Multi-Tenant Database Memory Management Mechanism Based on Chunk Folding (Unknown)
- New search for: Yao, J.-C.
- New search for: Yao, J.-C.
In:
CHINESE JOURNAL OF COMPUTERS -CHINESE EDITION-
;
34
;
2319-2331
;
2011
-
ISSN:
- Article (Journal) / Print
-
Title:Multi-Tenant Database Memory Management Mechanism Based on Chunk Folding
-
Contributors:Yao, J.-C. ( author )
-
Published in:CHINESE JOURNAL OF COMPUTERS -CHINESE EDITION- ; 34 ; 2319-2331
-
Publisher:
- New search for: SCIENCE PRESS
-
Publication date:2011-01-01
-
Size:13 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:Unknown
- New search for: 004
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 004 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 34
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Optimization Approaches for QoS in Computer Networks: A SurveyLin, C. et al. | 2011
- 15
-
Study on the Countermeasures of BitTorrent Fake Block AttackShi, J.-T. et al. | 2011
- 25
-
Anonymous HIBE Scheme Secure Against Full Adaptive-ID AttacksWang, H. et al. | 2011
- 38
-
Gateway-Oriented Password-Authenticated Key Exchange Based on RSAWei, F.-S. et al. | 2011
- 47
-
Provably Secure Two-Party Authenticated Key Exchange Protocol in eCK ModelZhao, J.-J. et al. | 2011
- 55
-
Dynamic Trust Evaluation Model Under Distributed Computing EnvironmentZhu, Y.-W. et al. | 2011
- 65
-
A Fairness Optimization Algorithm of Variable Spectral Widths and Time-Slot Lengths in Wireless Mesh NetworksShu, T. et al. | 2011
- 76
-
Snowflake: A New-Type Network Structure of Data CenterLiu, X.-Q. et al. | 2011
- 87
-
Correlation Dominating Set Construction Based upon Entropy Evaluation in Wireless Sensor NetworksYu, R.-Y. et al. | 2011
- 96
-
Study of Mobility-Adaptive Strategy for Stability-Based Routing of MANETsHu, X. et al. | 2011
- 105
-
Distribution of the Symmetrical Logic Formulas in the L~3^*-Logic Metric SpaceWang, Q.-P. et al. | 2011
- 115
-
An Improved Particle Swarm Optimization Algorithm with Search Space Zoomed Factor and AttractorChi, Y.-H. et al. | 2011
- 131
-
A User-Centric Service Composition Method Synthesizing Multiple ViewsDing, W.-L. et al. | 2011
- 143
-
ELF:Shared Cache Management through Eliminating Dead Blocks and Filtering Less Reused LinesSui, X.-F. et al. | 2011
- 154
-
A Study of Thread-Based MPI Communication AcceleratorLiu, Z.-Q. et al. | 2011
- 165
-
Design and Implementation of a FPGA Based Gaussian Random Number GeneratorGu, X.-C. et al. | 2011
- 174
-
Delivery Probability Prediction Based Efficient Routing in DTNPeng, M. et al. | 2011
- 182
-
Optimizing Scheduling Technology for Clustered VLIW Architectures Using Data Dependence GraphYang, X. et al. | 2011
- 193
-
The Pi^+ Calculus - An Extension of the Pi Calculus for Expressing Petri NetsHao, K.-G. et al. | 2011
- 204
-
A Feature Extraction Method of Computer Viruses Based on Artificial Immune and Code RelevanceWang, W. et al. | 2011
- 216
-
A Model of Network Device Coordinative RunZang, T.-N. et al. | 2011
- 229
-
The QCircuit-Based Simulation and Analysis of Eavesdropping of BB84 QKD ProtocolLu, S.-F. et al. | 2011
- 236
-
The Efficient CCA Secure Public-Key Encryption SchemeKang, L. et al. | 2011
- 242
-
An Automatic Network Protocol Fuzz Testing and Vulnerability Discovering MethodLi, W.-M. et al. | 2011
- 256
-
Index of Mobile Data Based on Phrase Points AnalysisYe, X.-P. et al. | 2011
