Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Huazhong University of Science and Technology(Nature Science)
1671-4512
2012 Issue S1
Discriminatory behavior in peer-to-peer trust model
He Bing1 Li Xiaojian1;2 Xia Chunhe2 Liu Cui3
..............page:191-195
Resource selection method for active service based on Internet of Things
Jia Bing Yang Yongjian Sun Yongxiong
..............page:47-50
Service negotiation approach based on simultaneous offer
Xu Liyuan1 Liu Shijun1 Pan Li2
..............page:372-378
Extended ciphertext-policy attribute based encryption scheme
Duan Yawei Lang Bo
..............page:113-115,145
Research on spam pages identification in search service based on cloud computing
Li Yanpinga;b Xu Yabina;b Chen Junyia
..............page:249-253
Evaluation method for trustworthiness probability based on Bayesian network
Wang Xiaodong Hu Shanfeng Ye Qingwei Zhou Yu
..............page:79-82,86
New cloud security solutions and its key technologies
Xu Yingying Gao Fei Shang Fengying Zhu Junli
..............page:74-78
Parallel discovering of city hot spot based on taxi trajectories
Gui Zhiming Xiang Yu Li Yujian
..............page:187-190
Research progress on P2P E-services reputation incentives integration of QoS
Wu Jiyi1;2;3 Shen Qianli2 Chen Deren1 Zhang Jianlin2
..............page:365-371
Resource allocation in network virtualization environment based on Stackelberg game
Yang Yu1 Chen Shanzhi2 Li Xin1 Wang Yan3
..............page:311-315
Human-computer interaction on cloud operation platform for robot
Wang Quanyu Jia Jinmiao Zhao Lianxiang Lu Zhengling
..............page:254-257,265
Discovering aero-space information network hub node between units based on topological dimensional rollup
Yang Shangqiana Li Chuana;b Tang Changjiea;b Zeng Weia;b
..............page:280-283
Scalable distributed relational cloud database solution
Wang Xianmei1 Wu Dichong2 Zhu Zefei3 Li Renwang1
..............page:124-127
Detecting coronal mass ejection method by analyzing spectrum change
Zeng Zhaoxian1;2;3 Liu Yi3;4 Wei Yali1
..............page:379-383
Fast Newman parallel algorithm based on MapReduce
Tang Yanqin Pan Zhisong Wu Junqing
..............page:58-61
Self-feedback BP network cloud computing information fusion and application
Li Jingzhao Deng Huimei
..............page:316-319
Distributed exchange system of earthquake precursory data
Li Jun Shan Weifeng Yang Qiuge Li Xiaoli
..............page:108-112
A fine-grained data access control algorithm in cloud computing
Han Dezhi1;2 Wu Shuai1 Bi Kun1
..............page:245-248
Cloud detection for breadth first sphere decoding algorithm of MIMO systems
Mao Xinyu Cheng Yuxin Xiang Haige
..............page:18-21
CNGM:a new candidate network generation algorithm
Yang Yan He Tianyu
..............page:240-244
Design and implementation of environmental education system based on IOT
Yang Jinzhong Zhang Jianping Li Hangcai Li Hongmei Xu Wei
..............page:157-160,169
Efficient discovery of Hub nodes in complex aero-space information network
Zeng Wei Li Chuan Tang Changjie Yang Shangqian
..............page:394-397
Parallel KMeans algorithm for massive data
Zhou Lijuan1 Wang Hui1 Wang Wenbo1 Zhang Ning2
..............page:150-152
Implementation technology of terminal in vector network based on Windows platform
Zhao Aqun Zou Weijia Lian Songhai
..............page:51-53,57
Delay scheduling-based admission control for deadline-constrained advance reservations
Li Bo Liu Haixia Yang Na Wu Hao Pei Yijian
..............page:332-336
Security threats of virtualization in cloud computing
Wang Huaixi Chen Jianxiong Wang Chen Liu Kesheng
..............page:153-156
A distributed suffix tree generation and matching algorithm
Huang Zhenglin Zhang Bing
..............page:219-224
Malice detection and prevention mechanism in social P2P networks
Yang Bowei Song Guanghua Zheng Yao
..............page:132-134
SaaS flow evolution model based on expanded Pi calculus
He Jun Li Tong
..............page:183-186
Approach to optimize virtual machine deployment in IaaS
Feng Shaochong Di Yanqiang Zhu Yuanchang Yang Wenbing
..............page:359-364
Study on task scheduling algorithm based on genetic algorithm in cloud computing
Xiong Congconga Feng Longa Chen Lixianb Su Jinga
..............page:1-4
Camouflage face recognition based on distributed compressed sensing
Zeng Junying Gan Junying Zhai Yikui
..............page:297-299,303
Internet hot topic founding based on MapReduce architecture
Xu Yabina;b Li Yanpinga;b Zheng Fena
..............page:236-239
Resource scheduling strategy for the enterprise extended cloud
Yuan Zhengwu Sang Xinguang
..............page:146-149
Method of fountain code based privacy protection and data recovery
Peng Zhen Chen Lanxiang Guo Gongde
..............page:54-57
Cloud storage data protection mechanisms based on CP-ABE algorithm
Song Kaibo1 Luo Jun1 Sun Jintao2
..............page:266-269,292
Infrastructure optimization of mobile intelligent network based on cloud computing
Ma Qin1 Zhao Xinguang2 Chen Hong1
..............page:342-346
A cloud security sensitive information filtering model for SNS
Zeng Ming Yu Junsheng Liu Shaohua
..............page:211-214
An encryption file system ENFS for portable mobile storage devices
Wu Yimin Yang Shaoyin Wang Zhaofan
..............page:26-29
Enhanced PoWs algorithm of cloud storage authentication
Wu Zehui Wei Qiang
..............page:83-86
Study of virtualization technology in cloud environment
Han Dezhi1;2 Li Nannan1 Bi Kun1
..............page:262-265
Design of a combining encryption logs disaster-tolerant method based cloud storage platform
Liu Lin 1;2 Wang Wenfeng3 Zhao Yuelong2 Wang Guohua2
..............page:99-103
Uncertain resource allocation model of multi-homing mobile delay tolerant network
Zhang Yonghui1;2 Lin Zhangxi3 Liang Quan1
..............page:293-296
Research on knowledge change of data mining based on Rough sets
Wang Xilei Ma Yongjun Su Jing
..............page:320-323,346
Architecture design of cloud boss based on NGOSS
Yang Xianghao1 Chen Bin2 Liu Yun1
..............page:95-98
A survey on transportation network topology and its properties
Yu Haining Zhang Hongli Yu Xiangzhan
..............page:274-279
Design and implementation of algorithm Apriori based on iterative MapReduce
Zhang Zhigang Ji Genlin
..............page:9-12
Particle swarm optimization algorithm with fast convergence applied in cloud computing
Li Yuanyuan1;2 Qu Wenyu1 Li Zhiyang1 Xu Yujie1
..............page:34-37
Secure centralized localization for wireless sensor networks
Zhang Tinga He Jingshab Li Xiaohuia
..............page:384-388
New cloud storage solution based on P2P
Zhou Huixiang Wen Qiaoyan
..............page:87-91
Dynamic analysis method of network security risk
Wei Qing L Liangshuang Yao Shan Wu Weikang
..............page:202-206
Job scheduling and resource allocation research on heterogeneous cluster
Liu Xiwei Ye Lei Yu Mingyuan Liang Ronghua Huang Qingzang
..............page:175-178
Solving capability analysis of logical encodings in intelligent planning
Chen Aihua1 L Shuai2 Liu Lei2a Zhang Peng2a
..............page:351-354,358
Generalized image pyramid and coding method-oriented cloud computing
Xia Yubin Liu Fengtao
..............page:22-25,33
Universal data interactive interface model based on publish/subscribe
Chen Guangwei Yang Bo Ma Kun Chen Zhenxiang
..............page:141-145
Research on realizing robot cloud-operation platform
Zhao Lianxiang Wang Quanyu Jia Jinmiao Lu Zhengling
..............page:161-164
Research on the user interactive technology of multi-view video system
Hu Binbin Wang Xiaodong Wang Tengfei Jiang Gangyi
..............page:196-201
Collaborative caching in P2P streaming networks
Gao Guoqiang1 Ma Xiaopu2 Xu Zhiyong3
