


default search action
International Journal of High Performance Computing and Networking, Volume 9
Volume 9, Numbers 1/2, 2016
- Tianzhu Wen, Aiqiang Xu, Jiayu Tang:

Study on extension negative selection algorithm. 1-7 - Liqiong Chen, Guisheng Fan, Huanhuan Zhang, Lizhong Xiao:

Petri nets-based method to model and analyse the self-healing web service composition. 8-18 - Shuchih Ernest Chang, Yu-Teng Jacky Jang, Wei-Cheng Shen, Wen-Chi Su:

Cocktail: a service-oriented cloud storage architecture for enhancing service quality. 19-30 - ZhiHui Lv, Jie Wu, Jie Bao, Patrick C. K. Hung:

OCReM: OpenStack-based cloud datacentre resource monitoring and management scheme. 31-44 - Guibo Liu, Zhan Wang, Dayong Luo, Ying Guo, Moon Ho Lee:

Fast circulant block Jacket transform based on the Pauli matrices. 45-51 - Weina Lu, Xiaohui Hu, Xiaotao Li, Yuan Wei:

A new method of QoS prediction based on probabilistic latent feature analysis and cloud similarity. 52-60 - Aobing Sun, Tongkai Ji, Jun Wang:

Cloud platform scheduling strategy based on virtual machine resource behaviour analysis. 61-69 - Xiaogang Wang, Jian Cao, Jie Wang:

A dynamic cloud service selection strategy using adaptive learning agents. 70-81 - Man Zhang, Zhenhua Duan, Qingshan Li, Hua Chu:

Transformation from business process models to BPEL with overlapped patterns involved. 82-92 - Guosheng Kang, Liqin Yang, Wei Xu, Zhaoyang Tian, Liang Zhang:

Artefact-centric business process configuration. 93-103 - Chang-Ai Sun, Guan Wang, Qing Wen, Dave Towey

, Tsong Yueh Chen
:
MT4WS: an automated metamorphic testing system for web services. 104-115 - Helan Liang, Yanhua Du:

Two-stage dynamic optimisation of service processes with temporal constraints. 116-126 - Qiping She, Qing Li, Juan Deng:

The study of multi-instance purchase decision-making for minimising customers' cost under fluctuating cloud demands. 127-133 - Shijun Liu, Ze-yu Di, Lei Wu, Li Pan, Yuliang Shi:

Probabilistic-based workload forecasting and service redeployment for multi-tenant services. 134-149 - Junling Zhang, Shijun Liu, Lizhen Cui, Lei Wu, Li Pan:

A Bayesian approach to performance modelling for multi-tenant applications using Gaussian models. 150-159 - Gang Tian, Chengai Sun, Keqing He, Xiang-min Ji:

Transferring auxiliary knowledge to enhance heterogeneous web service clustering. 160-169
Volume 9, Number 3, 2016
- Kok-Leong Ong, Andrzej Goscinski, Yuzhang Han, Peter Brezany, Zahir Tari

, Lei Yan:
SSC: cloud-based data stream management in distributed environments. 171-189 - Yoshihiro Oyama, Jun Murakami, Shun Ishiguro, Osamu Tatebe

:
Implementation of a deduplication cache mechanism using content-defined chunking. 190-205 - Sapna U. Prabhu, Rohin D. Daruwala:

Shared resource management in multi-core systems using LV competition model. 206-217 - Guangwei Xu, Yanbin Yang, Cairong Yan, Yanglan Gan:

A probabilistic verification algorithm against spoofing attacks on remote data storage. 218-229 - Rashmi M. Jogdand, S. B. Batlad, Durgaprasad Gangodkar:

CSaaS - a multi-cloud framework for secure file storage technology using open ZFS. 230-241 - Seppo J. Ovaska

, Roy E. Dragseth, Svenn A. Hanssen:
Direct-to-chip liquid cooling for reducing power consumption in a subarctic supercomputer centre. 242-249 - Amit Barve

, Brijendra Kumar Joshi
:
Fast parallel lexical analysis on multi-core machines. 250-257 - Ying Tang, Zhan Zhou, Xiaoying Shi, Jing Fan:

Parallel computing of texture-optimisation-based flow visualisation on CUDA. 258-270
Volume 9, Number 4, 2016
- Haythem Ahmad Bany Salameh

, Mohammed Fozi Dhainat:
Event-driven hybrid MAC protocol for a two-tier cognitive wireless sensor network: design and implementation. 271-280 - Izzat Alsmadi:

The integration of access control levels based on SDN. 281-290 - Fouad Benamrane, Francisco J. Ros, Mouad Ben Mamoun:

Synchronisation cost of multi-controller deployments in software-defined networks. 291-298 - Somchart Fugkeaw

, Hiroyuki Sato:
Embedding lightweight proxy re-encryption for efficient attribute revocation in cloud computing. 299-309 - Samer Samarah:

Vector-based data prediction model for wireless sensor networks. 310-315 - Qiang Duan, Athanasios V. Vasilakos

:
Federated selection of network and cloud services for high-performance software-defined cloud computing. 316-327 - Lo'ai Tawalbeh

, Yousef Haddad, Omar Khamis, Elhadj Benkhelifa
, Yaser Jararweh
, Fahd M. Al-Dosari:
Efficient and secure software-defined mobile cloud computing infrastructure. 328-341 - Fatiha Houacine, Samia Bouzefrane, Aghiles Adjaz:

Service architecture for multi-environment mobile cloud services. 342-355
Volume 9, Numbers 5/6, 2016
- Lingbo Jiang, Yuping Wang, Tiehua Wen, Jianfeng Tan:

Remote attestation approach by cross-layer security policy translation. 357-371 - Junfeng Tian, Hongqiang Jiao, Baomin Wang, Chao Chen:

An e-commerce trust model based on expanded subjective logic. 372-381 - Qian Gao, Zhen Han, Yong-Zhong He, Daoshun Wang:

Two image encryption methods with hiding effect based on moiré pattern. 382-393 - Longfei Liu, Xiaoyuan Yang, Xiaoni Du, Bin Wei:

On the k-error linear complexity of generalised cyclotomic sequences. 394-400 - Lixia Wang, Qing Zhu:

Utility-based anonymisation for dataset with multiple sensitive attributes. 401-408 - Hao Peng, Dandan Zhao, Jianmin Han, Jianfeng Lu:

An anonymity mechanism with reduced server-side cost in peer-to-peer networks. 409-416 - Tanping Zhou, Xiaoyuan Yang, Wei Zhang, Liqiang Wu:

Efficient fully homomorphic encryption with circularly secure key switching process. 417-422 - Linchen Yu, Hong Yao, Xiaofei Liao:

A novel GPU resources management and scheduling system based on virtual machines. 423-430 - Shuang Xiang, Bo Zhao, Yu Xiao, Yang An:

Security risk analysis of IaaS based on the abstract state machine model. 431-442 - Yanfeng Shi, Jiqiang Liu, Zhen Han, Shuo Qiu:

Deterministic attribute-based encryption. 443-450 - Yixuan Zhang, Jingsha He, Bin Zhao, Ruohong Liu:

Application of game theory for dynamic access control in security systems. 451-461 - Ting Feng, Kenli Li, Yunchuan Qin

, Siyang Yu:
A dynamic active shield against shield rerouting attack. 462-469 - Hongwei Zhou, Wenchang Shi, Jinhui Yuan, Fulin Li:

BeCFI: detecting hidden control flow with performance monitoring counters. 470-479 - Jing-Jing Wang, Jiayong Chen, Xiaoyuan Yang:

Research on generating good key sequence based on chaos. 480-488 - Zongmin Cui, Guangyong Gao, Caixue Zhou, Jing Yu, An-Yuan Deng, Changshou Deng:

Efficient key management for publish/subscribe system in cloud scenarios. 489-498

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














