


default search action
Scalable Computing: Practice and Experience, Volume 20
Volume 20, Number 1, 2019
- Rosilah Hassan, Khairol Amali Bin Ahmad

, Khaleel Ahmad
:
Introduction to the Special Issue on Opportunistic Network and its Security Challenges. iii-v
- Ritu Nigam, Deepak Kumar Sharma

, Satbir Jain, Sarthak Gupta, Shilpa Ghosh:
Bonding Based Technique for message forwarding in Social Opportunistic Network. 1-15 - Sharif Hossen, Muhammad Sajjadur Rahim

:
Analysis of Delay-Tolerant Routing Protocols using the Impact of Mobility Models. 17-26 - Deepak Kumar Sharma

, Deepika Kukreja:
Establishing Reliability for Efficient Routing in Opportunistic Networks. 27-40 - Pawan Singh Mehra

, Mohammad Najmud Doja, Bashir Alam
:
Enhanced Clustering Algorithm based on Fuzzy Logic (E-CAFL) for WSN E-CAFL for Homogeneous WSN. 41-54 - Rajan Sharma, Balwinder Singh Sohi, Nitin Mittal

:
Zone-based Energy Efficient Routing Protocols for Wireless Sensor Networks. 55-70 - Arvinda Kushwaha, Mohd Amjad:

A Particle Swarm Optimization Based Load Scheduling Algorithm in Cloud Platform for Wireless Sensor Networks. 71-82 - Musaeed Abouaroek, Khaleel Ahmad

:
Node Authentication Using NTRU Algorithm in Opportunistic Network. 83-92 - Suman Bala, Gaurav Sharma, Himani Bansal

, Tarunpreet Bhatia:
On the Security of Authenticated Group Key Agreement Protocols. 93-99 - Pankhuri, Akash Sinha

, Gulshan Shrivastava
, Prabhat Kumar:
A Pattern-Based Multi-Factor Authentication System. 101-112 - Asif Iqbal Hajamydeen

, Nur Izura Udzir:
A Detailed Description on Unsupervised Heterogeneous Anomaly Based Intrusion Detection Framework. 113-160 - Chanchal Kumar, Mohammad Najmud Doja:

A Secure Structure for Hiding Information in a Cryptosystem based on Machine-learning Techniques and Content-based Optimization using Portfolio Selection Data. 161-180 - Hamza Mutaher Alshameri

, Pradeep Kumar
:
An Efficient Zero-Knowledge Proof Based Identification Scheme for Securing Software Defined Network. 181-189
Volume 20, Number 2, 2019
- Anand Nayyar

, Rudra Rameshwar, Pijush Kanti Dutta Pramanik
:
Special Issue on Recent Trends and Future of Fog and Edge Computing, Services and Enabling Technologies Editorial File. iii-vi
- Sujata Dash

, Sitanath Biswas
, Debajit Banerjee, Atta-ur-Rahman
:
Edge and Fog Computing in Healthcare - A Review. 191-206 - Parminder Singh

, Pooja Gupta
, Kiran Jyoti
:
Triangulation Resource Provisioning for Web Applications in Cloud Computing: A Profit-Aware Approach. 207-222 - Akshi Kumar

, Abhilasha Sharma:
Ontology Driven Social Big Data Analytics for Fog enabled Sentic-Social Governance. 223-236 - Avinash Kaur

, Pooja Gupta
, Manpreet Singh
:
Hybrid Balanced Task Clustering Algorithm for Scientific Workflows in Cloud Computing. 237-258 - Pijush Kanti Dutta Pramanik

, Saurabh Pal, Prasenjit Choudhury
:
Green and Sustainable High-Performance Computing with Smartphone Crowd Computing. 259-284 - A. Dhanapal

, P. Nithyanandam
:
The Slow HTTP Distributed Denial of Service Attack Detection in Cloud. 285-298 - Mandeep Kaur

, Rajni Mohana:
Static Load Balancing Technique for Geographically Partitioned Public Cloud. 299-316 - Mukta

, Neeraj Gupta
:
Analytical Available Bandwidth Estimation in Wireless Ad-hoc Networks Considering Mobility in 3-Dimensional Space. 317-334 - R. Sridharan, S. Domnic:

Placement Strategy for Intercommunicating Tasks of an Elastic Request in Fog-Cloud Environment. 335-348 - S. Velliangiri

, R. Rajagopal, P. Karthikeyan:
Trust Factor Based Key Distribution Protocol in Hybrid Cloud Environment. 349-364 - Vivek Kumar Prasad, Madhuri Bhavsar

