


default search action
International Journal of High Performance Computing and Networking, Volume 11
Volume 11, Number 1, 2018
- Kuo-Chan Huang, Chun-Hao Hung, Wei Hsieh:

Revenue maximisation for scheduling deadline-constrained mouldable jobs on high performance computing as a service platforms. 1-13 - Zhenhua Liu, Bin Li, Qi Han:

Secure and verifiable outsourcing protocol for non-negative matrix factorisation. 14-23 - Jun Ye, Meixia Miao, Peng Chen, Xiaofeng Chen:

Comparable encryption scheme supporting multiple users in cloud computing. 24-33 - Marcelo Keese Albertini, Rodrigo Fernandes de Mello:

Estimating data stream tendencies to adapt clustering parameters. 34-44 - Leyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu:

Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud. 45-54 - Minal P. Patel

, Sanjay Chaudhary, Sanjay Garg:
Improved pre-copy algorithm using statistical prediction and compression model for efficient live memory migration. 55-65 - Pierre Spitéri, Amar Ouaoua, Ming Chau, Hacène Boutabia:

Parallel solution of the discretised and linearised G-heat equation. 66-82 - Yinxia Sun, Zhuoran Zhang, Limin Shen:

A revocable certificateless encryption scheme with high performance. 83-91
Volume 11, Number 2, 2018
- Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat

, Al-Sakib Khan Pathan
:
Checkpointing distributed application running on mobile ad hoc networks. 95-107 - Hamza Toulni

, Benayad Nsiri
:
Cluster-based routing protocol using traffic information. 108-116 - Tooska Dargahi

, Hamid H. S. Javadi
, Hosein Shafiei, Payam Mousavi:
Detection and mitigation of pulse-delay attacks in pairwise-secured wireless sensor networks. 117-128 - Souaad Boussoufa-Lahlah, Fouzi Semchedine

, Louiza Bouallouche-Medjkoune
, Nadir Farhi:
PSCAR: a proactive-optimal-path selection with coordinator agents assisted routing for vehicular ad hoc networks. 129-144 - Mohamed-Lamine Messai, Hamida Seba:

EAHKM+: energy-aware secure clustering scheme in wireless sensor networks. 145-155 - N. Ambika:

RPSE - reenactment of data using polynomial-variant cryptographic scheme in sensor environment. 156-166 - Hassiba Louazene

, Mouloud Challal
, M'Hamed Boulakroune:
Compact UWB BPF with notch-band using SIR and DGS. 167-172
Volume 11, Number 3, 2018
- Chao Qu, Fagui Liu, Dacheng Deng, Ruifen Yuan:

UOSM: user-oriented semi-automatic method of constructing domain ontology. 173-180 - Delong Cui

, Zhiping Peng, Wende Ke, Xiaoyu Hong, Jinglong Zuo:
Cloud workflow scheduling algorithm based on reinforcement learning. 181-190 - Zhongming Yang, Yong Qin, Yunfu Jia:

Quick convergence algorithm of ACO based on convergence grads expectation. 191-198 - Lei Yang, Kangshun Li, Wensheng Zhang, Yaolang Kong:

Short-term vegetable prices forecast based on improved gene expression programming. 199-213 - Lin Liu, Jingguo Dai:

High performance energy saving policy based on IND. 214-222 - Kangshun Li, Liang Zhong, Lei Zuo, Zhaopeng Wang:

Constrained evolution algorithm based on adaptive differential evolution. 223-230 - Jin Yang, Liangming Wang, Joonsang Baek:

A privacy preserving and fine-grained access control scheme in DaaS based on efficient DSP re-encryption. 231-241 - Lu Xiong, Kangshun Li, Lei Yang:

A parallel immune genetic algorithm for community detection in complex networks. 242-250 - Jieren Cheng, Boyi Liu, Xiangyan Tang:

An automatic traffic-congestion detection method for bad weather based on traffic video. 251-259
Volume 11, Number 4, 2018
- Mageda Sharafeddine, Hmayag Partamian, Mariette Awad, Mazen A. R. Saghir, Haitham Akkary, Hassan Artail, Hazem M. Hajj, Mohammed Baydoun:

Towards distributed acceleration of image processing applications using reconfigurable active SSD clusters: a case study of seismic data analysis. 261-278 - Ali Imran Jehangiri, Ramin Yahyapour

, Edwin Yaqub, Philipp Wieder
:
Distributed predictive performance anomaly detection for virtualised platforms. 279-290 - Amel Ltifi, Ahmed Zouinkhi, Med Salim Bouhlel:

Active vehicle: a new approach integrating AmI technology for trust management in VANET. 291-303 - Salvatore Cuomo, Ardelio Galletti, Livia Marcellino:

A GPU parallel optimised blockwise NLM algorithm in a distributed computing system. 304-311 - Huiting Liu, Kaishen Zhou, Peng Zhao, Sheng Yao:

Mining frequent itemsets over uncertain data streams. 312-321 - Xu Wang, Wei Liu, Yue Tan:

A semantic similarity calculation model for event ontology mapping. 322-331 - Shangping Wang, Ru Zhao, Yaling Zhang:

Lattice-based ring signature scheme under the random oracle model. 332-341 - Taisong Xiong, Yuanyuan Huang, Xin Luo, Jing Zeng:

Robust Student's-t mixture modelling via Markov random field and its application in image segmentation. 342-350

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














