


default search action
International Journal of Parallel, Emergent and Distributed Systems, Volume 39
Volume 39, Number 1, January 2024
- Maurice Margenstern:

A weakly universal cellular automaton in the heptagrid of the hyperbolic plane. 1-31 - Dmitry A. Zaitsev

, Tatiana R. Shmeleva
, Zeyu Zhou
, Ding Liu
:
Verification of cryptocurrency consensus protocols: reenterable colored Petri net model design. 32-50 - Nils Kohl, Daniel Bauer

, Fabian Böhm, Ulrich Rüde
:
Fundamental data structures for matrix-free finite elements on hybrid tetrahedral grids. 51-74 - Jordi Vallverdú

, Max Talanov:
Neuropunk revolution in short. 75-85 - Souvik Roy, Debopriya Barman, Sukanta Das:

Cellular automata machines for graph theoretic problems. 86-105 - Xuemin Wu, Liqiong Xu:

Fault-tolerance of enhanced hypercubes with faulty subcubes. 106-115 - Shibsankar Bala, Somesh Gorai, Pradyut Sarkar, Monish Chatterjee:

Blocking aware offline survivable path provisioning of connection requests in elastic optical networks. 116-137
Volume 39, Number 2, March 2024
- Bernd Ulmann:

Beyond zeros and ones - analog computing in the twenty-first century. 139-151 - Yoji Yamato:

Study and evaluation of FPGA reconfiguration during service operation for environment-adaptive software. 183-196 - Yuki Abe

, Kohei Nishida
, Kota Ando
, Tetsuya Asai
:
SPCTRE: sparsity-constrained fully-digital reservoir computing architecture on FPGA. 197-213 - Pritam Goswami

, Manash Kumar Kundu, Satakshi Ghosh, Buddhadeb Sau:
Circle formation by asynchronous opaque fat robots on an infinite grid. 214-247 - Bo Wei, Yixing Hu, Chuangui Chen:

Coordination of large-scale systems with unknown external disturbances: an observer-based event-triggered control scheme. 248-263 - Xin Xu, Chenxu Yang

, Gemaji Bao, Ayun Zhang, Xuan Shao:
Monitoring-edge-geodetic sets in product networks. 264-277
Volume 39, Number 3, May 2024
- Deepthi Haridas, Hari Om Prakash, Rakesh Shukla, Rallapalli Phani Bhushan:

End-to-end data security with DMaya on IPFS: keyless secured private swarm for the closed user group. 279-291 - Jirí Kaspar, Ivan Simecek:

Parallel CRC optimisations on the x64 architecture: a per-partes method. 292-316 - Arun S. Nair, Geeta Patil, Archit Agarwal

, Aboli Vijayan Pai, Biju K. Raveendran, Sasikumar Punnekkat:
CAMP: a hierarchical cache architecture for multi-core mixed criticality processors. 317-352 - Rongrong Ma, Zhen Ji, Yifan Yao, Yalong Lei:

Monitoring-edge-geodetic numbers of radix triangular mesh and Sierpiński graphs. 353-361 - Chenxu Yang

, Xingchao Deng, Zhen Ji, Wen Li:
Distance-edge-monitoring numbers of some related pseudo wheel networks. 362-378 - Filipe Oliveira

, Davide Carneiro
, Miguel Guimarães
, Óscar Oliveira
, Paulo Novais
:
Block size, parallelism and predictive performance: finding the sweet spot in distributed learning. 379-398 - Caixi Xue, Shuming Zhou, Hong Zhang, Qifan Zhang:

The generalized 4-connectivity of complete-transposition graphs. 399-412
Volume 39, Number 4, July 2024
- Bruno Patrício, José Félix Costa, Paula Gouveia:

Ex -identification and scientific discovery. 413-445 - Moritz Platt

, Daniel Platt, Peter McBurney
:
Sybil attack vulnerability trilemma. 446-460 - Mozhong Zhu, Rongkun Zhu, Feng Li, Jianxiang Qiu:

An improved slime mould algorithm using multiple strategies. 461-485 - Feng Xiao, Haobo Yang, Bo Wei:

A control-oriented LPV model of large-scale offshore wind turbines for deloading operation. 486-500 - Christoph Alt

, Martin Lanser
, Jonas Plewinski
, Atin Janki
, Axel Klawonn
, Harald Köstler
, Michael Selzer
, Ulrich Rüde
:
A continuous benchmarking infrastructure for high-performance computing applications. 501-523
Volume 39, Number 5, September 2024
- Zhihao Zhang, Mingwei Tang, Xiaoliang Chen, Yan-Li Lee, Yajun Du, Liansong Zong, Xianyong Li, Zhongyuan Jiang, Haosong Gou:

Aspect-Level sentiment analysis based on fusion graph double convolutional neural networks. 525-541 - Luming Kong, Feng Xiao, Haobo Yang, Bo Wei:

Modelling of linear large-capacity wind turbines with application to distributed control in wind farms. 542-556 - Wenbing Zhao, Izdehar M. Aldyaflah, Zhaohua Zheng, Xiong Luo:

A blockchain-based academic degree attestation system. 557-571 - Lanfranco Lopriore:

Hierarchical password capabilities. 572-588 - Xiaotian Li

, Koji Nakano, Shunsuke Tsukiyama, Yasuaki Ito, Takumi Kato, Yuya Kawamata:
Generating hard quadratic unconstrained binary optimization instances via the method of combining bit reduction and duplication technique. 589-608
Volume 39, Number 6, November 2024
- Henryk Fuks

, José Manuel Gómez Soto:
Cellular automaton model of self-healing. 609-618 - Igor V. Tarasyuk

:
Embedding and elimination for performance analysis in stochastic process algebra dtsdPBC. 619-652 - Liqiong Xu, Lin Yu, Shuming Zhou, Cheng-Kuan Lin:

Fault diagnosability of ( K 4 - e )-free multiprocessor systems under the PMC and HPMC model. 653-668 - Haleemah Ghazwani

, Muhammad Faisal Nadeem
, Ali Ahmad
, Ali N. A. Koam
, Hamza Iqbal:
Fault-tolerant graph embeddings in Archimedean networks. 669-681 - M. W. AlMasri

:
On logic gates with complex numbers. 682-695 - R. Pavithra, D. Arivudainambi

, S. Afizudeen
, T. S. Poorani:
Coverage optimization for IoT-based network using Monarch Butterfly Optimization with greedy strategy and self-adaptive crossover operator. 696-711

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














