


default search action
International Journal of High Performance Computing and Networking, Volume 14
Volume 14, Number 1, 2019
- Hongyong Ji, Zhangjie Fu:

Coverless information hiding method based on the keyword. 1-7 - Nan Liu, Weipeng Jing, Wenlong Song, Jiawei Zhang:

Measurement method of carbon dioxide using spatial decomposed parallel computing. 8-16 - Ovidiu Mihai Poncea, Sorin Andrei Pistirica, Florica Moldoveanu, Victor Asavei

:
Design and implementation of an Openflow SDN controller in NS-3 discrete-event network simulator. 17-29 - Dongjin Yu, Jiaojiao Wang, Ruiting Wang:

Exploring traffic condition based on massive taxi trajectories. 30-41 - Hongxi Yin, Qingchun Zhao, Dongjiao Xu, Xiaolei Chen, Ying Chang, Hehe Yue, Nan Zhao:

1.25 Gbits/s-message experimental transmission utilising chaos-based fibre-optic secure communications over 143 km. 42-51 - Kashif Hussain, Mohd. Najib Mohd. Salleh, Abdul Mutalib Leman:

Optimisation of ANFIS using mine blast algorithm for predicting strength of Malaysian small medium enterprises. 52-59 - Zhen Li, Minghao Zhao, Han Jiang, Qiuliang Xu:

Keyword guessing on multi-user searchable encryption. 60-68 - Xian-Fa Cai, Jia Wei, Guihua Wen, Zhiwen Yu, Yongming Cai, Jie Li:

Semi-supervised dimensionality reduction based on local estimation error. 69-76 - Udaya Kiran Tupakula, Vijay Varadharajan, Preeti Mishra:

Securing SDN controller and switches from attacks. 77-91 - Rui Wang, Min Lv, Zhiyong Wu, Yongkun Li, Yinlong Xu:

Fast graph centrality computation via sampling: a case study of influence maximisation over OSNs. 92-101 - Qi Liu, Min Lu, Xiaodong Liu, Nigel Linge:

Non-intrusive load monitoring and its challenges in a NILM system framework. 102-111 - Libin Xu, Pin Wan, Yonghua Wang, Ting Liang:

A similarity algorithm based on hamming distance used to detect malicious users in cooperative spectrum sensing. 112-119
Volume 14, Number 2, 2019
- Zhiguo Qu, Huangxing He, Wenjie Liu, Song-Ya Ma:

A self-adaptive quantum steganography algorithm based on QLSb modification in watermarked quantum image. 121-129 - Xiaolin Yang, Zhigang Zhang, Yilin Wang, Cheqing Jin:

Distributed continuous KNN query over moving objects. 130-138 - Aiguo Chen, Xuemei Li, Guoming Lu, Guangchun Luo:

A cross-layer QoS model for space DTN. 139-146 - Yubiao Wang, Junhao Wen, Wei Zhou:

A trust-based evaluation model for data privacy protection in cloud computing. 147-156 - Leyi Shi, Yuwen Cui, Xu Han, Honglong Chen, Deli Liu:

Mimicry honeypot: an evolutionary decoy system. 157-164 - M. Graham Lopez

, Wayne Joubert, Verónica G. Vergara Larrea
, Oscar R. Hernandez, Azzam Haidar, Stanimire Tomov, Jack J. Dongarra:
Evaluation of directive-based performance portable programming models. 165-182 - Jianhong Zhang, Hongxin Meng:

Genuine and secure public auditing for the outsourced data in cloud. 183-196 - Ioannis K. Marmorkos, Costas C. Constantinou

:
Distributed admission control algorithm for random access wireless networks in the presence of hidden terminals. 197-207 - Zhen Chen, Limin Shen, Dianlong You, Huihui Jia, Chuan Ma, Feng Li:

Modelling geographical effect of user neighbourhood on collaborative web service QoS prediction. 208-218 - Xiaohui Yang, Wenqing Ding:

Researches on data encryption scheme based on CP-ASBE of cloud storage. 219-228 - Xiaohong Zhang, Jianji Ren, Zhizhong Liu, Zong-pu Jia:

Deferred virtual machine migration. 229-236 - Chia-Wei Tseng, Po-Hao Lai, Bo-Sheng Huang, Li-Der Chou, Meng-Chiou Wu:

NFV deployment strategies in SDN network. 237-248
Volume 14, Number 3, 2019
- Ying Huang, Yezhen Luo, Honghui Lai, Yiwang Huang:

A new localisation strategy with wireless sensor networks for tunnel space model. 249-256 - Li Tan, Chaoyu Yang, Minghua Yang, Xiaojiang Tang:

Path self-deployment algorithm of three-dimensional space in directional sensor networks. 257-264 - Baowei Wang, Qun Ding, Xiaodu Gu:

A secure reversible chaining watermark scheme with hidden group delimiter for WSNs. 265-273 - Kangshun Li, Weiguang Chen, Ying Huang, Shuling Yang:

A new segmentation algorithm based on evolutionary algorithm and bag of words model. 274-283 - Xianglin Wei, Qin Sun:

A jamming detection method for multi-hop wireless networks based on association graph. 284-293 - Hua Ma, Linchao Zhang, Zhenhua Liu, Enting Dong:

Secure deduplication of encrypted data in online and offline environments. 294-303 - Lei Wu, Longshu Li, Xuejun Li, Futian Wang, Yun Yang:

An efficient temporal verification algorithm for intersectant constraints in scientific workflow. 304-314 - Wei Zhong, Yi Zhuang, Jian Sun, Jingjing Gu:

Load forecasting for cloud computing based on wavelet support vector machine. 315-324 - Yongjun Ren, Wenyue Ma

, Xiaohua Wang:
A new method of text information hiding based on open channel. 325-332 - Yan Mu, Zhili Zhou:

Visual vocabulary tree-based partial-duplicate image retrieval for coverless image steganography. 333-341 - Ping He, Shuli Luan:

Efficient algorithm for online data retrieval with one antenna in wireless networks. 342-355 - Heng Zhang, Bin Zhuang:

An efficient 3D point clouds covariance descriptor for object classification with mismatching correction algorithm. 356-364 - Yassir Samadi, Mostapha Zbakh, Claude Tadonki:

Graph-based model and algorithm for minimising big data movement in a cloud environment. 365-375 - Yanli Liu, Mengyu Zhu:

Processed RGB-D SLAM based on HOG-Man algorithm. 376-384 - Haoxuan Li, Hui Huang, Shichong Tan, Ning Zhang, Xiaotong Fu, Xiaoling Tao:

A new revocable reputation evaluation system based on blockchain. 385-396
Volume 14, Number 4, 2019
- Yanli Liu, Mengyu Zhu:

Telecom customer clustering via glowworm swarm optimisation algorithm. 397-404 - Prema Soundararajan, R. Jehadeesan, B. K. Panigrahi:

A comparative study on automatic parallelisation tools and methods to improve their usage. 405-415 - Mingzhong Wang

:
FollowMe: a mobile crowd sensing platform for spatial-temporal data sharing. 416-424 - Xiao Lin, Haizhou Du, Shenshen Chen:

A novel graph compression algorithm for data-intensive scientific networks. 425-434 - Qi Liu, Zhen Wang, Xiaodong Liu, Nigel Linge:

Outlier detection of time series with a novel hybrid method in cloud computing. 435-443 - Mourad Amad, Djamil Aïssani

, Razika Bouiche, Nouria Madi:
A priority-based queuing system for P2P-SIP call communications control. 444-452 - Mokhtar A. Alworafi, Atyaf Dhari, Sheren A. El-Booz, Suresha Mallappa:

Budget-aware task scheduling technique for efficient management of cloud resources. 453-465 - Yajie Sun, Feihong Gu, Sai Ji:

Sparse reconstruction of piezoelectric signal for phased array structural health monitoring. 466-472 - Dharmaraj R. Patil

, Jayantrao Bhaurao Patil:
Malicious web pages detection using feature selection techniques and machine learning. 473-488

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














