Deep search:Searching for "cloud computing" in 'ABSTRACT and KEYWORDGot 25 items.
index Title
1Important developments for the digital library: Data Ocean and Smart Library
Author(s):Yun-he Pan   Clicked:5023  Download:2641  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.11 P.837-843  DOI:10.1631/jzus.C1001000
2Optimizing storage performance in public cloud platforms
Author(s):Jian-zong Wang, Peter Varman, Chan...  Clicked:9372  Download:4443  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.12 P.951-964  DOI:10.1631/jzus.C1100097
3From Semantic Grid to Knowledge Service Cloud
Author(s):Zhao-hui Wu, Hua-jun Chen  Clicked:5220  Download:2575  Cited:1  <Full Text>
Journal of Zhejiang University Science C  2012 Vol.13 No.4 P.253-256  DOI:10.1631/jzus.C1101006
4A mixture of HMM, GA, and Elman network for load prediction in cloud-oriented data centers
Author(s):Da-yu Xu, Shan-lin Yang, Ren-ping ...  Clicked:7207  Download:3052  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.11 P.845-858  DOI:10.1631/jzus.C1300109
5NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:9724  Download:4528  Cited:7  <Full Text>  <PPT> 2101
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
6Data center network architecture in cloud computing: review, taxonomy, and open research issues
Author(s):Han Qi, Muhammad Shiraz, Jie-yao L...  Clicked:10964  Download:4057  Cited:9  <Full Text>  <PPT> 2389
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.776-793  DOI:10.1631/jzus.C1400013
7Analyzing the service availability of mobile cloud computing systems by fluid-flow approximation
Author(s):Hong-wu Lv, Jun-yu Lin, Hui-qiang ...  Clicked:6842  Download:2438  Cited:2  <Full Text>  <PPT> 2004
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.7 P.553-567  DOI:10.1631/FITEE.1400410
8Towards adaptable and tunable cloud-based map-matching strategy for GPS trajectories
Author(s):Aftab Ahmed Chandio, Nikos Tzirita...  Clicked:7145  Download:2781  Cited:0  <Full Text>  <PPT> 1778
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.12 P.1305-1319  DOI:10.1631/FITEE.1600027
9Scientific workflow execution system based on mimic defense in the cloud environment
Author(s):Ya-wen Wang, Jiang-xing Wu, Yun-fe...  Clicked:5363  Download:1963  Cited:0  <Full Text>  <PPT> 1608
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1522-1536  DOI:10.1631/FITEE.1800621
10Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He,...  Clicked:7236  Download:2399  Cited:0  <Full Text>  <PPT> 1878
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
11Special issue on future network: software-defined networking
Author(s):Tao Huang, F. Richard Yu, Yun-jie ...  Clicked:3235  Download:1733  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.7 P.603-605  DOI:10.1631/FITEE.SDN2016
12The rise of high-throughput computing
Author(s):Ning-hui Sun, Yun-gang Bao, Dong-r...  Clicked:3022  Download:2285  Cited:0  <Full Text>  <PPT> 1539
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.10 P.1245-1250  DOI:10.1631/FITEE.1800501
13Post-exascale supercomputing: research opportunities abound
Author(s):Zuo-ning Chen, Jack Dongarra, Zhi-...  Clicked:4311  Download:2349  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.10 P.1203-1208  DOI:10.1631/FITEE.1830000
14SIoTFog: Byzantine-resilient IoT fog networking
Author(s):Jian-wen Xu, Kaoru Ota, Mian-xiong...  Clicked:5006  Download:2802  Cited:0  <Full Text>  <PPT> 1576
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1546-1557  DOI:10.1631/FITEE.1800519
15Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual mach...
Author(s):Chao Yang, Yun-fei Guo, Hong-chao ...  Clicked:5106  Download:2092  Cited:0  <Full Text>  <PPT> 1662
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.5 P.731-748  DOI:10.1631/FITEE.1800526
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE