


default search action
Cluster Computing, Volume 23
Volume 23, Number 1, March 2020
Special Issue: Advances in Cloud Computing, Big Data and the Internet of Things;
Special Issue: Advances in High Performance Computing and its Applications;
Special Issue: AMGCC -2018;
Special Issue: High Performance Computing Conference Latin America
- Sara Khairi
, Brahim Raouyane, Mostafa Bellafkih
:
Novel QoE monitoring and management architecture with eTOM for SDN-based 5G networks. 1-12 - Abdellatif Serhani, Najib Naja, Abdellah Jamali:
AQ-Routing: mobility-, stability-aware adaptive routing protocol for data routing in MANET-IoT systems. 13-27 - Cheyma Ben Njima
, Youssef Gamha, Chirine Ghedira Guégan
, Lotfi Ben Romdhane:
Development of a mobile web services discovery and composition model. 29-42 - Muhua Liu
, Ying Wu, Rui Xue, Rui Zhang:
Verifiable outsourcing computation for modular exponentiation from shareable functions. 43-55 - Jieun Choi, Geunchul Park, Dukyun Nam
:
Interference-aware co-scheduling method based on classification of application characteristics from hardware performance counter using data mining. 57-69 - Seontae Kim, Young-ri Choi
:
Constraint-aware VM placement in heterogeneous computing clusters. 71-85 - Yisel Gari
, David A. Monge
, Cristian Mateos, Carlos García Garino:
Learning budget assignment policies for autoscaling scientific workflows in the cloud. 87-105 - Cristian Galleguillos
, Zeynep Kiziltan, Alessio Netti, Ricardo Soto:
AccaSim: a customizable workload management simulator for job dispatching research in HPC systems. 107-122 - Thaylon Guedes, Leonardo Araújo de Jesus, Kary A. C. S. Ocaña
, Lúcia M. A. Drummond
, Daniel de Oliveira
:
Provenance-based fault tolerance technique recommendation for cloud-based scientific workflows: a practical approach. 123-148 - Lucia Damiani, Ariel Ivan Diaz, Javier Iparraguirre
, Aníbal M. Blanco:
Accelerated particle swarm optimization with explicit consideration of model constraints. 149-164 - Maximiliano Geier, David A. González Márquez, Esteban E. Mocskos
:
SherlockFog: a new tool to support application analysis in Fog and Edge computing. 165-176 - Pablo Carvalho, Rommel Anatoli Quintanilla Cruz
, Lúcia M. A. Drummond
, Cristiana Bentes
, Esteban Clua, Edson Cataldo, Leandro A. J. Marzulo:
Kernel concurrency opportunities based on GPU benchmarks characterization. 177-188 - Ying-xin Chen:
Agent-based research on crowd interaction in emergency evacuation. 189-202 - Ying-xin Chen, Pandu R. Tadikamalla, Jennifer Shang, Yan Song
:
Supply allocation: bi-level programming and differential evolution algorithm for Natural Disaster Relief. 203-217 - Evangelos Pournaras
, Srivatsan Yadhunathan, Ada Diaconescu:
Holarchic structures for decentralized deep learning: a performance analysis. 219-240 - Mahmood Mortazavi-Dehkordi, Kamran Zamanifar
:
Efficient deadline-aware scheduling for the analysis of Big Data streams in public Cloud. 241-263 - Chao-Tung Yang
, Shuo-Tsung Chen, Jung-Chun Liu, Ren-Hao Liu, Ching-Lung Chang:
On construction of an energy monitoring service using big data technology for the smart campus. 265-288 - Aadil Zia Khan
, Ihsan Ayyub Qazi
:
RecFlow: SDN-based receiver-driven flow scheduling in datacenters. 289-306 - Mohammad Sharfoddin Khatib, Mohammad Atique:
FGSA for optimal quality of service based transaction in real-time database systems under different workload condition. 307-319 - Babak Aghaei
, Midia Reshadi, Mohammad Masdari, Seyed Hadi Sajadi, Mehdi Hosseinzadeh, Aso Mohammad Darwesh:
Network adapter architectures in network on chip: comprehensive literature review. 321-346 - Jiwoong Park, Yongseok Son, Heon Young Yeom, Yoonhee Kim
:
SoftDC: software-based dynamically connected transport. 347-357 - Sandra Catalán
, Adrián Castelló
, Francisco D. Igual
, Rafael Rodríguez-Sánchez
, Enrique S. Quintana-Ortí:
Programming parallel dense matrix factorizations with look-ahead and OpenMP. 359-375 - Amrita Jyoti
, Manish Shrimali
:
Dynamic provisioning of resources based on load balancing and service broker policy in cloud computing. 377-395 - Bilal Iqbal, Waheed Iqbal
, Nazar Khan, Arif Mahmood
, Abdelkarim Erradi:
Canny edge detection and Hough transform for high resolution video streams using Hadoop and Spark. 397-408
Volume 23, Number 2, June 2020
- Guilan Feng, Zhengnan Li, Wengang Zhou, Shi Dong
:
Entropy-based outlier detection using spark. 409-419 - Jean-Marc Pierson
, Patricia Stolf
, Hongyang Sun
, Henri Casanova:
MILP formulations for spatio-temporal thermal-aware scheduling in Cloud and HPC datacenters. 421-439 - Saroja Subbaraj
, Revathi Thiagarajan
:
Hybrid dual-objective parallel genetic algorithm for heterogeneous multiprocessor scheduling. 441-450 - Rajaputhri Maharaja, Prashant Iyer, Zilong Ye
:
A hybrid fog-cloud approach for securing the Internet of Things. 451-459 - Seyed Mehdi Mohtavipour
, Morteza Mollajafari
, Ali Naseri:
A novel packet exchanging strategy for preventing HoL-blocking in fat-trees. 461-482 - Hong Huang, Latifur Khan
, Zhou Shaohua:
Classified enhancement model for big data storage reliability based on Boolean satisfiability problem. 483-492 - Wenjing Ma, Yulong Ao, Chao Yang
, Samuel Williams
:
Solving a trillion unknowns per second with HPGMG on Sunway TaihuLight. 493-507 - Asmaa H. Rabie, Shereen H. Ali
, Ahmed I. Saleh, Hesham A. Ali:
A new outlier rejection methodology for supporting load forecasting in smart grids based on big data. 509-535 - Abhishek Mishra, Prasoon Trivedi:
Benchmarking the contention aware nature inspired metaheuristic task scheduling algorithms. 537-553 - Xiaohui Wei, Yuan Zhuang, Hongliang Li
, Zhiliang Liu:
Reliable stream data processing for elastic distributed stream processing systems. 555-574 - Mahmoud Mohammed Badawy
, Zainab Hassan Ali
, Hesham A. Ali:
QoS provisioning framework for service-oriented internet of things (IoT). 575-591 - Hongjian Li
, Huochen Wang, Shuyong Fang, Yang Zou, Wenhong Tian:
An energy-aware scheduling algorithm for big data applications in Spark. 593-609 - Bilal Ahmad
, Zaib Maroof, Sally I. McClean, Darryl Charles
, Gerard Parr:
Economic impact of energy saving techniques in cloud server. 611-621 - Jianyu Fu
, Youyou Lu, Jiwu Shu, Guangming Liu, Ming Zhao:
COWCache: effective flash caching for Copy-on-Write virtual disks. 623-639 - Behrouz Pourghebleh
, Vahideh Hayyolalam:
A comprehensive and systematic review of the load balancing mechanisms in the Internet of Things. 641-661 - Sara Tabagchi Milan, Lila Rajabion, Aso Mohammad Darwesh, Mehdi Hosseinzadeh
, Nima Jafari Navimipour:
Priority-based task scheduling method over cloudlet using a swarm intelligence algorithm. 663-671 - Fang Huang
, Bo Tie, Jian Tao, Xicheng Tan, Yan Ma:
Methodology and optimization for implementing cluster-based parallel geospatial algorithms with a case study. 673-704 - Ting Wu
, Xianzhang Chen
, Kai Liu
, Chunhua Xiao, Zhixiang Liu, Qingfeng Zhuge, Edwin H.-M. Sha:
HydraFS: an efficient NUMA-aware in-memory file system. 705-724 - Monther Aldwairi
, Abdulmughni Y. Hamzah, Moath H. A. Jarrah
:
KPN-based parallelization of Wu-Manber algorithm on multi-core machines. 725-734 - Amin Shokrzade
, Fardin Akhlaghian Tab
, Mohsen Ramezani:
ELM-NET, a closer to practice approach for classifying the big data using multiple independent ELMs. 735-757 - Mohammad Hadi Mazidi, Mohammad Eshghi, Mohammad Reza Raoufy:
Detection of premature ventricular contraction (PVC) using linear and nonlinear techniques: an experimental study. 759-774 - Sumedha Arora, Anju Bala:
A survey: ICT enabled energy efficiency techniques for big data applications. 775-796 - Seyedeh Yasaman Rashida, Masoud Sabaei, Mohammad Mehdi Ebadzadeh, Amir Masoud Rahmani
:
A memetic grouping genetic algorithm for cost efficient VM placement in multi-cloud environment. 797-836 - Hamid Talebian, Abdullah Gani
, Mehdi Sookhak
, Ahmed Abdelaziz Abdelatif, Abdullah Yousafzai, Athanasios V. Vasilakos
, Fei Richard Yu:
Optimizing virtual machine placement in IaaS data centers: taxonomy, review and open issues. 837-878 - Muhammad Umair Sadiq
, Muhammad Murtaza Yousaf, Laeeq Aslam, Muhammad Aleem
, Shahzad Sarwar, Syed Waqar Jaffry
:
NvPD: novel parallel edit distance algorithm, correctness, and performance evaluation. 879-894 - Hyeongwon Jang, Sang Youp Rhee, Jae Eun Kim, Yoonhee Kim
, Hyuck Han, Sooyong Kang, Hyungsoo Jung:
AutoBahn: a concurrency control framework for non-volatile file buffer. 895-910 - Ashish Kumar Maurya
, Kashish Modi, Vinay Kumar
, Nenavath Srinivas Naik
, Anil Kumar Tripathi:
Energy-aware scheduling using slack reclamation for cluster systems. 911-923 - Mouna Ben Said, Yessine Hadj Kacem
, Mickaël Kerboeuf, Mohamed Abid:
An MDE-based approach for self-adaptive RTES model generation. 925-951 - Ajeet Ram Pathak
, Manjusha Pandey, Siddharth S. Rautaray
:
Approaches of enhancing interoperations among high performance computing and big data analytics via augmentation. 953-988 - Surendra Singh, Suvadip Batabyal
, Sachin Tripathi:
Security aware dynamic scheduling algorithm (SADSA) for real-time applications on grid. 989-1005 - Hanan Ali, Ghada M. Fathy
, Zeinab Fayez, Walaa M. Sheta:
Exploring the parallel capabilities of GPU: Berlekamp-Massey algorithm case study. 1007-1024 - Salma Abdel Magid, Francesco Petrini, Behnam Dezfouli
:
Image classification on IoT edge devices: profiling and modeling. 1025-1043 - Ali Shahidinejad
, Mostafa Ghobaei-Arani
, Leila Esmaeili
:
An elastic controller using Colored Petri Nets in cloud computing environment. 1045-1071 - Mokhtar A. Alworafi
, Suresha Mallappa:
A collaboration of deadline and budget constraints for task scheduling in cloud computing. 1073-1083 - Rashad Elhabob
, Yanan Zhao, Nabeil Eltayieb
, Abdeldime M. S. Abdelgader, Hu Xiong:
Identity-based encryption with authorized equivalence test for cloud-assisted IoT. 1085-1101 - Moumita Chatterjee
