


default search action
International Journal of Computational Science and Engineering, Volume 9
Volume 9, Numbers 1/2, 2014
- Chun-Yuan Lin, Sheng-Ta Li, Che-Lun Hung:

Frequency-based re-sequencing tool for short reads on graphics processing units. 3-10 - Chun-Yuan Lin, Yu-Shiang Lin:

Efficient parallel algorithm for multiple sequence alignments with regular expression constraints on graphics processing units. 11-20 - Bouraoui Ouni, Abdellatif Mtibaa

:
Temporal partitioning of data flow graphs for reconfigurable architectures. 21-33 - Quey-Liang Kao, Che-Rung Lee:

Preliminary performance evaluations of the determinant quantum Monte Carlo simulations for multi-core CPU and many-core GPU. 34-43 - Chia-Pang Chen, Cheng-Long Chuang, Tzu-Shiang Lin, Chun-Yi Liu, Joe-Air Jiang

, Hsiao-Wei Yuan
, Chyi-Rong Chiou, Chung-Hang Hong:
TernCam: an automated energy-efficient visual surveillance system. 44-54 - Peng Xiao, Dongbo Liu:

Multi-scheme co-scheduling framework for high-performance real-time applications in heterogeneous grids. 55-63 - Slo-Li Chu, Chih-Chieh Hsiao:

Optimising space exploration of OpenCL for GPGPUs. 64-79 - G. Murugesan

, C. Chellappan:
Multi-source task scheduling in grid computing environment using linear programming. 80-85 - Jen-Chieh Yeh, Chi-Hung Lin, Chun-Nan Liu:

Multi-core system performance prediction and analysis at the ESL. 86-94 - V. Sanju, C. Koushika, R. Sharmili, Niranjan N. Chiplunkar

, M. Khalid:
Design and implementation of a network on chip-based simulator: a performance study. 95-105 - Marlon Scalabrin, Rafael S. Parpinelli

, César Manuel Vargas Benítez
, Heitor S. Lopes
:
Population-based harmony search using GPU applied to protein structure prediction. 106-118 - Randall E. Duran

, Ding Chen, Rishi Saraswat, Aaron Hallmark:
A framework for comparing high performance computing technologies. 119-129 - G. Kavitha, V. Sankaranarayanan:

A novel resource selection framework to improve QoS in computational grid. 130-138 - Xinguo Xu, Wei Kang, Zhiqi Fang, Baohui Sun, Yan Wang, Tingshao Zhu

:
Global and initiative safety mechanism in industrial control system. 139-146 - Ming Yang

, Jianliang Gao:
Numerical simulation on the influence of gob permeability on distribution of air leakage flow field. 147-152
Volume 9, Number 3, 2014
- Yung-Hui Chen, Lawrence Y. Deng:

The best learning order inference based on blue-red trees of rule-space model for social network. 155-164 - Korra Sathya Babu

, Jhalaka Hota
, Sanjay Kumar Jena:
Privacy preserving social networking. 165-176 - V. Subramaniyaswamy

, S. Chenthur Pandian
:
Topic ontology-based efficient tag recommendation approach for blogs. 177-187 - Deepa Anand, Kamal Kant Bharadwaj:

Exploring graph-based global similarity estimates for quality recommendations. 188-197 - M. Arunachalam, V. Rajamani:

An efficient flooding algorithm for improving network performance in optical WDM networks. 198-204 - Wei Liu, Wenjie Xu, Dong Wang, Xujie Zhang, Zongtian Liu:

An extending description logic for action formalism in event ontology. 205-214 - C. Kavitha

, G. Sudha Sadasivam
, M. A. Priya:
Annotation-based document classification using shuffled frog leaping algorithm. 215-221 - Pasquale Cantiello, Beniamino Di Martino

:
Software porting support with component-based and language neutral source code analysis. 222-234 - Jin Zhu, Yoshiyori Urano, Hidenori Nakazato, Qun Jin:

A progressive approach for cross-browser web data generation. 235-246 - Ahmed N. Oumer

, Othman Mamat
:
Numerical modelling of non-isothermal flow of fibre suspensions: prediction of fibre orientation in three-dimensional cavities. 247-256 - Sayan Kaennakham

, Moji Moatamedi:
An automatic mesh adaptation algorithm and its performance for simulation of flow over a circular cylinder at Re = 1.4 × 105. 257-273
Volume 9, Number 4, 2014
- Simeon Veloudis

, Dimitrios A. Baltatzis, Christos Ilioudis
, George Pangalos:
A formal framework to support dynamic authorisation in collaborative environments. 278-291 - Zakaria Al-Qudah, Basheer Al-Duwairi, Osama Daifallah Al-Khaleel:

DDoS protection as a service: hiding behind the giants. 292-300 - He Du, Jian Wang, Yanan Liu:

Independent verification of proxy multi-signature scheme. 301-311 - Dwaine E. Clarke

:
Hybrid certificate closure-chain discovery public key system. 312-324 - Luca Caviglione

, Mauro Coccoli
, Alessio Merlo:
A taxonomy-based model of security and privacy in online social networks. 325-338 - Wei Ren

, Yuliang Liu:
A lightweight possession proof scheme for outsourced files in mobile cloud computing based on chameleon hash function. 339-346 - Feng Gao, Jingsha He

, Shunan Ma:
Modelling the relationship between trust and privacy in network environments. 347-354 - Shaik Shakeel Ahamad

, V. N. Sastry, Siba K. Udgata
:
Secure mobile payment framework based on UICC with formal verification. 355-370 - Sushma Kejgir, Manesh Kokare:

Robust multichannel colour image watermarking using lifting wavelet transform with singular value decomposition. 371-385 - Al-Sakib Khan Pathan

, Diallo Abdoulaye Kindy:
Lethality of SQL injection against current and future internet technologies. 386-394
Volume 9, Numbers 5/6, 2014
- Wouter Dekeyser

, Detlev Reiter, Martine Baelmans
:
Optimal shape design for divertors. 397-407 - Johannes Willkomm, Christian H. Bischof, H. Martin Bücker

:
A new user interface for ADiMat: toward accurate and efficient derivatives of MATLAB programmes with ease of use. 408-415 - Sebastian Reiter, Dmitriy Logashenko

, Sabine Stichel, Gabriel Wittum, Alfio Grillo:
Models and simulations of variable-density flow in fractured porous media. 416-432 - Jörg Ostrowski, Romeo Bianchetti, Irena Erceg-Baros, Bernardo Galletti, Rudolf Gati, David Pusch, Michael Schwinne, Benjamin Wüthrich:

Computational magnetohydrodynamics in the simulation of gas circuit breakers. 433-444 - Tim Bastian Klaus, Oliver Heuss, Christian Thyes

, Holger Hanselka:
FDTD simulation of the acoustic interaction between a cavity and an adaptive Helmholtz resonator. 445-456 - I. Ficza, M. Vaverka, Martin Hartl

:
Numerical solution of contact pressure in lubricated non-smooth point contact using convolution algorithms. 457-464 - Bettina Schieche, Jens Lang:

Uncertainty quantification for thermo-convective Poiseuille flow using stochastic collocation. 465-477 - Annette Fröhlcke, Erion Gjonaj

, Thomas Weiland:
A boundary conformal discontinuous Galerkin approach for electro-quasistatic field problems on Cartesian grids. 478-483 - Frank D. Bramkamp, Bernhard Pollul, Arno Rasch, Gero Schieffer:

Matrix-free second-order methods in implicit time integration for compressible flows using automatic differentiation. 484-498 - Henrik Büsing, Johannes Willkomm, Christian H. Bischof, Christoph Clauser:

Using exact Jacobians in an implicit Newton method for solving multiphase flow in porous media. 499-508 - Debora Clever

, Jens Lang, Dirk Schröder:
Model hierarchy-based optimal control of radiative heat transfer. 509-525 - Mathias Lemke

, J. Schulze, Jörn Sesterhenn
:
Adjoint-based reconstruction of an entropy source by discrete temperature measurements. 526-537 - Jens Trommler, Stephan Koch, Thomas Weiland:

Coupled simulation of switching arcs considering transient-capacitive effects. 538-548 - Mohammad Kazem Akhlaghi, Alireza Fathi

, Hamidreza Mohamadi Danyali, Mohamad Ali Khesali:
A novel particle swarm optimiser with semi-active congregation and a nature-inspired supervising algorithm. 549-558

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














