Multi-Tenant Database Memory Management Mechanism Based on Chunk Folding (Unbekannt)
- Neue Suche nach: Yao, J.-C.
- Neue Suche nach: Yao, J.-C.
In:
CHINESE JOURNAL OF COMPUTERS -CHINESE EDITION-
;
34
;
2319-2331
;
2011
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Multi-Tenant Database Memory Management Mechanism Based on Chunk Folding
-
Beteiligte:Yao, J.-C. ( Autor:in )
-
Erschienen in:CHINESE JOURNAL OF COMPUTERS -CHINESE EDITION- ; 34 ; 2319-2331
-
Verlag:
- Neue Suche nach: SCIENCE PRESS
-
Erscheinungsdatum:01.01.2011
-
Format / Umfang:13 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Unbekannt
- Neue Suche nach: 004
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 004 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 34
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Optimization Approaches for QoS in Computer Networks: A SurveyLin, C. et al. | 2011
- 15
-
Study on the Countermeasures of BitTorrent Fake Block AttackShi, J.-T. et al. | 2011
- 25
-
Anonymous HIBE Scheme Secure Against Full Adaptive-ID AttacksWang, H. et al. | 2011
- 38
-
Gateway-Oriented Password-Authenticated Key Exchange Based on RSAWei, F.-S. et al. | 2011
- 47
-
Provably Secure Two-Party Authenticated Key Exchange Protocol in eCK ModelZhao, J.-J. et al. | 2011
- 55
-
Dynamic Trust Evaluation Model Under Distributed Computing EnvironmentZhu, Y.-W. et al. | 2011
- 65
-
A Fairness Optimization Algorithm of Variable Spectral Widths and Time-Slot Lengths in Wireless Mesh NetworksShu, T. et al. | 2011
- 76
-
Snowflake: A New-Type Network Structure of Data CenterLiu, X.-Q. et al. | 2011
- 87
-
Correlation Dominating Set Construction Based upon Entropy Evaluation in Wireless Sensor NetworksYu, R.-Y. et al. | 2011
- 96
-
Study of Mobility-Adaptive Strategy for Stability-Based Routing of MANETsHu, X. et al. | 2011
- 105
-
Distribution of the Symmetrical Logic Formulas in the L~3^*-Logic Metric SpaceWang, Q.-P. et al. | 2011
- 115
-
An Improved Particle Swarm Optimization Algorithm with Search Space Zoomed Factor and AttractorChi, Y.-H. et al. | 2011
- 131
-
A User-Centric Service Composition Method Synthesizing Multiple ViewsDing, W.-L. et al. | 2011
- 143
-
ELF:Shared Cache Management through Eliminating Dead Blocks and Filtering Less Reused LinesSui, X.-F. et al. | 2011
- 154
-
A Study of Thread-Based MPI Communication AcceleratorLiu, Z.-Q. et al. | 2011
- 165
-
Design and Implementation of a FPGA Based Gaussian Random Number GeneratorGu, X.-C. et al. | 2011
- 174
-
Delivery Probability Prediction Based Efficient Routing in DTNPeng, M. et al. | 2011
- 182
-
Optimizing Scheduling Technology for Clustered VLIW Architectures Using Data Dependence GraphYang, X. et al. | 2011
- 193
-
The Pi^+ Calculus - An Extension of the Pi Calculus for Expressing Petri NetsHao, K.-G. et al. | 2011
- 204
-
A Feature Extraction Method of Computer Viruses Based on Artificial Immune and Code RelevanceWang, W. et al. | 2011
- 216
-
A Model of Network Device Coordinative RunZang, T.-N. et al. | 2011
- 229
-
The QCircuit-Based Simulation and Analysis of Eavesdropping of BB84 QKD ProtocolLu, S.-F. et al. | 2011
- 236
-
The Efficient CCA Secure Public-Key Encryption SchemeKang, L. et al. | 2011
- 242
-
An Automatic Network Protocol Fuzz Testing and Vulnerability Discovering MethodLi, W.-M. et al. | 2011
- 256
-
Index of Mobile Data Based on Phrase Points AnalysisYe, X.-P. et al. | 2011
- 275
-
A CTMO-Based Damage Quarantine Technology for DatabaseDai, H. et al. | 2011
- 291
-
XML Modeling of Fuzzy Data with Relational DatabasesYan, L. et al. | 2011
- 304
-
AI Planning Based Parlay X Telecom Services DesignJiang, Z.-H. et al. | 2011
- 318
-
Online Evolution of Software ServicesWang, H.-M. et al. | 2011
- 329
-
An Approach for Capturing Software Requirements from Interactive ScenariosChen, X.-H. et al. | 2011
- 342
-
Modeling and Weaving Architectural-Level Stateful Aspects-A LTS Based ApproachYang, C.-H. et al. | 2011
- 353
-
XML Document Classification Based on Kernel MethodYang, J.-W. et al. | 2011
- 360
-
Research on the Present Status of Chinese Deep Web DatabaseLiu, Y.-K. et al. | 2011
- 371
-
A Kind of Software Faults Diagnosing FrameworkShan, J.-H. et al. | 2011
- 383
-
Hierarchical Abstraction Process in Model-Based DiagnosisWang, N. et al. | 2011
- 395
-
A Flooding-Based DDoS Detection Algorithm Based on Non-Linear Preprocessing Network Traffic Predicted MethodYang, X.-Y. et al. | 2011
- 406
-
Dynamic Critical Paths Multi-Product Manufacturing Scheduling Algorithm Based on Operation SetXie, Z.-Q. et al. | 2011
- 413
-
A QoS Assurance Mechanism Based on Credit Record for SOC SystemYin, X.-Z. et al. | 2011
- 425
-
Research on Compressed SensingDai, Q.-H. et al. | 2011
- 435
-
A Positive-Approximation Based Accelerated Algorithm to Feature Selection from Incomplete Decision TablesQian, Y.-H. et al. | 2011
- 443
-
A SSVM-Based Recursive Uncorrelated Feature Extraction AlgorithmRen, S.-J. et al. | 2011
- 452
-
Application Layer Real-time Proactive Defense System Based on Application Layer Protocol AnalysisXie, B.-L. et al. | 2011
- 464
-
Human Motion Synthesis Based on Independent Spatio-Temporal Feature SpaceLiu, G.-D. et al. | 2011
- 473
-
Single-Pass Data Access for Multi-Fragment Effects Rendering on GPUsXie, G.-F. et al. | 2011
- 482
-
Remote Sensing Images Upsampling Based on Projection onto Convex Sets and Complex Wavelet Packet TransferZhang, Y. et al. | 2011
- 489
-
Sampling and Orienting of Scattered Points Based on Adaptive Spherical CoveringLiu, S.-J. et al. | 2011
- 499
-
GPU-Based Fast Spherical Distance TransformChen, W.-F. et al. | 2011
- 508
-
High-Quality Volume Rendering of Unstructured-Grid Cell-Centered Data in CFDMa, Q.-L. et al. | 2011
- 517
-
A Novel Ray Casting Algorithm for the Display of Occluded FeaturesZhou, Z.-G. et al. | 2011
- 526
-
Research on the Technology of Computer Aided Irregular Needling EmbroideryChen, S.-G. et al. | 2011
- 539
-
A Non-Rigid Registration Algorithm of Large-Scale Deformable ModelsLi, J. et al. | 2011
- 548
-
A New Method to Solve Plateau-Bezier Problems over the Triangular DomainXu, G. et al. | 2011
- 555
-
Research on Decision Analysis System Based on Interactive Visual ComponentsTeng, D.-X. et al. | 2011
- 566
-
An Intelligent Interface for Interactive Classification of Volume Data Based on the 2D Embedding of the High Dimensional Feature SpaceWang, G.-Z. et al. | 2011
- 574
-
Retinal Vessel Segmentation Using Nonsubsampled Contourlet TransformZhong, H. et al. | 2011
- 583
-
Research of an Improved LBP Algorithm in Texture Classification Based on Rotation Invariance and Statistical Phase DistributionHan, Y.-B. et al. | 2011
- 593
-
Green Network and Green Evaluation: Mechanism, Modeling and EvaluationLin, C. et al. | 2011
- 613
-
An Improved Differential Fault Analysis on CamelliaZhao, X.-j. et al. | 2011
- 628
-
Replica Distribution for Search Size Minimization in Unstructured OverlayFeng, G.-F. et al. | 2011
- 636
-
Convergence and Runtime Analysis of ITO Algorithm for One Class of Combinatorial OptimizationDong, W.-Y. et al. | 2011
- 647
-
An Indicator for Assessing the Spread of Solutions in Multi-Objective Evolutionary AlgorithmLi, M.-Q. et al. | 2011
- 665
-
Dynamic Pool Allocation on Improving Heap Data LocalityWang, Z.-J. et al. | 2011
- 676
-
CC-NUMA Oriented Conflict Preventing Method for Transactional MemoryWang, R.-B. et al. | 2011
- 684
-
A Memory Global Optimization Approach in Virtualized Cloud Computing EnvironmentsLi, Y.-Q. et al. | 2011
- 694
-
Memory-Level Parallelism and Processor MicroarchitectureXie, L.-G. et al. | 2011
- 705
-
A GPU Low-Power Optimization Based on Parallelism Analysis ModelLin, Y.-S. et al. | 2011
- 717
-
Thermal-Scalable 3D Parallel-Heat-Sinking Integration Methodology:Key SoC Technology for Large-Scale Parallel ComputingLuo, Z.-Y. et al. | 2011
- 729
-
A Two-Step CORDIC Rotation Algorithm with Pre-Coded Scale FactorsMou, S.-M. et al. | 2011
- 738
-
Study of User and Library Functions Distinguishing Technology in DecompilationWu, W.-F. et al. | 2011
- 748
-
An Analytic Solution for the Noncoplanar P4P Problem with An Uncalibrated CameraGuo, Y. et al. | 2011
- 755
-
A Stereo Matching Method Based on K-means Segmentation and Neighborhood Constraints RelaxationWu, C.-H. et al. | 2011
- 763
-
An Energy-Efficient Spatial Window Query Processing Algorithm in Wireless Sensor NetworksLiu, L. et al. | 2011
- 779
-
Multiconstrained Multipath Routing for Wireless Sensor Networks in the Fuzzy Random EnvironmentWang, X.-M. et al. | 2011
- 792
-
An Energy-Saving Privacy-Preserving Data Aggregation AlgorithmYang, G. et al. | 2011
- 801
-
Convergence Analysis and Comparison of Evolutionary Algorithms Based on Relation ModelHuang, H. et al. | 2011
- 812
-
An Adaptive Query Relaxation Approach for Relational Databases Based on Semantic SimilarityMeng, X.-F. et al. | 2011
- 825
-
KREAG: Keyword Query Approach over RDF Data Based on Entity-Triple Association GraphLi, H.-Y. et al. | 2011
- 836
-
Multiobjective Path Planning under Dynamic Uncertain EnvironmentWei, W. et al. | 2011
- 847
-
An Efficient Integrity Check Method for Fine-Grained Data over Galois FieldChen, L. et al. | 2011
- 856
-
A Text Similarity Measurement Combining Word Semantic Information with TF-IDF MethodHuang, C.-H. et al. | 2011
- 865
-
A Location Privacy Preserving Approach on Road NetworkXue, J. et al. | 2011
- 879
-
A Test Suite Reduction Technique for Partial Coverage of Test RequirementsGu, Q. et al. | 2011
- 889
-
A Method on Software Pipelined Parallelism for Data Flow ProgramsWei, H.-T. et al. | 2011
- 899
-
Adaptive Cache Line Strategy for Irregular References on Cell ArchitectureCao, Q. et al. | 2011
- 912
-
A Network RAID System with Backend Centralized Redundancy ManagementNa, W.-W. et al. | 2011
- 924
-
A Recursive Scalable Topology for Network on ChipZhu, X.-J. et al. | 2011
- 931
-
Research on Non-Local Regularization Model and Algorithms for Image Super-Resolution ReconstructionXiao, L. et al. | 2011
- 943
-
Two Improved EDF Dynamic Scheduling Algorithms in Soft Real-Time SystemsLi, Q. et al. | 2011
- 953
-
