[1] |
Pu Yonglin, Yu Jiong, Lu Liang, Li Ziyang, Guo Binglei, Liao Bin.
Energy-Efficient Strategy Based on Data Recovery in Storm
[J]. Journal of Computer Research and Development, 2021, 58(3): 479-496.
|
[2] |
Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin.
Security Issues and Privacy Preserving in Machine Learning
[J]. Journal of Computer Research and Development, 2020, 57(10): 2066-2085.
|
[3] |
Xu Yi, Tong Yongxin, Li Wei.
Recent Progress in Large-Scale Ridesharing Algorithms
[J]. Journal of Computer Research and Development, 2020, 57(1): 32-52.
|
[4] |
Duan Wenxue, Hu Ming, Zhou Qiong, Wu Tingming, Zhou Junlong, Liu Xiao, Wei Tongquan, Chen Mingsong.
Reliability in Cloud Computing System: A Review
[J]. Journal of Computer Research and Development, 2020, 57(1): 102-123.
|
[5] |
Guo Yanchao, Gao Ling, Wang Hai, Zheng Jie, Ren Jie.
Power Optimization Based on Dynamic Content Refresh in Mobile Edge Computing
[J]. Journal of Computer Research and Development, 2018, 55(3): 563-571.
|
[6] |
Jiang Shuhao, Yan Guihai, Li Jiajun, Lu Wenyan, Li Xiaowei.
A Quantitative Analysis on the “Approximatability” of Machine Learning Algorithms
[J]. Journal of Computer Research and Development, 2017, 54(6): 1337-1347.
|
[7] |
Fan Xinggang, Ren Yongmo, Che Zhicong, Wang Chao.
A Distributed Directional Barrier Construction Scheme Based on Neighbor Sport
[J]. Journal of Computer Research and Development, 2017, 54(1): 221-231.
|
[8] |
Fu Shuai, Jiang Qi, Ma Jianfeng.
A Privacy-Preserving Data Aggregation Scheme in Wireless Sensor Networks
[J]. Journal of Computer Research and Development, 2016, 53(9): 2030-2038.
|
[9] |
Liao Bin, Zhang Tao, Yu Jiong, Yin Lutong, Guo Gang, Guo Binglei.
Energy Consumption Modeling and Optimization Analysis for MapReduce
[J]. Journal of Computer Research and Development, 2016, 53(9): 2107-2131.
|
[10] |
Gong Xiaoli, Yu Haiyang, Sun Chengjun, Li Tao, Zhang Jin, Ma Jie.
XOS: A QoE Oriented Energy Efficient Heterogeneous Multi-Processor Schedule Mechanism
[J]. Journal of Computer Research and Development, 2016, 53(7): 1467-1477.
|
[11] |
Wang Tiefeng, Cai Ying, Zhang Yujie.
Reputation-Based Defense Scheme Against Pollution Attacks on Network Coding
[J]. Journal of Computer Research and Development, 2016, 53(11): 2491-2499.
|
[12] |
Xue Kaiping, Chen Ke, Ni Dan, Zhang Hong, Hong Peilin.
Survey of MPTCP-Based Multipath Transmission Optimization
[J]. Journal of Computer Research and Development, 2016, 53(11): 2512-2529.
|
[13] |
Cao Zhenfu, Dong Xiaolei, Zhou Jun, Shen Jiachen, Ning Jianting, Gong Junqing.
Research Advances on Big Data Security and Privacy Preserving
[J]. Journal of Computer Research and Development, 2016, 53(10): 2137-2151.
|
[14] |
Xie Yong, Wu Libing, Zhang Yubo, Ye Luyao.
Anonymous Mutual Authentication and Key Agreement Protocol in Multi-Server Architecture for VANETs
[J]. Journal of Computer Research and Development, 2016, 53(10): 2323-2333.
|
[15] |
Huang Longxia, Zhang Gongxuan, Fu Anmin.
Privacy-Preserving Public Auditing for Dynamic Group Based on Hierarchical Tree
[J]. Journal of Computer Research and Development, 2016, 53(10): 2334-2342.
|