


default search action
International Journal of Computational Science and Engineering, Volume 20
Volume 20, Number 1, 2019
- Hongyu Yang, Yuguang Ning, Yue Wang:

Research on RSA and Hill hybrid encryption algorithm. 1-6 - Yonglong Zhang, Bin Li, Mingfen Li, Jin Wang:

An auction mechanism for cloud resource allocation with time-discounting values. 7-14 - Ru Jia, Ru Li, Meng Gao:

Study on data sparsity in social network-based recommender system. 15-20 - Peng Xiao, Changsong Liu:

A novel virtual disk bandwidth allocation framework for data-intensive applications in cloud environments. 21-30 - Weiwei Lin, Zilong Zhang, Shaoliang Peng

:
Academic research trend analysis based on big data technology. 31-39 - Gang Xu

, Jia-Yi Wang, Hai-He Jin, Peng-Fei Mu:
The discovery in uncertain-social-relationship communities of opportunistic network. 40-48 - Han Xue, Bing Qin, Ting Liu, Shen Liu:

Tag recommendation based on topic hierarchy of folksonomy. 49-58 - Lei Chen, Chong Wu:

Collective entity linking via greedy search and Monte Carlo calculation. 59-68 - Mario Casillo

, Francesco Colace, Massimo De Santo, Saverio Lemma, Marco Lombardi:
CAT: a context aware teller for supporting tourist experiences. 69-87 - Mingdong Tang, Fenfang Xie, Wei Liang, Yanmin Xia, Kuan-Ching Li

:
Predicting new composition relations between web services via link analysis. 88-101 - André Luiz Marasca, Dalcimar Casanova, Marcelo Teixeira:

Assessing classification complexity of datasets using fractals. 102-119 - Gaoming Yang

, Tao Dong, Xianjin Fang, Shuzhi Su:
Association data release with the randomised response based on Bayesian networks. 120-129
Volume 20, Number 2, 2019
- Li Liu, Letian Yang, Qi Fan:

User preferences oriented cloud service selection in multi-cloud environment. 133-145 - Chien-Ping Liu, Ho-Ting Wu, Kai-Wei Ke, Chia-Chih Chien:

The loading-aware energy saving scheme for EPON networks. 146-156 - Yeh-Cheng Chen, Ruey-Shun Chen, Hung-Min Sun, S. Felix Wu:

Using RFID technology to develop an intelligent equipment lock management system. 157-165 - Ralph Duncan:

Managing changes to a packet-processing virtual machine's instruction set architecture over time. 166-178 - Khine Zar Thwe, Mie Mie Thaw:

Spectro-temporal features for environmental sound classification. 179-189 - Shih-Chien Chang, Ja-Ling Wu:

A privacy-preserving cloud-based data management system with efficient revocation scheme. 190-199 - Yumeng Guo, Wenke Wang, Sikun Li:

Out-of-core streamline visualisation based on adaptive partitioning and data prefetching. 200-208 - Xiaoqi Hu, Mengshen Zhao, Shuang Z. Tu

, Byunghyun Jang:
Accelerating the discontinuous Galerkin cell-vertex scheme solver on GPU-powered systems. 209-224 - Younes Hajoui, Omar Bouattane

, Mohamed Youssfi
, El Hossein Illoussamen:
Q-learning and ACO hybridisation for real-time scheduling on heterogeneous distributed architectures. 225-239 - Ferdinando Di Martino, Salvatore Sessa:

Passive image autofocus by using direct fuzzy transform. 240-254 - Cairong Yan, Bin Zhu, Yanglan Gan, Guangwei Xu:

Incremental processing for string similarity join. 255-268 - Yuezhong Wu

, Qin Liu, Changyun Li
, Guojun Wang:
A hybrid filtering-based network document recommendation system in cloud storage. 269-279
Volume 20, Number 3, 2019
- Samar El Helou

