


default search action
Information Sciences, Volume 379
Volume 379, February 2017
- Md. Zakirul Alam Bhuiyan
, Sy-Yen Kuo
, Jie Wu:
Special issue on dependability in parallel and distributed systems and applications. 1-2 - Jianxin Li, Yangyang Zhang
, Jingsheng Zheng, Hanqing Liu, Bo Li, Jinpeng Huai:
Towards an efficient snapshot approach for virtual machines in clouds. 3-22 - Yingxin Cheng, Xiao Fu, Xiaojiang Du, Bin Luo, Mohsen Guizani:
A lightweight live memory forensic approach based on hardware virtualization. 23-41 - Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li, Ilsun You:
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. 42-61 - Xuhui Liu, Qin Liu, Tao Peng, Jie Wu:
Dynamic access policy in cloud-based personal health record (PHR) systems. 62-81 - Yuanfang Chen, Noël Crespi, Antonio Manuel Ortiz, Lei Shu
:
Reality mining: A prediction algorithm for disease dynamics based on mobile big data. 82-93 - Bing Tang, Mingdong Tang, Gilles Fedak, Haiwu He:
Availability/Network-aware MapReduce over the Internet. 94-111 - Bunjamin Memishi, María S. Pérez, Gabriel Antoniu:
Failure detector abstractions for MapReduce-based systems. 112-127 - Md. Mamunur Rashid
, Iqbal Gondal
, Joarder Kamruzzaman
:
Dependable large scale behavioral patterns mining from sensor data using Hadoop platform. 128-145 - Sancheng Peng, Aimin Yang, Lihong Cao, Shui Yu
, Dongqing Xie:
Social influence modeling using information theory in mobile social networks. 146-159 - Tian Wang, Zhen Peng, Sheng Wen
, Yongxuan Lai, Weijia Jia
, Yiqiao Cai, Hui Tian
, Yonghong Chen:
Reliable wireless connections for fast-moving rail users based on a chained fog structure. 160-176 - Christian Esposito
, Aniello Castiglione
, Francesco Palmieri
:
Layered multicast for reliable event notification over large-scale networks. 177-194 - Farzana Rahman, Md. Endadul Hoque, Sheikh Iqbal Ahamed:
AnonPri: A secure anonymous private authentication protocol for RFID systems. 195-210 - Md. Shamsul Huda, Md. Suruz Miah
, Mohammad Mehedi Hassan, Md. Rafiqul Islam
, John Yearwood, Majed A. AlRubaian, Ahmad Almogren
:
Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data. 211-228 - Mohammad Shahriar Rahman
, Anirban Basu
, Shinsaku Kiyomoto, Md. Zakirul Alam Bhuiyan
:
Privacy-friendly secure bidding for smart grid demand-response. 229-240 - Longxin Zhang
, Kenli Li, Changyun Li
, Keqin Li:
Bi-objective workflow scheduling of the energy consumption and reliability in heterogeneous computing systems. 241-256 - Laurence T. Yang
, Ying Huang, Jun Feng
, Qiwen Pan, Chunsheng Zhu:
An improved parallel block Lanczos algorithm over GF(2) for integer factorization. 257-273 - Gabriel P. Gimenes, Robson L. F. Cordeiro
, José Fernando Rodrigues Jr.:
ORFEL: Efficient detection of defamation or illegitimate promotion in online recommendation. 274-287 - Rosana Veroneze
, Arindam Banerjee, Fernando J. Von Zuben:
Enumerating all maximal biclusters in numerical datasets. 288-309 - Scott Lauber
:
Comments on "network-based H∞ control for singular systems with event-triggered sampling scheme [Information Sciences 329 (2016) 540-551]". 310-312 - Thiago N. C. Cardoso, Rodrigo M. Silva, Sérgio D. Canuto
, Mirella M. Moro
, Marcos André Gonçalves
:
Ranked batch-mode active learning. 313-337 - Seung Hwan Ryu, Boualem Benatallah
:
Experts community memory for entity similarity functions recommendation. 338-355

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.