- 275
-
A CTMO-Based Damage Quarantine Technology for DatabaseDai, H. et al. | 2011
- 291
-
XML Modeling of Fuzzy Data with Relational DatabasesYan, L. et al. | 2011
- 304
-
AI Planning Based Parlay X Telecom Services DesignJiang, Z.-H. et al. | 2011
- 318
-
Online Evolution of Software ServicesWang, H.-M. et al. | 2011
- 329
-
An Approach for Capturing Software Requirements from Interactive ScenariosChen, X.-H. et al. | 2011
- 342
-
Modeling and Weaving Architectural-Level Stateful Aspects-A LTS Based ApproachYang, C.-H. et al. | 2011
- 353
-
XML Document Classification Based on Kernel MethodYang, J.-W. et al. | 2011
- 360
-
Research on the Present Status of Chinese Deep Web DatabaseLiu, Y.-K. et al. | 2011
- 371
-
A Kind of Software Faults Diagnosing FrameworkShan, J.-H. et al. | 2011
- 383
-
Hierarchical Abstraction Process in Model-Based DiagnosisWang, N. et al. | 2011
- 395
-
A Flooding-Based DDoS Detection Algorithm Based on Non-Linear Preprocessing Network Traffic Predicted MethodYang, X.-Y. et al. | 2011
- 406
-
Dynamic Critical Paths Multi-Product Manufacturing Scheduling Algorithm Based on Operation SetXie, Z.-Q. et al. | 2011
- 413
-
A QoS Assurance Mechanism Based on Credit Record for SOC SystemYin, X.-Z. et al. | 2011
- 425
-
Research on Compressed SensingDai, Q.-H. et al. | 2011
- 435
-
A Positive-Approximation Based Accelerated Algorithm to Feature Selection from Incomplete Decision TablesQian, Y.-H. et al. | 2011
- 443
-
A SSVM-Based Recursive Uncorrelated Feature Extraction AlgorithmRen, S.-J. et al. | 2011
- 452
-
Application Layer Real-time Proactive Defense System Based on Application Layer Protocol AnalysisXie, B.-L. et al. | 2011
- 464
-
Human Motion Synthesis Based on Independent Spatio-Temporal Feature SpaceLiu, G.-D. et al. | 2011
- 473
-
Single-Pass Data Access for Multi-Fragment Effects Rendering on GPUsXie, G.-F. et al. | 2011
- 482
-
Remote Sensing Images Upsampling Based on Projection onto Convex Sets and Complex Wavelet Packet TransferZhang, Y. et al. | 2011
- 489
-
Sampling and Orienting of Scattered Points Based on Adaptive Spherical CoveringLiu, S.-J. et al. | 2011
- 499
-
GPU-Based Fast Spherical Distance TransformChen, W.-F. et al. | 2011
- 508
-
High-Quality Volume Rendering of Unstructured-Grid Cell-Centered Data in CFDMa, Q.-L. et al. | 2011
- 517
-
A Novel Ray Casting Algorithm for the Display of Occluded FeaturesZhou, Z.-G. et al. | 2011
- 526
-
Research on the Technology of Computer Aided Irregular Needling EmbroideryChen, S.-G. et al. | 2011
- 539
-
A Non-Rigid Registration Algorithm of Large-Scale Deformable ModelsLi, J. et al. | 2011
- 548
-
A New Method to Solve Plateau-Bezier Problems over the Triangular DomainXu, G. et al. | 2011
- 555
-
Research on Decision Analysis System Based on Interactive Visual ComponentsTeng, D.-X. et al. | 2011
- 566
-
An Intelligent Interface for Interactive Classification of Volume Data Based on the 2D Embedding of the High Dimensional Feature SpaceWang, G.-Z. et al. | 2011
- 574
-
Retinal Vessel Segmentation Using Nonsubsampled Contourlet TransformZhong, H. et al. | 2011
- 583
-
Research of an Improved LBP Algorithm in Texture Classification Based on Rotation Invariance and Statistical Phase DistributionHan, Y.-B. et al. | 2011
- 593
-
Green Network and Green Evaluation: Mechanism, Modeling and EvaluationLin, C. et al. | 2011
- 613
