default search action
Journal of Computational Science, Volume 22
Volume 22, September 2017
- David Chalupa, Christian Blum:
Mining k-reachable sets in real-world networks using domination in shortcut graphs. 1-14 - Saad Alowayyed, Derek Groen, Peter V. Coveney, Alfons G. Hoekstra:
Multiscale computing in the exascale era. 15-25 - Pablo Rabanal, Ismael Rodríguez, Fernando Rubio:
Applications of river formation dynamics. 26-35 - Faryad Darabi Sahneh, Aram Vajdi, Heman Shakeri, Futing Fan, Caterina M. Scoglio:
GEMFsim: A stochastic simulator for the generalized epidemic modeling framework. 36-44 - Byron E. Moutafis, Christos K. Filelis-Papadopoulos, George A. Gravvanis:
Parallel multi-projection preconditioned methods based on semi-aggregation techniques. 45-54 - Debashis De, Jadav Chandra Das:
Design of novel carry save adder using quantum dot-cellular automata. 54-68 - Oluwole K. Oyebamiji, Darren J. Wilkinson, Pahala Gedara Jayathilake, Thomas P. Curtis, S. P. Rushton, Bowen Li, P. Gupta:
Gaussian process emulation of an individual-based model simulation of microbial communities. 69-84 - Mete Celik, Ahmet Sakir Dokuz:
Discovering socio-spatio-temporal important locations of social media users. 85-98 - Fabio Verbosio, Arne De Coninck, Drosos Kourounis, Olaf Schenk:
Enhancing the scalability of selected inversion factorization algorithms in genomic prediction. 99-108 - Bijil Prakash, Amit Setia, Deepak Alapatt:
Numerical solution of nonlinear fractional SEIR epidemic model by using Haar wavelets. 109-118 - Yi-Kuei Lin, Shin-Guang Chen:
A maximal flow method to search for d-MPs in stochastic-flow networks. 119-125
- Mauro Iacono, Marco Gribaudo, Joanna Kolodziej, Florin Pop:
Modeling and evaluation of highly complex computer systems architectures. 126-130 - Dimitrios Tychalas, Helen D. Karatza:
High performance system based on Cloud and beyond: Jungle Computing. 131-147 - Pang-Wei Tsai, Francesco Piccialli, Chun-Wei Tsai, Mon-Yen Luo, Chu-Sing Yang:
Control frameworks in network emulation testbeds: A survey. 148-161 - Ugo Fiore, Paolo Zanetti, Francesco Palmieri, Francesca Perla:
Traffic matrix estimation with software-defined NFV: Challenges and opportunities. 162-170 - Dae-Young Kim, Seokhoon Kim, Houcine Hassan, Jong Hyuk Park:
Adaptive data rate control in low power wide area networks for long range IoT services. 171-178 - Massimo Ficco, Michal Choras, Rafal Kozik:
Simulation platform for cyber-security and vulnerability analysis of critical infrastructures. 179-186 - Ewa Niewiadomska-Szynkiewicz, Adam Kozakiewicz:
Design and evaluation of a system for network threat signatures generation. 187-197 - Grazyna Suchacka, Daria Wotzka:
Modeling a non-stationary bots' arrival process at an e-commerce Web site. 198-208 - Jacek M. Czerniak, Hubert Zarzycki:
Artificial Acari Optimization as a new strategy for global optimization of multimodal functions. 209-227 - Salvatore Cuomo, Pasquale De Michele, Ardelio Galletti, Livia Marcellino:
A parallel PDE-based numerical algorithm for computing the Optical Flow in hybrid systems. 228-236
- Boucif Amar Bensaber, Luca Foschini:
Performance evaluation of communications in distributed systems and web based service architectures. 237-239 - Robertas Damasevicius, Christian Napoli, Tatjana Sidekerskiene, Marcin Wozniak:
IMF mode demixing in EMD for jitter analysis. 240-252 - Walid Serrai, Abdelkrim Abdelli, Lynda Mokdad, Youcef Hammal:
Towards an efficient and a more accurate web service selection using MCDM methods. 253-267 - Carlos Ferreira, Susana Sargento, Arnaldo S. R. Oliveira:
An architecture for a learning-based autonomic decision system. 268-282 - Hacène Fouchal, Emilien Bourdy, Geoffrey Wilhelm, Marwane Ayaida:
A validation tool for cooperative intelligent transport systems. 283-288 - Hyunbum Kim, Jalel Ben-Othman, Paolo Bellavista:
Collision-free reinforced barriers in UAV networks. 289-300 - Yasuyuki Tanaka, Mitsuaki Akiyama, Atsuhiro Goto:
Analysis of malware download sites by focusing on time series variation of malware. 301-313
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.