default search action
Information Sciences, Volume 379
Volume 379, February 2017
- Md. Zakirul Alam Bhuiyan, Sy-Yen Kuo, Jie Wu:
Special issue on dependability in parallel and distributed systems and applications. 1-2 - Jianxin Li, Yangyang Zhang, Jingsheng Zheng, Hanqing Liu, Bo Li, Jinpeng Huai:
Towards an efficient snapshot approach for virtual machines in clouds. 3-22 - Yingxin Cheng, Xiao Fu, Xiaojiang Du, Bin Luo, Mohsen Guizani:
A lightweight live memory forensic approach based on hardware virtualization. 23-41 - Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li, Ilsun You:
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. 42-61 - Xuhui Liu, Qin Liu, Tao Peng, Jie Wu:
Dynamic access policy in cloud-based personal health record (PHR) systems. 62-81 - Yuanfang Chen, Noël Crespi, Antonio Manuel Ortiz, Lei Shu:
Reality mining: A prediction algorithm for disease dynamics based on mobile big data. 82-93 - Bing Tang, Mingdong Tang, Gilles Fedak, Haiwu He:
Availability/Network-aware MapReduce over the Internet. 94-111 - Bunjamin Memishi, María S. Pérez, Gabriel Antoniu:
Failure detector abstractions for MapReduce-based systems. 112-127 - Md. Mamunur Rashid, Iqbal Gondal, Joarder Kamruzzaman:
Dependable large scale behavioral patterns mining from sensor data using Hadoop platform. 128-145 - Sancheng Peng, Aimin Yang, Lihong Cao, Shui Yu, Dongqing Xie:
Social influence modeling using information theory in mobile social networks. 146-159 - Tian Wang, Zhen Peng, Sheng Wen, Yongxuan Lai, Weijia Jia, Yiqiao Cai, Hui Tian, Yonghong Chen:
Reliable wireless connections for fast-moving rail users based on a chained fog structure. 160-176 - Christian Esposito, Aniello Castiglione, Francesco Palmieri:
Layered multicast for reliable event notification over large-scale networks. 177-194 - Farzana Rahman, Md. Endadul Hoque, Sheikh Iqbal Ahamed:
AnonPri: A secure anonymous private authentication protocol for RFID systems. 195-210 - Md. Shamsul Huda, Md. Suruz Miah, Mohammad Mehedi Hassan, Md. Rafiqul Islam, John Yearwood, Majed A. AlRubaian, Ahmad Almogren:
Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data. 211-228 - Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto, Md. Zakirul Alam Bhuiyan:
Privacy-friendly secure bidding for smart grid demand-response. 229-240 - Longxin Zhang, Kenli Li, Changyun Li, Keqin Li:
Bi-objective workflow scheduling of the energy consumption and reliability in heterogeneous computing systems. 241-256 - Laurence T. Yang, Ying Huang, Jun Feng, Qiwen Pan, Chunsheng Zhu:
An improved parallel block Lanczos algorithm over GF(2) for integer factorization. 257-273 - Gabriel P. Gimenes, Robson L. F. Cordeiro, José Fernando Rodrigues Jr.:
ORFEL: Efficient detection of defamation or illegitimate promotion in online recommendation. 274-287 - Rosana Veroneze, Arindam Banerjee, Fernando J. Von Zuben:
Enumerating all maximal biclusters in numerical datasets. 288-309 - Scott Lauber:
Comments on "network-based H∞ control for singular systems with event-triggered sampling scheme [Information Sciences 329 (2016) 540-551]". 310-312 - Thiago N. C. Cardoso, Rodrigo M. Silva, Sérgio D. Canuto, Mirella M. Moro, Marcos André Gonçalves:
Ranked batch-mode active learning. 313-337 - Seung Hwan Ryu, Boualem Benatallah:
Experts community memory for entity similarity functions recommendation. 338-355
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.