


default search action
The Journal of Supercomputing, Volume 55
Volume 55, Number 1, January 2011
- Keqiu Li, Hai Jin, Yingwei Jin:

Guest editorial: high performance trusted computing. 1-3 - Carmelo Militello

, Vincenzo Conti, Salvatore Vitabile
, Filippo Sorbello:
Embedded access points for trusted data and resources access in HPC systems. 4-27 - Juan M. Cebrian

, Juan L. Aragón
, José M. García, Stefanos Kaxiras:
Leakage-efficient design of value predictors through state and non-state preserving techniques. 28-50 - Yongwei Wu, Gang Chen, Jia Liu, Rui Fang, Xiaomeng Huang, Guangwen Yang, Weimin Zheng:

Automatically constructing trusted cluster computing environment. 51-68 - Deqing Zou, Shangxin Du, Weide Zheng, Hai Jin:

Building Automated Trust Negotiation architecture in virtual computing environment. 69-85 - Kuei-Chung Chang:

Reliable network-on-chip design for multi-core system-on-chip. 86-102 - Nong Xiao, Tao Chen, Fang Liu:

RSEDP: an effective hybrid data placement algorithm for large-scale storage systems. 103-122
Volume 55, Number 2, February 2011
- Tai-Hoon Kim, Omer F. Rana

, Juan Touriño
, Isaac Woungang:
Special issue on "Theory and practice of high-performance computing, communications, and security". 123-125 - Guillermo L. Taboada

, Sabela Ramos
, Juan Touriño
, Ramon Doallo:
Design of efficient Java message-passing collectives on multi-core clusters. 126-154 - Jong Sik Moon, Jong Hyuk Park, Im-Yeong Lee:

Admissible bilinear map-based key management protocol for HPCCS in heterogeneous network. 155-172 - Raylin Tso

, Xun Yi
, Xinyi Huang:
Efficient and short certificateless signatures secure against realistic adversaries. 173-191 - Yang Sun Lee

, Sang-Soo Yeo
:
A novel design of variable-rate RS encoder for ubiquitous high performance multimedia service in Gbps transmission system. 192-206 - Ronald Toegl, Michael Hutter:

An approach to introducing locality in remote attestation using near field communications. 207-227 - Hangbae Chang:

The study on end-to-end security for ubiquitous commerce. 228-245 - Minh-Triet Tran

, Trung Thanh Nguyen, Anh Duc Duong, Isao Echizen:
Pool-based anonymous communication framework for high-performance computing. 246-268 - Chin-Feng Lai

, Sung-Yen Chang, Yueh-Min Huang, Jong Hyuk Park, Han-Chieh Chao
:
A portable UPnP-based high performance content sharing system for supporting multimedia devices. 269-283 - Matthew Smith, Christian Schridde, Björn Agel, Bernd Freisleben

:
Secure mobile communication via identity-based cryptography and server-aided computations. 284-306 - Cheol-Ho Jeong, Kwang Seon Ahn:

Efficient RNTS system for privacy of banking off-line customer. 307-319
Volume 55, Number 3, March 2011
- Samee Ullah Khan

:
Mosaic-Net: a game theoretical method for selection and allocation of replicas in ad hoc networks. 321-366 - Chunlin Li, Layuan Li:

Tradeoffs between energy consumption and QoS in mobile grid. 367-399 - Nitin

, Shruti Garhwal, Neha Srivastava:
Designing a Fault-tolerant Fully-Chained Combining Switches Multi-stage Interconnection Network with Disjoint Paths. 400-431 - Jae-Hyun Park

:
The deflection self-routing Delta network: a dynamically fault-tolerant high-radix multistage interconnection network. 432-447

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














