


default search action
International Journal of Grid and Utility Computing, Volume 10
Volume 10, Number 1, 2019
- Azmi Alazzam, Ban Al-Omar:

Educational data modelling using curve fitting and average uniform algorithm. 3-9 - Sheeraz Ahmed, Muhammad Ayub Khan, Atif Ishtiaq, Zahoor Ali Khan, Malik Taimur Ali:

Energy harvesting techniques for routing issues in wireless sensor networks. 10-21 - Belsam Attallah, Zakea Il-agure:

Evaluating the affordances of wearable technology in education. 22-28 - Andrews Samraj

, Ramesh Kumarasamy, Kalvina Rajendran, Karthik Selvaraj
:
High-speed gesture modelling through boundary analysis of active signals from wearable data glove. 29-35 - Zakea Il-agure, Belsam Attallah:

How mutual information interprets anomalies using different clustering. 36-41 - Maher Salem

, Khalid Samara, Mohammed Saeed Aldhaheri:
A novel integrated framework for securing online instructor-student communication. 42-52 - Khaoula Tabet, Riad Mokadem

, Mohamed Ridda Laouar:
A data replication strategy for document-oriented NoSQL systems. 53-62 - Stig Bosmans, Glenn Maricaux, Filip Van der Schueren, Peter Hellinckx:

Cost-aware hybrid cloud scheduling of parameter sweep calculations using predictive algorithms. 63-75 - Rodrigo da Rosa Righi, Vinicius Facco Rodrigues, Igor Fontana De Nardin

, Cristiano André da Costa, Marco Antonio Zanata Alves, Maurício Aronne Pillon:
Towards providing middleware-level proactive resource reorganisation for elastic HPC applications in the cloud. 76-92
Volume 10, Number 2, 2019
- Manel Medhioub, Mohamed Hamdi:

An identity-based cryptographic scheme for cloud storage applications. 93-104 - Thomas Huybrechts

, Yorick De Bock
, Haoxuan Li, Peter Hellinckx
:
COBRA-HPA: a block generating tool to perform hybrid program analysis. 105-118 - Xiurong Chen, Yixiang Tian:

The big data mining forecasting model based on combination of improved manifold learning and deep learning. 119-131 - Haoxuan Li, Paul De Meulenaere

, Siegfried Mercelis
, Peter Hellinckx
:
Impact of software architecture on execution time: a power window TACLeBench case study. 132-140 - Fatma Masmoudi

, Mohamed Sellami, Monia Loulou, Ahmed Hadj Kacem:
Accountability management for multi-tenant cloud services. 141-158 - Silvio Pardi, Guido Russo

:
A Big Data approach for multi-experiment data management. 159-167 - Kosuke Ozera, Takaaki Inaba, Kevin Bylykbashi

, Shinji Sakamoto, Makoto Ikeda, Leonard Barolli:
A WLAN triage testbed based on fuzzy logic and its performance evaluation for different number of clients and throughput parameter. 168-178 - Akash Punhani, Pardeep Kumar

, Nitin
:
E-XY: an entropy based XY routing algorithm. 179-186 - Felipe Volpato, Madalena Pereira da Silva

, Mário Antônio Ribeiro Dantas
:
OFQuality: a quality of service management module for software-defined networking. 187-198
Volume 10, Number 3, 2019
- Joao Vicente Ferreira Lima, Daniel Di Domenico:

HPSM: a programming framework to exploit multi-CPU and multi-GPU systems simultaneously. 201-211 - Alexandre Solon Nery, Alexandre da Costa Sena, Leandro Soares Guedes

:
An efficient pathfinding system in FPGA for edge/fog computing. 212-223 - Bruno Marques, Igor Machado Coelho, Alexandre da Costa Sena, Maria Clicia Stelling de Castro:

A network coding protocol for wireless sensor fog computing. 224-234 - Caio B. G. Carvalho, Victor da Cruz Ferreira, Felipe M. G. França

, Cristiana B. Bentes, Gabriele Mencagli, Tiago A. O. Alves, Alexandre da Costa Sena, Leandro A. J. Marzulo:
A dataflow runtime environment and static scheduler for edge, fog and in-situ computing. 235-247 - Marcos Paulo Rocha, Felipe M. G. França

, Alexandre Solon Nery, Leandro Soares Guedes
:
An optimised dataflow engine for GPGPU stream processing. 248-257 - Hiroki Sakaji, Masaki Kohana, Akio Kobayashi, Hiroyuki Sakai:

Enriching folksonomy for online videos. 258-264 - Masaki Kohana, Shusuke Okamoto:

A web platform for oral exam of programming class. 265-271 - David Guyon, Anne-Cécile Orgerie, Christine Morin, Deborah A. Agarwal

:
Involving users in energy conservation: a case study in scientific clouds. 272-282 - Ilias K. Savvas

, Dimitrios C. Tselios
, Georgia Garani
:
Distributed and multi-core version of k-means algorithm. 283-291
Volume 10, Number 4, 2019
- Chaitanya Pavan Tanay Kondapalli, Srikanth Khanna, Venkatachalam Chandrasekaran, Pallav Kumar Baruah, Diwakar Kartheek Pingali, Sai Hareesh Anamandra:

GPU accelerated video super resolution using transformed spatio-temporal exemplars. 295-307 - Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit Kumar Awasthi, Emmanuel S. Pilli:

Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation. 308-325 - Xianghu Wu, Mingcheng Qu, Yongchao Tao, Guannan Wang, Ziyu Dong:

A novel test case generation method based on program structure diagram. 326-333 - Yubiao Wang, Junhao Wen, Quanwang Wu, Lei Guo, Bamei Tao:

A dynamic cloud service selection model based on trust and SLA in cloud computing. 334-343 - Roberta Calegari, Enrico Denti, Stefano Mariani, Andrea Omicini:

Logic programming as a service in multi-agent systems for the Internet of Things. 344-360 - Satyapal Singh, Mohan Kubendiran, Arun Kumar Sangaiah

:
A review on intrusion detection approaches in cloud security systems. 361-374 - Philip Moore, Hai Van Pham:

A fog computing model for pervasive connected healthcare in smart environments. 375-391 - Nelson L. Santos, Salvatore Lentini, Enrico Grosso, Bogdan V. Ghita, Giovanni Luca Masala:

Performance analysis of data fragmentation techniques on a cloud server. 392-401 - Olga Datskova, Wedong Shi:

Large-scale data processing software and performance instabilities within HEP grid environments. 402-414 - Abeer E. W. Eldewahi, Alzubair Hassan, Khalid Elbadawi, Bazara I. A. Barry:

The analysis of man at the end attack behaviour in software defined network. 415-421 - Xuan Guo, Fei Xu, Zhiting Xiao, Hongguo Yuan, Xiaoyuan Yang:

Winning the war on terror: using social networking tools and GTD to analyse the regularity of terrorism activities. 422-437
Volume 10, Number 5, 2019
- Walaa Hassan Elashmawi

, Ahmed Fouad Ali
:
An enhanced Jaya algorithm for solving nurse scheduling problem. 439-447 - Hesham M. Elmasry

, Ayman E. Khedr, Mona M. Nasr:
An adaptive technique for cost reduction in cloud data centre environment. 448-464 - Mahdieh Izadpanahkakhk

, Seyyed Mohammad Razavi, Mehran Taghipour-Gorjikolaie
, Seyyed Hamid Zahiri, Aurelio Uncini:
Novel mobile palmprint databases for biometric authentication. 465-474 - Lamia Nabil Omran, Kadry Ali Ezzat, Alaa Bayoumi, Ashraf Darwish, Aboul Ella Hassanien

:
IoT-based intensive care secure framework for patient monitoring and tracking. 475-487 - Mayur Rahul

, Narendra Kohli, Rashi Agarwal
, Sanju Mishra
:
Facial expression recognition using geometric features and modified hidden Markov model. 488-496 - Kamaleddin Yaghoobirafi, Eslam Nazemi:

An autonomic mechanism based on ant colony pattern for detecting the source of incidents in complex enterprise systems. 497-511 - Samaher Al-Janabi

, Muhammed Abaid Mahdi:
Evaluation prediction techniques to achievement an optimal biomedical analysis. 512-527 - Mala Kalra

, Sarbjeet Singh:
An intelligent water drops-based approach for workflow scheduling with balanced resource utilisation in cloud computing. 528-544 - Tomoya Enokido, Dilawaer Duolikun, Makoto Takizawa

:
The energy consumption laxity-based algorithm to perform computation processes in virtual machine environments. 545-555 - Cunlin Li, Ming Li:

A new bi-matrix game model with fuzzy payoffs in credibility space. 556-563 - Toshinobu Hayashi, Shinji Sugawara

:
An efficient content sharing scheme using file splitting and differences between versions in hybrid peer-to-peer networks. 564-573 - Tsukasa Kudo:

Fog computing with original data reference function. 574-582
Volume 10, Number 6, 2019
- Giovanni Morana, Rao Mikkilineni, Surendra Keshan:

Cognitive workload management on globally interoperable network of clouds. 586-592 - Benedikt Pittl, Irfan Ul Haq, Werner Mach, Erich Schikuta

:
Towards autonomous creation of service chains on cloud markets. 593-606 - Erick Barros Nascimento

, Edward David Moreno, Douglas Dyllon Jeronimo de Macedo:
Cache replication for information-centric networks through programmable networks. 607-617 - Paul Moggridge

, Na Helian
, Yi Sun, Mariana Lilley
, Vito Veneziano
, Martin Eaves:
Improving the MXFT scheduling algorithm for a cloud computing context. 618-638 - Valentina Casola

, Alessandra De Benedictis, Massimiliano Rak
, Umberto Villano, Erkuden Rios
, Angel Rego
, Giancarlo Capone:
Model-based deployment of secure multi-cloud applications. 639-653 - Mohamed Mehdi Kandi

, Shaoyi Yin, Abdelkader Hameurlain:
Resource auto-scaling for SQL-like queries in the cloud based on parallel reinforcement learning. 654-671 - Chunfen Xu:

Data analysis of CSI 800 industry index by using factor analysis model. 672-680 - Demis Gomes, Glauco Estácio Gonçalves, Patricia Takako Endo

, Moisés Rodrigues, Judith Kelner, Djamel Sadok, Calin Curescu:
Don't lose the point, check it: Is your cloud application using the right strategy? 681-693 - Antonella Longo

, Marco Zappatore, Mario A. Bochicchio
:
A cloud-based approach to dynamically manage service contracts for local public transportation. 694-707 - Anderson Schwede Raugust, Wilton Jaciel Loch, Felipe Rodrigo de Souza, Maurício Aronne Pillon, Charles Christian Miers

, Guilherme Piêgas Koslovski:
Towards to virtual infrastructure allocation on multiple IaaS providers with survivability and reliability requirements. 708-723

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














