default search action
Future Generation Computer Systems, Volume 72
Volume 72, July 2017
- Yuzhu Wang, Jinrong Jiang, He Zhang, Xiao Dong, Lizhe Wang, Rajiv Ranjan, Albert Y. Zomaya:
A scalable parallel algorithm for atmospheric general circulation models on a multi-core cluster. 1-10 - Simon Scheider, Frank O. Ostermann, Benjamin Adams:
Why good data analysts need to be critical synthesists. Determining the role of semantics in data analysis. 11-22 - R. Vidhyalakshmi, Vikas Kumar:
CORE framework for evaluating the reliability of SaaS products. 23-36 - John K. Tarus, Zhendong Niu, Abdallah Yousif:
A hybrid knowledge-based recommender system for e-learning based on ontology and sequential pattern mining. 37-48 - Hyunwoo Joe, Jungseok Kim, Jemin Lee, Hyungshin Kim:
Output-oriented power saving mode for mobile devices. 49-64 - Sarunya Pumma, Wu-chun Feng, Phond Phunchongharn, Sylvain Chapeland, Tiranee Achalakul:
A runtime estimation framework for ALICE. 65-77
- Daniel S. Katz, Xiaobo Zhou:
Leading-edge research in cluster, cloud, and grid computing: Best papers from the IEEE/ACM CCGrid 2015 conference. 78-80 - Andrej Podzimek, Lubomír Bulej, Lydia Y. Chen, Walter Binder, Petr Tuma:
Reprint of "Robust partial-load experiments with Showstopper". 81-104 - Zhe Zhang, Brian Bockelman, Dale W. Carder, Todd Tannenbaum:
Lark: An effective approach for software-defined networking in high throughput computing clusters. 105-117 - Umesh Deshpande, Kate Keahey:
Traffic-sensitive Live Migration of Virtual Machines. 118-128 - Christine Bassem, Azer Bestavros:
Multi-Capacity Bin Packing with Dependent Items and its Application to the Packing of Brokered Workloads in Virtualized Environments. 129-144 - Feroz Zahid, Ernst Gunnar Gran, Bartosz Bogdanski, Bjørn Dag Johnsen, Tor Skeie:
Efficient network isolation and load balancing in multi-tenant HPC clusters. 145-162
- Teodor-Florin Fortis, Victor Ion Munteanu:
Topics in cloud incident management. 163-164 - Giovanni Toffetti, Sandro Brunner, Martin Blöchlinger, Josef Spillner, Thomas Michael Bohnert:
Self-managing cloud-native applications: Design, implementation, and experience. 165-179 - Alexandru Sirbu, Cristian Pop, Cristina Serbanescu, Florin Pop:
Predicting provisioning and booting times in a Metal-as-a-service system. 180-192 - Rubén Trapero, Jolanda Modic, Miha Stopar, Ahmed Taha, Neeraj Suri:
A novel approach to manage cloud security SLA incidents. 193-205
- Qin Liu, Avinash Srinivasan, Jiankun Hu, Guojun Wang:
Preface: Security and privacy in big data clouds. 206-207 - Zuojie Deng, Kenli Li, Keqin Li, Jingli Zhou:
A multi-user searchable encryption scheme with keyword authorization in a cloud storage. 208-218 - Guangwu Hu, Wenlong Chen, Qi Li, Yong Jiang, Ke Xu:
TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code. 219-226 - Shiwen Zhang, Qin Liu, Yaping Lin:
Anonymizing popularity in online social networks with full utility. 227-238 - Qinlong Huang, Yixian Yang, Mansuo Shen:
Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing. 239-249 - Kalpana Singh, Lynn Batten:
Aggregating privatized medical data for secure querying applications. 250-263 - Mei Wang, Meng Xiao, Sancheng Peng, Guohua Liu:
A hybrid index for temporal big data. 264-272 - Mehdi Sookhak, F. Richard Yu, Muhammad Khurram Khan, Yang Xiang, Rajkumar Buyya:
Attribute-based data access control in mobile cloud computing: Taxonomy and open issues. 273-287 - Arezou Soltani Panah, Ron G. van Schyndel, Timos Sellis:
Towards an asynchronous aggregation-capable watermark for end-to-end protection of big data streams. 288-304 - Lifang Zhang, Zheng Yan, Raimo Kantola:
Privacy-preserving trust management for unwanted traffic control. 305-318 - Chao Chen, Sheng Wen, Jun Zhang, Yang Xiang, Jonathan J. Oliver, Abdulhameed Alelaiwi, Mohammad Mehedi Hassan:
Investigating the deceptive information in Twitter spam. 319-326 - Vu Mai, Ibrahim Khalil:
Design and implementation of a secure cloud-based billing model for smart meters as an Internet of things using homomorphic cryptography. 327-338 - Farzana Rahman, Md. Zakirul Alam Bhuiyan, Sheikh Iqbal Ahamed:
A privacy preserving framework for RFID based healthcare systems. 339-352
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.