| index | Title |
| 1 | Interactive point cloud blending by drag-and-drop Author(s):ZOU Wan-hong, DING Zhan, YE Xiu-zi, CHEN Zhi-yang Clicked:6914 Download:4318 Cited:1 <Full Text> Journal of Zhejiang University Science A 2007 Vol.8 No.10 P.1633-1641 DOI:10.1631/jzus.2007.A1633 |
| 2 | Application of uncertainty reasoning based on cloud model in time series prediction Author(s):ZHANG Jin-chun, HU Gu-yu Clicked:7432 Download:3357 Cited:3 <Full Text> Journal of Zhejiang University Science 2003 Vol.4 No.5 P.578-583 DOI:10.1631/jzus.2003.0578 |
| 3 | Surface reconstruction by offset surface filtering Author(s):DONG Chen-shi, WANG Guo-zhao Clicked:5125 Download:3239 Cited:0 <Full Text> Journal of Zhejiang University Science A 2005 Vol.6 No.100 P.137-143 DOI:10.1631/jzus.2005.AS0137 |
| 4 | Optimizing storage performance in public cloud platforms Author(s):Jian-zong Wang, Peter Varman, Chang-sheng Xie Clicked:11691 Download:5599 Cited:6 <Full Text> Journal of Zhejiang University Science C 2011 Vol.12 No.12 P.951-964 DOI:10.1631/jzus.C1100097 |
| 5 | Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren Clicked:12860 Download:10189 Cited:14 <Full Text> Journal of Zhejiang University Science C 2013 Vol.14 No.2 P.85-97 DOI:10.1631/jzus.C1200240 |
| 6 | A mixture of HMM, GA, and Elman network for load prediction in cloud-oriented data centers Author(s):Da-yu Xu, Shan-lin Yang, Ren-ping Liu Clicked:10187 Download:4221 Cited:6 <Full Text> Journal of Zhejiang University Science C 2013 Vol.14 No.11 P.845-858 DOI:10.1631/jzus.C1300109 |
| 7 | NaEPASC: a novel and efficient public auditing scheme for cloud data Author(s):Shuang Tan, Yan Jia Clicked:12671 Download:9516 Cited:7 <Full Text> <PPT> 3123 Journal of Zhejiang University Science C 2014 Vol.15 No.9 P.794-804 DOI:10.1631/jzus.C1400045 |
| 8 | Data center network architecture in cloud computing: review, taxonomy, and open research issues Author(s):Han Qi, Muhammad Shiraz, Jie-yao Liu, Abdullah Gani, Zulkanain ABDUL Rahman, Torki A. Altameem Clicked:14506 Download:6442 Cited:9 <Full Text> <PPT> 3453 Journal of Zhejiang University Science C 2014 Vol.15 No.9 P.776-793 DOI:10.1631/jzus.C1400013 |
| 9 | Analyzing the service availability of mobile cloud computing systems by fluid-flow approximation Author(s):Hong-wu Lv, Jun-yu Lin, Hui-qiang Wang, Guang-sheng Feng, Mo Zhou Clicked:10248 Download:4448 Cited:2 <Full Text> <PPT> 2983 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.7 P.553-567 DOI:10.1631/FITEE.1400410 |
| 10 | Towards adaptable and tunable cloud-based map-matching strategy for GPS trajectories Author(s):Aftab Ahmed Chandio, Nikos Tziritas, Fan Zhang, Ling Yin, Cheng-Zhong Xu Clicked:11405 Download:5166 Cited:0 <Full Text> <PPT> 2938 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.12 P.1305-1319 DOI:10.1631/FITEE.1600027 |
| 11 | A multiscale-contour-based interpolation framework for generating a time-varying quasi-dense point cloud sequence Author(s):Chu-hua Huang, Dong-ming Lu, Chang-yu Diao Clicked:10114 Download:4744 Cited:0 <Full Text> <PPT> 2813 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.5 P.422-434 DOI:10.1631/FITEE.1500316 |
| 12 | A locality-based replication manager for data cloud Author(s):Reza Sookhtsaraei, Javad Artin, Ali Ghorbani, Ahmad Faraahi, Hadi Adineh Clicked:8973 Download:4513 Cited:0 <Full Text> <PPT> 2704 Frontiers of Information Technology & Electronic Engineering 2016 Vol.17 No.12 P.1275-1286 DOI:10.1631/FITEE.1500391 |
| 13 | A quality requirements model and verification approach for system of systems based on description logic Author(s):Qing-long Wang, Zhi-xue Wang, Ting-ting Zhang, Wei-xing Zhu Clicked:9426 Download:4588 Cited:0 <Full Text> <PPT> 2542 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.3 P.346-361 DOI:10.1631/FITEE.1500309 |
| 14 | Scientific workflow execution system based on mimic defense in the cloud environment Author(s):Ya-wen Wang, Jiang-xing Wu, Yun-fei Guo, Hong-chao Hu, Wen-yan Liu, Guo-zhen Cheng Clicked:8864 Download:4083 Cited:0 <Full Text> <PPT> 2523 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1522-1536 DOI:10.1631/FITEE.1800621 |
| 15 | Cryptanalysis of an identity-based public auditing protocol for cloud storage Author(s):Li-bing Wu, Jing Wang, De-biao He, Muhammad-Khurram Khan Clicked:10203 Download:4539 Cited:0 <Full Text> <PPT> 3037 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.12 P.1972-1977 DOI:10.1631/FITEE.1601530 |
