[1] |
Li Guorui, Meng Jie, Peng Sancheng, Wang Cong.
A Distributed Data Reconstruction Algorithm Based on Jacobi ADMM for Compressed Sensing in Sensor Networks
[J]. Journal of Computer Research and Development, 2020, 57(6): 1284-1291.
|
[2] |
Zhou Jun, Shen Huajie, Lin Zhongyun, Cao Zhenfu, Dong Xiaolei.
Research Advances on Privacy Preserving in Edge Computing
[J]. Journal of Computer Research and Development, 2020, 57(10): 2027-2051.
|
[3] |
Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin.
Security Issues and Privacy Preserving in Machine Learning
[J]. Journal of Computer Research and Development, 2020, 57(10): 2066-2085.
|
[4] |
Xu Yi, Tong Yongxin, Li Wei.
Recent Progress in Large-Scale Ridesharing Algorithms
[J]. Journal of Computer Research and Development, 2020, 57(1): 32-52.
|
[5] |
Wang Jiye, Zhou Biyu, Zhang Fa, Shi Xiang, Zeng Nan, Liu Zhiyong.
Data Center Energy Consumption Models and Energy Efficient Algorithms
[J]. Journal of Computer Research and Development, 2019, 56(8): 1587-1603.
|
[6] |
Sun Jian, Li Zhanhuai, Li Qiang, Zhang Xiao, Zhao Xiaonan.
SSD Power Modeling Method Based on the Gradient of Energy Consumption
[J]. Journal of Computer Research and Development, 2019, 56(8): 1772-1782.
|
[7] |
Xing Yulong, Chen Yongrui, Yi Weidong, Duan Chenghua.
The Optimal Beacon Interval for Synchronous MAC in Low Duty-Cycle Wireless Sensor Networks
[J]. Journal of Computer Research and Development, 2016, 53(9): 2009-2015.
|
[8] |
Wan Shaohua, Zhang Yin.
An Energy-Efficient Routing Algorithm Based on Bezier Curve in Wireless Sensors Networks
[J]. Journal of Computer Research and Development, 2016, 53(7): 1532-1543.
|
[9] |
Cao Zhenfu, Dong Xiaolei, Zhou Jun, Shen Jiachen, Ning Jianting, Gong Junqing.
Research Advances on Big Data Security and Privacy Preserving
[J]. Journal of Computer Research and Development, 2016, 53(10): 2137-2151.
|
[10] |
Xie Yong, Wu Libing, Zhang Yubo, Ye Luyao.
Anonymous Mutual Authentication and Key Agreement Protocol in Multi-Server Architecture for VANETs
[J]. Journal of Computer Research and Development, 2016, 53(10): 2323-2333.
|
[11] |
Huang Longxia, Zhang Gongxuan, Fu Anmin.
Privacy-Preserving Public Auditing for Dynamic Group Based on Hierarchical Tree
[J]. Journal of Computer Research and Development, 2016, 53(10): 2334-2342.
|
[12] |
Wang Liang, Wang Weiping, Meng Dan.
Privacy Preserving Data Publishing via Weighted Bayesian Networks
[J]. Journal of Computer Research and Development, 2016, 53(10): 2343-2353.
|
[13] |
Xiao Fu, Sha Chaoheng, Chen Lei, Sun Lijuan, Wang Ruchuan.
Localization Algorithm for Wireless Sensor Networks via Norm Regularized Matrix Completion
[J]. Journal of Computer Research and Development, 2016, 53(1): 216-227.
|
[14] |
Shu Jian,Tang Jin,Liu Linlan,Hu Gang,Liu Song.
Fuzzy Support Vector Regression-Based Link Quality Prediction Model for Wireless Sensor Networks
[J]. Journal of Computer Research and Development, 2015, 52(8): 1842-1851.
|
[15] |
Lin Hui,Tian Youliang,Xu Li, Hu Jia.
A Novel Privacy Aware Secure Routing Protocol for HWMN
[J]. Journal of Computer Research and Development, 2015, 52(8): 1883-1892.
|