


default search action
Multiagent and Grid Systems, Volume 12
Volume 12, Number 1, 2016
- Takahiro Majima, Keiki Takadama, Daisuke Watanabe
, Mitujiro Katuhara:
Characteristic and application of network evolution model for public transport network. 1-11 - Absalom E. Ezugwu
, Marc E. Frîncu, Sahalu B. Junaidu:
Characterization of grid computing resources using measurement-based evaluation. 13-34 - Chairi Kiourt
, Dimitris Kalles
:
A platform for large-scale game-playing multi-agent systems on a high performance computing infrastructure. 35-54 - Esma Insaf Djebbar, Ghalem Belalem
, Merien Benadda:
Task scheduling strategy based on data replication in scientific Cloud workflows. 55-67
Volume 12, Number 2, 2016
- Suyel Namasudra
, Pinki Roy
:
Secure and efficient data access control in cloud computing environment: A survey. 69-90 - Meiyu Shi, Wei Zhu, Hongji Yang, Chen Li
:
Using agent-based model to simulate stakeholder balance model of tourism intangible cultural heritage. 91-103 - Ahmed Taki Eddine Dib, Kamel Barkaoui, Zaïdi Sahnoun:
Specification and verification of reconfigurable multi-agent system architectures. 105-124 - Wei Meng, Shaobo Li, Jinglei Qu
:
An iterative and fair protocol for bilateral multi-issue negotiation with complex utility space. 125-138 - Fabien Delecroix, Maxime Morge
, Thomas Nachtergaelle, Jean-Christophe Routier:
Multi-party negotiation with preferences rather than utilities. 139-165
Volume 12, Number 3, 2016
- Esha Barlaskar, Yumnam Jayanta Singh
, Biju Issac
:
Energy-efficient virtual machine placement using enhanced firefly algorithm. 167-198 - Meftah Mohammed Charaf Eddine, Okba Kazar
:
An agent based approach for modeling a groupware. 199-215 - Said Limam
, Ghalem Belalem
:
A self-adaptive conflict resolution with flexible consistency guarantee in the cloud computing. 217-238 - Nirmal Kaur
, Savina Bansal
, Rakesh Kumar Bansal:
Energy efficient duplication-based scheduling for precedence constrained tasks on heterogeneous computing cluster. 239-252
Volume 12, Number 4, 2016
- Shaik Naseera:
A survey on data replication strategies in a Data Grid environment. 253-269 - Sanjay Chakraborty
, Lopamudra Dey
:
A rule based probabilistic technique for malware code detection. 271-286 - Fatima Kalfadj, Belabbes Yagoubi:
Dynamic fault tolerant scheduling policy for workflows in Grid computing. 287-302 - Ellie Lovellette
, Henry Hexmoor:
Voronoi diagrams for automated argumentations among Internet of Things. 303-318 - Robin Cohen, John Finnson, Thomas T. Tran, Jie Zhang:
An ontological representation for trust-based decision making in transportation environments. 319-342

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.