default search action
The Journal of Supercomputing, Volume 74
Volume 74, Number 1, January 2018
- Aryaf Al-Adwan, Basel A. Mahafzah, Ahmad Abdel-Aziz Sharieh:
Solving traveling salesman problem using parallel repetitive nearest neighbor algorithm on OTIS-Hypercube and OTIS-Mesh optoelectronic architectures. 1-36 - Bob Zigon, Luoding Zhu, Fengguang Song:
Interactive 3D simulation for fluid-structure interactions using dual coupled GPUs. 37-64 - King-Hang Wang, Chien-Ming Chen, Weicheng Fang, Tsu-Yang Wu:
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. 65-70 - Samad Rostampour, Nasour Bagheri, Mehdi Hosseinzadeh, Ahmad Khademzadeh:
A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications. 71-86 - Esther Salamí, Cristina Barrado, Antonia Gallardo, Enric Pastor:
General queuing model for optimal seamless delivery of payload processing in multi-core processors. 87-104 - Zhegao Piao, Seong Joon Yoo, Yeong Hyeon Gu, Jaechun No, Zhiyan Jiang, Helin Yin:
Recommender system architecture based on Mahout and a main memory database. 105-121 - Madnesh K. Gupta, Tarachand Amgoth:
Resource-aware virtual machine placement algorithm for IaaS cloud. 122-140 - Yili Wang, Kyung Tae Kim, Byung Jun Lee, Hee Yong Youn:
A novel buffer management scheme based on particle swarm optimization for SSD. 141-159 - Armin Ahmadzadeh, Omid Hajihassani, Saeid Gorgin:
A high-performance and energy-efficient exhaustive key search approach via GPU on DES-like cryptosystems. 160-182 - Xianfu Meng:
A churn-aware durable data storage scheme in hybrid P2P networks. 183-204 - Ali Kazemi Niari, Reza Berangi, Mahmood Fathy:
ECCN: an extended CCN architecture to improve data access in vehicular content-centric network. 205-221 - Tuan Anh Nguyen, Dugki Min, Eunmi Choi:
A comprehensive evaluation of availability and operational cost for a virtualized server system using stochastic reward nets. 222-276 - Ali Shokouhi Rostami, Marzieh Badkoobe, Farahnaz Mohanna, Hengameh Keshavarz, Ali Asghar Rahmani Hosseinabadi, Arun Kumar Sangaiah:
Survey on clustering in heterogeneous and homogeneous wireless sensor networks. 277-323 - Hazem M. Bahig:
A fast optimal parallel algorithm for a short addition chain. 324-333 - Olusogo Popoola, Bernardi Pranggono:
On energy consumption of switch-centric data center networks. 334-369 - Sambit Kumar Mishra, Deepak Puthal, Bibhudatta Sahoo, Sanjay Kumar Jena, Mohammad S. Obaidat:
An adaptive task allocation technique for green cloud computing. 370-385 - Sukhchandan Randhawa, Sushma Jain:
Energy-efficient load balancing scheme for two-tier communication in wireless sensor networks. 386-416 - Nafiseh Fareghzadeh, Mir Ali Seyyedi, Mehran Mohsenzadeh:
Dynamic performance isolation management for cloud computing services. 417-455 - Dae-Yeol Lee, Jooyoung Lee, Ji-Hoon Choi, Jong-Ok Kim, Hui Yong Kim, Jin Soo Choi:
GPU-based real-time super-resolution system for high-quality UHD video up-conversion. 456-484 - Keqin Li:
Energy constrained scheduling of stochastic tasks. 485-508 - Seyed Farhad Aghili, Maede Ashouri-Talouki, Hamid Mala:
DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT. 509-525
Volume 74, Number 2, February 2018
- George A. Gravvanis, John P. Morrison, Dan C. Marinescu, Christos K. Filelis-Papadopoulos:
Special section: towards high performance computing in the cloud. 527-529 - Christos K. Filelis-Papadopoulos, Konstantinos M. Giannoutakis, George A. Gravvanis, Dimitrios Tzovaras:
Large-scale simulation of a self-organizing self-management cloud computing framework. 530-550 - Hamidreza Khaleghzadeh, Ziming Zhong, Ravi Reddy, Alexey L. Lastovetsky:
Out-of-core implementation for accelerator kernels on heterogeneous clouds. 551-568 - Panagiotis E. Kyziropoulos, C. K. Filelis-Papadopoulos, George A. Gravvanis, Christos Efthymiopoulos:
Toward the design of a novel hybrid parallel N-body method in scope of modern cloud architectures. 569-591 - Rajinder Sandhu, Navroop Kaur, Sandeep K. Sood, Rajkumar Buyya:
TDRM: tensor-based data representation and mining for healthcare data in cloud computing environments. 592-614 - Dawei Sun, Hongbin Yan, Shang Gao, Xunyun Liu, Rajkumar Buyya:
Rethinking elastic online scheduling of big data streaming applications over high-velocity continuous data streams. 615-636 - Hanul Sung, Myungsun Kim, Jeesoo Min, Hyeonsang Eom:
OLM: online LLC management for container-based cloud service. 637-664
- Nafiul Alam Siddique, Patricia Grubel, Abdel-Hameed A. Badawy, Jeanine E. Cook:
A performance study of the time-varying cache behavior: a study on APEX, Mantevo, NAS, and PARSEC. 665-695 - Mohammad Reza Khosravi, Hamid Basri, Habib Rostami:
Efficient routing for dense UWSNs with high-speed mobile nodes using spherical divisions. 696-716 - Mahnaz Toloueiashtian, Homayun Motameni:
A new clustering approach in wireless sensor networks using fuzzy system. 717-737 - Yung-Ting Chuang, Chung-Yen Yu, Qian-Wei Wu:
DSLM: a decentralized search for large and mobile networks. 738-767 - Pawel Czarnul:
Parallelization of large vector similarity computations in a hybrid CPU+GPU environment. 768-786 - Jae-Sung Shim, Yong-Wan Ju, Seok-Cheon Park:
Design and implementation of a Pedestrian recognition algorithm using trilinear interpolation based on HOG-UDP. 787-800 - Noroddin Alaei, Faramarz Safi Esfahani:
RePro-Active: a reactive-proactive scheduling method based on simulation in cloud computing. 801-829 - Sarvenaz Hatamirad, Mir Mohsen Pedram:
Low-rank approximation of large-scale matrices via randomized methods. 830-844 - Teng Li, Jianfeng Ma, Cong Sun:
Dlog: diagnosing router events with syslogs for anomaly detection. 845-867 - Mónica Denham, Enrico Lamperti, Javier A. Areta:
Weather radar data processing on graphic cards. 868-885 - Junsu Kim, Myoung Ho Kim:
An efficient parallel processing method for skyline queries in MapReduce. 886-935 - Przemyslaw Stpiczynski:
Vectorized algorithm for multidimensional Monte Carlo integration on modern GPU, CPU and MIC architectures. 936-952 - Zeynab Mohseni, Midia Reshadi:
A deadlock-free routing algorithm for irregular 3D network-on-chips with wireless links. 953-969 - Ali M. Shatnawi, Mohammad Alsaedeen:
Reducing the second-level cache conflict misses using a set folding technique. 970-993
Volume 74, Number 3, March 2018
- James J. Park:
Fusion algorithms and high-performance applications for vehicular cloud computing. 995-1000 - Li Xu, Chi-Yao Weng, Lun-Pin Yuan, Mu-En Wu, Raylin Tso, Hung-Min Sun:
A shareable keyword search over encrypted data in cloud computing. 1001-1023 - Lewis Nkenyereye, Youngho Park, Kyung-Hyune Rhee:
Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing. 1024-1044 - Longbin Chen, Meikang Qiu, Jeungeun Song, Zenggang Xiong, Houcine Hassan:
E2FS: an elastic storage system for cloud computing. 1045-1060 - Fernando Román Muñoz, Luis Javier García-Villalba:
An algorithm to find relationships between web vulnerabilities. 1061-1089 - JongBeom Lim, Young-Sik Jeong, Doo-Soon Park, HwaMin Lee:
An efficient distributed mutual exclusion algorithm for intersection traffic control. 1090-1107 - Sai Ji, Chang Tan, Ping Yang, Yajie Sun, Desheng Fu, Jin Wang:
Compressive sampling and data fusion-based structural damage monitoring in wireless sensor network. 1108-1131 - You-Shyang Chen, Chienwen Wu, Heng-Hsing Chu, Chien-Ku Lin, Huan-Ming Chuang:
Analysis of performance measures in cloud-based ubiquitous SaaS CRM project systems. 1132-1156 - Ravikumar Ramadoss, N. M. Elango, Satheesh Abimannan, Ching-Hsien Hsu:
Non-intrusive transaction aware filtering during enterprise application modernization. 1157-1181 - Keon-Myung Lee, Kyung Mi Lee, Sang Ho Lee:
Remote data integrity check for remotely acquired and stored stream data. 1182-1201 - Fei Hao, Doo-Soon Park:
cSketch: a novel framework for capturing cliques from big graph. 1202-1214 - Hye-Young Kim:
A load balancing scheme with Loadbot in IoT networks. 1215-1226 - Seokhong Min, Young-Sik Jeong, Jungho Kang:
Cross-layer design and performance analysis for maximizing the network utilization of wireless mesh networks in cloud computing. 1227-1254 - Won-Hyuk Lee, Jong-Seon Park, Seung-Hae Kim, Jin-Hyung Park, Joon-Min Gil:
A method for enhancing end-to-end transfer efficiency via performance tuning factors on dedicated circuit networks with a public cloud platform. 1255-1266 - Chang Tan, Sai Ji, Ziyuan Gui, Jian Shen, Desheng Fu, Jin Wang:
An effective data fusion-based routing algorithm with time synchronization support for vehicular wireless sensor networks. 1267-1282 - Shin Hyoung Park, Jienki Synn, Oh Hoon Kwon, Yunsick Sung:
Apriori-based text mining method for the advancement of the transportation management plan in expressway work zones. 1283-1298
- Abbas Yazdinejad, Ali Bohlooli, Kamal Jamshidi:
Efficient design and hardware implementation of the OpenFlow v1.3 Switch on the Virtex-6 FPGA ML605. 1299-1320 - Hamidreza Khaleghzadeh, Hossein Deldari, Ravi Reddy, Alexey L. Lastovetsky:
Hierarchical multicore thread mapping via estimation of remote communication. 1321-1340 - Romain Dolbeau:
Theoretical peak FLOPS per instruction set: a tutorial. 1341-1377 - Manhyun Chung, Woo-Geun Ahn, Byung-gil Min, Jungtaek Seo, Jongsub Moon:
An analytical method for developing appropriate protection profiles of Instrumentation & Control System for nuclear power plants. 1378-1393 - Jihoon Kwon, Seog Chung Seo, Seokhie Hong:
An efficient implementation of pairing-based cryptography on MSP430 processor. 1394-1417
Volume 74, Number 4, April 2018
- Ami Marowka, Przemyslaw Stpiczynski:
Special section on parallel programming. 1419-1421 - Peter Thoman, Kiril Dichev, Thomas Heller, Roman Iakymchuk, Xavier Aguilar, Khalid Hasanov, Philipp Gschwandtner, Pierre Lemarinier, Stefano Markidis, Herbert Jordan, Thomas Fahringer, Kostas Katrinis, Erwin Laure, Dimitrios S. Nikolopoulos:
A taxonomy of task-based parallel programming technologies for high-performance computing. 1422-1434 - Jonas Posner, Claudia Fohry:
Hybrid work stealing of locality-flexible and cancelable tasks for the APGAS library. 1435-1448 - Ami Marowka:
Python accelerators for high-performance computing. 1449-1460 - Przemyslaw Stpiczynski:
Language-based vectorization and parallelization using intrinsics, OpenMP, TBB and Cilk Plus. 1461-1472 - Christopher Blöcker, Ulrich Hoffmann:
Pardis: a process calculus for parallel and distributed programming in Haskell. 1473-1484 - Pawel Batko, Marcin Kuta:
Actor model of Anemone functional language. 1485-1496 - Jaroslaw Bylina:
Parallelization of stochastic bounds for Markov chains on multicore and manycore platforms. 1497-1509 - Hiroki Tokura, Toru Fujita, Koji Nakano, Yasuaki Ito, Jacir Luiz Bordim:
Almost optimal column-wise prefix-sum computation on the GPU. 1510-1521 - Rene Halver, Wilhelm Homberg, Godehard Sutmann:
Function portability of molecular dynamics on heterogeneous parallel architectures with OpenCL. 1522-1533 - Lukasz Szustak:
Strategy for data-flow synchronizations in stencil parallel computations on multi-/manycore systems. 1534-1546
- Adnan Nasri, Mahmood Fathy, Ali Broumandnia:
An energy-efficient 3D-stacked STT-RAM cache architecture for cloud processors: the effect on emerging scale-out workloads. 1547-1561 - Ankita Sinha, Prasanta K. Jana:
A hybrid MapReduce-based k-means clustering using genetic algorithm for distributed datasets. 1562-1579 - Siham Tabik, Maurice Peemen, Luis F. Romero:
A tuning approach for iterative multiple 3d stencil pipeline on GPUs: Anisotropic Nonlinear Diffusion algorithm as case study. 1580-1608 - Ehsan Atoofian, Sean Rea:
Data-type specific cache compression in GPGPUs. 1609-1635 - Jung-hyun Seo, Jong-Seok Kim, Hyung Jae Chang, Hyeong-Ok Lee:
The hierarchical Petersen network: a new interconnection network with fixed degree. 1636-1654 - Jie Zhao, Rongcai Zhao:
K-DT: a formal system for the evaluation of linear data dependence testing techniques. 1655-1675 - Ricardo Quislant, Eladio Gutiérrez, Emilio L. Zapata, Oscar G. Plata:
Privatizing transactions for Lee's algorithm in commercial hardware transactional memory. 1676-1694 - An Braeken, Pardeep Kumar, Madhusanka Liyanage, Ta Thi Kim Hue:
An efficient anonymous authentication protocol in multiple server communication networks (EAAM). 1695-1714 - Ehsan Mousavi Khaneghah, Nosratollah Shadnoush, Amir Hossein Ghobakhlou:
A mathematical model to calculate real cost/performance in software distributed shared memory on computing environments. 1715-1764 - Gregorio Bernabé, Raúl Hernández, Manuel E. Acacio:
Parallel implementations of the 3D fast wavelet transform on a Raspberry Pi 2 cluster. 1765-1778 - Wei Zhang, Shiwei Zhu, Jian Tang, Naixue Xiong:
A novel trust management scheme based on Dempster-Shafer evidence theory for malicious nodes detection in wireless sensor networks. 1779-1801
Volume 74, Number 5, May 2018
- José M. Cecilia, José-Matías Cutillas-Lozano, Domingo Giménez, Baldomero Imbernón:
Exploiting multilevel parallelism on a many-core system for the application of hyperheuristics to a molecular docking problem. 1803-1814 - ThienLuan Ho, Seungrohk Oh, Hyunjin Kim:
New algorithms for fixed-length approximate string matching and approximate circular string matching under the Hamming distance. 1815-1834 - ThienLuan Ho, Seungrohk Oh, Hyunjin Kim:
Correction to: New algorithms for fixed-length approximate string matching and approximate circular string matching under the Hamming distance. 1835 - Juan Mompean, Juan L. Aragón, Pedro Prieto, Pablo Artal:
Design of an accurate and high-speed binocular pupil tracking system based on GPGPUs. 1836-1862 - Jan Fousek:
Efficient sparse matrix-delayed vector multiplication for discretized neural field model. 1863-1884 - Minki Kim, Haengrae Cho:
Popularity-based covering sets for energy proportionality in shared-nothing clusters. 1885-1910 - Martti Forsell, Jussi Roivainen, Ville Leppänen:
REPLICA MBTAC: multithreaded dual-mode processor. 1911-1933 - Nasour Bagheri, Masoumeh Safkhani, Mojtaba Eslamnezhad Namin, Samad Rostampour:
An improved low-cost yoking proof protocol based on Kazahaya's flaws. 1934-1948 - Ali Kadhum Idrees, Karine Deschinkel, Michel Salomon, Raphaël Couturier:
Multiround Distributed Lifetime Coverage Optimization protocol in wireless sensor networks. 1949-1972 - Olufunke R. Vincent, Olarewaju Mubashiru Lawal:
A key agreement authentication protocol using an improved parallel Pollard rho for electronic payment system. 1973-1993 - Saeed Rasouli Heikalabad, Mazaher Naji Asfestani, Mehdi Hosseinzadeh:
A full adder structure without cross-wiring in quantum-dot cellular automata with energy dissipation analysis. 1994-2005 - Veronica Gil-Costa, Mauricio Marín, Carolina Bonacic, Roberto Solar:
A graph-based cache for large-scale similarity search engines. 2006-2034 - Ravneet Kaur, Inderveer Chana, Jhilik Bhattacharya:
Data deduplication techniques for efficient cloud storage management: a systematic review. 2035-2085 - Ha Nguyen Tran, Erik Cambria:
A survey of graph processing on graphics processing units. 2086-2115 - Shahin Vakilinia, Mohamed Cheriet:
Preemptive cloud resource allocation modeling of processing jobs. 2116-2150 - Amir Hossein Akhavan Rahnama, Mehdi Toloo, Nezer Jacob Zaidenberg:
An LP-based hyperparameter optimization model for language modeling. 2151-2160 - Michele Scarpiniti, Enzo Baccarelli, Paola Gabriela Vinueza Naranjo, Aurelio Uncini:
Energy performance of heuristics and meta-heuristics for real-time joint resource scaling and consolidation in virtualized networked data centers. 2161-2198 - P. S. Tamizharasan, N. Ramasubramanian:
Analysis of large deviations behavior of multi-GPU memory access in deep learning. 2199-2212 - Athena Abdi, Hamid R. Zarandi:
HYSTERY: a hybrid scheduling and mapping approach to optimize temperature, energy consumption and lifetime reliability of heterogeneous multiprocessor systems. 2213-2238 - Sung-Hoon Park, Su-Chang Yoo, Bokyoung Kim:
An election protocol based on group membership detection algorithm in mobile ad hoc distributed systems. 2239-2253 - Jihoon Kwon, Seog Chung Seo, Seokhie Hong:
Correction to: An efficient implementation of pairing-based cryptography on MSP430 processor. 2254
Volume 74, Number 6, June 2018
- Semra Aydin, Refik Samet, Ömer Faruk Bay:
Real-time parallel image processing applications on multicore CPUs with OpenMP and GPGPU with CUDA. 2255-2275 - Iain A. Stewart, Alejandro Erickson:
The influence of datacenter usage on symmetry in datacenter network design. 2276-2313 - Nuno Neves, Pedro Tomás, Nuno Roma:
Stream data prefetcher for the GPU memory interface. 2314-2328 - Peyman Neamatollahi, Mahmoud Naghibzadeh:
Distributed unequal clustering algorithm in large-scale wireless sensor networks using fuzzy logic. 2329-2352 - Sina Mahmoodi Khorandi, Mohsen Sharifi:
Non-clairvoyant online scheduling of synchronized jobs on virtual clusters. 2353-2384 - Narges Arastouie, Masoud Sabaei:
Self-adaptive risk-aware routing in opportunistic network. 2385-2411 - Anwesha Mukherjee, Priti Deb, Debashis De, Rajkumar Buyya:
C2OF2N: a low power cooperative code offloading method for femtolet-based fog network. 2412-2448 - Yoshimichi Andoh, Soichiro Suzuki, Satoshi Ohshima, Tatsuya Sakashita, Masao Ogino, Takahiro Katagiri, Noriyuki Yoshii, Susumu Okazaki:
A thread-level parallelization of pairwise additive potential and force calculations suitable for current many-core architectures. 2449-2469 - Paola Gabriela Vinueza Naranjo, Enzo Baccarelli, Michele Scarpiniti:
Design and energy-efficient resource management of virtualized networked Fog architectures for the real-time support of IoT applications. 2470-2507 - Jun Wang, Dezhi Han, Ruijun Wang:
A new rule-based power-aware job scheduler for supercomputers. 2508-2527 - Hosein Bagherlou, Ali Ghaffari:
A routing protocol for vehicular ad hoc networks using simulated annealing algorithm and neural networks. 2528-2552 - Xianfu Meng:
speedTrust: a super peer-guaranteed trust model in hybrid P2P networks. 2553-2580 - Shadi Torabi, Faramarz Safi Esfahani:
A dynamic task scheduling framework based on chicken swarm and improved raven roosting optimization methods in cloud computing. 2581-2626 - Helena Caminal, Diego Caballero, Juan M. Cebrian, Roger Ferrer, Marc Casas, Miquel Moretó, Xavier Martorell, Mateo Valero:
Performance and energy effects on task-based parallelized applications - User-directed versus manual vectorization. 2627-2637 - Hon-Chan Chen:
The panpositionable panconnectedness of crossed cubes. 2638-2655 - Jaagup Viil, Satish Narayana Srirama:
Framework for automated partitioning and execution of scientific workflows in the cloud. 2656-2683 - Peng Luo, Deqing Zou, Hai Jin, Yajuan Du, Long Zheng, Jinan Shen:
DigHR: precise dynamic detection of hidden races with weak causal relation analysis. 2684-2704 - Abdullah Al Hasib, Juan M. Cebrian, Lasse Natvig:
A vectorized k-means algorithm for compressed datasets: design and experimental analysis. 2705-2728 - Hong-Bin Tsai, Chin-Laung Lei:
Time-shift replacement algorithm for main memory performance optimization. 2729-2746 - Fumiya Kono, Naohito Nakasato, Kensaku Hayashi, Alexander Vazhenin, Stanislav Sedukhin:
Evaluations of OpenCL-written tsunami simulation on FPGA and comparison with GPU implementation. 2747-2775 - Wanfeng Dou, Yanan Li:
A fault-tolerant computing method for Xdraw parallel algorithm. 2776-2800 - Somayeh Abdi, Latif Pourkarimi, Mahmood Ahmadi, Farzad Zargari:
Cost minimization for bag-of-tasks workflows in a federation of clouds. 2801-2822 - Edoardo Coronado-Barrientos, Guillermo Indalecio Fernández, Antonio J. García-Loureiro:
Improving performance of iterative solvers with the AXC format using the Intel Xeon Phi. 2823-2840 - Kayo Gonçalves-e-Silva, Daniel Aloise, Samuel Xavier de Souza:
Parallel synchronous and asynchronous coupled simulated annealing. 2841-2869 - Sangmin Lee, Soon J. Hyun, Hong-Yeon Kim, Young-Kyun Kim:
APS: adaptable prefetching scheme to different running environments for concurrent read streams in distributed file systems. 2870-2902 - Tuan Anh Nguyen, Dugki Min, Eunmi Choi:
Correction to: A comprehensive evaluation of availability and operational cost for a virtualized server system using stochastic reward nets. 2903
Volume 74, Number 7, July 2018
- Nan Su, Huaxi Gu, Kun Wang, Xiaoshan Yu, Bowen Zhang:
A highly efficient dynamic router for application-oriented network on chip. 2905-2915 - Yonghui Li, Kun Wang, Huaxi Gu, Yintang Yang, Nan Su, Yawen Chen, Haibo Zhang:
A joint optimization method for NoC topology generation. 2916-2934 - Xilong Qu, Peng Xiao, Lirong Huang:
Improving the energy efficiency and performance of data-intensive workflows in virtualized clouds. 2935-2955 - Carlos Guerrero, Isaac Lera, Carlos Juiz:
Resource optimization of container orchestration: a case study in multi-cloud microservices-based applications. 2956-2983 - Montassar Riahi, Saoussen Krichen:
A multi-objective decision support framework for virtual machine placement in cloud data centers: a real case study. 2984-3015 - Heyang Xu, Yang Liu, Wei Wei, Wenqiang Zhang:
Incentive-aware virtual machine scheduling in cloud computing. 3016-3038 - Ashish Kumar Maurya, Anil Kumar Tripathi:
On benchmarking task scheduling algorithms for heterogeneous computing systems. 3039-3070 - Jerzy Proficz:
Improving all-reduce collective operations for imbalanced process arrival patterns. 3071-3092 - Akihiro Musa, Osamu Watanabe, Hiroshi Matsuoka, Hiroaki Hokari, Takuya Inoue, Yoichi Murashima, Yusaku Ohta, Ryota Hino, Shunichi Koshimura, Hiroaki Kobayashi:
Real-time tsunami inundation forecast system for tsunami disaster prevention and mitigation. 3093-3113 - Jingxian Wang, Yongmei Sun, Yuefeng Ji:
Priority-based capacity and power allocation in co-located WBANs using Stackelberg and bargaining games. 3114-3147 - S. Anandhi, Anitha Ramalingam, Venkatasamy Sureshkumar:
An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment. 3148-3167 - Li Yu, Zhou Zhou, Yuping Fan, Michael E. Papka, Zhiling Lan:
System-wide trade-off modeling of performance, power, and resilience on petascale systems. 3168-3192 - Narjes Hasanikhah, Siavash Amin-Nejad, Ghafar Darvish, M. R. Moniri:
Efficient implementation of space-time adaptive processing for adaptive weights calculation based on floating point FPGAs. 3193-3210 - Edward Richter, Spencer Valancius, Josiah McClanahan, John Mixter, Ali Akoglu:
Balancing the learning ability and memory demand of a perceptron-based dynamically trainable neural network. 3211-3235 - Ekasit Kijsipongse, Apivadee Piyatumrong, Suriya U.-ruekolan:
A hybrid GPU cluster and volunteer computing platform for scalable deep learning. 3236-3263 - Rafael Sanchez-Lara, Joel Antonio Trejo-Sánchez, José Luis López-Martínez, José A. Álvarez-Chávez:
Simulation of an inelastic dispersive phenomenon: stimulated Brillouin scattering in a single-mode fiber segment through parallelism. 3264-3277 - Takafumi Miyata:
A heuristic search algorithm based on subspaces for PageRank computation. 3278-3294 - Omar Said, Amr Tolba:
Design and performance evaluation of mixed multicast architecture for internet of things environment. 3295-3328 - Naghmeh Dezhabad, Saeed Sharifian:
Learning-based dynamic scalable load-balanced firewall as a service in network function-virtualized cloud computing environments. 3329-3358 - Wiem Abderrahim, Zièd Choukair:
Brokerage-based dependability integration in cloud computing services. 3359-3387 - Lan Gao, Rui Wang, Yunlong Xu, Hailong Yang, Zhongzhi Luan, Depei Qian, Han Zhang, Jihong Cai:
SRAM- and STT-RAM-based hybrid, shared last-level cache for on-chip CPU-GPU heterogeneous architectures. 3388-3414 - Elaheh Gavagsaz, Ali Rezaee, Hamid Haj Seyyed Javadi:
Load balancing in reducers for skewed data in MapReduce systems by using scalable simple random sampling. 3415-3440 - Bin Lao, Ge Nong, Wai Hong Chan, Yi Pan:
Fast induced sorting suffixes on a multicore machine. 3468-3485 - Wenbing Zhao, Mary Qu Yang:
Correction to: Dependability enhancing mechanisms for integrated clinical environments. 3486-3487
Volume 74, Number 8, August 2018
- TaeJin Lee, Bomin Choi, Youngsang Shin, Jin Kwak:
Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient. 3489-3503 - Shehzad Ashraf Chaudhry, Husnain Naqvi, Mohammad Sabzinejad Farash, Taeshik Shon, Muhammad Sher:
An improved and robust biometrics-based three factor authentication scheme for multiserver environments. 3504-3520 - Jongseok Choi, Youngjin In, Changjun Park, Seonhee Seok, Hwajeong Seo, Howon Kim:
Secure IoT framework and 2D architecture for End-To-End security. 3521-3535 - Jongseok Choi, Youngjin In, Changjun Park, Seonhee Seok, Hwajeong Seo, Howon Kim:
Erratum to: Secure IoT framework and 2D architecture for End-To-End security. 3536 - Kwanghoon Choi, Sung-Hwa Lim, Jai-Hoon Kim:
Cost-effective monitoring algorithm for cyber-physical system platform using combined spatio-temporal model. 3537-3548 - Tae-Yoon Kim, Eui-Jik Kim:
Uplink scheduling of MU-MIMO gateway for massive data acquisition in Internet of things. 3549-3563 - Yongsung Kim, Eenjun Hwang, Seungmin Rho:
Twitter news-in-education platform for social, collaborative, and flipped learning. 3564-3582 - Dongwoo Kim, Sangwho Kim, Jaecheol Ryou:
Design and implementation of user-level dynamic binary instrumentation on ARM architecture. 3583-3595 - Mohammad Salehan, Dan J. Kim, Chulmo Koo:
A study of the effect of social trust, trust in social networking services, and sharing attitude, on two dimensions of personal information sharing behavior. 3596-3619 - Taek-Young Youn, Nam-Su Jho, Ku-Young Chang:
Design of additive homomorphic encryption with multiple message spaces for secure and practical storage services over encrypted data. 3620-3638 - Younggeun Choi, Kyounghwan Yoo, Shin-Jin Kang, Beomjoo Seo, Soo Kyun Kim:
Development of a low-cost wearable sensing glove with multiple inertial sensors and a light and fast orientation estimation algorithm. 3639-3652 - Younggeun Choi, Kyounghwan Yoo, Shin-Jin Kang, Beomjoo Seo, Soo Kyun Kim:
Erratum to: Development of a low-cost wearable sensing glove with multiple inertial sensors and a light and fast orientation estimation algorithm. 3653 - Mucheol Kim, Sangyong Han:
Cognitive social network analysis for supporting the reliable decision-making process. 3654-3665 - Maziar Loghman, Joohee Kim, Kyuwon Choi:
Fast depth estimation using semi-global matching and adaptive stripe-based optimization. 3666-3684 - Imran Khan, Shehzad Ashraf Chaudhry, Muhammad Sher, Muhammad Khurram Khan:
An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data. 3685-3703 - Wooyeon Jo, Hyun Soo Chang, Taeshik Shon:
Digital forensic science approach by file recovery research. 3704-3725 - Ruilian Xie, Jueping Cai, Xin Xin, Bo Yang:
LBFT: a fault-tolerant routing algorithm for load-balancing network-on-chip based on odd-even turn model. 3726-3747 - Cheng-Ta Huang, Cheng-Hsing Yang, Wei-Jen Wang, Shiau-Rung Tsui, Shiuh-Jeng Wang:
Raw reversibility of information hiding on the basis of VQ systems. 3748-3777 - Jihoon Moon, Jinwoong Park, Eenjun Hwang, Sanghoon Jun:
Forecasting power consumption for higher educational institutions based on machine learning. 3778-3800 - Kok-Seng Wong, Myung Ho Kim:
Toward a fair indictment for sealed-bid auction with self-enforcing privacy. 3801-3819 - Mohsen Raji, Behnam Ghavami:
Redressing fork constraints in nanoscale quasi-delay-insensitive asynchronous pipelines. 3820-3840 - Dongwann Kang, Sanghyun Seo:
Photo collage-based photograph display system on mobile computing platform. 3841-3854 - Je-Ho Park, Young Bom Park, Soo-Kyung Choi:
Representation and automatic generation of state-transition mapping tree. 3855-3874 - Danqi Hu, Fang Lv, Chenxi Wang, Huimin Cui, Lei Wang, Ying Liu, Xiaobing Feng:
NVM Streaker: a fast and reconfigurable performance simulator for non-volatile memory-based memory architecture. 3875-3903
- Sangmin Lee, Soon J. Hyun, Hong-Yeon Kim, Young-Kyun Kim:
Fair bandwidth allocating and strip-aware prefetching for concurrent read streams and striped RAIDs in distributed file systems. 3904-3932 - John Fedoruk, Byron Schmuland, Julia Ann Johnson, Giseon Heo:
Dimensionality reduction via the Johnson-Lindenstrauss Lemma: theoretical and empirical bounds on embedding dimension. 3933-3949 - Leila Shooshtarian, Farshad Safaei Semnani, Ali Tizghadam:
Scaling-up versus scaling-out networking in data centers: a comparative robustness analysis. 3950-3974 - Mohammed Baydoun, Hassan Ghaziri, Mohammed Al-Husseini:
CPU and GPU parallelized kernel K-means. 3975-3998 - Yuzhu Wang, Jinrong Jiang, Junqiang Zhang, Juanxiong He, He Zhang, Xuebin Chi, Tianxiang Yue:
An efficient parallel algorithm for the coupling of global climate models and regional climate models on a large-scale multi-core cluster. 3999-4018 - César Gómez-Martín, Miguel A. Vega-Rodríguez:
Optimization of resources in parallel systems using a multiobjective artificial bee colony algorithm. 4019-4036 - Long Chen, Jigang Wu, Gangqiang Zhou, Longjie Ma:
QUICK: QoS-guaranteed efficient cloudlet placement in wireless metropolitan area networks. 4037-4059 - Thiago Felipe da Silva Pinheiro, Francisco Airton Silva, Iure Fe, Sokol Kosta, Paulo Romero Martins Maciel:
Performance prediction for supporting mobile applications' offloading. 4060-4103 - V. M. Krushnarao Kotteda, Vinod Kumar, William F. Spotz:
Performance of preconditioned iterative solvers in MFiX-Trilinos for fluidized beds. 4104-4126 - Borja Bordel, Ramón Alcarria, Diego Sánchez de Rivera, Tomás Robles:
Process execution in Cyber-Physical Systems using cloud and Cyber-Physical Internet services. 4127-4169
Volume 74, Number 9, September 2018
- Jaeik Cho, Naveen K. Chilamkurti, S. J. Wang:
Editorial of special section on enabling technologies for industrial and smart sensor internet of things systems. 4171-4172 - Megha Agrawal, Tarun Kumar Bansal, Donghoon Chang, Amit Kumar Chauhan, Seokhie Hong, Jinkeon Kang, Somitra Kumar Sanadhya:
RCB: leakage-resilient authenticated encryption via re-keying. 4173-4198 - Rajkumar Tekchandani, Rajesh Kumar Bhatia, Maninder Singh:
Semantic code clone detection for Internet of Things applications using reaching definition and liveness analysis. 4199-4226 - Jordi Mongay Batalla, Konrad Sienkiewicz, Waldemar Latoszek, Piotr Krawiec, Constandinos X. Mavromoustakis, George Mastorakis:
Validation of virtualization platforms for I-IoT purposes. 4227-4241 - Jihyun Kim, Yonghun Jeon, Howon Kim:
The intelligent IoT common service platform architecture and service implementation. 4242-4260 - Sung Ryoung Kim, Jeong-Nyeo Kim, Sung Tae Kim, Sunwoo Shin, Jeong Hyun Yi:
Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications. 4261-4280 - Amjad Ali Alamr, Firdous Kausar, Jongsung Kim, Changho Seo:
A secure ECC-based RFID mutual authentication protocol for internet of things. 4281-4294 - Cheng-Ta Huang, Min-Yi Tsai, Li-Chiun Lin, Wei-Jen Wang, Shiuh-Jeng Wang:
VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements. 4295-4314 - Ming-Fong Tsai, Ye Chin Kiong, Ang Sinn:
Smart service relying on Internet of Things technology in parking systems. 4315-4338 - Shiyong Wang, Jiafu Wan, Muhammad Imran, Di Li, Chunhua Zhang:
Cloud-based smart manufacturing for personalized candy packing application. 4339-4357 - Wei-Chang Yeh, Jsen-Shung Lin:
New parallel swarm algorithm for smart sensor systems redundancy allocation problems in the Internet of Things. 4358-4384 - Hwi-Ho Lee, Jung-Hyok Kwon, Eui-Jik Kim:
FS-IIoTSim: a flexible and scalable simulation framework for performance evaluation of industrial Internet of things systems. 4385-4402 - Jaehak Yu, Namkyung Lee, Cheol Sig Pyo, Yang Sun Lee:
WISE: web of object architecture on IoT environment for smart home and building energy management. 4403-4418 - Sohail Jabbar, Murad Khan, Bhagya Nathali Silva, Kijun Han:
A REST-based industrial web of things' framework for smart warehousing. 4419-4433 - SungJin Kim, Taeshik Shon:
Field classification-based novel fuzzing case generation for ICS protocols. 4434-4450 - Ching-Han Chen, Ming-Yi Lin, Xing-Chen Guo:
High-performance fieldbus application-specific integrated circuit design for industrial smart sensor networks. 4451-4469 - Jia-Yang Lin, Yi-Ting Hsieh, Trong Nghia Le, Wen-Long Chin:
AnyNoC: new network on a chip switching using the shared-memory and output-queue techniques for complex Internet of things systems. 4470-4480 - Hangbae Chang:
Performance evaluation framework design for smart sensor business. 4481-4496 - Chang Jin Koo, JeongYeon Kim:
Enforcing high-level security policies for Internet of Things. 4497-4505 - Seokcheol Lee, Seokjun Lee, Hyunguk Yoo, SungMoon Kwon, Taeshik Shon:
Design and implementation of cybersecurity testbed for industrial IoT systems. 4506-4520 - Tzu-Wei Lin, Chien-Lung Hsu:
Anonymous group key agreement protocol for multi-server and mobile environments based on Chebyshev chaotic maps. 4521-4541 - Farhan Aadil, Waleed Ahsan, Zahoor-Ur Rehman, Peer Azmat Shah, Seungmin Rho, Irfan Mehmood:
Clustering algorithm for internet of vehicles (IoV) based on dragonfly optimizer (CAVDO). 4542-4567 - Anum Kalsoom, Muazzam Maqsood, Mustansar Ali Ghazanfar, Farhan Aadil, Seungmin Rho:
A dimensionality reduction-based efficient software fault prediction using Fisher linear discriminant analysis (FLDA). 4568-4602 - Keonsoo Lee, Yang Sun Lee, Yunyoung Nam:
A model of FSM-based planner and dialogue supporting system for emergency call services. 4603-4612 - Kishore Sanapala, Ramachandran Sakthivel, Sang-Soo Yeo:
Schmitt trigger-based single-ended 7T SRAM cell for Internet of Things (IoT) applications. 4613-4622
- Kamran, Babar Nazir:
QoS-aware VM placement and migration for hybrid cloud infrastructure. 4623-4646 - Somayeh Khoroush, Midia Reshadi, Ahmad Khademzadeh:
Application mapping in hybrid photonic networks-on-chip for reducing insertion loss. 4647-4671 - Michael Conrad Meyer, Yuichi Okuyama, Abderazek Ben Abdallah:
SAFT-PHENIC: a thermal-aware microring fault-resilient photonic NoC. 4672-4695 - Seyed-Sajad Ahmadpour, Mohammad Mosleh:
A novel fault-tolerant multiplexer in quantum-dot cellular automata technology. 4696-4716 - Somayeh Mohammadi, Hossein Pedram, Latif Pourkarimi:
Integer linear programming-based cost optimization for scheduling scientific workflows in multi-cloud environments. 4717-4745 - Sung Min Lee, Su-Kyung Yoon, Jeong-Geun Kim, Shin-Dug Kim:
Adaptive correlated prefetch with large-scale hybrid memory system for stream processing. 4746-4770 - Azeem Irshad, Husnain Naqvi, Shehzad Ashraf Chaudhry, Shouket Raheem, Saru Kumari, Ambrina Kanwal, Muhammad Usman:
An efficient and secure design of multi-server authenticated key agreement protocol. 4771-4797 - Lei Wang, Guangjun Xie:
Novel designs of full adder in quantum-dot cellular automata technology. 4798-4816 - Matheus Torquato, I. M. Umesh, Paulo R. M. Maciel:
Models for availability and power consumption evaluation of a private cloud with VMM rejuvenation enabled by VM Live Migration. 4817-4841 - Suleyman Tosun, Vahid Babaei Ajabshir:
Energy-aware partitioning of fault-tolerant irregular topologies for 3D network-on-chips. 4842-4863
Volume 74, Number 10, October 2018
- Junaid Chaudhry, Al-Sakib Khan Pathan, Mubashir Husain Rehmani, Ali Kashif Bashir:
Threats to critical infrastructure from AI and human intelligence. 4865-4866 - Muhammad Shafiq, Xiangzhan Yu, Ali Kashif Bashir, Hassan Nazeer Chaudhry, Dawei Wang:
A machine learning approach for feature selection traffic classification using security analysis. 4867-4892 - Wencheng Yang, Song Wang, Guanglou Zheng, Junaid Ahsenali Chaudhry, Craig Valli:
ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures. 4893-4909 - Mohammad Hassan Mojtahed Soleimani, Muharram Mansoorizadeh, Mohammad Nassiri:
Real-time identification of three Tor pluggable transports using machine learning techniques. 4910-4927 - Hichem Sedjelmaci, Sidi-Mohammed Senouci:
Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution. 4928-4944 - Emmanuel Boateng Sifah, Qi Xia, Kwame Opuni-Boachie Obour Agyekum, Sandro Amofa, Jianbin Gao, Ruidong Chen, Hu Xia, James C. Gee, Xiaojiang Du, Mohsen Guizani:
Chain-based big data access control infrastructure. 4945-4964 - Abdullah Yasin Nur, Mehmet Engin Tozal:
Identifying critical autonomous systems in the Internet. 4965-4985 - Ibrahim Ghafir, Jibran Saleem, Mohammad Hammoudeh, Hanan Faour, Vaclav Prenosil, Sardar F. Jaf, Sohail Jabbar, Thar Baker:
Security threats to critical infrastructure: the human factor. 4986-5002 - Mubashar Hussain, Mansoor Ahmed, Hasan Ali Khattak, Muhammad Imran, Abid Khan, Sadia Din, Awais Ahmad, Gwanggil Jeon, Goutham Reddy Alavalapati:
Towards ontology-based multilingual URL filtering: a big data problem. 5003-5021 - Saqib Ubaid, Muhammad Farrukh Shafeeq, Majid Hussain, Ali Hammad Akbar, Abdelrahman Abuarqoub, M. Sultan Zia, Beenish Abbas:
SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks. 5022-5040 - Mohiuddin Ahmed, Abu S. S. M. Barkat Ullah:
Infrequent pattern mining in smart healthcare environment using data summarization. 5041-5059 - Rashid Masood Khan, Mian Muhammad Waseem Iqbal, Muhammad Faisal Amjad, Haider Abbas, Hammad Afzal, Abdul Rauf, Maruf Pasha:
Forensic investigation to detect forgeries in ASF files of contemporary IP cameras. 5060-5081 - Muhammad Ayzed Mirza, Mudassar Ahmad, Muhammad Asif Habib, Nasir Mahmood, Chaudhry Muhammad Nadeem Faisal, Usman Ahmad:
CDCSS: cluster-based distributed cooperative spectrum sensing model against primary user emulation (PUE) cyber attacks. 5082-5098 - Olumide Malomo, Danda B. Rawat, Moses Garuba:
Next-generation cybersecurity through a blockchain-enabled federated cloud framework. 5099-5126 - Adeel Anjum, Naveed Ahmad, Saif Ur Rehman Malik, Samiya Zubair, Basit Shahzad:
An efficient approach for publishing microdata for multiple sensitive attributes. 5127-5155 - Amjad Mehmood, Mithun Mukherjee, Syed Hassan Ahmed, Houbing Song, Khalid Mahmood Malik:
NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks. 5156-5170 - Ahmed Ibrahim, Craig Valli, Ian McAteer, Junaid Ahsenali Chaudhry:
A security review of local government using NIST CSF: a case study. 5171-5186 - Fadi Al-Turjman, Sinem Alturjman:
Confidential smart-sensing framework in the IoT era. 5187-5198 - Mohamed Hawedi, Chamseddine Talhi, Hanifa Boucheneb:
Multi-tenant intrusion detection system for public cloud (MTIDS). 5199-5230
- Se Dong Min, Chang-Won Wang, Hwa-Min Lee, Bong-Keun Jung:
A low cost wearable wireless sensing system for paretic hand management after stroke. 5231-5240 - Aisha Siddiqa, Ahmad Karim, Victor Chang:
Modeling SmallClient indexing framework for big data analytics. 5241-5262 - Chunlin Li, Jianhang Tang, Youlong Luo:
Multi-queue scheduling of heterogeneous jobs in hybrid geo-distributed cloud environment. 5263-5292 - Su-Kyung Yoon, Young-Sun Youn, Jeong-Geun Kim, Shin-Dug Kim:
Design of DRAM-NAND flash hybrid main memory and Q-learning-based prefetching method. 5293-5313 - Marzieh Malekimajd, Danilo Ardagna, Michele Ciavotta, Eugenio Gianniti, Mauro Passacantando, Alessandro Maria Rizzi:
An optimization framework for the capacity allocation and admission control of MapReduce jobs in cloud systems. 5314-5348 - Najme Mansouri, Mohammad Masoud Javidi:
A hybrid data replication strategy with fuzzy-based deletion for heterogeneous cloud data centers. 5349-5372 - Mahdi Bounouni, Louiza Bouallouche-Medjkoune:
Acknowledgment-based punishment and stimulation scheme for mobile ad hoc network. 5373-5398 - Yasir Noman Khalid, Muhammad Aleem, Radu Prodan, Muhammad Azhar Iqbal, Muhammad Arshad Islam:
E-OSched: a load balancing scheduler for heterogeneous multicores. 5399-5431 - Yousef Seyfari, Shahriar Lotfi, Jaber Karimpour:
Optimizing inter-nest data locality in imperfect stencils based on loop blocking. 5432-5460 - Ali Mostafaeipour, Alireza Goli, Mojtaba Qolipour:
Prediction of air travel demand using a hybrid artificial neural network (ANN) with Bat and Firefly algorithms: a case study. 5461-5484 - Mina Emami Khansari, Saeed Sharifian, Seyed Ahmad Motamedi:
Virtual sensor as a service: a new multicriteria QoS-aware cloud service composition for IoT applications. 5485-5512 - Anwar Alyatama, Asmaa Alsumait, Maryam Alotaibi:
Continuous memory allocation model for cloud services. 5513-5538 - Bui Thi Thuan, Lam Boi Ngoc, Keiichi Kaneko:
A stochastic link-fault-tolerant routing algorithm in folded hypercubes. 5539-5557 - Se-Hang Cheong, Yain-Whar Si:
CWBound: boundary node detection algorithm for complex non-convex mobile ad hoc networks. 5558-5577 - Monire Safari, Reihaneh Khorsand:
PL-DVFS: combining Power-aware List-based scheduling algorithm with DVFS technique for real-time tasks in Cloud Computing. 5578-5600 - Chaobo He, Xiang Fei, Hanchao Li, Yong Tang, Hai Liu, Shuangyin Liu:
Improving NMF-based community discovery using distributed robust nonnegative matrix factorization with SimRank similarity measure. 5601-5624
Volume 74, Number 11, November 2018
- José Daniel García, Kevin Hammond, Lutz Schubert:
Reengineering for parallelism in heterogeneous parallel platforms. 5625-5627 - Adrián Castelló, Antonio J. Peña, Rafael Mayo, Judit Planas, Enrique S. Quintana-Ortí, Pavan Balaji:
Exploring the interoperability of remote GPGPU virtualization using rCUDA and directive-based programming models. 5628-5642 - Lu Li, Christoph W. Kessler:
MeterPU: a generic measurement abstraction API - Enabling energy-tuned skeleton backend selection. 5643-5658 - Marco Danelutto, Tiziano De Matteis, Gabriele Mencagli, Massimo Torquati:
Data stream processing via code annotations. 5659-5673 - David del Rio Astorga, Rafael Sotomayor, Luis Miguel Sánchez, Francisco Javier García Blas, Alejandro Calderón, Javier Fernández:
Assessing and discovering parallelism in C++ code for heterogeneous platforms. 5674-5689 - Marco Aldinucci, Marco Danelutto, Maurizio Drocco, Peter Kilpatrick, Claudia Misale, Guilherme Peretti Pezzi, Massimo Torquati:
A parallel pattern for iterative stencil + reduce. 5690-5705
- Byung-Seok Kang, Hyunseung Choo:
An SDN-enhanced load-balancing technique in the cloud system. 5706-5729 - Dinh-Mao Bui, Thien Huynh-The, Sungyoung Lee:
Early fault detection in IaaS cloud computing based on fuzzy logic and prediction technique. 5730-5745 - Toqeer Ali Syed, Roslan Ismail, Shahrulniza Musa, Mohammad Nauman, Sohail Khan:
Design and implementation of an attestation protocol for measured dynamic behavior. 5746-5773 - Syed Rizvi, Jungwoo Ryoo, John Kissell, William Aiken, Yuhong Liu:
A security evaluation framework for cloud security auditing. 5774-5796
- Yuanlong Yu, Zhifan Ye, Xianghan Zheng, Chunming Rong:
An efficient cascaded method for network intrusion detection based on extreme learning machines. 5797-5812 - Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das, Vanga Odelu:
Attribute-based authentication on the cloud for thin clients. 5813-5845 - Gangyi Luo, Zhuzhong Qian, Mianxiong Dong, Kaoru Ota, Sanglu Lu:
Improving performance by network-aware virtual machine clustering and consolidation. 5846-5864
- Tae-Geon Song, Mehdi Pirahandeh, Cheong-Jin Ahn, Deok-Hwan Kim:
GPU-accelerated high-performance encoding and decoding of hierarchical RAID in virtual machines. 5865-5888 - Chun-Hsiung Tseng, Yung-Hui Chen:
A camera-based attention level assessment tool designed for classroom usage. 5889-5902 - Hao Jin, Ke Zhou, Yan Luo:
A framework with data-centric accountability and auditability for cloud storage. 5903-5926 - Jiaqing Mo, Zhongwang Hu, Yuhua Lin:
Remote user authentication and key agreement for mobile client-server environments on elliptic curve cryptography. 5927-5943 - Kiamars Shojaei, Faramarz Safi Esfahani, Saeed Ayat:
VMDFS: virtual machine dynamic frequency scaling framework in cloud computing. 5944-5979 - Ashish Kumar Mishra, Brajesh Kumar Umrao, Dharmendra Kumar Yadav:
A survey on optimal utilization of preemptible VM instances in cloud computing. 5980-6032 - Shaifu Gupta, Aroor Dinesh Dileep, Timothy A. Gonsalves:
A joint feature selection framework for multivariate resource usage prediction in cloud servers using stability and prediction performance. 6033-6068 - Samarjit Roy, Dhiman Sarkar, Sourav Hati, Debashis De:
Internet of Music Things: an edge computing paradigm for opportunistic crowdsensing. 6069-6101 - Maryam Rezaei-Ravari, Vahid Sattari Naeini:
Reliable congestion-aware path prediction mechanism in 2D NoCs based on EFuNN. 6102-6125 - Yang Hui:
A virtual machine anomaly detection system for cloud computing infrastructure. 6126-6134 - Feng Zhang, Heng Lin, Jidong Zhai, Jie Cheng, Dingyi Xiang, Jizhong Li, Yunpeng Chai, Xiaoyong Du:
An adaptive breadth-first search algorithm on integrated architectures. 6135-6155 - Libing Wu, Jing Wang, Sherali Zeadally, Debiao He:
Privacy-preserving auditing scheme for shared data in public clouds. 6156-6183 - Mohammad Reza Khosravi, Hamid Basri, Habib Rostami, Sadegh Samadi:
Distributed random cooperation for VBF-based routing in high-speed dense underwater acoustic sensor networks. 6184-6200 - Nicolas Bock, Christian F. A. Negre, Susan M. Mniszewski, Jamaludin Mohd-Yusof, Bálint Aradi, Jean-Luc Fattebert, Daniel Osei-Kuffuor, Timothy C. Germann, Anders M. N. Niklasson:
The basic matrix library (BML) for quantum chemistry. 6201-6219 - Masoumeh Safkhani, Mahyar Shariat:
Implementation of secret disclosure attack against two IoT lightweight authentication protocols. 6220-6235 - Ramy Gad, Simon Pickartz, Tim Süß, Lars Nagel, Stefan Lankes, Antonello Monti, André Brinkmann:
Zeroing memory deallocator to reduce checkpoint sizes in virtualized HPC environments. 6236-6257 - M. M. Abutaleb:
Robust and efficient QCA cell-based nanostructures of elementary reversible logic gates. 6258-6274 - Hongyuan Qi, Jinchen Xu, Shaozhong Guo:
Detection of the maximum error of mathematical functions. 6275-6290 - Huangke Chen, Jianghan Zhu, Guohua Wu, Lisu Huo:
Cost-efficient reactive scheduling for real-time workflows in clouds. 6291-6309 - Amir Tavizi, Ali Ghaffari:
Tree-based reliable and energy-aware multicast routing protocol for mobile ad hoc networks. 6310-6332 - Sa'ar Hersonsky:
Approximation of conformal mappings and novel applications to shape recognition of planar domains. 6333-6368 - Saleh Abdel-Hafeez, Ann Gordon-Ross, Samer Abubaker:
A comparison-free sorting algorithm on CPUs and GPUs. 6369-6400
Volume 74, Number 12, December 2018
- D. S. Park:
Future computing with IoT and cloud computing. 6401-6407 - Yi Meng, Qingkui Chen:
DCSACA: distributed constraint service-aware collaborative access algorithm based on large-scale access to the Internet of Things. 6408-6427 - Saru Kumari, Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Fan Wu, Neeraj Kumar:
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. 6428-6453 - Fernando Román Muñoz, Esteban Alejandro Armas Vega, Luis Javier García-Villalba:
Analyzing the traffic of penetration testing tools with an IDS. 6454-6469 - Mohammad Sadegh Aslanpour, Seyed Ebrahim Dashti, Mostafa Ghobaei-Arani, Ali Asghar Rahmanian:
Resource provisioning for cloud applications: a 3-D, provident and flexible approach. 6470-6501 - Dusan Baek, Jae-Hyeon Park, Jung-Won Lee:
An energy efficiency grading system for mobile applications based on usage patterns. 6502-6515 - Hye-Young Kim:
A design and implementation of a framework for games in IoT. 6516-6528 - Long Chen, Xiaoping Li:
Cloud workflow scheduling with hybrid resource provisioning. 6529-6553 - Binbin Song, Yao Yu, Yu Zhou, Ziqiang Wang, Sidan Du:
Host load prediction with long short-term memory in cloud computing. 6554-6568 - Taha Chaabouni, Maher Khemakhem:
Energy management strategy in cloud computing: a perspective study. 6569-6597 - Fernando Román Muñoz, Iván Israel Sabido Cortes, Luis Javier García-Villalba:
Enlargement of vulnerable web applications for testing. 6598-6617 - Dohyun Kim, Yunho Lee, Sangjin Lee:
Mobile forensic reference set (MFReS) and mobile forensic investigation for android devices. 6618-6632 - Jin Wang, Jiayi Cao, R. Simon Sherratt, Jong Hyuk Park:
An improved ant colony optimization-based approach with mobile sink for wireless sensor networks. 6633-6645 - Yun-kyung Lee, Jeong-Nyeo Kim, Kyung-Soo Lim, Hyunsoo Yoon:
Secure mobile device structure for trust IoT. 6646-6664 - Seung-Ho Ok, Jae Hoon Shim, Byungin Moon:
Modified adaptive support weight and disparity search range estimation schemes for stereo matching processors. 6665-6690 - Sung-Kil Kim, Junseok Oh:
Information science techniques for investigating research areas: a case study in telecommunications policy. 6691-6718 - Chaeho Cho, Kwang-Sik Chung, Yoojae Won:
Detection of damaged files and measurement of similarity to originals using entropy graph characteristics. 6719-6728 - Seon Ho Oh, Geon Woo Kim, Kyung-Soo Lim:
Compact deep learned feature-based face recognition for Visual Internet of Things. 6729-6741 - Dongkyun Kim, Yong-Hwan Kim, Ki-Hyun Kim, Joo-Beom Kim, Gi-Seong You, Joon-Min Gil:
Logically isolated group network for virtual convergence environment over SD-WAN. 6742-6752 - Seon Ho Oh, Seung-Wan Han, Bumsuk Choi, Geon Woo Kim, Kyung-Soo Lim:
Deep feature learning for person re-identification in a large-scale crowdsourced environment. 6753-6765 - Chunxia Yin, Shunfu Jin:
An energy-saving strategy based on multi-server vacation queuing theory in cloud data center. 6766-6784 - Jeong-Hwan Kim, Kang-Hwi Lee, Jeong-Whan Lee, Kyeong-Seop Kim:
Semi-real-time removal of baseline fluctuations in electrocardiogram (ECG) signals by an infinite impulse response low-pass filter (IIR-LPF). 6785-6793 - Dazhi Li, Minglu Li, Jianhua Liu:
A dynamic multiple-keys game-based industrial wireless sensor-cloud authentication scheme. 6794-6814 - Min Zhu, Dengyin Zhang, Jin Wang:
Multi-objective optimization design for multi-source multicasting MIMO AF relay systems. 6815-6830 - Elham Mirzavand Borujeni, Dadmehr Rahbari, Mohsen Nickray:
Fog-based energy-efficient routing protocol for wireless sensor networks. 6831-6858 - Dae-Won Lee, Hwa-Min Lee:
IoT service classification and clustering for integration of IoT service platforms. 6859-6875 - Chao-Tung Yang, Shuo-Tsung Chen, Yu-Sheng Lo, Endah Kristiani, Yu-Wei Chan:
On construction of a virtual GPU cluster with InfiniBand and 10 Gb Ethernet virtualization. 6876-6897 - Jong-Hyuk Lee, Weidong Shi, Joon-Min Gil:
Accelerated bulk memory operations on heterogeneous multi-core systems. 6898-6922 - Xiaofan Wang, Lei Wang, Shengji Li, Jin Wang:
An event-driven plan recognition algorithm based on intuitionistic fuzzy theory. 6923-6938 - Linh Van Ma, Gwanghyun Yu, Jin-Young Kim, Yonggwan Won, Jinsul Kim:
An efficient transmission method based on HEVC multi-view adaptive video streaming over P2P network in NFV. 6939-6959 - Daeyong Jung, Myungil Kim, Jungha Lee, Han-Yee Kim, Dae-Won Lee:
Job submission and monitoring management in integrated computing environment for finite element analysis. 6960-6975 - Yan Li, Byeong-Seok Shin:
Privacy-aware task data management using TPR*-Tree for trajectory-based crowdsourcing. 6976-6987 - Sangho Park, Hyunjin Kim, JaeCheol Ryou:
Utilizing a lightweight PKI mechanism to guarantee a secure service in a cloud environment. 6988-7002 - Jiao Yao, Kaimin Zhang, Yaxuan Dai, Jin Wang:
Power function-based signal recovery transition optimization model of emergency traffic. 7003-7023 - Nam Yong Kim, Jung Hyun Ryu, Byoung Wook Kwon, Yi Pan, Jong Hyuk Park:
CF-CloudOrch: container fog node-based cloud orchestration for IoT networks. 7024-7045
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.