-
An Improved Differential Fault Analysis on CamelliaZhao, X.-j. et al. | 2011
- 628
-
Replica Distribution for Search Size Minimization in Unstructured OverlayFeng, G.-F. et al. | 2011
- 636
-
Convergence and Runtime Analysis of ITO Algorithm for One Class of Combinatorial OptimizationDong, W.-Y. et al. | 2011
- 647
-
An Indicator for Assessing the Spread of Solutions in Multi-Objective Evolutionary AlgorithmLi, M.-Q. et al. | 2011
- 665
-
Dynamic Pool Allocation on Improving Heap Data LocalityWang, Z.-J. et al. | 2011
- 676
-
CC-NUMA Oriented Conflict Preventing Method for Transactional MemoryWang, R.-B. et al. | 2011
- 684
-
A Memory Global Optimization Approach in Virtualized Cloud Computing EnvironmentsLi, Y.-Q. et al. | 2011
- 694
-
Memory-Level Parallelism and Processor MicroarchitectureXie, L.-G. et al. | 2011
- 705
-
A GPU Low-Power Optimization Based on Parallelism Analysis ModelLin, Y.-S. et al. | 2011
- 717
-
Thermal-Scalable 3D Parallel-Heat-Sinking Integration Methodology:Key SoC Technology for Large-Scale Parallel ComputingLuo, Z.-Y. et al. | 2011
- 729
-
A Two-Step CORDIC Rotation Algorithm with Pre-Coded Scale FactorsMou, S.-M. et al. | 2011
- 738
-
Study of User and Library Functions Distinguishing Technology in DecompilationWu, W.-F. et al. | 2011
- 748
-
An Analytic Solution for the Noncoplanar P4P Problem with An Uncalibrated CameraGuo, Y. et al. | 2011
- 755
-
A Stereo Matching Method Based on K-means Segmentation and Neighborhood Constraints RelaxationWu, C.-H. et al. | 2011
- 763
-
An Energy-Efficient Spatial Window Query Processing Algorithm in Wireless Sensor NetworksLiu, L. et al. | 2011
- 779
-
Multiconstrained Multipath Routing for Wireless Sensor Networks in the Fuzzy Random EnvironmentWang, X.-M. et al. | 2011
- 792
-
An Energy-Saving Privacy-Preserving Data Aggregation AlgorithmYang, G. et al. | 2011
- 801
-
Convergence Analysis and Comparison of Evolutionary Algorithms Based on Relation ModelHuang, H. et al. | 2011
- 812
-
An Adaptive Query Relaxation Approach for Relational Databases Based on Semantic SimilarityMeng, X.-F. et al. | 2011
- 825
-
KREAG: Keyword Query Approach over RDF Data Based on Entity-Triple Association GraphLi, H.-Y. et al. | 2011
- 836
-
Multiobjective Path Planning under Dynamic Uncertain EnvironmentWei, W. et al. | 2011
- 847
-
An Efficient Integrity Check Method for Fine-Grained Data over Galois FieldChen, L. et al. | 2011
- 856
-
A Text Similarity Measurement Combining Word Semantic Information with TF-IDF MethodHuang, C.-H. et al. | 2011
- 865
-
A Location Privacy Preserving Approach on Road NetworkXue, J. et al. | 2011
- 879
-
A Test Suite Reduction Technique for Partial Coverage of Test RequirementsGu, Q. et al. | 2011
- 889
-
A Method on Software Pipelined Parallelism for Data Flow ProgramsWei, H.-T. et al. | 2011
- 899
-
Adaptive Cache Line Strategy for Irregular References on Cell ArchitectureCao, Q. et al. | 2011
- 912
-
A Network RAID System with Backend Centralized Redundancy ManagementNa, W.-W. et al. | 2011
- 924
-
A Recursive Scalable Topology for Network on ChipZhu, X.-J. et al. | 2011
- 931
-
Research on Non-Local Regularization Model and Algorithms for Image Super-Resolution ReconstructionXiao, L. et al. | 2011
- 943
-
Two Improved EDF Dynamic Scheduling Algorithms in Soft Real-Time SystemsLi, Q. et al. | 2011
- 953
-
