[1] |
Xu Kunhao, Nie Tiezheng, Shen Derong, Kou Yue, Yu Ge.
Parallel String Similarity Join Approach Based on CPU-GPU Heterogeneous Architecture
[J]. Journal of Computer Research and Development, 2021, 58(3): 598-608.
|
[2] |
Yang Fan, Li Fei, Shu Jiwu.
Survey on Secure Persistent Memory Storage
[J]. Journal of Computer Research and Development, 2020, 57(5): 912-927.
|
[3] |
Tan Jian, Luo Qiaoling, Wang Liyi, Hu Xiahui, Fan Hao, Xu Zhan.
Data Constraint Generation Technology for Microprocessor Instruction Verification Based on SMT Solver
[J]. Journal of Computer Research and Development, 2020, 57(12): 2694-2702.
|
[4] |
Feng Tao, Wang Shuaishuai, Gong Xiang, Fang Junli.
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
[J]. Journal of Computer Research and Development, 2020, 57(11): 2312-2327.
|
[5] |
Miao Chunyu, Chen Lina, Wu Jianjun, Zhou Jiaqing, Feng Xuhang.
Node Location Verification Framework for WSN
[J]. Journal of Computer Research and Development, 2019, 56(6): 1231-1243.
|
[6] |
Wang Qiang, Zhou Fucai, Xuan Pengkai, Wu Qiyu.
Publicly Verifiable Database Model with Full Operations Based on Bilinear Map
[J]. Journal of Computer Research and Development, 2019, 56(3): 521-532.
|
[7] |
Cao Yan, Huang Zhiqiu, Kan Shuanglong, Peng Huanfeng,Ke Changbo.
Location-Constrained Access Control Model and Verification Methods
[J]. Journal of Computer Research and Development, 2018, 55(8): 1809-1825.
|
[8] |
Liu Yining, Zhou Yuanjian, Lan Rushi, Tang Chunming.
Blockchain-Based Verification Scheme for Deletion Operation in Cloud
[J]. Journal of Computer Research and Development, 2018, 55(10): 2199-2207.
|
[9] |
Xu Guangwei, Bai Yanke, Yan Cairong, Yang Yanbin, Huang Yongfeng.
Check Algorithm of Data Integrity Verification Results in Big Data Storage
[J]. Journal of Computer Research and Development, 2017, 54(11): 2487-2496.
|
[10] |
Liu Yi, Lei Cheng, Zhang Hongqi, Yang Yingjie.
MapReduce-Based Network Property Verification Technique for OpenFlow Network
[J]. Journal of Computer Research and Development, 2016, 53(11): 2500-2511.
|
[11] |
Duan Zhao, Tian Cong, Duan Zhenhua.
CEGAR Based Null-Pointer Dereference Checking in C Programs
[J]. Journal of Computer Research and Development, 2016, 53(1): 155-164.
|
[12] |
Tan Shuang,He Li,Chen Zhikun,Jia Yan.
A Method of Provable Data Integrity Based on Lattice in Cloud Storage
[J]. Journal of Computer Research and Development, 2015, 52(8): 1862-1872.
|
[13] |
Zhang Chen, Duan Zhenhua, Tian Cong, Yu Bin.
Modeling, Verification and Test of Interactive Behaviors in Distributed Software Systems
[J]. Journal of Computer Research and Development, 2015, 52(7): 1604-1619.
|
[14] |
Dai Hua,Yang Geng,Xiao Fu,Zhou Qiang,He Ruiliang.
An Energy-Efficient and Privacy-Preserving Range Query Processing in Two-Tiered Wireless Sensor Networks
[J]. Journal of Computer Research and Development, 2015, 52(4): 983-993.
|
[15] |
Zhu Ying, Chen Cheng, Xu Xiaohong, and Li Yanzhe.
Design and Implementation of FPGA Verification Platform for Multi-core Processor
[J]. Journal of Computer Research and Development, 2014, 51(6): 1295-1303.
|