[1] |
Cui Yuanning, Li Jing, Shen Li, Shen Yang, Qiao Lin, Bo Jue.
Duration-HyTE: A Time-Aware Knowledge Representation Learning Method Based on Duration Modeling
[J]. Journal of Computer Research and Development, 2020, 57(6): 1239-1251.
|
[2] |
Yang Hongzhang, Yang Yahui, Tu Yaofeng, Sun Guangyu, Wu Zhonghai.
Proactive Fault Tolerance Based on “Collection—Prediction—Migration—Feedback” Mechanism
[J]. Journal of Computer Research and Development, 2020, 57(2): 306-317.
|
[3] |
Duan Wenxue, Hu Ming, Zhou Qiong, Wu Tingming, Zhou Junlong, Liu Xiao, Wei Tongquan, Chen Mingsong.
Reliability in Cloud Computing System: A Review
[J]. Journal of Computer Research and Development, 2020, 57(1): 102-123.
|
[4] |
Wang Tao, Chen Wei, Li Juan, Liu Shaohua, Su Lingang, Zhang Wenbo.
Association Mining Based Consistent Service Configuration
[J]. Journal of Computer Research and Development, 2020, 57(1): 188-201.
|
[5] |
He Rongxi, Lei Tianying, Lin Ziwei.
Multi-Constrained Energy-Saving Routing Algorithm in Software-Defined Data Center Networks
[J]. Journal of Computer Research and Development, 2019, 56(6): 1219-1230.
|
[6] |
Fei Ning, Xu Lijie, Cheng Xiaohui.
Implementation and Evaluation of Cooperative Routing in Software Defined Wireless Networking
[J]. Journal of Computer Research and Development, 2019, 56(5): 967-976.
|
[7] |
Zheng Peng, Hu Chengchen, Li Hao.
Reducing the Southbound Interface Overhead for OpenFlow Based on the Flow Volume Characteristics
[J]. Journal of Computer Research and Development, 2018, 55(2): 346-357.
|
[8] |
Xu Hongzhi, Li Renfa, Zeng Lining.
Parallel Task Scheduling for Resource Consumption Minimization with Reliability Constraint
[J]. Journal of Computer Research and Development, 2018, 55(11): 2569-2583.
|
[9] |
Wang Jian, Zhao Guosheng, Zhao Zhongnan, Li Ke.
Formal Modeling and Factor Analysis for Vulnerability Propagation Oriented to SDN
[J]. Journal of Computer Research and Development, 2018, 55(10): 2256-2268.
|
[10] |
Fu Yingxun, Wen Shilin, Ma Li, Shu Jiwu.
Survey on Single Disk Failure Recovery Methods for Erasure Coded Storage Systems
[J]. Journal of Computer Research and Development, 2018, 55(1): 1-13.
|
[11] |
Li Yinglong, Zhu Yihua, Lü Mingqi.
Semantic Event Region Query Processing in Sensor Networks
[J]. Journal of Computer Research and Development, 2017, 54(5): 986-997.
|
[12] |
Zhang Liancheng, Wei Qiang, Tang Xiucun, Fang Jiabao.
Path and Port Address Hopping Based SDN Proactive Defense Technology
[J]. Journal of Computer Research and Development, 2017, 54(12): 2761-2771.
|
[13] |
Li Chu, Feng Dan, Wang Fang.
A High Performance and Reliable Hybrid Host Cache System
[J]. Journal of Computer Research and Development, 2017, 54(11): 2497-2507.
|
[14] |
Zhang Chao, Sun Guangyu, Zhang Xueying, Zhao Weisheng.
Thermal Modeling and Management for Shift Operations of Racetrack Memory
[J]. Journal of Computer Research and Development, 2017, 54(1): 154-162.
|
[15] |
Chen Zhen, Han Jianghong, Liu Zhengyu, Lu Yang.
Using Unreserved TDMA Slots for Retransmitting Packets in VANET
[J]. Journal of Computer Research and Development, 2017, 54(1): 202-211.
|