Target-Directed Concolic TestingCui, Z.-Q. et al. | 2011
- 965
-
FSM-Based Testing: Theory, Method and EvaluationLiu, P. et al. | 2011
- 985
-
A Workload Generation Method for TTCN-3 Performance TestingXu, L. et al. | 2011
- 1001
-
Study on the Method of Checking the Reachability of Internet Ware Based on ModelZhao, H.-Q. et al. | 2011
- 1012
-
Model-Based Testing for Web ApplicationsMiao, H.-K. et al. | 2011
- 1029
-
Testing Web Services Based on User RequirementsXu, L. et al. | 2011
- 1041
-
A Verification Approach for Web Service Compositions Based on Epistemic Model CheckingLuo, X.-Y. et al. | 2011
- 1062
-
An Approach for Inter-Class Integration Test Order Determination Based on Coupling MeasuresJiang, S.-J. et al. | 2011
- 1075
-
An Approach for Class Integration Testing Based on Dynamic Dependency RelationsZhang, Y.-M. et al. | 2011
- 1090
-
Research on the Effect of Runtime Exception in Software Static TestingJin, D.-H. et al. | 2011
- 1100
-
Improving the Efficiency and Accuracy of Path-Sensitive Defect DetectingZhao, Y.-S. et al. | 2011
- 1114
-
A Semi-Automatic Extensible Static Defect Analysis ToolLiang, G.-T. et al. | 2011
- 1126
-
Locating Error Interactions Based on Partial Covering ArrayZhou, W.-J. et al. | 2011
- 1137
-
Model for Cascading Faults in Complex SoftwareWang, J. et al. | 2011
- 1148
-
Research of Software Defect Prediction Model Based on ACO-SVMJiang, H.-Y. et al. | 2011
- 1155
-
Location-Based Services: Architecture and ProgressZhou, A.-Y. et al. | 2011
- 1172
-
A Survey on Electronic TextilesZheng, N.-G. et al. | 2011
- 1188
-
Universal Composable Grouping-Proof Protocol for RFID Tags in the Internet of ThingsZhang, Z. et al. | 2011
- 1195
-
An Adaptive Debugging Approach for Wireless Sensor Network ApplicationsLi, F. et al. | 2011
- 1214
-
Channel Selection Algorithm Based on Gibbs Sampler for Optimal QoM in Multi-Channel Wireless NetworksXia, N. et al. | 2011
- 1224
-
A Survey of Optimization Technology of Inclusion-Based Pointer AnalysisChen, C.-M. et al. | 2011
- 1239
-
Research on Algorithms for Complexes and Functional Modules Prediction in Protein-Protein Interaction NetworksYu, L. et al. | 2011
- 1252
-
Research on Simulation and Modeling of Social Network Worm PropagationSun, X. et al. | 2011
- 1262
-
One Validity Model of Digital Data Forensics Based on Trusted ProbabilitySun, G.-Z. et al. | 2011
- 1275
-
A Dynamic Approach on Quickly Predicting Non-Termination of Logic Program of Security ProtocolZhou, T. et al. | 2011
- 1284
-
A Practical Attack on the pSFLASH Public Key CryptosystemSun, S.-W. et al. | 2011
- 1291
-
Certificateless Signcryption Scheme with Proxy UnsigncryptionYu, G. et al. | 2011
- 1300
-
An Asymmetric Impossible Boomerang Attack on 7-Round AES-128Dong, X.-L. et al. | 2011
- 1308
-
Pseudo-Randomness Extraction for Generalized Diffie-Hellman Problem over Composite Modulus Under Factoring AssumptionMei, Q.-X. et al. | 2011
- 1314
-
Optimization of Stateful Hardware Acceleration in Hybrid ArchitecturesMa, Y.-K. et al. | 2011
- 1323
-
Research of Data Parallel Computation Method of Lifting Wavelet TransformZhong, S. et al. | 2011
- 1332
-
On Next Generation Optic-Core Load-Balanced Packet SwitchXia, Y. et al. | 2011
- 1342
-
An Energy Efficient Topology Control Protocol for Ad Hoc Networks Utilizing Randomized BeamformingLi, X.-H. et al. | 2011
- 1351
-
