default search action
Concurrency and Computation: Practice and Experience, Volume 28
Volume 28, Number 1, January 2016
- Weifeng Liu, Michael Gerndt, Bin Gong:
Model-based MPI-IO tuning with Periscope tuning framework. 3-20 - Emanuele Manca, Andrea Manconi, Alessandro Orro, Giuliano Armano, Luciano Milanesi:
CUDA-quicksort: an improved GPU-based implementation of quicksort. 21-43 - Tonglin Li, Xiaobing Zhou, Ke Wang, Dongfang Zhao, Iman Sadooghi, Zhao Zhang, Ioan Raicu:
A convergence of key-value storage systems from clouds to supercomputers. 44-69 - Ke Wang, Kan Qiao, Iman Sadooghi, Xiaobing Zhou, Tonglin Li, Michael Lang, Ioan Raicu:
Load-balanced and locality-aware scheduling for data-intensive workloads at extreme scales. 70-94 - Vitor Venceslau Curtis, Carlos Alberto Alonso Sanches:
An efficient solution to the subset-sum problem on GPU. 95-113 - Lahiru S. Gallege, Dimuthu U. Gamage, James H. Hill, Rajeev R. Raje:
Understanding the trust of software-intensive distributed systems. 114-143 - Peter A. Buhr, David Dice, Wim H. Hesselink:
Dekker's mutual exclusion algorithm made RW-safe. 144-165 - Youzhong Ma, Xiaofeng Meng, Shaoya Wang:
Parallel similarity joins on massive high-dimensional data using MapReduce. 166-183
Volume 28, Number 2, February 2016
Editorials
- Georg Hager, Darren J. Kerbyson, Abhinav Vishnu, Gerhard Wellein:
Performance and power for highly parallel systems. 187-188
- Georg Hager, Jan Treibig, Johannes Habich, Gerhard Wellein:
Exploring performance and power properties of modern multi-core chips via simple machine models. 189-210 - Joshua Peraza, Ananta Tiwari, Michael Laurenzano, Laura Carrington, Allan Snavely:
PMaC's green queue: a framework for selecting energy optimal DVFS configurations in large scale MPI applications. 211-231 - Alex D. Breslow, Leo Porter, Ananta Tiwari, Michael Laurenzano, Laura Carrington, Dean M. Tullsen, Allan Snavely:
The case for colocation of high performance computing workloads. 232-251 - Harald Servat, Germán Llort, Judit Giménez, Jesús Labarta:
Detailed and simultaneous power and performance analysis. 252-273 - Scott Pakin, Curtis B. Storlie, Michael Lang, Robert E. Fields, Eloy E. Romero Jr., Craig Idler, Sarah Michalak, Hugh Greenberg, Josip Loncaric, Randal Rheinheimer, Gary Grider, Joanne Wendelberger:
Power usage of production supercomputers and production workloads. 274-290
- Florin Pop, Mauro Iacono, Marco Gribaudo, Joanna Kolodziej:
Advances in modelling and simulation for big-data applications (AMSBA). 291-293
- Jianwei Liao:
Server-side prefetching in distributed file systems. 294-310 - Tinghuai Ma, Huan Rong, Changhong Ying, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Detect structural-connected communities based on BSCHEF in C-DBLP. 311-330 - Shuoyi Zhao, Ruixuan Li, Wenlong Tian, Weijun Xiao, Xinhua Dong, Dongjie Liao, Samee U. Khan, Keqin Li:
Divide-and-conquer approach for solving singular value decomposition based on MapReduce. 331-350 - Pantelimon George Popescu, Emil-Ioan Slusanschi, Voichita Iancu, Florin Pop:
A new upper bound for Shannon entropy. A novel approach in modeling of Big Data applications. 351-359 - Omar Behadada, Marcello Trovati, Mohammed Amine Chikh, Nik Bessis:
Big data-based extraction of fuzzy partition rules for heart arrhythmia detection: a semi-automated approach. 360-373 - Vlad Serbanescu, Keyvan Azadbakht, Frank S. de Boer, Chetan Nagarajagowda, Behrooz Nobakht:
A design pattern for optimizations in data intensive applications using ABS and JAVA 8. 374-385 - Song Wu, Songqiao Tao, Xiao Ling, Hao Fan, Hai Jin, Shadi Ibrahim:
iShare: Balancing I/O performance isolation and disk I/O efficiency in virtualized environments. 386-399 - Massimo Ficco, Giovanni Avolio, Francesco Palmieri, Aniello Castiglione:
An HLA-based framework for simulation of large-scale critical systems. 400-419 - Michal P. Karpowicz:
Energy-efficient CPU frequency control for the Linux system. 420-437 - Davide Cerotti, Marco Gribaudo, Mauro Iacono, Pietro Piazzolla:
Modeling and analysis of performances for concurrent multithread applications on multicore and graphics processing unit systems. 438-452
- Pavan Balaji, Zhiyi Huang:
Programming models and applications for multicores and manycores. 453-454
- Quan Chen, Long Zheng, Minyi Guo:
Adaptive demand-aware work-stealing in multi-programmed multi-core architectures. 455-471 - Georgios Varisteas, Mats Brorsson:
Palirria: accurate on-line parallelism estimation for adaptive work-stealing. 472-491 - Lanjun Wan, Kenli Li, Jing Liu, Keqin Li:
Efficient CPU-GPU cooperative computing for solving the subset-sum problem. 492-516 - Wasuwee Sodsong, Jingun Hong, Seongwook Chung, Yeong-Kyu Lim, Shin-Dug Kim, Bernd Burgstaller:
Dynamic partitioning-based JPEG decompression on heterogeneous multicore architectures. 517-536 - Xiaonan Tian, Rengan Xu, Yonghong Yan, Sunita Chandrasekaran, Deepak Eachempati, Barbara M. Chapman:
Compiler transformation of nested loops for general purpose GPUs. 537-556 - I. Z. Reguly, Endre László, Gihan R. Mudalige, Mike B. Giles:
Vectorizing unstructured mesh computations for many-core architectures. 557-577
Volume 28, Number 3, March 2016
Editorials
- Yang Xiang, Ivan Stojmenovic, Peter Mueller, Jun Zhang:
Security and reliability in big data. 581-582
- Gwan-Hwan Hwang, Wei-Sian Huang, Jenn-Zjone Peng, Yu-Wei Lin:
Fulfilling mutual nonrepudiation for cloud storage. 583-599 - Hua Wang, Xun Yi, Elisa Bertino, Lili Sun:
Protecting outsourced data in cloud computing through access management. 600-615 - Chunjing Han, Zhenyu Li, Gaogang Xie, Steve Uhlig, Yulei Wu, Liangxiong Li, Jingguo Ge, Yunjie Liu:
Insights into the issue in IPv6 adoption: A view from the Chinese IPv6 Application mix. 616-630 - Wei Zhou, Yang Xu, Guojun Wang:
Decentralized group key management for hierarchical access control using multilinear forms. 631-645 - Chang Liu, Nick Beaugeard, Chi Yang, Xuyun Zhang, Jinjun Chen:
HKE-BC: hierarchical key exchange for secure scheduling and auditing of big data in cloud computing. 646-660 - Jinson Zhang, Mao Lin Huang:
Density approach: a new model for BigData analysis and visualization. 661-673 - Yuxin Mao, Ping Zhu, Guiyi Wei, Mohammad Mehedi Hassan, M. Anwar Hossain:
A game-based incentive model for service cooperation in VANETs. 674-687 - Adam Muhlbauer, Timothy Zelinsky, Salil S. Kanhere:
Platform zero: a step closer to ubiquitous computing. 688-706 - Ruppa K. Thulasiram, Parimala Thulasiraman, Hari Prasain, Girish K. Jha:
Nature-inspired soft computing for financial option pricing using high-performance analytics. 707-728 - Wei Zhou, Jizhong Han, Yun Gao, Zhiyong Xu:
An efficient graph data processing system for large-scale social network service applications. 729-747
- Jesús Carretero, Raimondas Ciegis, Emmanuel Jeannot, Laurent Lefèvre, Gudula Rünger, Domenico Talia, Julius Zilinskas:
HeteroPar 2014, APCIE 2014, and TASUS 2014 Special Issue. 748-749
- Farouk Mansouri, Sylvain Huet, Dominique Houzet:
A domain-specific high-level programming model. 750-767 - Fábio Soldado, Fernando Alexandre, Hervé Paulino:
Execution of compound multi-kernel OpenCL computations in multi-CPU/multi-GPU environments. 768-787 - Alejandro Acosta, Francisco Almeida:
The particle filter algorithm: parallel implementations and performance analysis over Android mobile devices. 788-801 - Tania Malik, Vladimir Rychkov, Alexey L. Lastovetsky:
Network-aware optimization of communications for parallel matrix multiplication on hierarchical HPC platforms. 802-821 - Davide Morelli, Andrea Canciani, Antonio Cisternino:
A high-level and accurate energy model of parallel and concurrent workloads. 822-833
- Matthew Dixon, José E. Moreira, David Daly:
Workshop on high-performance computational finance. 834-835
- Neil Burke, Andrew Rau-Chaplin, Blesson Varghese:
Computing probable maximum loss in catastrophe reinsurance portfolios on multi-core and many-core architectures. 836-847 - Shuo Li, James Lin:
Accelerating Asian option pricing on many-core architectures. 848-865 - Matthew Dixon, Jörg Lotze, Mohammad Zubair:
A portable, extensible and fast stochastic volatility model calibration using multi and many-core processors. 866-877 - Evgeny Fiksman, Andrey Nikolaev, Ilya Burylov, Sania Salahuddin:
STAC-A2 on Intel architecture: evolving from scalar code to heterogeneous applications. 878-891 - Christian Brugger, Gongda Liu, Christian de Schryver, Norbert Wehn:
Precision-tuning and hybrid pricer for closed-form solution-based Heston calibration. 892-904 - Alexander Moreno, Tucker Balch:
Improving financial computation speed with full and subproblem memoization. 905-915 - Giorgis Georgakoudis, Charles J. Gillan, Ahmed Sayed, Ivor T. A. Spence, Richard Faloon, Dimitrios S. Nikolopoulos:
Methods and metrics for fair server assessment under real-time financial workloads. 916-928 - Fábio Daros Freitas, Christian Daros Freitas, Alberto Ferreira de Souza:
Intelligent trading architecture. 929-943
Volume 28, Number 4, March 2016
Editorials
- Yogesh Simmhan, Lavanya Ramakrishnan, Gabriel Antoniu, Carole A. Goble:
Cloud computing for data-driven science and engineering. 947-949
- Alexandru Costan, Radu Tudoran, Gabriel Antoniu, Goetz Brasche:
TomusBlobs: scalable data-intensive processing on Azure clouds. 950-976 - Ishan Patel, Andrew Rau-Chaplin, Blesson Varghese:
Accelerating R-based analytics on the cloud. 977-994 - Paolo Missier, Simon Woodman, Hugo Hiden, Paul Watson:
Provenance and data differencing for workflow reproducibility analysis. 995-1015 - Naiqiao Du, Xiaojun Ye, Jianmin Wang:
A semantic-aware data generator for ETL workflows. 1016-1040 - Piyush Mehrotra, M. Jahed Djomehri, Steve Heistand, Robert Hood, Haoqiang Jin, Arthur Lazanoff, Subhash Saini, Rupak Biswas:
Performance evaluation of Amazon Elastic Compute Cloud for NASA high-performance computing applications. 1041-1055 - Leonardo Candela, Donatella Castelli, Gianpaolo Coro, Pasquale Pagano, Fabio Sinibaldi:
Species distribution modeling in the cloud. 1056-1079
- Yong Yu, Yi Mu, Rongxing Lu, Jian Ren:
Recent advances in security and privacy in large-scale networks. 1080-1082
- Bo Yang, Mingwu Zhang, Jun-Qiang Du:
An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing. 1083-1093 - Haiyong Bao, Le Chen:
A lightweight privacy-preserving scheme with data integrity for smart grid communications. 1094-1110 - Yue Zhang, Jing Qin, Lihua Du:
A secure biometric authentication based on PEKS. 1111-1123 - Jiang Deng, Chunxiang Xu, Huai Wu, Liju Dong:
A new certificateless signature with enhanced security and aggregation version. 1124-1133 - Zhide Chen, Meng Wang, Li Xu, Wei Wu:
Worm propagation model in mobile network. 1134-1144 - Xiaolei Dong, Jun Zhou, Zhenfu Cao:
Efficient privacy-preserving temporal and spacial data aggregation for smart grid communications. 1145-1160 - Yafang Zhang, Jianbing Ni, Xiaoling Tao, Yong Wang, Yong Yu:
Provable multiple replication data possession with full dynamics for secure cloud storage. 1161-1173 - Shuangyu He, Qianhong Wu, Bo Qin, Jianwei Liu, Yan Li:
Efficient group key management for secure big data in predictable large-scale networks. 1174-1192 - Yongyong Ge, Yannan Li, Zhusong Liu:
Delegation of signing rights for emerging 5G networks. 1193-1203 - Yinbin Miao, Jianfeng Ma, Zhiquan Liu:
Revocable and anonymous searchable encryption in multi-user setting. 1204-1218 - Xinghua Li, Ermeng Wang, Weidong Yang, Jianfeng Ma:
DALP: A demand-aware location privacy protection scheme in continuous location-based services. 1219-1236 - Minqian Wang, Zhenfeng Zhang, Cheng Chen:
Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme. 1237-1245 - Xuefeng He, Xingzheng Ai, Yuewu Jing, Yuanyuan Liu:
Partner selection of agricultural products supply chain based on data mining. 1246-1256
- Salvatore Venticinque, David Camacho:
Intelligent Distributed Computing. 1257-1260
- R. Martin, Ricardo Aler, José María Valls, Inés María Galván:
Machine learning techniques for daily solar energy prediction and interpolation using numerical weather models. 1261-1274 - Alba Amato, Beniamino Di Martino, Marco Scialdone, Salvatore Venticinque:
Distributed architecture for agents-based energy negotiation in solar powered micro-grids. 1275-1290 - Davide Carneiro, André Pimenta, Sérgio Gonçalves, José Neves, Paulo Novais:
Monitoring and improving performance in human-computer interaction. 1291-1309 - Carlos Javier Hernández-Castro, David F. Barrero, María D. R.-Moreno:
Machine learning and empathy: the Civil Rights CAPTCHA. 1310-1323 - Kai Jander, Lars Braubach, Winfried Lamersdorf:
Distributed monitoring and workflow management for goal-oriented workflows. 1324-1335 - Randi Karlsen, David Sundby, Joan C. Nordbotten:
Development of image collection representations for intelligent distributed systems. 1336-1355 - Jason J. Jung:
Exploiting geotagged resources for spatial clustering on social network services. 1356-1367 - Alexander Pokahr, Lars Braubach:
Elastic component-based applications in PaaS clouds. 1368-1384 - Esther Villar-Rodriguez, Javier Del Ser, Ana I. Torre-Bastida, Miren Nekane Bilbao, Sancho Salcedo-Sanz:
A novel machine learning approach to the detection of identity theft in social networks based on emulated attack instances and support vector machines. 1385-1395
Volume 28, Number 5, April 2016
- Wei Wei, Yuhong Zhang, Yang Liu, Zhiguang Qin:
FRP: a fast resource placement algorithm in distributed cloud computing platform. 1399-1416 - Damjan Strnad, Andrej Nerat:
Parallel construction of classification trees on a GPU. 1417-1436 - Xiaoqiang Pei, Yijie Wang, Xingkong Ma, Fangliang Xu:
Repairing multiple failures adaptively with erasure codes in distributed storage systems. 1437-1461 - Absalom E. Ezugwu, Sahalu B. Junaidu, Marc E. Frîncu, Seyed M. Buhari, Afolayan Ayodele Obiniyi:
