[1] |
JI Yuan, ZHENG Wei-bo, WANG Zi, .
Virtualization of Secure Access Device Based on Container
[J]. Computer and Modernization, 2022, 0(09): 106-110.
|
[2] |
YOU Qiang-zhi, HU Huai-xiang, CHEN Xiang-yu.
Fast Memory Synchronization Technology for Container Thermal Migration
[J]. Computer and Modernization, 2022, 0(01): 17-22.
|
[3] |
CHEN Si-yu, ZHUANG Yi, LI Jing.
Multi Feature Load Forecasting Model for LSTM Network in Mobile Cloud Computing
[J]. Computer and Modernization, 2021, 0(06): 74-85.
|
[4] |
LI Zhi-yi, WANG Xue-ming, WANG Ze-xian.
A Dynamic Public Key Searchable Encryption Scheme Against Keyword Guessing Attack
[J]. Computer and Modernization, 2021, 0(06): 100-106.
|
[5] |
XU Sheng-chao, SONG Juan, PAN Huan.
A Detection Approach of Physical Host Status Anomalousness Based on Linear Regression and Least Squares
[J]. Computer and Modernization, 2021, 0(05): 105-111.
|
[6] |
XIAO Jun-bi, CHENG Peng, TAN Li-zhuang, MENG Xiang-ze.
Data Center Dynamic Priority Multipath Scheduling Algorithm Based on SDN
[J]. Computer and Modernization, 2020, 0(07): 21-26.
|
[7] |
HU Quan-gui, ZHAO En-lai, JIA Wei-zhao, KAI Bei-qiang.
Real-time Task Fault-tolerant Scheduling Algorithm for Data Center Inspection Robot Information Platform
[J]. Computer and Modernization, 2020, 0(05): 50-.
|
[8] |
ZHANG Zi-ye1, LIU Yu-long1, HU Bei2 .
Multi-source Data Integration Method Based on Data Virtualization Technology
[J]. Computer and Modernization, 2019, 0(11): 18-.
|
[9] |
WANG Yi-chao1, WANG Yu-mei2.
Intelligent Equipment Maintenance and Management Platform#br#
Based on Microservice Architecture
[J]. Computer and Modernization, 2018, 0(10): 79-.
|
[10] |
SUN Qing-gong, CHEN Hai-biao, LIN Nan, WU Jin-ming.
An Optimal Virtual Machine Placement Algorithm for Data Center Based on Orbital Shrinking
[J]. Computer and Modernization, 2018, 0(03): 48-.
|
[11] |
TIAN Ye1, SUN Yan-tao1,2, XIONG Ke1,2.
A Semi-centralized SDN Routing Strategy in Data Center Network
[J]. Computer and Modernization, 2018, 0(01): 95-101.
|
[12] |
LIN Fan-long, CHEN Qian, CHEN Liang.
A Data Hiding Protection Method for Power Grid Based on Content Sensation Cluster
[J]. Computer and Modernization, 2017, 0(6): 112-115+126.
|
[13] |
WANG Gang, LI Fei-fei, WANG Yao.
Designated Server Identity-based Encryption with Conjunctive Keyword Search Scheme
[J]. Computer and Modernization, 2017, 0(4): 118-121.
|
[14] |
ZHANG Wen, MU Yan, GAO Zhen-xing, LIU Zhi-feng.
Application of WebSocket in Real-time Monitoring of Industrial Equipment Data
[J]. Computer and Modernization, 2017, 0(11): 111-115.
|
[15] |
YU Qiong1, PENG Hao1, JIANG Xian-yang2, CAO Da-ping1.
An Efficient Audio Streaming Server Method
[J]. Computer and Modernization, 2016, 0(8): 114-117.
|