Target-Directed Concolic TestingCui, Z.-Q. et al. | 2011
- 965
-
FSM-Based Testing: Theory, Method and EvaluationLiu, P. et al. | 2011
- 985
-
A Workload Generation Method for TTCN-3 Performance TestingXu, L. et al. | 2011
- 1001
-
Study on the Method of Checking the Reachability of Internet Ware Based on ModelZhao, H.-Q. et al. | 2011
- 1012
-
Model-Based Testing for Web ApplicationsMiao, H.-K. et al. | 2011
- 1029
-
Testing Web Services Based on User RequirementsXu, L. et al. | 2011
- 1041
-
A Verification Approach for Web Service Compositions Based on Epistemic Model CheckingLuo, X.-Y. et al. | 2011
- 1062
-
An Approach for Inter-Class Integration Test Order Determination Based on Coupling MeasuresJiang, S.-J. et al. | 2011
- 1075
-
An Approach for Class Integration Testing Based on Dynamic Dependency RelationsZhang, Y.-M. et al. | 2011
- 1090
-
Research on the Effect of Runtime Exception in Software Static TestingJin, D.-H. et al. | 2011
- 1100
-
Improving the Efficiency and Accuracy of Path-Sensitive Defect DetectingZhao, Y.-S. et al. | 2011
- 1114
-
A Semi-Automatic Extensible Static Defect Analysis ToolLiang, G.-T. et al. | 2011
- 1126
-
Locating Error Interactions Based on Partial Covering ArrayZhou, W.-J. et al. | 2011
- 1137
-
Model for Cascading Faults in Complex SoftwareWang, J. et al. | 2011
- 1148
-
Research of Software Defect Prediction Model Based on ACO-SVMJiang, H.-Y. et al. | 2011
- 1155
-
Location-Based Services: Architecture and ProgressZhou, A.-Y. et al. | 2011
- 1172
-
A Survey on Electronic TextilesZheng, N.-G. et al. | 2011
- 1188
-
Universal Composable Grouping-Proof Protocol for RFID Tags in the Internet of ThingsZhang, Z. et al. | 2011
- 1195
-
An Adaptive Debugging Approach for Wireless Sensor Network ApplicationsLi, F. et al. | 2011
- 1214
-
Channel Selection Algorithm Based on Gibbs Sampler for Optimal QoM in Multi-Channel Wireless NetworksXia, N. et al. | 2011
- 1224
-
A Survey of Optimization Technology of Inclusion-Based Pointer AnalysisChen, C.-M. et al. | 2011
- 1239
-
Research on Algorithms for Complexes and Functional Modules Prediction in Protein-Protein Interaction NetworksYu, L. et al. | 2011
- 1252
-
Research on Simulation and Modeling of Social Network Worm PropagationSun, X. et al. | 2011
- 1262
-
One Validity Model of Digital Data Forensics Based on Trusted ProbabilitySun, G.-Z. et al. | 2011
- 1275
-
A Dynamic Approach on Quickly Predicting Non-Termination of Logic Program of Security ProtocolZhou, T. et al. | 2011
- 1284
-
A Practical Attack on the pSFLASH Public Key CryptosystemSun, S.-W. et al. | 2011
- 1291
-
Certificateless Signcryption Scheme with Proxy UnsigncryptionYu, G. et al. | 2011
- 1300
-
An Asymmetric Impossible Boomerang Attack on 7-Round AES-128Dong, X.-L. et al. | 2011
- 1308
-
Pseudo-Randomness Extraction for Generalized Diffie-Hellman Problem over Composite Modulus Under Factoring AssumptionMei, Q.-X. et al. | 2011
- 1314
-
Optimization of Stateful Hardware Acceleration in Hybrid ArchitecturesMa, Y.-K. et al. | 2011
- 1323
-
Research of Data Parallel Computation Method of Lifting Wavelet TransformZhong, S. et al. | 2011
- 1332
-
On Next Generation Optic-Core Load-Balanced Packet SwitchXia, Y. et al. | 2011
- 1342
-
An Energy Efficient Topology Control Protocol for Ad Hoc Networks Utilizing Randomized BeamformingLi, X.-H. et al. | 2011
- 1351
-
