


default search action
Information Sciences, Volume 379
Volume 379, February 2017
- Md. Zakirul Alam Bhuiyan

, Sy-Yen Kuo
, Jie Wu:
Special issue on dependability in parallel and distributed systems and applications. 1-2 - Jianxin Li, Yangyang Zhang

, Jingsheng Zheng, Hanqing Liu, Bo Li, Jinpeng Huai:
Towards an efficient snapshot approach for virtual machines in clouds. 3-22 - Yingxin Cheng, Xiao Fu, Xiaojiang Du, Bin Luo, Mohsen Guizani:

A lightweight live memory forensic approach based on hardware virtualization. 23-41 - Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li, Ilsun You:

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. 42-61 - Xuhui Liu, Qin Liu, Tao Peng, Jie Wu:

Dynamic access policy in cloud-based personal health record (PHR) systems. 62-81 - Yuanfang Chen, Noël Crespi, Antonio Manuel Ortiz, Lei Shu

:
Reality mining: A prediction algorithm for disease dynamics based on mobile big data. 82-93 - Bing Tang, Mingdong Tang, Gilles Fedak, Haiwu He:

Availability/Network-aware MapReduce over the Internet. 94-111 - Bunjamin Memishi, María S. Pérez, Gabriel Antoniu:

Failure detector abstractions for MapReduce-based systems. 112-127 - Md. Mamunur Rashid

, Iqbal Gondal
, Joarder Kamruzzaman
:
Dependable large scale behavioral patterns mining from sensor data using Hadoop platform. 128-145 - Sancheng Peng, Aimin Yang, Lihong Cao, Shui Yu

, Dongqing Xie:
Social influence modeling using information theory in mobile social networks. 146-159 - Tian Wang, Zhen Peng, Sheng Wen

, Yongxuan Lai, Weijia Jia
, Yiqiao Cai, Hui Tian
, Yonghong Chen:
Reliable wireless connections for fast-moving rail users based on a chained fog structure. 160-176 - Christian Esposito

, Aniello Castiglione
, Francesco Palmieri
:
Layered multicast for reliable event notification over large-scale networks. 177-194 - Farzana Rahman, Md. Endadul Hoque, Sheikh Iqbal Ahamed:

AnonPri: A secure anonymous private authentication protocol for RFID systems. 195-210 - Md. Shamsul Huda, Md. Suruz Miah

, Mohammad Mehedi Hassan, Md. Rafiqul Islam
, John Yearwood, Majed A. AlRubaian, Ahmad Almogren
:
Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data. 211-228 - Mohammad Shahriar Rahman

, Anirban Basu
, Shinsaku Kiyomoto, Md. Zakirul Alam Bhuiyan
:
Privacy-friendly secure bidding for smart grid demand-response. 229-240 - Longxin Zhang

, Kenli Li, Changyun Li
, Keqin Li:
Bi-objective workflow scheduling of the energy consumption and reliability in heterogeneous computing systems. 241-256 - Laurence T. Yang

, Ying Huang, Jun Feng
, Qiwen Pan, Chunsheng Zhu:
An improved parallel block Lanczos algorithm over GF(2) for integer factorization. 257-273 - Gabriel P. Gimenes, Robson L. F. Cordeiro

, José Fernando Rodrigues Jr.:
ORFEL: Efficient detection of defamation or illegitimate promotion in online recommendation. 274-287 - Rosana Veroneze

, Arindam Banerjee, Fernando J. Von Zuben:
Enumerating all maximal biclusters in numerical datasets. 288-309 - Scott Lauber

:
Comments on "network-based H∞ control for singular systems with event-triggered sampling scheme [Information Sciences 329 (2016) 540-551]". 310-312 - Thiago N. C. Cardoso, Rodrigo M. Silva, Sérgio D. Canuto

, Mirella M. Moro
, Marcos André Gonçalves
:
Ranked batch-mode active learning. 313-337 - Seung Hwan Ryu, Boualem Benatallah

:
Experts community memory for entity similarity functions recommendation. 338-355

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














