default search action
International Journal of Parallel, Emergent and Distributed Systems, Volume 30
Volume 30, Number 1, 2015
- Ivan Stojmenovic:
Editorial. 1-2 - Shui Yu:
Special Issue on networking aspects in Big Data. 3-4
- Jemal H. Abawajy:
Comprehensive analysis of big data variety landscape. 5-14 - Krzysztof Walkowiak, Michal Wozniak, Miroslaw Klinkowski, Wojciech Kmiecik:
Optical networks for cost-efficient and scalable provisioning of big data traffic. 15-28 - Guobin Xu, Wei Yu, Zhijiang Chen, Hanlin Zhang, Paul Moulema, Xinwen Fu, Chao Lu:
A cloud computing based system for cyber security management. 29-45 - Mauro Femminella, Emilia Nunzi, Gianluca Reali, Dario Valocchi:
Networking issues related to delivering and processing genomic big data. 46-64 - Tom Tofigh, Sasan Adibi, Amin Mobasher, Masood Mortazavi:
Novel approach to big data collaboration with network operators network function virtualisation (NFV). 65-78
Volume 30, Number 2, 2015
- Pete Burnap, Omer F. Rana, Matthew L. Williams, William Housley, Adam Edwards, Jeffrey Morgan, Luke Sloan, Javier Conejero:
COSMOS: Towards an integrated and scalable service for analysing social media on demand. 80-100 - Bidi Ying, Dimitrios Makrakis:
Protecting location privacy in vehicular networks against location-based attacks. 101-117 - M. Sridevi, C. Mala, Siddhant Sanyam:
Optimised template matching techniques in parallel environment with exhaustive search and swarm intelligence. 118-134 - Ramesh Singh, Sandip Chakraborty, Sushanta Karmakar:
Concurrent deterministic 1-2 skip list in distributed message passing systems. 135-174
Volume 30, Number 3, 2015
- Monalisa Mandal, Anirban Mukhopadhyay:
A novel PSO-based graph-theoretic approach for identifying most relevant and non-redundant gene markers from gene expression data. 175-192 - Aleksandr Khasymski, Dimitrios S. Nikolopoulos:
Scalable black-box prediction models for multi-dimensional adaptation on NUMA multi-cores. 193-210 - Nana Yaw Asabere, Feng Xia, Qinxue Meng, Fengqi Li, Haifeng Liu:
Scholarly paper recommendation based on social awareness and folksonomy. 211-232 - Kinga Lipskoch, Oliver E. Theel:
Relaxing data consistency along different dimensions for increasing operation availabilities. 233-261
Volume 30, Number 4, 2015
- Mrinal Nandi, Amiya Nayak, Bimal K. Roy, Santanu Sarkar:
Hypothesis testing and decision theoretic approach for fault detection in wireless sensor networks. 262-285 - Ali El-Moursy, Walid El-Reedy, Hossam A. H. Fahmy:
Fair memory access scheduling algorithms for multicore processors. 286-308 - Mayez Al-Mouhamed, Ayaz ul Hassan Khan:
Exploration of automatic optimisation for CUDA programming. 309-324 - Mohammad Rayati, Aras Sheikhi, Ali Mohammad Ranjbar:
Optimising operational cost of a smart energy hub, the reinforcement learning approach. 325-341
Volume 30, Number 5, 2015
- Toktam Ghafarian-M., Bahman Javadi, Rajkumar Buyya:
Decentralised workflow scheduling in volunteer computing systems. 343-365 - Xiaonan Wang, Hongbin Cheng, Yufeng Yao:
Mobility support for IPv6-based VANET. 366-379 - Wei-Tee Lin, Chih-Ping Chu:
Determining the appropriate number of nodes for fast mining of frequent patterns in distributed computing environments. 380-392 - Kangkang Li, Huanyang Zheng, Jie Wu, Xiaojiang Du:
Virtual machine placement in cloud systems through migration process. 393-410 - Abdullah Alamri, Peter Bertók, Adil Fahad:
Towards an architecture for managing semantic knowledge in semantic repositories. 411-425
Volume 30, Number 6, 2015
Guest Editorial
- Xavi Masip, Abdelhamid Mellouk, Stefano Testa, Eva Marín-Tordera, Guang-Jie Ren, Said Hoceini:
Smart Communications in Network Technologies. 426-427
- Carolina Fernandez, Carlos Bermudo, Gino Carrozzo, Roberto Monno, Bartosz Belter, Kostas Pentikousis, Umar Toseef, Tomohiro Kudoh, Atsuko Takefusa, Jason Haga, Bart Puype, Jin Tanaka:
A recursive orchestration and control framework for large-scale, federated SDN experiments: the FELIX architecture and use cases. 428-446 - Mohammad Fal Sadikin, Marcel Kyas:
IMAKA-Tate: secure and efficient privacy preserving for indoor positioning applications. 447-463 - Antonio Cuadra Sánchez, Javier Aracil, Javier Ramos de Santiago:
Proposal of a new information theory-based technique based on traffic anomaly detection analysis. 464-477 - Roger Immich, Pedro Borges, Eduardo Cerqueira, Marília Curado:
QoE-driven video delivery improvement using packet loss prediction. 478-493 - Jing Wang, Miodrag Bolic:
Reducing the phase cancellation effect in augmented RFID system. 494-514 - Mohamed Oulmahdi, Christophe Chassot, Nicolas Van Wambeke:
Transport protocols: limitations, evolution obstacles and solutions for an actual deployment in the Internet. 515-535
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.