default search action
International Journal of Grid and Utility Computing, Volume 6
Volume 6, Number 1, 2015
- Shu Guo, Haixia Xu:
A secure delegation scheme of large polynomial computation in multi-party cloud. 1-7 - Ezugwu E. Absalom, Seyed M. Buhari, Sahalu B. Junaidu:
Resource management system for scientific virtual laboratory applications. 8-20 - Kun Ma, Weijuan Zhang:
Introducing browser-based high-frequency cloud monitoring system using WebSocket proxy. 21-29 - Riad Mokadem, Abdelkader Hameurlain:
Data replication strategies with performance objective in data grid systems: a survey. 30-46 - A. J. Dinusha Rathnayaka, Vidyasagar M. Potdar, Tharam S. Dillon, Samitha Kuruppu:
Formation of virtual community groups to manage prosumers in smart grids. 47-56 - Saeed Javanmardi, Mohammad Shojafar, Shahdad Shariatmadari, Sima S. Ahrabi:
FR trust: a fuzzy reputation-based model for trust management in semantic P2P grids. 57-66
Volume 6, Number 2, 2015
- Long-Jun Huang, Qing-Hua Liu, Jie Tang, Ping Li:
Scratch line detection and restoration based on Sobel operator. 67-73 - Zhen Liu, Xiaoyuan Yang, Feng Pan, Yuechuan Wei:
CCA-secure publicly verifiable public key encryption scheme without pairings. 74-82 - Xiaoqing Li, Jicheng Liu, Xuejun Li, Hui Li:
A reputation-based secure scheme in vehicular ad hoc networks. 83-90 - Shuaishuai Zhu, Xiaoyuan Yang:
Protecting data in cloud environment with attribute-based encryption. 91-97 - Jess Farber, Trina S. Myers, Jarrod Trevathan, Ian Atkinson, Trevor Andersen:
Riskr: a web 2.0 platform to monitor and share disaster information. 98-112 - Xilong Qu, Xiao Peng:
An energy-efficient virtual machine scheduler based on CPU share-reclaiming policy. 113-120 - Ilir Shinko, Yoann Foquet, Dritan Nace:
Elastic routing for survivable networks. 121-129
Volume 6, Numbers 3/4, 2015
- Balamurugan Balusamy, P. Venkata Krishna:
Collective advancements on access control scheme for multi-authority cloud storage system. 133-142 - P. Mahesha, D. S. Vinod:
Support vector machine-based stuttering dysfluency classification using GMM supervectors. 143-149 - Mohan Manoharan, Saraswathi Selvarajan:
An efficient methodology to improve service negotiation in cloud environment. 150-158 - Trisiladevi C. Nagavi, Nagappa U. Bhajantri:
Fast query by humming system based on complex multiscale music entropy and CMMEB Kd tree. 159-169 - Soumya Priyadarsini Panda, Ajit Kumar Nayak, Srikanta Patnaik:
Text-to-speech synthesis with an Indian language perspective. 170-178 - Qingmei Cao, Zhili Zhou:
The design of tractor CAN bus intelligent node based on dual-core processor. 179-183 - Saeed Senobary, Mahmoud Naghibzadeh:
Semi-partitioned scheduling for fixed-priority real-time tasks based on intelligent rate monotonic algorithm. 184-191 - Shi-hai Zhu:
Hardware implementation based on FPGA of semaphore management in μC/OS-II real-time operating system. 192-199 - Wei Wu, Wencai Du, GuoLong Ruan:
Network congestion control methods and theory. 200-206 - Xiaohui Wang:
The architecture design of the wearable health monitoring system based on internet of things technology. 207-212 - Wenhong Wei, Qingxia Li, Ming Tao:
BSN-mesh and its basic parallel algorithms. 213-220 - Chengyu Hu, Bo Yang, Pengtao Liu:
Multi-keyword ranked searchable public-key encryption. 221-231 - Achal Kaushik, Deo Prakash Vidyarthi:
A model for resource management in computational grid for real-time jobs using game theory. 232-248
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.