Scheduling multi-component applications with mobile agents in heterogeneous distributed systems. 1462-1479 - Ting Yu, Julian Oppermann, Chris P. Bradley, Oliver Sinnen:
Performance optimisation strategies for automatically generated FPGA accelerators for biomedical models. 1480-1506 - Xinyang Wang, Jiarong Liang, Deyu Qi, Weiwei Lin:
The twisted crossed cube. 1507-1526 - Kevin Lee, Georg Buss, Daniel Veit:
A heuristic approach for the allocation of resources in large-scale computing infrastructures. 1527-1547 - Rodrigo da Rosa Righi, Cristiano André da Costa, Vinicius Facco Rodrigues, Gustavo Rostirolla:
Joint-analysis of performance and energy consumption when enabling cloud elasticity for synchronous HPC applications. 1548-1571 - Vinay Arora, Rajesh Kumar Bhatia, Maninder Singh:
A systematic review of approaches for testing concurrent programs. 1572-1611 - Duanyang Liu, Xi Yang, Zhen Cheng:
An energy-aware scheduling algorithm for divisible loads in a bus network. 1612-1628 - Yu-Te Lin, Jenq Kuen Lee:
Vector data flow analysis for SIMD optimizations on OpenCL programs. 1629-1654 - Matthias Feldotto, Kalman Graffi:
Systematic evaluation of peer-to-peer systems using PeerfactSim.KOM. 1655-1677 - Dali Li, Chuanfu Xu, Yongxian Wang, Zhifang Song, Min Xiong, Xiang Gao, Xiaogang Deng:
Parallelizing and optimizing large-scale 3D multi-phase flow simulations on the Tianhe-2 supercomputer. 1678-1692
Volume 28, Number 6, April 2016
Editorials
- Yunquan Zhang, Ji-Lin Zhang:
Workshop on high performance data intensive computing. 1695-1696
- Shan-Shan Tu, Shao-Zhang Niu, Hui Li:
A fine-grained access control and revocation scheme on clouds. 1697-1714 - Javid Taheri, Albert Y. Zomaya, Samee U. Khan:
Genetic algorithm in finding Pareto frontier of optimizing data transfer versus job execution in grids. 1715-1736 - Zhenyu Liu, Jingyuan Hu, Yang Li, Yi Huang:
Towards virtual dataspaces for material scientific data cloud. 1737-1750 - Jilin Zhang, Junfeng Yuan, Jian Wan, Jie Mao, Li-Ting Zhu, Li Zhou, Congfeng Jiang, Peng Di, Jue Wang:
Efficient parallel implementation of incompressible pipe flow algorithm based on SIMPLE. 1751-1766
- Mirela Sechi Moretti Annoni Notare:
Wireless and mobile network performance evaluation. 1767-1768
- Haifa Raja Maamar, Azzedine Boukerche, Emil M. Petriu:
A performance evaluation of mobility management and multihop supplying partner strategies for 3D streaming systems over thin mobile devices. 1769-1795 - Constantinos Marios Angelopoulos, Sotiris E. Nikoletseas, Dimitra Patroumpa, Christoforos L. Raptopoulos:
Efficient collection of sensor data via a new accelerated random walk. 1796-1811 - Salvador Climent, Antonio Sánchez, Sara Blanc, Juan Vicente Capella, Rafael Ors:
Wireless sensor network with energy harvesting: modeling and simulation based on a practical architecture using real radiation levels. 1812-1830 - Hayette Boumerzoug, Boucif Amar Bensaber, Ismaïl Biskri:
A lightweight key management scheme based on an Adelson-Velskii and Landis tree and elliptic curve cryptography for wireless sensor networks. 1831-1847 - YunFeng Gu, Azzedine Boukerche, Robson Eduardo De Grande:
Supporting multidimensional range queries in Hierarchically Distributed Tree. 1848-1869
- Gang Li, Wenjia Niu, Li Guo, Lynn Margaret Batten, Yinlong Liu, Guoyong Cai:
Securing cyberspace. 1870-1871
- Bianqing Yuan, Jiqiang Liu:
A universally composable secure grouping-proof protocol for RFID tags. 1872-1883 - Ping Xiong, Lefeng Zhang, Tianqing Zhu:
Semantic analysis in location privacy preserving. 1884-1899