


default search action
International Journal of High Performance Computing and Networking, Volume 12
Volume 12, Number 1, 2018
- Amjad Ullah, Jingpeng Li, Amir Hussain:

Towards workload-aware cloud resource provisioning using a multi-controller fuzzy switching approach. 13-25 - Djamila Bendouda, Lynda Mokdad, Hafid Haffaf:

Exploiting node mobility for fault management in RPL-based wireless sensor networks. 26-38 - Yinbin Miao, Jianfeng Ma, Fushan Wei, Kai Zhang, Zhiquan Liu:

VKSE-DO: verifiable keyword search over encrypted data for dynamic data-owner. 39-48 - Di Zhao:

Acceleration of sequential Monte Carlo for computationally intensive target distribution by parallel lookup table and GPU computing. 49-55 - Hanwu Wang, Lian Pan, Huicong Zou:

An optimised multicast data transmission scheme in IEEE 802.16j wireless relay networks. 56-64 - Huang Hai, Xie Dong Qing, Qi Ke:

A watermarking-based authentication and image restoration in multimedia sensor networks. 65-73 - Alessandro Cilardo:

HtComp: bringing reconfigurable hardware to future high-performance applications. 74-83 - Chun-Hsiung Tseng, Ching-Lien Huang, Yung-Hui Chen, Chu-Chun Chuang, Han-Ci Syu, Yan-Ru Jiang, Fang-Chi Tsai, Pin-Yu Su, Jun-Yan Chen:

Enhance e-learning system performance with a cloud and crowd-oriented approach. 84-93 - Naidila Sadashiv, S. M. Dilip Kumar:

Broker-based resource management in dynamic multi-cloud environment. 94-109
Volume 12, Number 2, 2018
- Jizhong Wang, Chunxiao Wang:

Full secure identity-based encryption scheme over lattices for wireless sensor networks in the standard model. 111-117 - Kun Wu, Jianshe Kang, Kuo Chi:

The fault diagnosis method of RVM based on FOA and improved multi-class classification algorithm. 118-127 - Shuaishuai Zhu, Yiliang Han:

Secure data outsourcing scheme in cloud computing with attribute-based encryption. 128-136 - Yutao Wu, Wenyuan Song, Yongsheng Bai, Yucheng Han, Wenbin Cao:

An optimisation research on two-dimensional age-replacement interval of two-dimensional products. 137-147 - Huiwen Jia, Yupu Hu:

Extensional schemes of multipartite non-interactive key exchange from multilinear maps and their applications. 148-155 - Zhiying Wang, Jun Ye, Jianfeng Wang:

An efficient traceable data sharing scheme in cloud computing for mobile devices. 156-165 - Baojiang Cui, Shanshan He, Xi Yao, Peilin Shi:

Malicious URL detection with feature extraction based on machine learning. 166-178 - Minghao Zhao, Han Jiang, Zhen Li, Qiuliang Xu, Hao Wang, Shaojing Li:

An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms. 179-190 - Yan Liu, Jared M. Chase, Ian Gorton, Mark Rice, Adam Wynne:

Modelling and coordinating multi-source distributed power system models in service-oriented architecture. 191-206 - Ye Li, Xuan Wang, Zoe Lin Jiang, Siu-Ming Yiu:

Outsourcing privacy-preserving ID3 decision tree over horizontally partitioned data for multiple parties. 207-215
Volume 12, Number 3, 2018
- Emad Mahmoud Alsukhni, Shayma Almallahi:

Classifying environmental monitoring data to improve wireless sensor networks management. 217-225 - Haythem Ahmad Bany Salameh, Rawan Shabbar, Ahmad Alshamali:

A power-control interference management mechanism for Femtocell-based networks. 226-234 - Mohammed Naji Al-Kabi:

Exploring the relationships between web accessibility, web traffic, and university rankings: a case study of Jordanian universities. 235-250 - Muder Almiani, Abdul Razaque, Toufik Aidja, Ayman Al-Dmour:

Context-aware latency reduction protocol for secure encryption and decryption. 251-260 - Songwen Pei, Junge Zhang, Naixue Xiong, Myoung-Seo Kim, Jean-Luc Gaudiot:

Energy efficiency of heterogeneous multicore system based on the enhanced Amdahl's law. 261-269 - Jie Chen, Zongliang Gan, Xiuchang Zhu, Jin Wang:

Pixel classified colourisation method based on neighbourhood similarity priori. 270-277 - Yiqin Deng, Ming Zhao, Zhengjiang Wu, Longhua Xiao:

A novel distributed node searching method in DTNs. 278-288 - Chenglong Su, Guang Jin, Xianliang Jiang, Jun Niu:

ElasticQ: an active queue management algorithm with flow trust. 289-298 - Ling Huang, Jiaqi Liu, Lin Guo:

A hybrid mutation artificial bee colony algorithm for spectrum sharing. 299-306 - Xiaoyun Xia

, Langping Tang, Xue Peng:
When is the immune inspired B-cell algorithm superior to the (1+1) evolutionary algorithm? 307-313 - Hui Xu, Jianpei Zhang, Jing Yang, Lijun Lun:

Assessing nodes' importance in complex networks using structural holes. 314-323
Volume 12, Number 4, 2018
- Silviu Panica, Bogdan Irimie, Dana Petcu

:
Enabling and monitoring platform for cloud-based applications. 328-338 - Athanasios Kiourtis, Argyro Mavrogiorgou, Dimosthenis Kyriazis

, Ilias Maglogiannis
, Marinos Themistocleous:
Exploring the complete data path for data interoperability in cyber-physical systems. 339-349 - Rocco Aversa, Luca Tasquier:

Monitoring and management of a cloud application within a federation of cloud providers. 350-361 - Amel Haji, Asma Ben Letaifa

, Sami Tabbane:
New architecture for virtual appliance deployment in the cloud. 362-367 - Beniamino Di Martino, Antonio Esposito

, Giuseppina Cretella:
From business process models to the cloud: a semantic approach. 368-378 - Alba Amato

, Rocco Aversa, Massimo Ficco, Salvatore Venticinque:
Migrating mission-critical applications in federated cloud: a case study. 379-390 - Flora Amato

, Giovanni Cozzolino, Antonino Mazzeo, Sara Romano:
Intelligent medical record management: a diagnosis support system. 391-399 - Xiuqin Pan, Wenmin Zhou, Yong Lu, Dongyin Sun:

Semi-supervised PSO clustering algorithm based on self-adaptive parameter optimisation. 400-409 - Suqin Ji, Hongbo Shi, Yali Lv, Min Guo:

Scalable bootstrap attribute reduction for massive data. 410-417 - Ricardo Jiménez-Peris, Marta Patiño-Martínez

, Ivan Brondino, Valerio Vianello:
Transaction management across data stores. 418-427

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














