Advanced Search



66 results found in all.
index Title
31Post-exascale supercomputing: research opportunities abound
Author(s):Zuo-ning Chen, Jack Dongarra, Zhi-wei Xu  Clicked:4102  Download:2263  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.10 P.1203-1208  DOI:10.1631/FITEE.1830000
32Generic user revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li  Clicked:5346  Download:2144  Cited:0  <Full Text>  <PPT> 1695
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.11 P.1362-1384  DOI:10.1631/FITEE.1800405
33SIoTFog: Byzantine-resilient IoT fog networking
Author(s):Jian-wen Xu, Kaoru Ota, Mian-xiong Dong, An-feng Liu, Qiang Li  Clicked:4801  Download:2532  Cited:0  <Full Text>  <PPT> 1534
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1546-1557  DOI:10.1631/FITEE.1800519
34Design and implementation of a novel enterprise network defense system by maneuvering multi-dimensional network properties
Author(s):Yang Chen, Hong-chao HU, Guo-zhen Cheng  Clicked:6841  Download:2181  Cited:0  <Full Text>  <PPT> 1657
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.2 P.238-252  DOI:10.1631/FITEE.1800516
35Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual machines
Author(s):Chao Yang, Yun-fei Guo, Hong-chao Hu, Ya-wen Wang, Qing Tong, Ling-shu Li  Clicked:4897  Download:2004  Cited:0  <Full Text>  <PPT> 1623
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.5 P.731-748  DOI:10.1631/FITEE.1800526
36A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
Author(s):Xin Wang, Bo Yang, Zhe Xia, Hong-xia Hou  Clicked:6985  Download:1928  Cited:0  <Full Text>  <PPT> 1638
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.787-800  DOI:10.1631/FITEE.1800066
37Generic attribute revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang  Clicked:5508  Download:1788  Cited:0  <Full Text>  <PPT> 1543
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.773-786  DOI:10.1631/FITEE.1800512
38Future Internet: trends and challenges
Author(s):Jiao Zhang, Tao Huang, Shuo Wang, Yun-jie Liu  Clicked:5289  Download:1942  Cited:0  <Full Text>  <PPT> 1495
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.9 P.1185-1194  DOI:10.1631/FITEE.1800445
39A multi-agent architecture for scheduling in platform-based smart manufacturing systems
Author(s):Yong-kui Liu, Xue-song Zhang, Lin Zhang, Fei Tao, Li-hui Wang  Clicked:5497  Download:1819  Cited:0  <Full Text>  <PPT> 1413
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.11 P.1465-1492  DOI:10.1631/FITEE.1900094
40MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data
Author(s):Mukti Padhya, Devesh C. Jinwala  Clicked:5806  Download:2753  Cited:0  <Full Text>  <PPT> 1385
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.12 P.1717-1748  DOI:10.1631/FITEE.1800192
41Novel 3D point set registration method based on regionalized Gaussian process map reconstruction
Author(s):Bo Li, Yu Zhang, Wen-jie Zhao, Ping Li  Clicked:4607  Download:2495  Cited:0  <Full Text>  <PPT> 1371
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.5 P.760-776  DOI:10.1631/FITEE.1900457
42MEACC: an energy-efficient framework for smart devices using cloud computing systems
Author(s):Khalid Alsubhi, Zuhaib Imtiaz, Ayesha Raana, M. Usman Ashraf, Babur Hayat  Clicked:5456  Download:3611  Cited:0  <Full Text>  <PPT> 1534
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.917-930  DOI:10.1631/FITEE.1900198
43Cloud-based vs. blockchain-based IoT: a comparative survey and way forward
Author(s):Raheel Ahmed Memon, Jian Ping Li, Junaid Ahmed, Muhammad Irshad Nazeer, Muhammad Ismail, Khursheed Ali  Clicked:6983  Download:4720  Cited:0  <Full Text>  <PPT> 1513
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.4 P.563-586  DOI:10.1631/FITEE.1800343
44EdgeKeeper: a trusted edge computing framework for ubiquitous power Internet of Things
Author(s):Weiyong Yang, Wei Liu, Xingshen Wei, Zixin Guo, Kangle Yang, Hao Huang, Longyun Qi  Clicked:4692  Download:3427  Cited:0  <Full Text>  <PPT> 1320
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.3 P.374-399  DOI:10.1631/FITEE.1900636
45Three-dimensional face point cloud hole-filling algorithm based on binocular stereo matching and a B-spline
Author(s):Yuan HUANG, Feipeng DA  Clicked:5985  Download:5546  Cited:0  <Full Text>  <PPT> 327
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.3 P.398-408  DOI:10.1631/FITEE.2000508
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE