[1] |
Xu Kunhao, Nie Tiezheng, Shen Derong, Kou Yue, Yu Ge.
Parallel String Similarity Join Approach Based on CPU-GPU Heterogeneous Architecture
[J]. Journal of Computer Research and Development, 2021, 58(3): 598-608.
|
[2] |
Yang Fan, Li Fei, Shu Jiwu.
Survey on Secure Persistent Memory Storage
[J]. Journal of Computer Research and Development, 2020, 57(5): 912-927.
|
[3] |
Tan Jian, Luo Qiaoling, Wang Liyi, Hu Xiahui, Fan Hao, Xu Zhan.
Data Constraint Generation Technology for Microprocessor Instruction Verification Based on SMT Solver
[J]. Journal of Computer Research and Development, 2020, 57(12): 2694-2702.
|
[4] |
Feng Tao, Wang Shuaishuai, Gong Xiang, Fang Junli.
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
[J]. Journal of Computer Research and Development, 2020, 57(11): 2312-2327.
|
[5] |
Zhang Chentong, Zhang Jiaying, Zhang Zhixing, Ruan Tong, He Ping, Ge Xiaoling .
Construction of Large-Scale Disease Terminology Graph with Common Terms
[J]. Journal of Computer Research and Development, 2020, 57(11): 2467-2477.
|
[6] |
Wang Guoqing, Zhuang Lei, He Mengyang, Song Yu, Ma Ling.
Calculation Principle and Algorithm for the Window of Exact Acceleration in Real-Time Model Checking
[J]. Journal of Computer Research and Development, 2020, 57(1): 214-226.
|
[7] |
Miao Chunyu, Chen Lina, Wu Jianjun, Zhou Jiaqing, Feng Xuhang.
Node Location Verification Framework for WSN
[J]. Journal of Computer Research and Development, 2019, 56(6): 1231-1243.
|
[8] |
Wang Qiang, Zhou Fucai, Xuan Pengkai, Wu Qiyu.
Publicly Verifiable Database Model with Full Operations Based on Bilinear Map
[J]. Journal of Computer Research and Development, 2019, 56(3): 521-532.
|
[9] |
Liu Yining, Zhou Yuanjian, Lan Rushi, Tang Chunming.
Blockchain-Based Verification Scheme for Deletion Operation in Cloud
[J]. Journal of Computer Research and Development, 2018, 55(10): 2199-2207.
|
[10] |
Xu Guangwei, Bai Yanke, Yan Cairong, Yang Yanbin, Huang Yongfeng.
Check Algorithm of Data Integrity Verification Results in Big Data Storage
[J]. Journal of Computer Research and Development, 2017, 54(11): 2487-2496.
|
[11] |
Chen Donghuo, Liu Quan, Jin Haidong, Zhu Fei, Wang Hui.
A Temporal Logic with a Semantics Defined on the Static Structure and Dynamic Behavior of Program
[J]. Journal of Computer Research and Development, 2016, 53(9): 2067-2084.
|
[12] |
Liu Yi, Lei Cheng, Zhang Hongqi, Yang Yingjie.
MapReduce-Based Network Property Verification Technique for OpenFlow Network
[J]. Journal of Computer Research and Development, 2016, 53(11): 2500-2511.
|
[13] |
Duan Zhao, Tian Cong, Duan Zhenhua.
CEGAR Based Null-Pointer Dereference Checking in C Programs
[J]. Journal of Computer Research and Development, 2016, 53(1): 155-164.
|
[14] |
Tan Shuang,He Li,Chen Zhikun,Jia Yan.
A Method of Provable Data Integrity Based on Lattice in Cloud Storage
[J]. Journal of Computer Research and Development, 2015, 52(8): 1862-1872.
|
[15] |
Wei Ou, Shi Yufeng, Xu Bingfeng, Huang Zhiqiu, Chen Zhe.
Abstract Modeling Formalisms in Software Model Checking
[J]. Journal of Computer Research and Development, 2015, 52(7): 1580-1603.
|