A Security Transmission Model for Internet of ThingsWu, Z.-Q. et al. | 2011
- 1365
-
Modeling and Verifying Services of Internet of Things Based on Timed AutomataLi, L.-X. et al. | 2011
- 1378
-
VANET Cooperative Downloading Approach Study Based on Dynamic SlotLiu, J.-H. et al. | 2011
- 1387
-
Low Cost RFID Authentication Protocol with Forward PrivacyMa, C.-S. et al. | 2011
- 1399
-
A Survey of Selective Ensemble Learning AlgorithmsZhang, C.-X. et al. | 2011
- 1411
-
Advances in Automatic Fault Localization TechniquesYu, K. et al. | 2011
- 1423
-
The Development of Topic Models in Natural Language ProcessingXu, G. et al. | 2011
- 1437
-
Representation and Reasoning of Fuzzy XML Model with Fuzzy Description LogicZhang, F. et al. | 2011
- 1452
-
A Heuristic Algorithm for MPMGOOCWu, Y.-X. et al. | 2011
- 1463
-
Asynchronous Communication Mechanism Oriented Wireless Sensor Networks and MAC ProtocolsHu, Y.-P. et al. | 2011
- 1478
-
Distributed Optimal Resource Allocation Algorithm Based on Mission of Cooperative Multi-Flows in Ad Hoc NetworkChen, Y. et al. | 2011
- 1488
-
MDA-Based Visual Component Formalism for Parallel SimulationsYao, Y.-P. et al. | 2011
- 1500
-
The Effect of NoC Latency Difference on the Fairness of Memory Systems and a StrategyLiu, S. et al. | 2011
- 1509
-
An Adaptive Algorithm of Locating Fault Interactions Based Combinatorial TestingZhou, W.-J. et al. | 2011
- 1519
-
An Adaptable QP-Independent Approach to Rate-Distortion Optimization for Video CodingYuan, W. et al. | 2011
- 1528
-
An Approach of Solving Constraint Satisfaction Problem Based on Cycle-CutLi, Z.-S. et al. | 2011
- 1536
-
A Universal and Optimal Dynamic Network Constructive FrameworkYuan, Y. et al. | 2011
- 1548
-
NURBS Curve Adaptive Fairing Algorithm Based on a Digital Index of FairnessWang, A.-Z. et al. | 2011
- 1556
-
An Image Segmentation Method Based on 3-D Histogram and Restrain Fuzzy Kohonen Clustering NetworkChen, Z.-Y. et al. | 2011
- 1563
-
A Review on the Churn Character of P2P NetworksFu, Z.-P. et al. | 2011
- 1578
-
A Survey on Java Program Obfuscation TechniquesWang, J.-M. et al. | 2011
- 1589
-
Mining Hierarchical Concept Lattice for Faceted NavigationHe, C. et al. | 2011
- 1603
-
Analysis and Modeling of Directory Protocol Energy Consumption in NoCWang, J.-H. et al. | 2011
- 1611
-
Decomposed Storage Model of FIB for Cluster RouterChen, W.-L. et al. | 2011
- 1621
-
Image Upsampling Based on Moving-Constrained Spring-Mass ModelGong, Y.-Y. et al. | 2011
- 1629
-
Research on Bandwidth Mismatch Compensation in Speech RecognitionHe, Y.-J. et al. | 2011
- 1638
-
Mandarin Stress Detection Using Acoustic, Lexical and Syntactic FeaturesNi, C.-J. et al. | 2011
- 1650
-
A Fair Load-Balancing QoS Routing Algorithm in Overlay NetworkCao, X.-S. et al. | 2011
- 1660
-
A Study on Network Service Behavior Verification with Process Algebra and Its ApplicationChen, F. et al. | 2011
- 1669
-
Provable Security Model for Trusted Network Connect ProtocolMa, Z. et al. | 2011
- 1679
-
The Capacity Analysis of Wireless Ad Hoc Networks Based on M/MMPP/1 Node ModelHan, S. et al. | 2011
- 1688
-
Joint Chinese-English Named Entity Recognition and AlignmentChen, Y.-F. et al. | 2011
- 1697
-
An Algorithm of Test Pattern Assignment of Circuit BIST Based on Gray CodeSun, H.-J. et al. | 2011
- 1705
-
Multimedia Data Clustering Based on Correlation Matrix FusionZhang, H. et al. | 2011