, Anirban Mitra, Sudipta Roy
, Sanjit Kumar Setua:
Gossip based fault tolerant protocol in distributed transactional memory using quorum based replication system. 1103-1124 - Shi Dong
, Raj Jain:
Energy-efficient scheme based on user task characteristic in virtual cloud platform. 1125-1135 - Xingwang Huang
, Chaopeng Li, Hefeng Chen, Dong An:
Task scheduling in cloud computing using particle swarm optimization with time varying inertia weight strategies. 1137-1147 - Harkiran Kaur
, Sandeep K. Sood
, Munish Bhatia
:
Cloud-assisted green IoT-enabled comprehensive framework for wildfire monitoring. 1149-1162 - Yunyan Li, Yuansheng Huang, Meimei Zhang, Lila Rajabion
:
Service selection mechanisms in the Internet of Things (IoT): a systematic and comprehensive study. 1163-1183 - Poopak Azad, Nima Jafari Navimipour
, Amir Masoud Rahmani, Arash Sharifi
:
The role of structured and unstructured data managing mechanisms in the Internet of things. 1185-1198 - Mahdi Sarbazi, Mehdi Sadeghzadeh, Seyyed Javad Mir Abedini:
Improving resource allocation in software-defined networks using clustering. 1199-1210 - Jonas Markussen
, Lars Bjørlykke Kristiansen, Rune Johan Borgli, Håkon Kvale Stensland, Friedrich Seifert, Michael Riegler, Carsten Griwodz, Pål Halvorsen:
Flexible device compositions and dynamic resource sharing in PCIe interconnected clusters using Device Lending. 1211-1234 - Chirag Dashora, P. Edwin Sudhagar
, J. Marietta
:
IoT based framework for the detection of vehicle accident. 1235-1250 - Muhammad Ibrahim
, Muhammad Azhar Iqbal, Muhammad Aleem
, Muhammad Arshad Islam, Nguyen-Son Vo
:
MAHA: Migration-based Adaptive Heuristic Algorithm for Large-scale Network Simulations. 1251-1266 - Asif Nawaz, Ashfaq Ahmed Awan, Tariq Ali, Muhammad Rizwan Rashid Rana:
Product's behaviour recommendations using free text: an aspect based sentiment analysis approach. 1267-1279 - Sumit Badotra
, Surya Narayan Panda
:
Evaluation and comparison of OpenDayLight and open networking operating system in software-defined networking. 1281-1291 - Behzad Chitsaz
, Ahmad Khonsari
:
General spin-up time distribution for energy-aware IaaS cloud service models. 1293-1301 - Brahim Hmedna
, Ali El Mezouary, Omar Baz:
A predictive model for the identification of learning styles in MOOC environments. 1303-1328 - Rajat Saxena
, Somnath Dey:
DDoS attack prevention using collaborative approach for cloud computing. 1329-1344 - Ahmad Alnafessah
, Giuliano Casale
:
Artificial neural networks based techniques for anomaly detection in Apache Spark. 1345-1360 - Ahmad Alnafessah
, Giuliano Casale
:
Correction to: Artificial neural networks based techniques for anomaly detection in Apache Spark. 1361-1362 - Jitendra Kumar
, Ashutosh Kumar Singh
:
Cloud datacenter workload estimation using error preventive time series forecasting models. 1363-1379 - Muhammad Saleem
, Yasir Saleem, Muhammad Faisal Hayat:
Stochastic QoE-aware optimization of multisource multimedia content delivery for mobile cloud. 1381-1396 - Vikash Kumar
, Ditipriya Sinha
, Ayan Kumar Das, Subhash Chandra Pandey, Radha Tamal Goswami:
An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset. 1397-1418 - Anum Masood
, Saima Gulzar Ahmad
, Hikmat Ullah Khan
, Ehsan Ullah Munir:
