default search action
International Journal of Computational Science and Engineering, Volume 9
Volume 9, Numbers 1/2, 2014
- Chun-Yuan Lin, Sheng-Ta Li, Che-Lun Hung:
Frequency-based re-sequencing tool for short reads on graphics processing units. 3-10 - Chun-Yuan Lin, Yu-Shiang Lin:
Efficient parallel algorithm for multiple sequence alignments with regular expression constraints on graphics processing units. 11-20 - Bouraoui Ouni, Abdellatif Mtibaa:
Temporal partitioning of data flow graphs for reconfigurable architectures. 21-33 - Quey-Liang Kao, Che-Rung Lee:
Preliminary performance evaluations of the determinant quantum Monte Carlo simulations for multi-core CPU and many-core GPU. 34-43 - Chia-Pang Chen, Cheng-Long Chuang, Tzu-Shiang Lin, Chun-Yi Liu, Joe-Air Jiang, Hsiao-Wei Yuan, Chyi-Rong Chiou, Chung-Hang Hong:
TernCam: an automated energy-efficient visual surveillance system. 44-54 - Peng Xiao, Dongbo Liu:
Multi-scheme co-scheduling framework for high-performance real-time applications in heterogeneous grids. 55-63 - Slo-Li Chu, Chih-Chieh Hsiao:
Optimising space exploration of OpenCL for GPGPUs. 64-79 - G. Murugesan, C. Chellappan:
Multi-source task scheduling in grid computing environment using linear programming. 80-85 - Jen-Chieh Yeh, Chi-Hung Lin, Chun-Nan Liu:
Multi-core system performance prediction and analysis at the ESL. 86-94 - V. Sanju, C. Koushika, R. Sharmili, Niranjan N. Chiplunkar, M. Khalid:
Design and implementation of a network on chip-based simulator: a performance study. 95-105 - Marlon Scalabrin, Rafael S. Parpinelli, César Manuel Vargas Benítez, Heitor S. Lopes:
Population-based harmony search using GPU applied to protein structure prediction. 106-118 - Randall E. Duran, Ding Chen, Rishi Saraswat, Aaron Hallmark:
A framework for comparing high performance computing technologies. 119-129 - G. Kavitha, V. Sankaranarayanan:
A novel resource selection framework to improve QoS in computational grid. 130-138 - Xinguo Xu, Wei Kang, Zhiqi Fang, Baohui Sun, Yan Wang, Tingshao Zhu:
Global and initiative safety mechanism in industrial control system. 139-146 - Ming Yang, Jianliang Gao:
Numerical simulation on the influence of gob permeability on distribution of air leakage flow field. 147-152
Volume 9, Number 3, 2014
- Yung-Hui Chen, Lawrence Y. Deng:
The best learning order inference based on blue-red trees of rule-space model for social network. 155-164 - Korra Sathya Babu, Jhalaka Hota, Sanjay Kumar Jena:
Privacy preserving social networking. 165-176 - V. Subramaniyaswamy, S. Chenthur Pandian:
Topic ontology-based efficient tag recommendation approach for blogs. 177-187 - Deepa Anand, Kamal Kant Bharadwaj:
Exploring graph-based global similarity estimates for quality recommendations. 188-197 - M. Arunachalam, V. Rajamani:
An efficient flooding algorithm for improving network performance in optical WDM networks. 198-204 - Wei Liu, Wenjie Xu, Dong Wang, Xujie Zhang, Zongtian Liu:
An extending description logic for action formalism in event ontology. 205-214 - C. Kavitha, G. Sudha Sadasivam, M. A. Priya:
Annotation-based document classification using shuffled frog leaping algorithm. 215-221 - Pasquale Cantiello, Beniamino Di Martino:
Software porting support with component-based and language neutral source code analysis. 222-234 - Jin Zhu, Yoshiyori Urano, Hidenori Nakazato, Qun Jin:
A progressive approach for cross-browser web data generation. 235-246 - Ahmed N. Oumer, Othman Mamat:
Numerical modelling of non-isothermal flow of fibre suspensions: prediction of fibre orientation in three-dimensional cavities. 247-256 - Sayan Kaennakham, Moji Moatamedi:
An automatic mesh adaptation algorithm and its performance for simulation of flow over a circular cylinder at Re = 1.4 × 105. 257-273
Volume 9, Number 4, 2014
- Simeon Veloudis, Dimitrios A. Baltatzis, Christos Ilioudis, George Pangalos:
A formal framework to support dynamic authorisation in collaborative environments. 278-291 - Zakaria Al-Qudah, Basheer Al-Duwairi, Osama Daifallah Al-Khaleel:
DDoS protection as a service: hiding behind the giants. 292-300 - He Du, Jian Wang, Yanan Liu:
Independent verification of proxy multi-signature scheme. 301-311 - Dwaine E. Clarke:
Hybrid certificate closure-chain discovery public key system. 312-324 - Luca Caviglione, Mauro Coccoli, Alessio Merlo:
A taxonomy-based model of security and privacy in online social networks. 325-338 - Wei Ren, Yuliang Liu:
A lightweight possession proof scheme for outsourced files in mobile cloud computing based on chameleon hash function. 339-346 - Feng Gao, Jingsha He, Shunan Ma:
Modelling the relationship between trust and privacy in network environments. 347-354 - Shaik Shakeel Ahamad, V. N. Sastry, Siba K. Udgata:
Secure mobile payment framework based on UICC with formal verification. 355-370 - Sushma Kejgir, Manesh Kokare:
Robust multichannel colour image watermarking using lifting wavelet transform with singular value decomposition. 371-385 - Al-Sakib Khan Pathan, Diallo Abdoulaye Kindy:
Lethality of SQL injection against current and future internet technologies. 386-394
Volume 9, Numbers 5/6, 2014
- Wouter Dekeyser, Detlev Reiter, Martine Baelmans:
Optimal shape design for divertors. 397-407 - Johannes Willkomm, Christian H. Bischof, H. Martin Bücker:
A new user interface for ADiMat: toward accurate and efficient derivatives of MATLAB programmes with ease of use. 408-415 - Sebastian Reiter, Dmitriy Logashenko, Sabine Stichel, Gabriel Wittum, Alfio Grillo:
Models and simulations of variable-density flow in fractured porous media. 416-432 - Jörg Ostrowski, Romeo Bianchetti, Irena Erceg-Baros, Bernardo Galletti, Rudolf Gati, David Pusch, Michael Schwinne, Benjamin Wüthrich:
Computational magnetohydrodynamics in the simulation of gas circuit breakers. 433-444 - Tim Bastian Klaus, Oliver Heuss, Christian Thyes, Holger Hanselka:
FDTD simulation of the acoustic interaction between a cavity and an adaptive Helmholtz resonator. 445-456 - I. Ficza, M. Vaverka, Martin Hartl:
Numerical solution of contact pressure in lubricated non-smooth point contact using convolution algorithms. 457-464 - Bettina Schieche, Jens Lang:
Uncertainty quantification for thermo-convective Poiseuille flow using stochastic collocation. 465-477 - Annette Fröhlcke, Erion Gjonaj, Thomas Weiland:
A boundary conformal discontinuous Galerkin approach for electro-quasistatic field problems on Cartesian grids. 478-483 - Frank D. Bramkamp, Bernhard Pollul, Arno Rasch, Gero Schieffer:
Matrix-free second-order methods in implicit time integration for compressible flows using automatic differentiation. 484-498 - Henrik Büsing, Johannes Willkomm, Christian H. Bischof, Christoph Clauser:
Using exact Jacobians in an implicit Newton method for solving multiphase flow in porous media. 499-508 - Debora Clever, Jens Lang, Dirk Schröder:
Model hierarchy-based optimal control of radiative heat transfer. 509-525 - M. Lemke, J. Schulze, Jörn Sesterhenn:
Adjoint-based reconstruction of an entropy source by discrete temperature measurements. 526-537 - Jens Trommler, Stephan Koch, Thomas Weiland:
Coupled simulation of switching arcs considering transient-capacitive effects. 538-548 - Mohammad Kazem Akhlaghi, Alireza Fathi, Hamidreza Mohamadi Danyali, Mohamad Ali Khesali:
A novel particle swarm optimiser with semi-active congregation and a nature-inspired supervising algorithm. 549-558
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.