[1] |
Yang Fan, Zhang Peng, Wang Zhan, Yuan Guojun, An Xuejun.
Accelerating Byzantine Fault Tolerance with In-Network Computing
[J]. Journal of Computer Research and Development, 2021, 58(1): 164-177.
|
[2] |
Ma Qingyun, Ji Hangxu, Zhao Yuhai, Mao Keming, Wang Guoren.
An Efficient Data Partitioning Method in Distributed Heterogeneous Bandwidth Environment
[J]. Journal of Computer Research and Development, 2020, 57(12): 2683-2693.
|
[3] |
Xu Zhiwei, Zeng Chen, Chao Lu, Peng Xiaohui.
Zone-Oriented Architecture: An Architectural Style for Smart Web of Everything
[J]. Journal of Computer Research and Development, 2019, 56(1): 90-102.
|
[4] |
Ren Yanbing, Li Xinghua, Liu Hai, Cheng Qingfeng, Ma Jianfeng.
Blockchain-Based Trust Management Framework for Distributed Internet of Things
[J]. Journal of Computer Research and Development, 2018, 55(7): 1462-1478.
|
[5] |
Zhang Tieying, Huang Gui, Zhang Yingqiang, Wang Jianying, Hu Wei, Zhao Diankui, He Dengcheng.
X-DB: Software and Hardware Co-Designed Database System
[J]. Journal of Computer Research and Development, 2018, 55(2): 319-326.
|
[6] |
Liu Hongyan, Xian Hequn, Lu Xiuqing, Hou Ruitao, Gao Yuan.
Verifiable Secure Data Deduplication Based on User-Defined Security Requirements
[J]. Journal of Computer Research and Development, 2018, 55(10): 2134-2148.
|
[7] |
Hui Zhen, Feng Dengguo, Zhang Min, Hong Cheng.
A Secure Index Against Statistical Analysis Attacks
[J]. Journal of Computer Research and Development, 2017, 54(2): 295-304.
|
[8] |
Wang Kaixuan, Li Yuxi, Zhou Fucai, Wang Quanqi.
Multi-Keyword Fuzzy Search over Encrypted Data
[J]. Journal of Computer Research and Development, 2017, 54(2): 348-360.
|
[9] |
Yang Xue, Dong Hongbin, Teng Xuyang.
Budget Constraint Auction Mechanism for Online Video Advertisement
[J]. Journal of Computer Research and Development, 2017, 54(2): 415-427.
|
[10] |
Jiang Junqiang, Lin Yaping, Xie Guoqi, Zhang Shiwen.
Energy Optimization Heuristic for Deadline-Constrained Workflows in Heterogeneous Distributed Systems
[J]. Journal of Computer Research and Development, 2016, 53(7): 1503-1516.
|
[11] |
Li Qin, Zhu Yanchao, Liu Yi, Qian Depei.
Accelerator Support in YARN Cluster
[J]. Journal of Computer Research and Development, 2016, 53(6): 1263-1270.
|
[12] |
Li Wei, Zhang Dafang, Xie Kun, Li Wenwei, He Jie.
A Matrix-Indexed Bloom Filter for Flash-Based Key-Value Store
[J]. Journal of Computer Research and Development, 2015, 52(5): 1210-1222.
|
[13] |
Wang Yanshi,Wang Wei,Liu Zhaohui,Wei Jun, Huang Tao.
A Mechanism for Transparent Data Caching
[J]. Journal of Computer Research and Development, 2015, 52(4): 907-917.
|
[14] |
Cui Xingcan, Yu Xiaohui, Liu Yang, Lü Zhaoyang.
Distributed Stream Processing: A Survey
[J]. Journal of Computer Research and Development, 2015, 52(2): 318-332.
|
[15] |
Xie Dongqing, Zhou Zaihong, and Luo Jiawei.
An Algorithm Based on LRU and SCBF for Elephant Flows Identification and Its Application in DDoS Defense
[J]. , 2011, 48(8): 1517-1523.
|