Network Reconfiguration Algorithm (NRA) for scheduling communication-intensive graphs in heterogeneous computing environment. 1419-1438 - Manjit Kaur, Dilbag Singh
:
Fusion of medical images using deep belief networks. 1439-1453 - Reyhaneh Rabaninejad
, Maryam Rajabzadeh Asaar, Mahmoud Ahmadian-Attari, Mohammad Reza Aref:
An identity-based online/offline secure cloud storage auditing scheme. 1455-1468 - Mahmoud Seifallahi, Hadi Soltanizadeh
, Afsoon Hassani Mehraban
, Fatemeh Khamseh:
Alzheimer's disease detection using skeleton data recorded with Kinect camera. 1469-1481 - Dharmendra Prasad Mahato
, Jasminder Kaur Sandhu
, Nagendra Pratap Singh
, Vishal Kaushal
:
On scheduling transaction in grid computing using cuckoo search-ant colony optimization considering load. 1483-1504 - Mohammad Hossein Shafiabadi, Hossein Pedram
, Midia Reshadi, Akram Reza
:
Comprehensive regression-based model to predict performance of general-purpose graphics processing unit. 1505-1516
Volume 23, Number 3, September 2020
Special Issue : Big Data Analytics in Urban Computing;
Special Issue : Enhancing security using Blockchain for Cyber-Physical System;
Special Issue : WorldCIST19 conference;
Special Issue : DAAC-2018;
Special Issue : Advances in Intelligent Big Data Analytics for Cloud & Cluster Comp;
Special Issue : Nature-Inspired Design of Par & Dist CI;
Special Issue : Blockchain for IoT;
Special Issue : AMGCC -2018;
Special Issue : Data Warehouse and On-line Analysis (EDA)
- Hania Gadouche
, Farah Zoubeyr
, Abdelkamel Tari:
A correct-by-construction model for attribute-based access control. 1517-1528 - Houari Mahfoud
:
Graph pattern matching with counting quantifiers and label-repetition constraints. 1529-1553 - George Roumelis, Polychronis Velentzas, Michael Vassilakopoulos
, Antonio Corral
, Athanasios Fevgas, Yannis Manolopoulos:
Parallel processing of spatial batch-queries using xBR+-trees in solid-state drives. 1555-1575 - Foudil Abdessamia, Weizhe Zhang
, Yu-Chu Tian
:
Energy-efficiency virtual machine placement based on binary gravitational search algorithm. 1577-1588 - Zakaria Maamar
, Muhammad Asim
, Khouloud Boukadi
, Thar Baker
, Saad Saeed, Ikbel Guidara, Fadwa Yahya
, Emir Ugljanin, Djamal Benslimane:
Towards a Quality-of-Thing based approach for assigning things to federations. 1589-1602 - Khaled Khebbeb, Nabil Hameurlain, Faiza Belala:
Formalizing and simulating cross-layer elasticity strategies in Cloud systems. 1603-1631 - M. Indrasena Reddy, A. P. Siva Kumar:
An efficient data transmission approach using IAES-BE. 1633-1645 - Nourelhoda M. Mahmoud
, Hassan Fouad
, Omar Alsadon
, Ahmed M. Soliman
:
Detecting dental problem related brain disease using intelligent bacterial optimized associative deep neural network. 1647-1657 - Xu Chen, Xiaoping Cai, Yangyang Zhou, Zhibin Hao
:
Development of data monitoring application based on IoT. 1659-1667 - Mohamed Hashem, Ahmed E. Youssef
:
Teeth infection and fatigue prediction using optimized neural networks and big data analytic tool. 1669-1682 - Dilip Venkata Kumar Vengala
, D. Kavitha, A. P. Siva Kumar:
Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC. 1683-1696 - Aarti Jain, Manju Khari, Elena Verdú
, Shigeru Omatsu, Rubén González Crespo
:
A route selection approach for variable data transmission in wireless sensor networks. 1697-1709 - Vadivel Ramasamy
, SudalaiMuthu Thalavai Pillai:
An effective HPSO-MGA optimization algorithm for dynamic resource allocation in cloud environment. 1711-1724 - A. Helen Sharmila
, Natarajan Jaisankar
:
E-MHMS: enhanced MAC-based secure delay-aware healthcare monitoring system in WBAN. 1725-1740 - M. Sridhar
, P. B. Pankajavalli
:
An optimization of distributed Voronoi-based collaboration for energy-efficient geographic routing in wireless sensor networks. 1741-1754 - Ayed Alwadain, Mohammad Al-Ma'aitah, Aldosary Saad
:
Developing computerized speech therapy system using metaheuristic optimized artificial cuckoo immune system. 1755-1767 - Fayez Alqahtani, Zafer Al-Makhadmeh, Amr Tolba
, Wael Said
:
Internet of things-based urban waste management system for smart cities using a Cuckoo Search Algorithm. 1769-1780 - Ahed Abugabah, Ahmad Ali AlZubi, Feras N. Al-Obeidat
, Abdulaziz Alarifi, Ayed Alwadain:
Data mining techniques for analyzing healthcare conditions of urban space-person lung using meta-heuristic optimized neural networks. 1781-1794 - José Chamadoira González, Vicente García-Díaz
, Edward Rolando Núñez-Valdéz
, Alberto Gómez Gómez
, Rubén González Crespo
:
Replacing email protocols with blockchain-based smart contracts. 1795-1801 - Andrea Vázquez-Ingelmo
, Francisco José García-Peñalvo
, Roberto Therón
, Daniel Amo Filvà
, David Fonseca Escudero:
Connecting domain-specific features to source code: towards the automatization of dashboard generation. 1803-1816 - Yogesh
, Ashwani Kumar Dubey, Rajeev Ratan
, Álvaro Rocha
:
Computer vision based analysis and detection of defects in fruits causes due to nutrients deficiency. 1817-1826 - Angel Marcelo Rea-Guaman, Jezreel Mejía
, Tomás San Feliu, José A. Calvo-Manzano
:
AVARCIBER: a framework for assessing cybersecurity risks. 1827-1843 - João Vidal de Carvalho
, Sandro Carvalho
, Álvaro Rocha
:
European strategy and legislation for cybersecurity: implications for Portugal. 1845-1854 - Ahmar Rashid, Muhammad Amir Zeb, Amad Rashid, Sajid Anwar
, Fernando Joaquim, Zahid Halim
:
Conceptualization of smartphone usage and feature preferences among various demographics. 1855-1873 - Paulo Carlos López-López
, Pablo Oñate, Álvaro Rocha
:
Social media mining, debate and feelings: digital public opinion's reaction in five presidential elections in Latin America. 1875-1886 - Marco Rosa, João Paulo Barraca
, Nelson Pacheco da Rocha:
Blockchain structures to guarantee logging integrity of a digital platform to support community-dwelling older adults. 1887-1898 - Yao Lu, Shuyang An:
Research on sports video detection technology motion 3D reconstruction based on hidden Markov model. 1899-1909 - Natalia G. Miloslavskaya, Alexander I. Tolstoy:
IoTBlockSIEM for information security incident management in the internet of things ecosystem. 1911-1925 - (Withdrawn) Intrusion detection and performance simulation based on improved sequential pattern mining algorithm. 1927-1936
- Darwin Alulema
, Javier Criado
, Luis Iribarne
, Antonio Jesús Fernández-García
, Rosa Ayala
:
A model-driven engineering approach for the service integration of IoT systems. 1937-1954 - Akalanka Mailewa Dissanayaka
, Susan A. Mengel, Lisa Gittner
,