, Sudeep Tanwar
:
Influence of Montoring: Fog and Edge Computing. 365-376 - Avinash Kaur

, Pooja Gupta
, Manpreet Singh
, Anand Nayyar
:
Data Placement in Era of Cloud Computing: a Survey, Taxonomy and Open Research Issues. 377-398 - Parminder Singh

, Pooja Gupta
, Kiran Jyoti
, Anand Nayyar
:
Research on Auto-Scaling of Web Applications in Cloud: Survey, Trends and Future Directions. 399-432 - Simar Preet Singh

, Anand Nayyar
, Harpreet Kaur, Ashu Singla:
Dynamic Task Scheduling using Balanced VM Allocation Policy for Fog Computing Platforms. 433-456
Volume 20, Number 3, 2019
- Shajulin Benedict

, Michael Gerndt:
Introduction to the Special Issue on IoT Cloud Solutions for Societal Applications. iii
- Syed Rameem Zahra, Mohammad Ahsan Chishti

:
Assesing the Services, Security Threaths, Challenges and Solutions in the Internet of Things. 457-484
- Amine Meghabber, Lakhdar Loukil, Richard Olejnik, Abou El Hassan Benyamina, Abdelkader Aroui:

Virtual Channel aware Scheduling for Real Time Data-Flows on Network on-Chip. 495-510 - Nikita Singh

, Manu Vardhan
:
Blockchain based e-Cheque Clearing Framework. 511-526 - Walid Kadri, Belabbas Yagoubi:

Optimized Scheduling Approach for Scientific Applications Based on Clustering in Cloud Computing Environment. 527-540 - Rihab Derouiche, Zaki Brahmi, Mohamed Mohsen Gammoudi, Sebastián García Galán:

E-DPSIW-FCA: Energy aware FCA-based Data Placement Strategy for Intensive Workflow. 541-562 - Lazhar Ourlis, Djamel Bellala:

SIMD Implementation of the Aho-Corasick Algorithm using Intel AVX2. 563-576 - Jyotsna Verma, Nishtha Kesswani:

AMIGM: Animal Migration Inspired Group Mobility Model for Mobile Ad hoc Networks. 577-590
Volume 20, Number 4, 2019
- Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Hawari bin Ghazali:

Introduction to the Special Issue on Smart Sensors for Scalable Computing. iii - Ashish Kumar Luhach

, Aditya Khamparia
, Ravindra Sihag, Raj Kumar
:
Honey Bee Optimization based Sink Mobility Aware Heterogeneous Protocol for Wireless Sensor Network. 591-598 - Kinnera Bharath Kumar Sai, Somula Rama Subbareddy, Ashish Kumar Luhach

:
IOT based Air Quality Monitoring System Using MQ135 and MQ7 with Machine Learning Analysis. 599-606 - Tausifa Jan Saleem

, Mohammad Ahsan Chishti
:
Data Analytics in the Internet of Things: A Survey. 607-630 - Suresh Kumar, Kiran Dhull, Payal Arora, Ashish Kumar Luhach

:
Performance of Energy Conservation Models, Generic, Micaz and Micamotes, using AODV Routing Protocol on a Wireless Sensor Network. 631-639 - Salem Sati

, Ahmed Sohoud, Tareg Abulifa:
Energy Efficient Routing Protocol for Mobile Social Sensing Networks. 641-651 - Suresh Kumar, Kiran Dhull, Deepak Sharma, Payal Arora, Sandeep Dahiya

:
Evaluation of AODV and DYMO Routing Protocol using Generic, Micaz and Micamotes Energy Conservation Models in AWSN with Static and Mobile Scenario. 653-662 - Kausha I. Masani, Parita Rajiv Oza

, Smita Agrawal
:
Predictive Maintenance and Monitoring of Industrial Machine using Machine Learning. 663-668 - A. Dhanapal, P. Nithyanandam

:
The Slow HTTP DDOS Attacks: Detection, Mitigation and Prevention in the Cloud Environment. 669-685 - Mostafa Abdulghafoor Mohammed, Aya Ahkam Kamil, Raed Abdulkareem Hasan, Nicolae Tapus

:
An Effective Context Sensitive Offloading System for Mobile Cloud Environments using Support Value-based Classification. 687-698 - Andrei Zamfira, Raluca Fat, Calin Cenan:

Applying Semantic Web Technologies to Discover an Ontology of Computer Attacks. 699-707

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














