![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Future Generation Computer Systems, Volume 30
Volume 30, January 2014
- Zhifeng Xiao, Yang Xiao
:
Achieving Accountable MapReduce in cloud computing. 1-13 - Ben van Werkhoven
, Jason Maassen
, Henri E. Bal, Frank J. Seinstra:
Optimizing convolution operations on GPUs using adaptive tiling. 14-26 - Rubing Duan, Radu Prodan
, Xiaorong Li:
A sequential cooperative game theoretic approach to scheduling multiple large-scale applications in grids. 27-43
- Georgios Theodoropoulos
, Kostas Katrinis, Rolf Riesen, Shoukat Ali:
Editorial: Special Issue on Extreme Scale Parallel Architectures and Systems. 44-45 - Sudip S. Dosanjh, Richard F. Barrett, Douglas Doerfler
, Simon D. Hammond, Karl S. Hemmert, Michael A. Heroux, Paul T. Lin, Kevin T. Pedretti, Arun F. Rodrigues, Tim Trucano, J. P. Luitjens:
Exascale design space exploration and co-design. 46-58 - Christian Engelmann
:
Scaling to a million cores and beyond: Using light-weight simulation to understand the challenges ahead on the road to exascale. 59-65 - Kurt B. Ferreira, Rolf Riesen, Patrick G. Bridges
, Dorian C. Arnold, Ron Brightwell:
Accelerating incremental checkpointing for extreme-scale computing. 66-77 - Diego Lugones, Kostas Katrinis, Georgios Theodoropoulos
, Martin Collier
:
A reconfigurable, regular-topology cluster/datacenter network using commodity optical switches. 78-89
- Robert H. Deng
, Yang Xiang
, Man Ho Au
:
Cryptography in Cloud Computing. 90 - Shaohua Tang, Lingling Xu:
Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials. 91-97 - Jingwei Li
, Jin Li, Xiaofeng Chen, Zheli Liu, Chunfu Jia:
Privacy-preserving data utilization in hybrid clouds. 98-106 - Fei Han, Jing Qin
, Huawei Zhao, Jiankun Hu
:
A general transformation from KP-ABE to searchable encryption. 107-115 - Xiangjian He
, Thawatchai Chomsiri
, Priyadarsi Nanda, Zhiyuan Tan
:
Improving cloud network security using the Tree-Rule firewall. 116-126 - Yong Yu
, Lei Niu, Guomin Yang
, Yi Mu, Willy Susilo
:
On the security of auditing mechanisms for secure cloud storage. 127-132 - Yanling Lian, Xinyi Huang, Yi Mu:
SA3: Self-adaptive anonymous authentication for dynamic authentication policies. 133-139 - Li Xu, Yuexin Zhang:
Matrix-based pairwise key establishment for wireless mesh networks. 140-145 - Cristina Alcaraz
, Javier López
:
WASAM: A dynamic wide-area situational awareness model for critical domains in Smart Grids. 146-154 - Shuai-Min Chen, Mu-En Wu, Hung-Min Sun, King-Hang Wang
:
CRFID: An RFID system with a cloud database as a back-end server. 155-161 - Mu-En Wu, Raylin Tso
, Hung-Min Sun:
On the improvement of Fermat factorization using a continued fraction technique. 162-168
- Xueyan Tang, Wentong Cai
, Rick Siow Mong Goh:
Special Issue: Recent Advances in Parallel and Distributed Systems, ICPADS 2012 Selected Papers. 169 - Adnan Ozsoy, D. Martin Swany, Arun Chauhan:
Optimizing LZSS compression on GPGPUs. 170-178 - Ruixuan Li, Zhiyong Xu, Wanshang Kang, Kin-Choong Yow
, Cheng-Zhong Xu
:
Efficient multi-keyword ranked query over encrypted data in cloud computing. 179-190 - Laércio Lima Pilla
, Christiane Pousa Ribeiro, Pierre Coucheney, François Broquedis
, Bruno Gaujal, Philippe Olivier Alexandre Navaux, Jean-François Méhaut
:
A topology-aware load balancing algorithm for clustered hierarchical multi-core machines. 191-201 - Lin Ma, Kunal Agrawal, Roger D. Chamberlain:
A memory access model for highly-threaded many-core architectures. 202-215 - Anup Das
, Akash Kumar
, Bharadwaj Veeravalli:
Communication and migration energy aware task mapping for reliable multiprocessor systems. 216-228 - Achille Peternier
, Danilo Ansaloni, Daniele Bonetta, Cesare Pautasso, Walter Binder
:
Improving execution unit occupancy on SMT-based processors through hardware-aware thread scheduling. 229-241 - Gongming Li, Hong An, Qi Li, Bobin Deng, Wenbo Dai:
Efficient execution of speculative threads and transactions with hardware transactional memory. 242-253 - Erika Rosas, Nicolas Hidalgo
, Mauricio Marín
, Veronica Gil-Costa
:
Web search results caching service for structured P2P networks. 254-264 - Judicael A. Zounmevo, Ahmad Afsahi:
A fast and resource-conscious MPI message queue mechanism for large-scale jobs. 265-290 - Darren J. Kerbyson, Kevin J. Barker
, Abhinav Vishnu, Adolfy Hoisie
:
A performance comparison of current HPC systems: Blue Gene/Q, Cray XE6 and InfiniBand systems. 291-304
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.