrity Monitoring Based on Hashing Time Validity
[J]. Journal of Computer Research and Development, 2015, 52(3): 702-717.
|
[12] |
Liu Xian, Guo Ruifeng, Deng Changyi.
Fault-Tolerant Real-Time Scheduling Algorithm with Pre-Allocation in Primary/Alternate Model
[J]. Journal of Computer Research and Development, 2015, 52(3): 760-768.
|
[13] |
Fu Ning,Du Chenglie,Li Jianliang,Liu Zhiqiang,Peng Han.
Analysis and Verification of AADL Hierarchical Schedulers
[J]. Journal of Computer Research and Development, 2015, 52(1): 167-176.
|
[14] |
Zhu Yi, Xiao Fangxiong, Zhou Hang, and Zhang Guangquan.
Method for Modeling and Analyzing Software Energy Consumption of Embedded Real-Time System
[J]. Journal of Computer Research and Development, 2014, 51(4): 848-855.
|
[15] |
Li Qiang, Sun Ninghui, Huo Zhigang, and Ma Jie.
Optimizing MPI Alltoall Communications in Multicore Clusters
[J]. , 2013, 50(8): 1744-1754.
|