


default search action
The Journal of Supercomputing, Volume 64
Volume 64, Number 1, April 2013
- Raquel Cortina

, Francisco-Jose Martínez-Zaldívar
, Antonio M. Vidal
, Jesús Vigo-Aguiar
:
Preface to high performance computing applied to computational problems in science and engineering. 1-3 - Vicente Galiano Ibarra

, Otoniel López
, Manuel P. Malumbres
, Héctor Migallón Gomis
:
Parallel strategies for 2D Discrete Wavelet Transform in shared memory systems and GPUs. 4-16 - Miguel López-Portugués

, Jesús Alberto López-Fernández
, José Ranilla
, Rafael González Ayestarán
, Fernando Las-Heras
:
Parallelization of the FMM on distributed-memory GPGPU systems for acoustic-scattering prediction. 17-27 - Jorge Francés

, Sergio Bleda
, Sergi Gallego
, Cristian Neipp
, Andrés Márquez
, Inmaculada Pascual, Augusto Beléndez
:
Development of a unified FDTD-FEM library for electromagnetic analysis with CPU and GPU computing. 28-37 - Juan F. R. Herrera

, Leocadio G. Casado
, Eligius M. T. Hendrix
, Inmaculada García
:
A threaded approach of the quadratic bi-blending algorithm. 38-48 - Gloria Ortega

, Ester M. Garzón, Francisco Vázquez, Inmaculada García
:
The BiConjugate gradient method on GPUs. 49-58 - Javier Fresno

, Arturo González-Escribano
, Diego R. Llanos
:
Extending a hierarchical tiling arrays library to support sparse data partitioning. 59-68 - Alberto Montañola, Concepció Roig

, Fernando Guirado
, Porfidio Hernández
, Cédric Notredame
:
Performance analysis of computational approaches to solve Multiple Sequence Alignment. 69-78 - Rafael Rodríguez-Sánchez

, José Luis Martínez
, Gerardo Fernández-Escribano
, José Manuel Claver
, José L. Sánchez
:
H.264/AVC inter prediction for heterogeneous computing systems. 79-88 - Pablo Toharia

, Oscar David Robles
, José Luis Bosque
, Angel Rodríguez
:
Scalable shot boundary detection. 89-99 - Jorge González-Domínguez

, Óscar García-López, Guillermo L. Taboada
, María J. Martín
, Juan Touriño
:
Performance evaluation of sparse matrix products in UPC. 100-109 - José Luis Bosque

, Oscar David Robles
, Pablo Toharia
, Luis Pastor:
Analyzing scalability of parallel systems with unbalanced workload. 110-119 - Jacobo Lobeiras, Margarita Amor, Ramon Doallo:

Influence of memory access patterns to small-scale FFT performance. 120-131 - José Antonio Álvarez-Bermejo

, N. Antequera, R. García-Rubio, Juan Antonio López-Ramos:
A scalable server for key distribution and its application to accounting. 132-143 - Antonio F. Díaz

, Mancia Anguita
, Hugo E. Camacho, Erik Nieto, Julio Ortega Lopera
:
Two-level Hash/Table approach for metadata management in distributed file systems. 144-155 - Guillermo Vigueras

, Juan M. Orduña
, Miguel Lozano
:
A Read-Copy Update based parallel server for distributed crowd simulations. 156-166 - Alejandro Acosta

, Francisco Almeida
, Ignacio Peláez:
From latex specifications to parallel codes. 167-176 - Marjan Abdeyazdan

, Saeed Parsa
, Amir Masoud Rahmani
:
Task graph pre-scheduling, using Nash equilibrium in game theory. 177-203 - Najme Mansouri, Gholamhosein Dastghaibyfard:

Job scheduling and dynamic data replication in data grid environment. 204-225 - Javad Akbari Torkestani:

Degree constrained minimum spanning tree problem: a learning automata approach. 226-249
Volume 64, Number 2, May 2013
- Sajid Hussain, Firdous Kausar

, Laurence T. Yang, Farrukh Aslam Khan
, Jong Hyuk Park:
Advances in communication networks for pervasive and ubiquitous applications. 251-255 - Daqiang Zhang

, Min Chen, Hongyu Huang, Minyi Guo:
Decentralized checking of context inconsistency in pervasive computing environments. 256-273 - Wei Xiong, Naixue Xiong, Laurence T. Yang, Jong Hyuk Park, Hanping Hu

, Qian Wang:
An anomaly-based detection in ubiquitous network using the equilibrium state of the catastrophe theory. 274-294 - Zia M. Loni, Noor Muhammad Khan

:
Analysis of fading statistics in cellular mobile communication systems. 295-309 - Marjan Naderan Tahan, Mehdi Dehghan

, Hossein Pedram:
Primal and dual-based algorithms for sensing range adjustment in WSNs. 310-330 - Min Choi, Jong Hyuk Park, Young-Sik Jeong:

Mobile cloud computing framework for a pervasive and ubiquitous environment. 331-356 - Apostolia Papapostolou, Hakima Chaouchi:

Handoff with energy awareness for future pervasive environments. 357-382 - Hang Liu, Eun Kyung Lee, Dario Pompili, Xiangwei Kong:

Thermal camera networks for large datacenters using real-time thermal monitoring mechanism. 383-408 - Tipu Arvind Ramrekha, Emmanouil A. Panaousis, Christos Politis

:
Standardisation advancements in the area of routing for mobile ad-hoc networks. 409-434 - Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:

Secure communication mechanism for ubiquitous Smart grid infrastructure. 435-455 - M. Victoria Bueno-Delgado

, Pablo Pavón-Mariño:
A maximum likelihood-based distributed protocol for passive RFID dense reader environments. 456-476 - Do-Eun Cho, Byoung-Soo Koh, Sang-Soo Yeo

:
Secure D-CAS system for digital contents downloading services. 477-491 - Sang Oh Park, Yang Sun Lee

, Sung Jo Kim:
A high performance NAND array file system based on multiple NAND flash memories. 492-506 - Jangwoo Park, Dae-Heon Park, Changhoon Lee

:
Angle and ranging based localization method for ad hoc network. 507-521 - Jaeik Cho, Taeshik Shon, Ken Choi, Jongsub Moon:

Dynamic learning model update of hybrid-classifiers for intrusion detection. 522-526 - Ehsan Atoofian:

Improving performance of software transactional memory through contention locality. 527-547 - Javier Lira, Carlos Molina, Ryan N. Rakvic, Antonio González

:
Replacement techniques for dynamic NUCA cache designs on CMPs. 548-579 - Yuanwu Lei, Yong Dou, Yazhuo Dong, Jie Zhou, Fei Xia:

FPGA implementation of an exact dot product and its application in variable-precision floating-point arithmetic. 580-605 - Seokho Son

, Gihun Jung, Sung Chan Jun
:
An SLA-based cloud computing that facilitates resource allocation in the distributed data centers of a cloud provider. 606-637 - Fernando Tinetti, Mariano Méndez, Armando De Giusti:

Restructuring Fortran legacy applications for parallel computing in multiprocessors. 638-659
Volume 64, Number 3, June 2013
- Guojun Wang, Wanlei Zhou

, Laurence T. Yang:
Trust, security and privacy for pervasive applications. 661-663 - Tim Good

, Mohammed Benaissa:
A holistic approach examining RFID design for security and privacy. 664-684 - Yingpei Zeng, Jiannong Cao

, Jue Hong, Shigeng Zhang, Li Xie:
Secure localization and location verification in wireless sensor networks: a survey. 685-701 - Ruidong Li

, Jie Li
:
Requirements and design for neutral trust management framework in unstructured networks. 702-716 - Kanthakumar Pongaliur, Li Xiao, Alex X. Liu:

Dynamic camouflage event based malicious node detection architecture. 717-743 - Fei Wang, Furong Wang, Benxiong Huang, Laurence T. Yang:

ADVS: a reputation-based model on filtering SPIT over P2P-VoIP networks. 744-761 - Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:

User requirements-aware security ranking in SSL protocol. 762-776 - Anoosha Prathapani, Lakshmi Santhanam, Dharma P. Agrawal:

Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents. 777-804 - Huanyu Zhao, Xiaolin Li:

VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks. 805-829
- Gang Kou

:
High performance networked computing in media, services and information management. 830-834 - Daji Ergu, Gang Kou, Yi Peng, Yong Shi, Yu Shi:

The analytic hierarchy process: task scheduling and resource allocation in cloud computing environment. 835-848 - Yasser Sadri

, Sohrab Khanmohammadi:
An intelligent scheduling system using fuzzy logic controller for management of services in WiMAX networks. 849-861 - Ning Zhong

, Jianhua Ma, Runhe Huang, Jiming Liu, Yiyu Yao, Yaoxue Zhang, Jianhui Chen:
Research challenges and perspectives on Wisdom Web of Things (W2T). 862-882 - Honggang Wang

:
Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks. 883-897 - Dengsheng Wu

, Jianping Li
, Yong Liang:
Linear combination of multiple case-based reasoning with optimized weight for software effort estimation. 898-918 - Kun You, Bin Tang, Zhuzhong Qian, Sanglu Lu, Daoxu Chen:

QoS-aware placement of stream processing service. 919-941 - Liheng Jian, Cheng Wang, Ying Liu, Shenshen Liang, Weidong Yi, Yong Shi:

Parallel data mining techniques on Graphics Processing Unit with Compute Unified Device Architecture (CUDA). 942-967 - Guanghua Song, Bowei Yang, Zhixing Wu, Junna Chuai, Yao Zheng:

ROIN: reputation-oriented inverted indexing for the P2P network. 968-986 - Jung-hyun Seo

:
Three-dimensional Petersen-torus network: a fixed-degree network for massively parallel computers. 987-1007
- Xiaohuang Huang, Christopher I. Rodrigues, Stephen Jones, Ian Buck, Wen-mei W. Hwu:

Scalable SIMD-parallel memory allocation for many-core machines. 1008-1020 - Bin Xie, Tianzhou Chen, Wei Hu, Xingsheng Tang, Dazhou Wang:

An energy-aware online task mapping algorithm in NoC-based system. 1021-1037 - Quan Chen, Minyi Guo, Qianni Deng, Long Zheng, Song Guo

, Yao Shen:
HAT: history-based auto-tuning MapReduce in heterogeneous environments. 1038-1054 - Guohui Li, Pei Zhao, Ling Yuan, Sheng Gao:

Efficient implementation of a multi-dimensional index structure over flash memory storage systems. 1055-1074 - Guojun Wang, Qiushuang Du, Wei Zhou, Qin Liu:

A scalable encryption scheme for multi-privileged group communications. 1075-1091 - Xiaoqun Yuan, Hao Yin, Geyong Min, Xuening Liu, Wen Hui, Guangxi Zhu:

A suitable server placement for peer-to-peer live streaming. 1092-1107 - Jin Liu, Jing Zhou, Junfeng Wang, Xue Chen, Hainan Zhou:

Cloud service: automatic construction and evolution of software process problem-solving resource space. 1108-1132 - Yinan Li, Asim YarKhan

, Jack J. Dongarra, Keith Seymour, Aurélie Hurault:
Enabling workflows in GridSolve: request sequencing and service trading. 1133-1152 - Saurabh Kumar Garg

, Christian Vecchiola
, Rajkumar Buyya:
Mandi: a market exchange for trading utility and cloud computing services. 1153-1174

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