- 1712
-
Tracking Video Object Based on Central MacroblocksXiao, G.-Q. et al. | 2011
- 1719
-
Generalized SOM with Application to Facial Gender IdentificationYu, D.-J. et al. | 2011
- 1726
-
A Computation Framework for Orientation Tensor EstimationShao, X.-F. et al. | 2011
- 1732
-
An Effective Algorithm in Partial Fourier Parallel MRI Based on Robust EstimatorHuang, X. et al. | 2011
- 1741
-
Architecting Big Data: Challenges, Studies and ForecastsWang, S. et al. | 2011
- 1753
-
Large Scale Graph Data Processing on Cloud Computing EnvironmentsYu, G. et al. | 2011
- 1768
-
Evaluating Large Graph Processing in MapReduce Based on Message PassingPan, W. et al. | 2011
- 1785
-
Efficient Skyline Query Processing of Massive Data Based on Map-ReduceDing, L.-L. et al. | 2011
- 1797
-
Keyword-Based Deep Web Database SelectionFan, J. et al. | 2011
- 1805
-
Computational Advertising: A Data-Centric Comprehensive Web ApplicationZhou, A.-Y. et al. | 2011
- 1820
-
A Survey of Trajectory Privacy-Preserving TechniquesHuo, Z. et al. | 2011
- 1831
-
Concepts, Tasks and Research Advances of Intervention Rule MiningDuan, L. et al. | 2011
- 1843
-
Object Identification on Complex Data: A SurveyWang, H.-Z. et al. | 2011
- 1853
-
Set and String Similarity Queries: A SurveyLin, X.-M. et al. | 2011
- 1863
-
An Approach for Optimizing Relational Provenance StorageWang, L.-W. et al. | 2011
- 1876
-
An Efficient Processing Algorithm for rho -Dominant Skyline QueryXin, J.-C. et al. | 2011
- 1885
-
An Efficient Algorithm for top-k Proximity Query on Uncertain GraphsZhang, H.-J. et al. | 2011
- 1897
-
A Probabilistic-Graphical-Model Based Approach for Representing Lineages in Uncertain DataYue, K. et al. | 2011
- 1907
-
A Semi-Markov Evaluation Model for the Survivability of Real-Time Database with Intrusion ToleranceChen, C.-Q. et al. | 2011
- 1917
-
A Method for Reverse k-Nearest-Neighbor Queries in Obstructed SpacesYu, X.-N. et al. | 2011
- 1926
-
A Multiple Top-k Join Algorithm Based on the Star SchemaCao, L.-X. et al. | 2011
- 1936
-
One-size-fits-all OLAP Technique for Big Data AnalysisZhang, Y.-S. et al. | 2011
- 1947
-
Mining Spatial Co-Location Patterns for Fuzzy ObjectsOuyang, Z.-P. et al. | 2011
- 1956
-
A New Hybrid Algorithm for Influence Maximization in Social NetworksTian, J.-T. et al. | 2011
- 1966
-
Trajectory Outliers Detection Based on Local Outlying DegreeLiu, L.-X. et al. | 2011
- 1976
-
CoPrivacy: A Collaborative Location Privacy-Preserving Method without Cloaking RegionHuang, Y. et al. | 2011
- 1986
-
Aggregate Keyword Queries on Hierarchy Relational DatabasesHu, H. et al. | 2011
- 1997
-
An Indexing and Query Processing Approach of RDF Data Based on Prufer SequenceLiu, X.-Y. et al. | 2011
- 2009
-
PCPF: A Parallel Index for Matching the High-Dimensional Vectors in Multimedia DatabasesChen, H.-Z. et al. | 2011
- 2018
-
Heuristic Mechanism for Query Optimization in Column-Store Data WarehouseYan, Q.-L. et al. | 2011
- 2029
-
Mobile Internet: Terminal Devices, Networks and ServicesLuo, J.-Z. et al. | 2011
- 2052
-
T-NBC: Transparent Non-blocking MPI Collective OperationsLi, Q. et al. | 2011
- 2064
-
An Optimized Hierarchical Cache Design Based on Data Access FeaturesLi, C.-M. et al. | 2011
- 2073
-
Exactly Reproducible Program Execution and Its Application in Computer Architecture SimulationZhao, T.-L. et al. | 2011
- 2084
-
