default search action
International Journal of Networking and Computing, Volume 9
Volume 9, Number 1, 2019
- Akihiro Fujiwara, Susumu Matsumae:
Preface: Special Issue on Workshop on Advances in Parallel and Distributed Computational Models 2018. 1 - Anne Benoit, Aurélien Cavelan, Florina M. Ciorba, Valentin Le Fèvre, Yves Robert:
Combining Checkpointing and Replication for Reliable Execution of Linear Workflows with Fail-Stop and Silent Errors. 2-27 - Thomas Hérault, Yves Robert, Aurélien Bouteiller, Dorian C. Arnold, Kurt B. Ferreira, George Bosilca, Jack J. Dongarra:
Checkpointing Strategies for Shared High-Performance Computing Platforms. 28-52 - Wei Chen, Liang Hong, Sudeep Bhattarai, Tony Sanchez, Ebholo Ijieh, Stacie Severyn, Leonard E. Lightfoot:
Joint design of cooperative protocols and distributed beamforming for multi-hop cognitive radio networks. 53-69 - Anup Zope, Edward Luke:
A Shared Memory Parallel Block Streaming Model for Irregular Applications. 70-96 - Hiroto Yasumi, Naoki Kitamura, Fukuhito Ooshita, Taisuke Izumi, Michiko Inoue:
A Population Protocol for Uniform $k$-partition under Global Fairness. 97-110
- Saleh Ahmed, Annisa, Asif Zaman, Zhan Zhang, Kazi Md. Rokibul Alam, Yasuhiko Morimoto:
Semi-Order Preserving Encryption Technique for Numeric Database. 111-129
Volume 9, Number 2, 2019
- Koji Nakano:
Preface: Special issued on the Sixth International Symposium on Networking and Computing. 130 - Hiroki Nishikawa, Kana Shimada, Ittetsu Taniguchi, Hiroyuki Tomiyama:
A Constraint Programming Approach to Scheduling of Malleable Tasks. 131-146 - Sayaka Kamei, Hirotsugu Kakugawa:
Asynchronous message-passing distributed algorithm for the global critical section problem. 147-160 - Jubee Tada:
A Cache Replacement Policy with Considering Global Fluctuations of Priority Values. 161-170 - Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami:
Advanced Searchable Encryption: An Adaptively Secure Keyword Search for Matrix-type Storages. 171-187 - Wai Kyi Kyi Oo, Hiroshi Koide, Kouichi Sakurai:
Analyzing the Effect of Moving Target Defense for a Web System. 188-200 - Kouzou Ohara, Kazumi Saito, Masahiro Kimura, Hiroshi Motoda:
Critical Node Identification based on Articulation Point Detection for Uncertain Network. 201-216 - Yuuki Okuda, Masaya Sato, Hideo Taniguchi:
Implementation and Evaluation of Communication-Hiding Method by System Call Proxy. 217-238 - Hiroshi Michizu, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa:
Energy Balancing by Wireless Energy Transfer in Sensor Networks. 239-256 - Naoki Kamikawa, Hiroshi Umeo:
Two Implementations of Real-Time Sequence Generator for {n^3 | n=1, 2, 3, ... } and Their Comparison. 257-275 - Joji Toshima, Takuo Suganuma, Akiko Takahashi:
Design and Evaluation of an Incentive Decision Method for an Agricultural Information Sharing System. 276-300 - Tomoaki Ukezono:
Evaluations of CMA with Error Corrector in Image Processing Circuit. 301-317 - Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Evaluation of Ad-hoc Secure Device Pairing Method with Accelerometer and Camera Using Marker. 318-338 - Yasuhiro Nakamura, Hideyuki Kawashima, Osamu Tatebe:
Integration of TicToc Concurrency Control Protocol with Parallel Write Ahead Logging Protocol. 339-353
- Akane Kawaharada, Takao Namiki:
Relation between spatio-temporal patterns generated by two-dimensional cellular automata and a singular function. 354-369 - Thuong Nguyen Dat, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa:
Implementation of high speed hash function Keccak on GPU. 370-389
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.