A Security Transmission Model for Internet of ThingsWu, Z.-Q. et al. | 2011
- 1365
-
Modeling and Verifying Services of Internet of Things Based on Timed AutomataLi, L.-X. et al. | 2011
- 1378
-
VANET Cooperative Downloading Approach Study Based on Dynamic SlotLiu, J.-H. et al. | 2011
- 1387
-
Low Cost RFID Authentication Protocol with Forward PrivacyMa, C.-S. et al. | 2011
- 1399
-
A Survey of Selective Ensemble Learning AlgorithmsZhang, C.-X. et al. | 2011
- 1411
-
Advances in Automatic Fault Localization TechniquesYu, K. et al. | 2011
- 1423
-
The Development of Topic Models in Natural Language ProcessingXu, G. et al. | 2011
- 1437
-
Representation and Reasoning of Fuzzy XML Model with Fuzzy Description LogicZhang, F. et al. | 2011
- 1452
-
A Heuristic Algorithm for MPMGOOCWu, Y.-X. et al. | 2011
- 1463
-
Asynchronous Communication Mechanism Oriented Wireless Sensor Networks and MAC ProtocolsHu, Y.-P. et al. | 2011
- 1478
-
Distributed Optimal Resource Allocation Algorithm Based on Mission of Cooperative Multi-Flows in Ad Hoc NetworkChen, Y. et al. | 2011
- 1488
-
MDA-Based Visual Component Formalism for Parallel SimulationsYao, Y.-P. et al. | 2011
- 1500
-
The Effect of NoC Latency Difference on the Fairness of Memory Systems and a StrategyLiu, S. et al. | 2011
- 1509
-
An Adaptive Algorithm of Locating Fault Interactions Based Combinatorial TestingZhou, W.-J. et al. | 2011
- 1519
-
An Adaptable QP-Independent Approach to Rate-Distortion Optimization for Video CodingYuan, W. et al. | 2011
- 1528
-
An Approach of Solving Constraint Satisfaction Problem Based on Cycle-CutLi, Z.-S. et al. | 2011
- 1536
-
A Universal and Optimal Dynamic Network Constructive FrameworkYuan, Y. et al. | 2011
- 1548
-
NURBS Curve Adaptive Fairing Algorithm Based on a Digital Index of FairnessWang, A.-Z. et al. | 2011
- 1556
-
An Image Segmentation Method Based on 3-D Histogram and Restrain Fuzzy Kohonen Clustering NetworkChen, Z.-Y. et al. | 2011
- 1563
-
A Review on the Churn Character of P2P NetworksFu, Z.-P. et al. | 2011
- 1578
-
A Survey on Java Program Obfuscation TechniquesWang, J.-M. et al. | 2011
- 1589
-
Mining Hierarchical Concept Lattice for Faceted NavigationHe, C. et al. | 2011
- 1603
-
Analysis and Modeling of Directory Protocol Energy Consumption in NoCWang, J.-H. et al. | 2011
- 1611
-
Decomposed Storage Model of FIB for Cluster RouterChen, W.-L. et al. | 2011
- 1621
-
Image Upsampling Based on Moving-Constrained Spring-Mass ModelGong, Y.-Y. et al. | 2011
- 1629
-
Research on Bandwidth Mismatch Compensation in Speech RecognitionHe, Y.-J. et al. | 2011
- 1638
-
Mandarin Stress Detection Using Acoustic, Lexical and Syntactic FeaturesNi, C.-J. et al. | 2011
- 1650
-
A Fair Load-Balancing QoS Routing Algorithm in Overlay NetworkCao, X.-S. et al. | 2011
- 1660
-
A Study on Network Service Behavior Verification with Process Algebra and Its ApplicationChen, F. et al. | 2011
- 1669
-
Provable Security Model for Trusted Network Connect ProtocolMa, Z. et al. | 2011
- 1679
-
The Capacity Analysis of Wireless Ad Hoc Networks Based on M/MMPP/1 Node ModelHan, S. et al. | 2011
- 1688
-
Joint Chinese-English Named Entity Recognition and AlignmentChen, Y.-F. et al. | 2011
- 1697
-
An Algorithm of Test Pattern Assignment of Circuit BIST Based on Gray CodeSun, H.-J. et al. | 2011
- 1705
-
Multimedia Data Clustering Based on Correlation Matrix FusionZhang, H. et al. | 2011
- 1712
-
Tracking Video Object Based on Central MacroblocksXiao, G.-Q. et al. | 2011
- 1719
-
Generalized SOM with Application to Facial Gender IdentificationYu, D.-J. et al. | 2011
- 1726
-
A Computation Framework for Orientation Tensor EstimationShao, X.-F. et al. | 2011
- 1732
-
An Effective Algorithm in Partial Fourier Parallel MRI Based on Robust EstimatorHuang, X. et al. | 2011
- 1741
-
Architecting Big Data: Challenges, Studies and ForecastsWang, S. et al. | 2011
- 1753
-
Large Scale Graph Data Processing on Cloud Computing EnvironmentsYu, G. et al. | 2011
- 1768
-
Evaluating Large Graph Processing in MapReduce Based on Message PassingPan, W. et al. | 2011
- 1785
-
Efficient Skyline Query Processing of Massive Data Based on Map-ReduceDing, L.-L. et al. | 2011
- 1797
-
Keyword-Based Deep Web Database SelectionFan, J. et al. | 2011
- 1805
-
Computational Advertising: A Data-Centric Comprehensive Web ApplicationZhou, A.-Y. et al. | 2011
- 1820
-
A Survey of Trajectory Privacy-Preserving TechniquesHuo, Z. et al. | 2011
- 1831
-
Concepts, Tasks and Research Advances of Intervention Rule MiningDuan, L. et al. | 2011
- 1843
-
Object Identification on Complex Data: A SurveyWang, H.-Z. et al. | 2011
- 1853
-
Set and String Similarity Queries: A SurveyLin, X.-M. et al. | 2011
- 1863
-
An Approach for Optimizing Relational Provenance StorageWang, L.-W. et al. | 2011
- 1876
-
An Efficient Processing Algorithm for rho -Dominant Skyline QueryXin, J.-C. et al. | 2011
- 1885
-
An Efficient Algorithm for top-k Proximity Query on Uncertain GraphsZhang, H.-J. et al. | 2011
- 1897
-
A Probabilistic-Graphical-Model Based Approach for Representing Lineages in Uncertain DataYue, K. et al. | 2011
- 1907
-
A Semi-Markov Evaluation Model for the Survivability of Real-Time Database with Intrusion ToleranceChen, C.-Q. et al. | 2011
- 1917
-
A Method for Reverse k-Nearest-Neighbor Queries in Obstructed SpacesYu, X.-N. et al. | 2011
- 1926
-
A Multiple Top-k Join Algorithm Based on the Star SchemaCao, L.-X. et al. | 2011
- 1936
-
One-size-fits-all OLAP Technique for Big Data AnalysisZhang, Y.-S. et al. | 2011
- 1947
-
Mining Spatial Co-Location Patterns for Fuzzy ObjectsOuyang, Z.-P. et al. | 2011
- 1956
-
A New Hybrid Algorithm for Influence Maximization in Social NetworksTian, J.-T. et al. | 2011
- 1966
-
Trajectory Outliers Detection Based on Local Outlying DegreeLiu, L.-X. et al. | 2011
- 1976
-
CoPrivacy: A Collaborative Location Privacy-Preserving Method without Cloaking RegionHuang, Y. et al. | 2011
- 1986
-
Aggregate Keyword Queries on Hierarchy Relational DatabasesHu, H. et al. | 2011
- 1997
-
An Indexing and Query Processing Approach of RDF Data Based on Prufer SequenceLiu, X.-Y. et al. | 2011
- 2009
-
PCPF: A Parallel Index for Matching the High-Dimensional Vectors in Multimedia DatabasesChen, H.-Z. et al. | 2011
- 2018
-
Heuristic Mechanism for Query Optimization in Column-Store Data WarehouseYan, Q.-L. et al. | 2011
- 2029
-
Mobile Internet: Terminal Devices, Networks and ServicesLuo, J.-Z. et al. | 2011
- 2052
-
T-NBC: Transparent Non-blocking MPI Collective OperationsLi, Q. et al. | 2011
- 2064
-
An Optimized Hierarchical Cache Design Based on Data Access FeaturesLi, C.-M. et al. | 2011
- 2073
-
Exactly Reproducible Program Execution and Its Application in Computer Architecture SimulationZhao, T.-L. et al. | 2011
- 2084
-
PartitionSim: A Parallel Simulator for Many-CoresJiao, S. et al. | 2011
- 2093
-
Secure Range Query with Single Assertion on Encrypted DataCai, K. et al. | 2011
- 2104
-
A New Multi-Receiver ID-Based Anonymous SigncryptionPang, L.-J. et al. | 2011
- 2114
-
A Scheme for Protecting Confidentiality of No-volatile Main Memory Based on Phase-Change MemoryZhao, P. et al. | 2011
- 2121
-
A Two-Step Data Placement and Task Scheduling Strategy for Optimizing Scientific Workflow Performance on Cloud Computing PlatformLiu, S.-W. et al. | 2011
- 2131
-
Efficient Entity Resolution on XML Data Based on Entity-Describe-AttributeLi, Y.-K. et al. | 2011
- 2142
-
RM-Tree: An Index Supporting String Similarity OperationsWang, J.-B. et al. | 2011
- 2155
-
Answering Probabilistic Top-k Queries over P2P NetworksSun, Y.-J. et al. | 2011
- 2165
-
Knowledge Guided Software Trustworthiness Requirements ElicitationWang, Y. et al. | 2011
- 2176
-
Optimizing Cost and Performance in Multiple Interface Mobile HostsZhang, C.-Y. et al. | 2011
- 2187
-
A Novel Packet Processing Model for Next-Generation Internet Experimental Platform-EasySwitchLi, T. et al. | 2011
- 2197
-
epsilon -Approximation and Weighted Fairness Guaranteed Congestion Control Algorithm for Wireless Sensor NetworksLi, G.-H. et al. | 2011
- 2211
-
An Adaptive User Interface Model Based on Experience AwarenessFan, Y.-T. et al. | 2011
- 2224
-
Image Retrieval Based on Locally Features AggregatingHe, Y.-F. et al. | 2011
- 2234
-
Group Interests and Their Correlations Mining Based on WikipediaZhang, H.-S. et al. | 2011
- 2243
-
A New Local Discriminant Projection MethodXie, J. et al. | 2011
- 2253
-
Adaptive Management and Multi-Objective Optimization for Virtual Machine Placement in Cloud ComputingLi, Q. et al. | 2011
- 2265
-
Memory Cooperation Optimization Strategies of Multiple Virtual Machines in Cloud Computing EnvironmentZhang, W.-Z. et al. | 2011
- 2278
-
Live Migration of Virtual Machines Based on Hybrid Memory Copy ApproachChen, Y. et al. | 2011
- 2292
-
Dynamically Estimating Approach for CPU Consumption of Multi-Tenancy Web ApplicationsWang, W. et al. | 2011
- 2305
-
The Dynamic Allocation Model for the Resources of Cloud Services Delivery NetworksShi, P.-C. et al. | 2011
- 2319
-
Multi-Tenant Database Memory Management Mechanism Based on Chunk FoldingYao, J.-C. et al. | 2011
- 2332
-
Knowledge Reduction Algorithms in Cloud ComputingQian, J. et al. | 2011
- 2344
-
Optimization Update for Data Composition View Based on Data ServiceZhang, P. et al. | 2011
- 2355
-
Service Classification and Recommendation Based on Software NetworksPan, W.-F. et al. | 2011
- 2370
-
Personalized Requirement Oriented Virtual Service Resource Aggregation MethodChu, D.-H. et al. | 2011
- 2381
-
Efficient Web Service Query Approach Based on Concept RelaxationOu, W.-J. et al. | 2011
- 2391
-
Privacy-Preserving Computable Encryption Scheme of Cloud ComputingHuang, R.-W. et al. | 2011
- 2403
-
A Trust Calculating Algorithm Based on Social Networking Service Users' ContextQiao, X.-Q. et al. | 2011
- 2414
-
An Automatic Emerging Approach for Web Service Semantics Based on Social TaggingNing, D. et al. | 2011
- 2427
-
Research on Deadlock Detecting of BPEL Inter-ProcessesHuang, J.-F. et al. | 2011
- 2435
-
Performance Modeling and Analysis of Service Systems Using Queueing Petri NetsGu, J. et al. | 2011