PartitionSim: A Parallel Simulator for Many-CoresJiao, S. et al. | 2011
- 2093
-
Secure Range Query with Single Assertion on Encrypted DataCai, K. et al. | 2011
- 2104
-
A New Multi-Receiver ID-Based Anonymous SigncryptionPang, L.-J. et al. | 2011
- 2114
-
A Scheme for Protecting Confidentiality of No-volatile Main Memory Based on Phase-Change MemoryZhao, P. et al. | 2011
- 2121
-
A Two-Step Data Placement and Task Scheduling Strategy for Optimizing Scientific Workflow Performance on Cloud Computing PlatformLiu, S.-W. et al. | 2011
- 2131
-
Efficient Entity Resolution on XML Data Based on Entity-Describe-AttributeLi, Y.-K. et al. | 2011
- 2142
-
RM-Tree: An Index Supporting String Similarity OperationsWang, J.-B. et al. | 2011
- 2155
-
Answering Probabilistic Top-k Queries over P2P NetworksSun, Y.-J. et al. | 2011
- 2165
-
Knowledge Guided Software Trustworthiness Requirements ElicitationWang, Y. et al. | 2011
- 2176
-
Optimizing Cost and Performance in Multiple Interface Mobile HostsZhang, C.-Y. et al. | 2011
- 2187
-
A Novel Packet Processing Model for Next-Generation Internet Experimental Platform-EasySwitchLi, T. et al. | 2011
- 2197
-
epsilon -Approximation and Weighted Fairness Guaranteed Congestion Control Algorithm for Wireless Sensor NetworksLi, G.-H. et al. | 2011
- 2211
-
An Adaptive User Interface Model Based on Experience AwarenessFan, Y.-T. et al. | 2011
- 2224
-
Image Retrieval Based on Locally Features AggregatingHe, Y.-F. et al. | 2011
- 2234
-
Group Interests and Their Correlations Mining Based on WikipediaZhang, H.-S. et al. | 2011
- 2243
-
A New Local Discriminant Projection MethodXie, J. et al. | 2011
- 2253
-
Adaptive Management and Multi-Objective Optimization for Virtual Machine Placement in Cloud ComputingLi, Q. et al. | 2011
- 2265
-
Memory Cooperation Optimization Strategies of Multiple Virtual Machines in Cloud Computing EnvironmentZhang, W.-Z. et al. | 2011
- 2278
-
Live Migration of Virtual Machines Based on Hybrid Memory Copy ApproachChen, Y. et al. | 2011
- 2292
-
Dynamically Estimating Approach for CPU Consumption of Multi-Tenancy Web ApplicationsWang, W. et al. | 2011
- 2305
-
The Dynamic Allocation Model for the Resources of Cloud Services Delivery NetworksShi, P.-C. et al. | 2011
- 2319
-
Multi-Tenant Database Memory Management Mechanism Based on Chunk FoldingYao, J.-C. et al. | 2011
- 2332
-
Knowledge Reduction Algorithms in Cloud ComputingQian, J. et al. | 2011
- 2344
-
Optimization Update for Data Composition View Based on Data ServiceZhang, P. et al. | 2011
- 2355
-
Service Classification and Recommendation Based on Software NetworksPan, W.-F. et al. | 2011
- 2370
-
Personalized Requirement Oriented Virtual Service Resource Aggregation MethodChu, D.-H. et al. | 2011
- 2381
-
Efficient Web Service Query Approach Based on Concept RelaxationOu, W.-J. et al. | 2011
- 2391
-
Privacy-Preserving Computable Encryption Scheme of Cloud ComputingHuang, R.-W. et al. | 2011
- 2403
-
A Trust Calculating Algorithm Based on Social Networking Service Users' ContextQiao, X.-Q. et al. | 2011
- 2414
-
An Automatic Emerging Approach for Web Service Semantics Based on Social TaggingNing, D. et al. | 2011
- 2427
-
Research on Deadlock Detecting of BPEL Inter-ProcessesHuang, J.-F. et al. | 2011
- 2435
-
Performance Modeling and Analysis of Service Systems Using Queueing Petri NetsGu, J. et al. | 2011