default search action
International Journal of High Performance Computing and Networking, Volume 12
Volume 12, Number 1, 2018
- Amjad Ullah, Jingpeng Li, Amir Hussain:
Towards workload-aware cloud resource provisioning using a multi-controller fuzzy switching approach. 13-25 - Djamila Bendouda, Lynda Mokdad, Hafid Haffaf:
Exploiting node mobility for fault management in RPL-based wireless sensor networks. 26-38 - Yinbin Miao, Jianfeng Ma, Fushan Wei, Kai Zhang, Zhiquan Liu:
VKSE-DO: verifiable keyword search over encrypted data for dynamic data-owner. 39-48 - Di Zhao:
Acceleration of sequential Monte Carlo for computationally intensive target distribution by parallel lookup table and GPU computing. 49-55 - Hanwu Wang, Lian Pan, Huicong Zou:
An optimised multicast data transmission scheme in IEEE 802.16j wireless relay networks. 56-64 - Huang Hai, Xie Dong Qing, Qi Ke:
A watermarking-based authentication and image restoration in multimedia sensor networks. 65-73 - Alessandro Cilardo:
HtComp: bringing reconfigurable hardware to future high-performance applications. 74-83 - Chun-Hsiung Tseng, Ching-Lien Huang, Yung-Hui Chen, Chu-Chun Chuang, Han-Ci Syu, Yan-Ru Jiang, Fang-Chi Tsai, Pin-Yu Su, Jun-Yan Chen:
Enhance e-learning system performance with a cloud and crowd-oriented approach. 84-93 - Naidila Sadashiv, S. M. Dilip Kumar:
Broker-based resource management in dynamic multi-cloud environment. 94-109
Volume 12, Number 2, 2018
- Jizhong Wang, Chunxiao Wang:
Full secure identity-based encryption scheme over lattices for wireless sensor networks in the standard model. 111-117 - Kun Wu, Jianshe Kang, Kuo Chi:
The fault diagnosis method of RVM based on FOA and improved multi-class classification algorithm. 118-127 - Shuaishuai Zhu, Yiliang Han:
Secure data outsourcing scheme in cloud computing with attribute-based encryption. 128-136 - Yutao Wu, Wenyuan Song, Yongsheng Bai, Yucheng Han, Wenbin Cao:
An optimisation research on two-dimensional age-replacement interval of two-dimensional products. 137-147 - Huiwen Jia, Yupu Hu:
Extensional schemes of multipartite non-interactive key exchange from multilinear maps and their applications. 148-155 - Zhiying Wang, Jun Ye, Jianfeng Wang:
An efficient traceable data sharing scheme in cloud computing for mobile devices. 156-165 - Baojiang Cui, Shanshan He, Xi Yao, Peilin Shi:
Malicious URL detection with feature extraction based on machine learning. 166-178 - Minghao Zhao, Han Jiang, Zhen Li, Qiuliang Xu, Hao Wang, Shaojing Li:
An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms. 179-190 - Yan Liu, Jared M. Chase, Ian Gorton, Mark Rice, Adam Wynne:
Modelling and coordinating multi-source distributed power system models in service-oriented architecture. 191-206 - Ye Li, Xuan Wang, Zoe Lin Jiang, Siu-Ming Yiu:
Outsourcing privacy-preserving ID3 decision tree over horizontally partitioned data for multiple parties. 207-215
Volume 12, Number 3, 2018
- Emad Mahmoud Alsukhni, Shayma Almallahi:
Classifying environmental monitoring data to improve wireless sensor networks management. 217-225 - Haythem Ahmad Bany Salameh, Rawan Shabbar, Ahmad Alshamali:
A power-control interference management mechanism for Femtocell-based networks. 226-234 - Mohammed Naji Al-Kabi:
Exploring the relationships between web accessibility, web traffic, and university rankings: a case study of Jordanian universities. 235-250 - Muder Almiani, Abdul Razaque, Toufik Aidja, Ayman Al-Dmour:
Context-aware latency reduction protocol for secure encryption and decryption. 251-260 - Songwen Pei, Junge Zhang, Naixue Xiong, Myoung-Seo Kim, Jean-Luc Gaudiot:
Energy efficiency of heterogeneous multicore system based on the enhanced Amdahl's law. 261-269 - Jie Chen, Zongliang Gan, Xiuchang Zhu, Jin Wang:
Pixel classified colourisation method based on neighbourhood similarity priori. 270-277 - Yiqin Deng, Ming Zhao, Zhengjiang Wu, Longhua Xiao:
A novel distributed node searching method in DTNs. 278-288 - Chenglong Su, Guang Jin, Xianliang Jiang, Jun Niu:
ElasticQ: an active queue management algorithm with flow trust. 289-298 - Ling Huang, Jiaqi Liu, Lin Guo:
A hybrid mutation artificial bee colony algorithm for spectrum sharing. 299-306 - Xiaoyun Xia, Langping Tang, Xue Peng:
When is the immune inspired B-cell algorithm superior to the (1+1) evolutionary algorithm? 307-313 - Hui Xu, Jianpei Zhang, Jing Yang, Lijun Lun:
Assessing nodes' importance in complex networks using structural holes. 314-323
Volume 12, Number 4, 2018
- Silviu Panica, Bogdan Irimie, Dana Petcu:
Enabling and monitoring platform for cloud-based applications. 328-338 - Athanasios Kiourtis, Argyro Mavrogiorgou, Dimosthenis Kyriazis, Ilias Maglogiannis, Marinos Themistocleous:
Exploring the complete data path for data interoperability in cyber-physical systems. 339-349 - Rocco Aversa, Luca Tasquier:
Monitoring and management of a cloud application within a federation of cloud providers. 350-361 - Amel Haji, Asma Ben Letaifa, Sami Tabbane:
New architecture for virtual appliance deployment in the cloud. 362-367 - Beniamino Di Martino, Antonio Esposito, Giuseppina Cretella:
From business process models to the cloud: a semantic approach. 368-378 - Alba Amato, Rocco Aversa, Massimo Ficco, Salvatore Venticinque:
Migrating mission-critical applications in federated cloud: a case study. 379-390 - Flora Amato, Giovanni Cozzolino, Antonino Mazzeo, Sara Romano:
Intelligent medical record management: a diagnosis support system. 391-399 - Xiuqin Pan, Wenmin Zhou, Yong Lu, Dongyin Sun:
Semi-supervised PSO clustering algorithm based on self-adaptive parameter optimisation. 400-409 - Suqin Ji, Hongbo Shi, Yali Lv, Min Guo:
Scalable bootstrap attribute reduction for massive data. 410-417 - Ricardo Jiménez-Peris, Marta Patiño-Martínez, Ivan Brondino, Valerio Vianello:
Transaction management across data stores. 418-427
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.