Advanced Search



32 results found in all.
index Title
1Interactive point cloud blending by drag-and-drop
Author(s):ZOU Wan-hong, DING Zhan, YE Xiu-zi, CHEN Zhi-yang  Clicked:5066  Download:3045  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2007 Vol.8 No.10 P.1633-1641  DOI:10.1631/jzus.2007.A1633
2Application of uncertainty reasoning based on cloud model in time series prediction
Author(s):ZHANG Jin-chun, HU Gu-yu  Clicked:5643  Download:2551  Cited:3  <Full Text>
Journal of Zhejiang University Science  2003 Vol.4 No.5 P.578-583  DOI:10.1631/jzus.2003.0578
3Surface reconstruction by offset surface filtering
Author(s):DONG Chen-shi, WANG Guo-zhao  Clicked:3846  Download:2493  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2005 Vol.6 No.100 P.137-143  DOI:10.1631/jzus.2005.AS0137
4Optimizing storage performance in public cloud platforms
Author(s):Jian-zong Wang, Peter Varman, Chang-sheng Xie  Clicked:9117  Download:4367  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.12 P.951-964  DOI:10.1631/jzus.C1100097
5Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren  Clicked:9935  Download:8201  Cited:14  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.2 P.85-97  DOI:10.1631/jzus.C1200240
6A mixture of HMM, GA, and Elman network for load prediction in cloud-oriented data centers
Author(s):Da-yu Xu, Shan-lin Yang, Ren-ping Liu  Clicked:6967  Download:2979  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.11 P.845-858  DOI:10.1631/jzus.C1300109
7NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:9366  Download:4416  Cited:7  <Full Text>  <PPT> 2028
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
8Data center network architecture in cloud computing: review, taxonomy, and open research issues
Author(s):Han Qi, Muhammad Shiraz, Jie-yao Liu, Abdullah Gani, Zulkanain ABDUL Rahman, Torki A. Altameem  Clicked:10686  Download:3815  Cited:9  <Full Text>  <PPT> 2320
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.776-793  DOI:10.1631/jzus.C1400013
9Analyzing the service availability of mobile cloud computing systems by fluid-flow approximation
Author(s):Hong-wu Lv, Jun-yu Lin, Hui-qiang Wang, Guang-sheng Feng, Mo Zhou  Clicked:6494  Download:2344  Cited:2  <Full Text>  <PPT> 1939
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.7 P.553-567  DOI:10.1631/FITEE.1400410
10Towards adaptable and tunable cloud-based map-matching strategy for GPS trajectories
Author(s):Aftab Ahmed Chandio, Nikos Tziritas, Fan Zhang, Ling Yin, Cheng-Zhong Xu  Clicked:6776  Download:2653  Cited:0  <Full Text>  <PPT> 1702
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.12 P.1305-1319  DOI:10.1631/FITEE.1600027
11A multiscale-contour-based interpolation framework for generating a time-varying quasi-dense point cloud sequence
Author(s):Chu-hua Huang, Dong-ming Lu, Chang-yu Diao  Clicked:5903  Download:2388  Cited:0  <Full Text>  <PPT> 1826
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.5 P.422-434  DOI:10.1631/FITEE.1500316
12A locality-based replication manager for data cloud
Author(s):Reza Sookhtsaraei, Javad Artin, Ali Ghorbani, Ahmad Faraahi, Hadi Adineh  Clicked:6574  Download:2445  Cited:0  <Full Text>  <PPT> 1530
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.12 P.1275-1286  DOI:10.1631/FITEE.1500391
13A quality requirements model and verification approach for system of systems based on description logic
Author(s):Qing-long Wang, Zhi-xue Wang, Ting-ting Zhang, Wei-xing Zhu  Clicked:6125  Download:2517  Cited:0  <Full Text>  <PPT> 1683
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.3 P.346-361  DOI:10.1631/FITEE.1500309
14Scientific workflow execution system based on mimic defense in the cloud environment
Author(s):Ya-wen Wang, Jiang-xing Wu, Yun-fei Guo, Hong-chao Hu, Wen-yan Liu, Guo-zhen Cheng  Clicked:5077  Download:1889  Cited:0  <Full Text>  <PPT> 1534
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1522-1536  DOI:10.1631/FITEE.1800621
15Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He, Muhammad-Khurram Khan  Clicked:6865  Download:2262  Cited:0  <Full Text>  <PPT> 1810
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE