


default search action
International Journal of High Performance Computing and Networking, Volume 11
Volume 11, Number 1, 2018
- Kuo-Chan Huang, Chun-Hao Hung, Wei Hsieh:
Revenue maximisation for scheduling deadline-constrained mouldable jobs on high performance computing as a service platforms. 1-13 - Zhenhua Liu, Bin Li, Qi Han:
Secure and verifiable outsourcing protocol for non-negative matrix factorisation. 14-23 - Jun Ye, Meixia Miao, Peng Chen, Xiaofeng Chen:
Comparable encryption scheme supporting multiple users in cloud computing. 24-33 - Marcelo Keese Albertini, Rodrigo Fernandes de Mello:
Estimating data stream tendencies to adapt clustering parameters. 34-44 - Leyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu:
Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud. 45-54 - Minal P. Patel
, Sanjay Chaudhary, Sanjay Garg:
Improved pre-copy algorithm using statistical prediction and compression model for efficient live memory migration. 55-65 - Pierre Spitéri, Amar Ouaoua, Ming Chau, Hacène Boutabia:
Parallel solution of the discretised and linearised G-heat equation. 66-82 - Yinxia Sun, Zhuoran Zhang, Limin Shen:
A revocable certificateless encryption scheme with high performance. 83-91
Volume 11, Number 2, 2018
- Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat
, Al-Sakib Khan Pathan
:
Checkpointing distributed application running on mobile ad hoc networks. 95-107 - Hamza Toulni
, Benayad Nsiri
:
Cluster-based routing protocol using traffic information. 108-116 - Tooska Dargahi
, Hamid H. S. Javadi
, Hosein Shafiei, Payam Mousavi:
Detection and mitigation of pulse-delay attacks in pairwise-secured wireless sensor networks. 117-128 - Souaad Boussoufa-Lahlah, Fouzi Semchedine
, Louiza Bouallouche-Medjkoune
, Nadir Farhi:
PSCAR: a proactive-optimal-path selection with coordinator agents assisted routing for vehicular ad hoc networks. 129-144 - Mohamed-Lamine Messai, Hamida Seba:
EAHKM+: energy-aware secure clustering scheme in wireless sensor networks. 145-155 - N. Ambika:
RPSE - reenactment of data using polynomial-variant cryptographic scheme in sensor environment. 156-166 - Hassiba Louazene
, Mouloud Challal
, M'Hamed Boulakroune:
Compact UWB BPF with notch-band using SIR and DGS. 167-172
Volume 11, Number 3, 2018
- Chao Qu, Fagui Liu, Dacheng Deng, Ruifen Yuan:
UOSM: user-oriented semi-automatic method of constructing domain ontology. 173-180 - Delong Cui
, Zhiping Peng, Wende Ke, Xiaoyu Hong, Jinglong Zuo:
Cloud workflow scheduling algorithm based on reinforcement learning. 181-190 - Zhongming Yang, Yong Qin, Yunfu Jia:
Quick convergence algorithm of ACO based on convergence grads expectation. 191-198 - Lei Yang, Kangshun Li, Wensheng Zhang, Yaolang Kong:
Short-term vegetable prices forecast based on improved gene expression programming. 199-213 - Lin Liu, JingGuo Dai:
High performance energy saving policy based on IND. 214-222 - Kangshun Li, Liang Zhong, Lei Zuo, Zhaopeng Wang:
Constrained evolution algorithm based on adaptive differential evolution. 223-230 - Jin Yang, Liangming Wang, Joonsang Baek:
A privacy preserving and fine-grained access control scheme in DaaS based on efficient DSP re-encryption. 231-241 - Lu Xiong, Kangshun Li, Lei Yang:
A parallel immune genetic algorithm for community detection in complex networks. 242-250 - Jieren Cheng, Boyi Liu, Xiangyan Tang:
An automatic traffic-congestion detection method for bad weather based on traffic video. 251-259
Volume 11, Number 4, 2018
- Mageda Sharafeddine, Hmayag Partamian, Mariette Awad, Mazen A. R. Saghir, Haitham Akkary, Hassan Artail, Hazem M. Hajj, Mohammed Baydoun:
Towards distributed acceleration of image processing applications using reconfigurable active SSD clusters: a case study of seismic data analysis. 261-278 - Ali Imran Jehangiri, Ramin Yahyapour
, Edwin Yaqub, Philipp Wieder
:
Distributed predictive performance anomaly detection for virtualised platforms. 279-290 - Amel Ltifi, Ahmed Zouinkhi, Med Salim Bouhlel:
Active vehicle: a new approach integrating AmI technology for trust management in VANET. 291-303 - Salvatore Cuomo, Ardelio Galletti, Livia Marcellino:
A GPU parallel optimised blockwise NLM algorithm in a distributed computing system. 304-311 - Huiting Liu, Kaishen Zhou, Peng Zhao, Sheng Yao:
Mining frequent itemsets over uncertain data streams. 312-321 - Xu Wang, Wei Liu, Yue Tan:
A semantic similarity calculation model for event ontology mapping. 322-331 - Shangping Wang, Ru Zhao, Yaling Zhang:
Lattice-based ring signature scheme under the random oracle model. 332-341 - Taisong Xiong, Yuanyuan Huang, Xin Luo, Jing Zeng:
Robust Student's-t mixture modelling via Markov random field and its application in image segmentation. 342-350

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.