


default search action
International Journal of Distributed Systems and Technologies, Volume 3
Volume 3, Number 1, 2012
- Nicolas Nobelis, Karima Boudaoud, Christian Delettre, Michel Riveill

:
Designing Security Properties-Centric Communication Protocols using a Component-Based Approach. 1-16 - Alexandra Carpen-Amarie, Alexandru Costan

, Catalin Adrian Leordeanu
, Cristina Basescu, Gabriel Antoniu:
Towards a Generic Security Framework for Cloud Data Management Environments. 17-34 - Tim French, Nik Bessis

, Carsten Maple, Eleana Asimakopoulou:
Trust Issues on Crowd-Sourcing Methods for Urban Environmental Monitoring. 35-47 - Jie Zhang:

Trust Management for VANETs: Challenges, Desired Properties and Future Directions. 48-62
Volume 3, Number 2, 2012
- Carlos Eduardo S. Pires

, Rocir Marcos Leite Santiago, Ana Carolina Salgado
, Zoubida Kedad, Mokrane Bouzeghoub:
Ontology-Based Clustering in a Peer Data Management System. 1-21 - Naveen Chauhan

, Lalit Kumar Awasthi
, Narottam Chand
:
Cache Replacement in Mobile Adhoc Networks. 22-38 - Ioan Sorin Comsa, Mehmet Aydin, Sijing Zhang, Pierre Kuonen, Jean-Frédéric Wagen:

Multi Objective Resource Scheduling in LTE Networks Using Reinforcement Learning. 39-57 - Muhammad Imran

, Khursheed Khursheed
, Abdul Waheed Malik, Naeem Ahmad, Mattias O'Nils, Najeem Lawal, Benny Thörnberg
:
Architecture Exploration Based on Tasks Partitioning Between Hardware, Software and Locality for a Wireless Vision Sensor Node. 58-71 - Jean-Charles Tournier, Vaibhav Donde, Zhao Li, Martin Naef:

Potential of General Purpose Graphic Processing Unit for Energy Management System. 72-82 - Andrzej Jordan, Carsten Maple, Ryszard Szczebiot

:
Optimal Placement of the Wind Generators in the Medium Voltage Power Grid. 83-92
Volume 3, Number 3, 2012
- Admir Barolli

, Makoto Takizawa
, Tetsuya Oda, Evjola Spaho
, Leonard Barolli
, Kazunori Uchida, Fatos Xhafa
:
Performance Evaluation of WMN-GA Simulation System for Different Settings of Genetic Operators Considering Giant Component and Number of Covered Users. 1-14 - Noriyasu Yamamoto, Toshihiko Wakahara:

Evaluation of Encryption Procedure for User Attestation System Using a Cellular Phone. 15-26 - Minoru Uehara:

Metabolic Computing: Towards Truly Renewable Systems. 27-39 - Markus Graube, Johannes Pfeffer, Jens Ziegler, Leon Urbas

:
Linked Data as Integrating Technology for Industrial Data. 40-52 - Ying-Hong Wang, Kuo-Feng Huang, Shaing-Ting Lin:

A Grid-Based Hole Detection Scheme in WSNs. 53-71 - Stelios Sotiriadis, Nik Bessis

, Nick Antonopoulos:
Exploring Inter-Cloud Load Balancing by Utilizing Historical Service Submission Records. 72-81
Volume 3, Number 4, 2012
- Asta Zelenkauskaite

, Paolo Massa
:
Contributing to Wikipedia: Through Content or Social Interaction? 1-13 - Iris Kaiser:

Collaborative Trend Analysis Using Web 2.0 Technologies: A Case Study. 14-23 - Alexiei Dingli, Dylan Seychell:

Taking Social Networks to the Next Level. 24-33 - Carsten Maple, Emma Short, Antony Brown, Chris Bryden, Michael Salter:

Cyberstalking in the UK: Analysis and Recommendations. 34-51 - Risto Honkanen, Ville Leppänen

:
Routing in Coloured Sparse Optical Tori by Using Balanced WDM and Network Sparseness. 52-62 - G. M. Siddesh, K. G. Srinisas:

An Adaptive Scheduler Framework for Complex Workflow Jobs on Grid Systems. 63-79

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