..............page:215-218,224
Multi-tenant oriented business model version management
Chen Qidou Cai Hongming Jiang Lihong
..............page:128-131
Access control security model based on dual identity authentication in cloud computing environment
Ning Yumei1 Ding Zhenguo1 Zeng Ping1;2 Wang Chen1
..............page:288-292
Projection position-based sequential pattern mining algorithm
Wang Weina1;2 Li Taoshen1 Chen Qingfeng1
..............page:104-107
The location service system for manufacturing resource based on the internet of thing
Zhong Xiaoyong Zhu Haiping Wan Yunlong Yu Qianhong
..............page:284-287
Virtualized resource auction and allocation model based on incentive and penalty
Zhou Li Duan Liangcheng Jiang Congfeng Wan Jian
..............page:43-46
User trust evaluation for education cloud-oriented E-learning services
Tan Wenan1 Li Jingxian2 Hao Junhua2
..............page:207-210
Method of real estate information services based on Hadoop
Yu Donghui Yu Mingyuan Ye Lei Liang Ronghua
..............page:66-69
Novel PageRank algorithm based on topic and link weighted
Yang Gelan Tu Li
..............page:300-303
Application target-oriented security network active defense system
Xiao Qing1 Jiao Jian2 Wang Chunping3
..............page:70-73
Trust based and signaling theory privacy protection method in cloud computing
Li Xiaohui1a;2 He Jingsha1a;b Zhang Ting1a
..............page:304-306,310
Virtual machine deployment strategy by load prediction based on BP neural network
Zhang Beibei1;2 Chen Ningjiang1 Hu Dandan1
..............page:120-123
Internet of knowledge and knowledge cloud service
Ju Dehua1 Shen Beijun2
..............page:13-17
Cross-layer design of the transport layer in wireless mesh networks
Liu Jiangsheng1 Yi Donglin1;2 Yue Guangxue2 Xiong Xiaofeng1
..............page:258-261
Efficient geographic data watermarking method based on MapReduce
Peng Yuwei1 Yue Mingliang1 Wang Chuanjian2
..............page:179-182
Anonymous authentication scheme for wireless medical sensor network
Zhang Mina;b Zhang Jiea;b Jin Zhengpinga Zhang Huaa
..............page:355-358
Research and application of goods vehicles matching system based on SaaS and CSCW
Lu Huijuan An Chunlin Cheng Zhuo Tang Wenbin
..............page:324-327
Energy-aware intelligent optimization algorithm for virtual machine replacement
Liu Zhipiao Wang Shangguang Sun Qibo Yang Fangchun
..............page:398-402
A RFID lightweight security communication protocol based on hybrid encrypting approach
Li Zhimin1 Wang Zhiwei2 Li Cunhua1
..............page:328-331
Large scale report generation in data consolidation environments of banks
Qin Xiongpai1 Zhou Xiaoyun2 Wu Zhongxin3 Yang Hongzhi3 Wang Wei3
..............page:5-8
Parallel classification algorithm for multi-streams based on gene expression programming
Yang Wen Li Wenjing Li Shuang Yang Yan
..............page:116-119
Distributed multi-dimensional probabilistic Top-k query processing in sensor networks
Zhu Jinghua1;2 Guan Xuemin1
..............page:389-393,397
Range-based scheduling method for cloud resources
Liu Lixiang1;2 Zhang Jian1;2 Zhao Yan3 Hu Songlin1
..............page:170-174
Main memory index of radio frequency identification middleware
Zhao Hai1;2 Ouyang Yuanxin1;2 Xiong Zhang1;2
..............page:92-94
Research on parallel machine scheduling problem in cloud computing based on ant colony algorithm
Li Bing Fu Xinyue Gao Xiang Zhang Zizhu
..............page:225-229
Research on P2P trust management mechanism based on node-behavior
Song Jiajia1 Yue Guangxue1 Liu Jiansheng2
..............page:347-350
Worm detection system based on P2P networks
Tang Haokun1 Liu Yanbing2a Huang Jun2a Xiao Yunpeng2b
..............page:230-235
Study on simulation model virtualization in cloud computing environment
Hu Chunshenga;b Xu Chengdonga;b Zhang Pengfeib Cao Xiaobob
..............page:135-140