, Shinji Kobayashi
, Goshiro Yamamoto, Naoto Kume, Eiji Kondoh
, Shusuke Hiragi
, Kazuya Okamoto, Hiroshi Tamura
, Tomohiro Kuroda:
Graph databases for openEHR clinical repositories. 281-298 - Mahesh Lokhande, Mohammad Atique:

Assessment of nested-parallel task model under real-time scheduling on multi-core processors. 299-316 - Guilherme Bonfim De Sousa, Patrícia Helena Moraes Rêgo:

Convergence and numerical stability of action-dependent heuristic dynamic programming algorithms based on RLS learning for online DLQR optimal control. 317-334 - Jingzhao Li, Zihua Chen, Guangming Cao, Mei Zhang:

A decision system based on active perception and intelligent analysis for key location security information. 335-344 - Liming Chen, Zhaoqing Pan, Xiaokai Yi, Yajuan Zhang:

Fast CU size decision based on texture-depth relationship for depth map encoding in 3D-HEVC. 345-353 - Xinsheng Lai, Xiaoyun Xia:

Multi-objective evolutionary algorithm on simplified bi-objective minimum weight minimum label spanning tree problems. 354-361 - Weigang Zou, Wei Li, Zhaoquan Cai:

High-dimensional Arnold inverse transformation for multiple images scrambling. 362-375 - Dongbo Liu, Peng Xiao, Yongjian Li:

Saving energy consumption for mixed workloads in cloud platforms. 376-386 - Chundong Wang, Tong Zhao, Xiu-liang Mo:

The extraction of security situation in heterogeneous log based on Str-FSFDP density peak cluster. 387-396 - Fengfei Wang, Zhen Liu, Chundong Wang:

An improved kNN text classification method. 397-403 - Yongchang Gao, Haowen Guan, Bin Gong:

CODM: an outlier detection method for medical insurance claims fraud. 404-411 - Shuyang Tang, Shengli Liu, Xinyi Huang, Zhiqiang Liu:

Privacy-preserving location-based service protocols with flexible access. 412-423
Volume 20, Number 4, 2019
- Deyou Tang, Yazhuo Zhang, Qingmiao Zeng, Hu Chen:

Performance evaluation of main-memory hash joins on KNL. 425-438 - Rodrigo da Rosa Righi, Vinicius Facco Rodrigues

, Luiz Felipe Da Silva Cunha, Cristiano André da Costa
:
On providing on-the-fly resizing of the elasticity grain when executing HPC applications in the cloud. 439-456 - João Fabrício Filho

, Luis Gustavo Araujo Rodriguez, Anderson Faustino da Silva:
Can the hybrid colouring algorithm take advantage of multi-core architectures? 457-479 - Po-Wen Chi, Ming-Hung Wang

, Jing-Wei Guo, Chin-Laung Lei:
MigrateSDN: efficient approach to integrate OpenFlow networks with STP-enabled networks. 480-491 - Quang-Khai Tran, Sa-Kwang Song:

Learning pattern of hurricane damage levels using semantic web resources. 492-500 - Richard Haney, Ram Mohan:

CUDA GPU libraries and novel sparse matrix-vector multiplication - implementation and performance enhancement in unstructured finite element computations. 501-507 - Tao Li, Shaojing Li:

Rational e-voting based on network evolution in the cloud. 508-515 - Qiang Chen, Bin Fang, Yinong Chen

, Yan Tang:
An adaptive feature combination method based on ranking order for 3D model retrieval. 516-525 - Qiang Wang, Fucai Zhou, Su Peng, Jian Xu:

Publicly verifiable function secret sharing. 526-535 - Richa

, Punam Bedi
:
Parallel context-aware multi-agent tourism recommender system. 536-549 - Biaohan Zhang:

Modelling of advanced persistent threat attack monitoring based on the artificial fish swarm algorithm. 550-557 - Punam Bedi

, Veenu Bhasin
:
Multilayer ensemble of ELMs for image steganalysis with multiple feature sets. 558-569

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














