Advanced Search



34 results found in all.
index Title
1Interactive point cloud blending by drag-and-drop
Author(s):ZOU Wan-hong, DING Zhan, YE Xiu-zi, CHEN Zhi-yang  Clicked:6914  Download:4318  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2007 Vol.8 No.10 P.1633-1641  DOI:10.1631/jzus.2007.A1633
2Application of uncertainty reasoning based on cloud model in time series prediction
Author(s):ZHANG Jin-chun, HU Gu-yu  Clicked:7432  Download:3357  Cited:3  <Full Text>
Journal of Zhejiang University Science  2003 Vol.4 No.5 P.578-583  DOI:10.1631/jzus.2003.0578
3Surface reconstruction by offset surface filtering
Author(s):DONG Chen-shi, WANG Guo-zhao  Clicked:5125  Download:3239  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2005 Vol.6 No.100 P.137-143  DOI:10.1631/jzus.2005.AS0137
4Optimizing storage performance in public cloud platforms
Author(s):Jian-zong Wang, Peter Varman, Chang-sheng Xie  Clicked:11691  Download:5599  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.12 P.951-964  DOI:10.1631/jzus.C1100097
5Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren  Clicked:12860  Download:10189  Cited:14  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.2 P.85-97  DOI:10.1631/jzus.C1200240
6A mixture of HMM, GA, and Elman network for load prediction in cloud-oriented data centers
Author(s):Da-yu Xu, Shan-lin Yang, Ren-ping Liu  Clicked:10187  Download:4221  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.11 P.845-858  DOI:10.1631/jzus.C1300109
7NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:12671  Download:9516  Cited:7  <Full Text>  <PPT> 3123
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
8Data center network architecture in cloud computing: review, taxonomy, and open research issues
Author(s):Han Qi, Muhammad Shiraz, Jie-yao Liu, Abdullah Gani, Zulkanain ABDUL Rahman, Torki A. Altameem  Clicked:14506  Download:6442  Cited:9  <Full Text>  <PPT> 3453
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.776-793  DOI:10.1631/jzus.C1400013
9Analyzing the service availability of mobile cloud computing systems by fluid-flow approximation
Author(s):Hong-wu Lv, Jun-yu Lin, Hui-qiang Wang, Guang-sheng Feng, Mo Zhou  Clicked:10248  Download:4448  Cited:2  <Full Text>  <PPT> 2983
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.7 P.553-567  DOI:10.1631/FITEE.1400410
10Towards adaptable and tunable cloud-based map-matching strategy for GPS trajectories
Author(s):Aftab Ahmed Chandio, Nikos Tziritas, Fan Zhang, Ling Yin, Cheng-Zhong Xu  Clicked:11405  Download:5166  Cited:0  <Full Text>  <PPT> 2938
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.12 P.1305-1319  DOI:10.1631/FITEE.1600027
11A multiscale-contour-based interpolation framework for generating a time-varying quasi-dense point cloud sequence
Author(s):Chu-hua Huang, Dong-ming Lu, Chang-yu Diao  Clicked:10114  Download:4744  Cited:0  <Full Text>  <PPT> 2813
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.5 P.422-434  DOI:10.1631/FITEE.1500316
12A locality-based replication manager for data cloud
Author(s):Reza Sookhtsaraei, Javad Artin, Ali Ghorbani, Ahmad Faraahi, Hadi Adineh  Clicked:8973  Download:4513  Cited:0  <Full Text>  <PPT> 2704
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.12 P.1275-1286  DOI:10.1631/FITEE.1500391
13A quality requirements model and verification approach for system of systems based on description logic
Author(s):Qing-long Wang, Zhi-xue Wang, Ting-ting Zhang, Wei-xing Zhu  Clicked:9426  Download:4588  Cited:0  <Full Text>  <PPT> 2542
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.3 P.346-361  DOI:10.1631/FITEE.1500309
14Scientific workflow execution system based on mimic defense in the cloud environment
Author(s):Ya-wen Wang, Jiang-xing Wu, Yun-fei Guo, Hong-chao Hu, Wen-yan Liu, Guo-zhen Cheng  Clicked:8864  Download:4083  Cited:0  <Full Text>  <PPT> 2523
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1522-1536  DOI:10.1631/FITEE.1800621
15Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He, Muhammad-Khurram Khan  Clicked:10203  Download:4539  Cited:0  <Full Text>  <PPT> 3037
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE