default search action
Cluster Computing, Volume 19
Volume 19, Number 1, March 2016
Special Issue: ICITCS 2015;
Special Issue: Convergence Systems for Human Computing
- Antonio Llanes, José M. Cecilia, Antonia M. Sánchez, José M. García, Martyn Amos, Manuel Ujaldon:
Dynamic load balancing on heterogeneous clusters for parallel ant colony optimization. 1-11 - Mohammed Rebbah, Yahya Slimani, Abdelkader Benyettou, Lionel Brunie:
A decentralized fault tolerance model based on level of performance for grid environment. 13-27 - Chen Yang, Peng Chi, Xiao Song, Tingyu Lin, Bo Hu Li, Xudong Chai:
An efficient approach to collaborative simulation of variable structure systems on multi-core machines. 29-46 - Jianhong Zhang, Xubing Zhao:
Efficient chameleon hashing-based privacy-preserving auditing in cloud storage. 47-56 - Carlos M. Toledo, Ricardo J. Barrientos, Andrés I. Ávila:
Similarity (range and kNN) queries processing on an Intel Xeon Phi coprocessor. 57-71 - Tian Zhuo:
Face recognition from a single image per person using deep architecture neural networks. 73-77 - Erwin Adi, Zubair A. Baig, Philip Hingston, Chiou Peng Lam:
Distributed denial-of-service attacks against HTTP/2 services. 79-86 - S. Raja Ratna, R. Ravi:
Scrutiny of unruly and abuse in wireless networks to mitigate physical layer threats using discriminate based misbehavior prevention. 87-97 - Musaed A. Alhussein:
Automatic facial emotion recognition using weber local descriptor for e-Healthcare system. 99-108 - Mahmoud Alewiwi, Cengiz Örencik, Erkay Savas:
Efficient top-k similarity document search utilizing distributed file systems and cosine similarity. 109-126 - Jianhong Zhang, Pengyan Li, Jian Mao:
IPad: ID-based public auditing for the outsourced data in the standard model. 127-138 - Lingjun Zhao, Lajiao Chen, Rajiv Ranjan, Kim-Kwang Raymond Choo, Jijun He:
Geographical information system parallelization for spatial big data processing: a review. 139-152 - Yan Hu, Jun Yan, Kim-Kwang Raymond Choo:
PEDAL: a dynamic analysis tool for efficient concurrency bug reproduction in big data environment. 153-166 - Jiyuan Shi, Junzhou Luo, Fang Dong, Jinghui Zhang, Junxue Zhang:
Elastic resource provisioning for scientific workflow scheduling in cloud under budget and deadline constraints. 167-182 - Chao Yang, Bin Jiang, Isao Ono, Setsuya Kurahashi, Takao Terano:
A grid based simulation environment for agent-based models with vast parameter spaces. 183-195 - Jia Wang, Xiaoping Li:
Task scheduling for MapReduce in heterogeneous networks. 197-210 - Zhiang Wu, Guangliang Gao, Zhan Bu, Jie Cao:
SIMPLE: a simplifying-ensembling framework for parallel community detection from large networks. 211-221 - Hwa Gyoo Park, Weiming Shen:
A methodology for developing clinical collaborative communication systems. 223-235 - Yuan Cheng, Fazhi He, Yiqi Wu, Dejun Zhang:
Meta-operation conflict resolution for human-human interaction in collaborative feature-based CAD systems. 237-253 - Liping Gao, Fangyu Yu, Qingkui Chen, Naixue Xiong:
Consistency maintenance of Do and Undo/Redo operations in real-time collaborative bitmap editing systems. 255-267 - S. P. Malarvizhi, B. Sathiyabhama:
Frequent pagesets from web log by enhanced weighted association rule mining. 269-277 - Hye-Young Kim:
An energy-efficient load balancing scheme to extend lifetime in wireless sensor networks. 279-283 - Changhee Cho, Jisu Kim, Jinsul Kim, Sangjoon Lee, Kuinam J. Kim:
Detecting for high speed flying object using image processing on target place. 285-292 - Sanghyun Park, Jisu Kim, Gemoh Maliva Tihfon, HoYong Ryu, Jinsul Kim:
Dynamic multimedia transmission control virtual machine using weighted Round-Robin. 293-300 - Dae-Won Park, Suhyun Park:
Multiple-domain marine data utilization structure for e-navigation. 301-308 - Hoyoung Cheong, Jonwon Eun, Hyuncheol Kim, Kuinam J. Kim:
Belief propagation decoding assisted on-the-fly Gaussian elimination for short LT codes. 309-314 - Hyoung-Gook Kim, Hye-Seung Cho, Jin Young Kim:
Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment. 315-323 - Seung-Ho Kang, Kuinam J. Kim:
A feature selection approach to find optimal feature subsets for the network intrusion detection system. 325-333 - Wai-Kong Lee, Hon-Sang Cheong, Raphael C.-W. Phan, Bok-Min Goi:
Fast implementation of block ciphers and PRNGs in Maxwell GPU architecture. 335-347 - Munwar Ali Zardari, Low Tang Jung:
Data security rules/regulations based classification of file data using TsF-kNN algorithm. 349-368 - Kyung-shick Choi, Kyungseok Choo, Yong-eun Sung:
Demographic variables and risk factors in computer-crime: an empirical assessment. 369-377 - Kuinam J. Kim, Cheong Ghil Kim, Taeg Keun Whangbo, Kyoungro Yoon:
A continuous playing scheme on RESTful web service. 379-387 - Hamzeh Alabool, Ahmad Kamil Bin Mahmood:
A novel evaluation framework for improving trust level of Infrastructure as a Service. 389-410 - Sufian Sudeng, Naruemon Wattanapongsakorn:
A knee-based multi-objective evolutionary algorithm: an extension to network system optimization design problem. 411-425 - Taher Ahmed Ghaleb:
Techniques and countermeasures of website/wireless traffic analysis and fingerprinting. 427-438 - Saad Alqahtany, Nathan L. Clarke, Steven Furnell, Christoph Reich:
A forensic acquisition and analysis system for IaaS. 439-453 - Abdulwahid Al Abdulwahid, Nathan L. Clarke, Ingo Stengel, Steven Furnell, Christoph Reich:
Continuous and transparent multimodal authentication: reviewing the state of the art. 455-474 - Yoon-Su Jeong, Seung-Soo Shin, Kun-Hee Han:
High-dimentional data authentication protocol based on hash chain for Hadoop systems. 475-484 - Seong-Taek Park, Eun-Mi Park, Joung-Hae Seo, GuoZhong Li:
Factors affecting the continuous use of cloud service: focused on security risks. 485-495 - Kun-Hee Han, Woo-Sik Bae:
Proposing and verifying a security protocol for hash function-based IoT communication system. 497-504 - Kyungyong Chung, Roy C. Park:
PHR open platform based smart health service using distributed object group framework. 505-517 - Jong-Hak Oh, Jung-Wan Hong, Yen-Yoo You, Gwan-Sik Na:
Effects of patent indicators on national technological level: concentrated on mobile communication, network, and convergence technologies. 519-528 - IlKyu Yoon, JaMee Kim, WonGyu Lee:
The analysis and application of an educational programming language (RUR-PLE) for a pre-introductory computer science course. 529-546 - Yunsick Sung, Young-Sik Jeong, Jong Hyuk Park:
Beacon-based active media control interface in indoor ubiquitous computing environment. 547-556 - Emmanuel N. Millán, Silvana B. Goirán, María Fabiana Piccoli, Carlos García Garino, Julieta N. Aranibar, Eduardo M. Bringa:
Monte Carlo simulations of settlement dynamics in GPUs. 557-566
Volume 19, Number 2, June 2016
- Esmail Asyabi, Azadeh Azhdari, Mostafa Dehsangi, Michel Gokan Khan, Mohsen Sharifi, Sayed Vahid Azhari:
Kani: a QoS-aware hypervisor-level scheduler for cloud computing environments. 567-583 - Heithem Abbes, Thouraya Louati:
PGTrust: a decentralized free-riding prevention model for DG systems. 585-599 - Zeng Zeng, Tram Truong Huu, Bharadwaj Veeravalli, Chen-Khong Tham:
Operational cost-aware resource provisioning for continuous write applications in cloud-of-clouds. 601-614 - George Terzopoulos, Helen D. Karatza:
Power-aware Bag-of-Tasks scheduling on heterogeneous platforms. 615-631 - Prasanthi Sreekumari, Jae-Il Jung, Meejeong Lee:
A simple and efficient approach for reducing TCP timeouts due to lack of duplicate acknowledgments in data center networks. 633-645 - Yichuan Wang, Santosh Chandrasekhar, Mukesh Singhal, Jianfeng Ma:
A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing. 647-662 - Fawaz AL-Hazemi, Dong-Ki Kang, Seong-Hwan Kim, Yuyang Peng, S. H. Shah Newaz, Chan-Hyun Youn:
LPC \(_\mathrm{FreqSchd}\) : A local power controller using the frequency scheduling approach for virtualized servers. 663-678 - Tarandeep Kaur, Inderveer Chana:
Energy aware scheduling of deadline-constrained tasks in cloud computing. 679-698 - (Withdrawn) The model for improving big data sub-image retrieval performance using scalable vocabulary tree based on predictive clustering. 699-708
- Jiaxuan Wu, Bin Zhang, Lei Yang, Peng Wang, Changsheng Zhang:
A replicas placement approach of component services for service-based cloud application. 709-721 - Darren Quick, Kim-Kwang Raymond Choo:
Big forensic data reduction: digital forensic images and electronic evidence. 723-740 - Jie Wan, Guorui Ren, Jinfu Liu, Qinghua Hu, Daren Yu:
Ultra-short-term wind speed prediction based on multi-scale predictability analysis. 741-755 - Xinhui Xu, Fei Xie, Xingyu Zhou:
Research on spatial and temporal characteristics of drought based on GIS using Remote Sensing Big Data. 757-767 - Bing Zhao, Yanhong Gu, Yuan Ruan, Quanle Chen:
Two game-based solution concepts for a two-agent scheduling problem. 769-781 - Jie Zheng:
Research on a cluster system for binary data frames of wireless sensor network. 783-791 - Lizhe Wang, Weijing Song, Peng Liu:
Link the remote sensing big data to the image features via wavelet transformation. 793-810 - Jun Ye, Zheng Xu, Yong Ding:
Secure outsourcing of modular exponentiations in cloud and cluster computing. 811-820 - Jiemin Chen, Feiyi Tang, Jing Xiao, Jianguo Li, Jing He, Yong Tang:
CogTime_RMF: regularized matrix factorization with drifting cognition degree for collaborative filtering. 821-835 - K. P. Swaraj, D. Manjula:
A fast approach to identify trending articles in hot topics from XML based big bibliographic datasets. 837-848 - Ji Xue, Feng Yan, Alma Riska, Evgenia Smirni:
Scheduling data analytics work with performance guarantees: queuing and machine learning models in synergy. 849-864 - Alina Sîrbu, Özalp Babaoglu:
Towards operator-less data centers through data-driven, predictive, proactive autonomics. 865-878 - Rajath Subramanyam, Indranil Gupta, Luke M. Leslie, Wenting Wang:
Idempotent distributed counters using a forgetful bloom filter. 879-892 - Daniel J. Dubois, Giuliano Casale:
OptiSpot: minimizing application deployment cost using spot cloud resources. 893-909 - Hyun Mi Jung, Yong Hwan Jung, Jang Won Choi:
The integrated management method of heterogeneous WIPS sensors. 911-919 - Hanjo Jeong, Yong-Ki Kim, Jaesoo Kim:
An evaluation-committee recommendation system for national R&D projects using social network analysis. 921-930 - Min-Cheol Jeon, Man-Seok Han, Jae-Uk Jang, Yong-Kyun Kim, Sun-Youl Seo, Gab-Jung Kim, Chang-Gyu Kim:
Evaluation of image reconstruction according to changing physical parameter. 931-938 - Kyuman Jeong, Han-Jin Cho:
Photo quality enhancement by relocating subjects. 939-948 - Seung-Mi Moon, Sook-Youn Kwon, Jae-Hyun Lim:
Implementation of smartphone-based color temperature and wavelength control LED lighting system. 949-966 - Hoill Jung, Kyung-Yong Chung:
Life style improvement mobile service for high risk chronic disease based on PHR platform. 967-977 - Jung-Soo Han, Gui-Jung Kim:
A method of unsupervised machine learning based on self-organizing map for BCI. 979-985 - Ill-Woo Park, Jeonghye Han:
Teachers' views on the use of robots and cloud services in education for sustainable development. 987-999 - DongBum Seo, You-Boo Jeon, Song-Hee Lee, Keun-Ho Lee:
Cloud computing for ubiquitous computing on M2M and IoT environment mobile application. 1001-1013 - Seong-Taek Park, Eun-Mi Park, Joung-Hae Seo, GuoZhong Li:
Erratum to: Factors affecting the continuous use of cloud service: focused on security risks. 1015
Volume 19, Number 3, September 2016
- Mostafa Ghobaei-Arani, Sam Jabbehdari, Mohammad Ali Pourmina:
An autonomic approach for resource provisioning of cloud services. 1017-1036 - Sandra Catalán, Francisco D. Igual, Rafael Mayo, Rafael Rodríguez-Sánchez, Enrique S. Quintana-Ortí:
Architecture-aware configuration and scheduling of matrix multiplication on asymmetric multicore processors. 1037-1051 - Somayeh Kianpisheh, Nasrollah Moghaddam Charkari, Mehdi Kargahi:
Ant colony based constrained workflow scheduling for heterogeneous computing systems. 1053-1070 - Najme Mansouri:
QDR: a QoS-aware data replication algorithm for Data Grids considering security factors. 1071-1087 - Hang Zhou, Qing Li, Weiqin Tong, Samina Kausar, Hai Zhu:
P-Aware: a proportional multi-resource scheduling strategy in cloud data center. 1089-1103 - Anna Sikora, Tomàs Margalef, Josep Jorba:
Automated and dynamic abstraction of MPI application performance. 1105-1137 - Mohsin Fayyaz, Khurram Aziz, Ghulam Mujtaba:
Performance analysis of optical interconnects' architectures for data center networks. 1139-1161 - Nasrin Akhter, Mohamed Othman:
Energy aware resource allocation of cloud data center: review and open issues. 1163-1182 - Dmitry A. Zaitsev, Tatiana R. Shmeleva, Werner Retschitzegger, Birgit Pröll:
Security of grid structures under disguised traffic attacks. 1183-1200 - Lei Wang, Lingyu Xu, Yunlan Xue, Gaowei Zhang:
Group behavior time series anomaly detection in specific network space based on separation degree. 1201-1210 - Jianhong Zhang, Jian Mao:
Efficient public key encryption with revocable keyword search in cloud computing. 1211-1217 - Gonzalo Hernández, Roberto León, Alejandra Urtubia:
Detection of abnormal processes of wine fermentation by support vector machines. 1219-1225 - Raed Karim, Chen Ding, Ali Miri, Md Shahinur Rahman:
Incorporating service and user information and latent features to predict QoS for selecting and recommending cloud service compositions. 1227-1242 - Jie Zhang, Jining Yan, Yan Ma, Dong Xu, Pengfei Li, Wei Jie:
Infrastructures and services for remote sensing data production management across multiple satellite data centers. 1243-1260 - Jeongmin Kim, Hyun-Sook Chung, MyounJae Lee, Yunseok Chang, Jongjin Jung, Pan-Seop Shin:
Design of user-centric semantic rights model for validation of user-generated content. 1261-1273 - Qingyuan Zhou:
Research on heterogeneous data integration model of group enterprise based on cluster computing. 1275-1282 - Zheng Xu, Lin Mei, Chuanping Hu, Yunhuai Liu:
The big data analytics and applications of the surveillance system using video structured description technology. 1283-1292 - Bao Zhu, Le-An Yu, Zhiqiang Geng:
Cost estimation method based on parallel Monte Carlo simulation and market investigation for engineering construction project. 1293-1308 - Jia Zhu, Chuanhua Xu, Zhixu Li, Gabriel Pui Cheong Fung, Xueqin Lin, Jin Huang, Changqin Huang:
An examination of on-line machine learning approaches for pseudo-random generated data. 1309-1321 - Yushan Zhang, Han Huang, Zhifeng Hao, Guiwu Hu:
First hitting time analysis of continuous evolutionary algorithms based on average gain. 1323-1332 - Lin Li, Jingjing Ye, Fang Deng, Shengwu Xiong, Luo Zhong:
A comparison study of clustering algorithms for microblog posts. 1333-1345 - R. Suganya Devi, D. Manjula, Vijayan Sugumaran:
Efficient indexing structure to handle durable queries through web crawling. 1347-1358 - Shanliang Yang, Mei Yang, Song Wang, Kedi Huang:
Adaptive immune genetic algorithm for weapon system portfolio optimization in military big data environment. 1359-1372 - Chuanliang Xia:
Property preservation of refinement for Petri net based representation for embedded systems. 1373-1384 - Qingsheng Zhu, Ji Feng, Jinlong Huang:
Weighted natural neighborhood graph: an adaptive structure for clustering and outlier detection with no neighborhood parameter. 1385-1397 - Shunxiang Zhang, Yin Wang, Shiyao Zhang, Guangli Zhu:
Building associated semantic representation model for the ultra-short microblog text jumping in big data. 1399-1410 - Chunchun Hu, Nianxue Luo, Qiansheng Zhao:
Fast fuzzy trajectory clustering strategy based on data summarization and rough approximation. 1411-1420 - Lei Wang, Lingyu Xu, Jie Yu, Yunlan Xue, Gaowei Zhang:
Context-aware edge similarity segmentation algorithm of time series. 1421-1436 - Penghao Xu, Bing Yan, Shouwei Hu:
DOA estimation of multiple sources in sparse space with an extended array technique. 1437-1447 - Fanqi Meng, Xiaohong Su, Zhaoyang Qu:
Nonlinear approach for estimating WCET during programming phase. 1449-1459 - Zhige Jia, Zhengsong Chen, Dijin Wang, Pengfei Yu:
Time series analysis of carrier phase differences for dual-frequency GPS high-accuracy positioning. 1461-1474 - Xiao Wei, Jun Zhang, Daniel Dajun Zeng, Qing Li:
A multi-level text representation model within background knowledge based on human cognitive process for big data analysis. 1475-1487 - Jie-Yu Wang, Hai-Cheng Xu:
Transportation route optimization with cost object in China. 1489-1501 - Junping Xiang, Zonghai Chen:
An adaptive traffic signal coordination optimization method based on vehicle-to-infrastructure communication. 1503-1514 - Seoyoung Kim, Jieun Choi, Yoonhee Kim:
Adaptive application-aware job scheduling optimization strategy in heterogeneous infrastructures. 1515-1526 - Md. Azam Hossain, Cao Ngoc Nguyen, Jik-Soo Kim, Soonwook Hwang:
Exploiting resource profiling mechanism for large-scale scientific computing on grids. 1527-1539 - Yongseok Son, Hara Kang, Hyuck Han, Heon Young Yeom:
An empirical evaluation and analysis of the performance of NVM express solid state drive. 1541-1553 - Yoonsung Nam, Minkyu Kang, Hanul Sung, Jincheol Kim, Hyeonsang Eom:
Workload-aware resource management for software-defined compute. 1555-1570