


default search action
Multiagent and Grid Systems, Volume 12
Volume 12, Number 1, 2016
- Takahiro Majima, Keiki Takadama, Daisuke Watanabe

, Mitujiro Katuhara:
Characteristic and application of network evolution model for public transport network. 1-11 - Absalom E. Ezugwu

, Marc E. Frîncu
, Sahalu B. Junaidu:
Characterization of grid computing resources using measurement-based evaluation. 13-34 - Chairi Kiourt

, Dimitris Kalles
:
A platform for large-scale game-playing multi-agent systems on a high performance computing infrastructure. 35-54 - Esma Insaf Djebbar, Ghalem Belalem

, Merien Benadda:
Task scheduling strategy based on data replication in scientific Cloud workflows. 55-67
Volume 12, Number 2, 2016
- Suyel Namasudra

, Pinki Roy
:
Secure and efficient data access control in cloud computing environment: A survey. 69-90 - Meiyu Shi, Wei Zhu, Hongji Yang, Chen Li

:
Using agent-based model to simulate stakeholder balance model of tourism intangible cultural heritage. 91-103 - Ahmed Taki Eddine Dib, Kamel Barkaoui, Zaïdi Sahnoun:

Specification and verification of reconfigurable multi-agent system architectures. 105-124 - Wei Meng, Shaobo Li, Jinglei Qu

:
An iterative and fair protocol for bilateral multi-issue negotiation with complex utility space. 125-138 - Fabien Delecroix, Maxime Morge

, Thomas Nachtergaelle, Jean-Christophe Routier:
Multi-party negotiation with preferences rather than utilities. 139-165
Volume 12, Number 3, 2016
- Esha Barlaskar, Yumnam Jayanta Singh

, Biju Issac
:
Energy-efficient virtual machine placement using enhanced firefly algorithm. 167-198 - Meftah Mohammed Charaf Eddine, Okba Kazar

:
An agent based approach for modeling a groupware. 199-215 - Said Limam

, Ghalem Belalem
:
A self-adaptive conflict resolution with flexible consistency guarantee in the cloud computing. 217-238 - Nirmal Kaur

, Savina Bansal
, Rakesh Kumar Bansal:
Energy efficient duplication-based scheduling for precedence constrained tasks on heterogeneous computing cluster. 239-252
Volume 12, Number 4, 2016
- Shaik Naseera:

A survey on data replication strategies in a Data Grid environment. 253-269 - Sanjay Chakraborty

, Lopamudra Dey
:
A rule based probabilistic technique for malware code detection. 271-286 - Fatima Kalfadj, Belabbes Yagoubi:

Dynamic fault tolerant scheduling policy for workflows in Grid computing. 287-302 - Ellie Lovellette

, Henry Hexmoor:
Voronoi diagrams for automated argumentations among Internet of Things. 303-318 - Robin Cohen, John Finnson, Thomas T. Tran, Jie Zhang:

An ontological representation for trust-based decision making in transportation environments. 319-342

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














