default search action
The Journal of Supercomputing, Volume 66
Volume 66, Number 1, October 2013
- Sang Oh Park, Bin Xiao, Victor C. M. Leung, Young-Sik Jeong:
Advanced technologies and applications for Highly-Reliable Cyber Physical System (HRCPS). 1-3 - Heiko Desruelle, Simon Isenberg, John Lyle, Frank Gielen:
Multi-device application middleware: leveraging the ubiquity of the Web with webinos. 4-20 - Wooseong Kim, Joon-Sang Park, Sanghyun Ahn:
Cross-layer optimization for wireless multihop multicast networks. 21-34 - Chen-Che Huang, Tsun-Tse Huang, Jiun-Long Huang, Lo-Yao Yeh:
Hierarchical role-based data dissemination in wireless sensor networks. 35-56 - Young-Sik Jeong, Hyun-Woo Kim, Haeng Jin Jang:
Adaptive resource management scheme for monitoring of CPS. 57-69 - Yong-hwan Kim, Chan-Myung Kim, Youn-Hee Han, Young-Sik Jeong, Doo-Soon Park:
An efficient strategy of nonuniform sensor deployment in cyber physical systems. 70-80 - Se Jin Kwon, Hyung-Ju Cho, Sungsoo Kim, Tae-Sun Chung:
Random data-aware flash translation layer for NAND flash-based smart devices. 81-93
- Fan Zhang, Yan Zhang, Jason D. Bakos:
Accelerating frequent itemset mining on graphics processing units. 94-117 - Jigang Wu, Pu Wang, Siew Kei Lam, Thambipillai Srikanthan:
Efficient heuristic and tabu search for hardware/software partitioning. 118-134 - Siham Tabik, Alejandro Villegas, Emilio L. Zapata, Luis F. Romero:
Optimal tilt and orientation maps: a multi-algorithm approach for heterogeneous multicore-GPU systems. 135-147 - Fan Wu, Kenli Li, Ahmed Sallam, Xu Zhou:
A molecular solution for minimum vertex cover problem in tile assembly model. 148-169 - Bhanu Sharma, Ruppa K. Thulasiram, Parimala Thulasiraman:
Normalized particle swarm optimization for complex chooser option pricing on graphics processing unit. 170-192 - Dawei Sun, Guiran Chang, Changsheng Miao, Xingwei Wang:
Analyzing, modeling and evaluating dynamic adaptive fault tolerance strategies in cloud computing environments. 193-228 - Wu-Chun Chung, Chin-Jung Hsu, Kuan-Chou Lai, Kuan-Ching Li, Yeh-Ching Chung:
Direction-aware resource discovery in large-scale distributed computing environments. 229-248 - Fengkai Yuan, Zhenzhou Ji:
DP&TB: a coherence filtering protocol for many-core chip multiprocessors. 249-261 - Rajni Aron, Inderveer Chana:
QoS based resource provisioning and scheduling in grids. 262-283 - Juan A. Villar, Pedro Javier García, Francisco José Alfaro, José L. Sánchez, Francisco J. Quiles:
An integrated solution for QoS provision and congestion management in high-performance interconnection networks using deterministic source-based routing. 284-304 - Tian Huang, Yongxin Zhu, Meikang Qiu, Xiaojing Yin, Xu Wang:
Extending Amdahl's law and Gustafson's law by evaluating interconnections on multi-core processors. 305-319 - Yahui Wu, Su Deng, Hongbin Huang:
Optimal management of dynamic information in Delay Tolerant Networks. 320-338 - Basel A. Mahafzah:
Performance assessment of multithreaded quicksort algorithm on simultaneous multithreaded architecture. 339-363 - Jun Chai, Huayou Su, Mei Wen, Xing Cai, Nan Wu, Chunyuan Zhang:
Resource-efficient utilization of CPU/GPU-based heterogeneous supercomputers for Bayesian phylogenetic inference. 364-380 - Hung-Fu Li, Tyng-Yeu Liang, Jun-Yao Chiu:
A compound OpenMP/MPI program development toolkit for hybrid CPU/GPU clusters. 381-405 - Manaschai Kunaseth, David F. Richards, James N. Glosli, Rajiv K. Kalia, Aiichiro Nakano, Priya Vashishta:
Analysis of scalable data-privatization threading algorithms for hybrid MPI/OpenMP parallelization of molecular dynamics. 406-430 - Arslan Munir, Farinaz Koushanfar, Ann Gordon-Ross, Sanjay Ranka:
High-performance optimizations on tiled many-core embedded systems: a matrix multiplication case study. 431-487 - Mohsen Soryani, Morteza Analoui, Ghobad Zarrinchian:
Improving inter-node communications in multi-core clusters using a contention-free process mapping algorithm. 488-513 - Xinyu Wang, Dong Xiang, Zhigang Yu:
TM: a new and simple topology for interconnection networks. 514-538 - Kenn Slagter, Ching-Hsien Hsu, Yeh-Ching Chung, Daqiang Zhang:
An improved partitioning mechanism for optimizing massive data analysis using MapReduce. 539-555 - Zhiyuan Shi, Fei Hao:
A strategy of multi-criteria decision-making task ranking in social-networks. 556-571 - Sadoon Azizi, Farshad Safaei, Naser Hashemi:
On the topological properties of HyperX. 572-593 - Jaeseok Myung, Sang-goo Lee:
Exploiting inter-operation parallelism for matrix chain multiplication using MapReduce. 594-609
Volume 66, Number 2, November 2013
- Jongsung Kim, Philip S. Yu, Nasrullah Memon:
Social network and high performance in smart communications. 611-613 - James (Jong Huk) Park, Hwa-Young Jeong:
The QoS-based MCDM system for SaaS ERP applications with Social Network. 614-632 - Jong-Soo Sohn, In-Jeong Chung:
Dynamic FOAF management method for social networks in the social web environment. 633-648 - Yuexing Peng, Yonghui Li, Lei Shu, Wenbo Wang:
An energy-efficient clustered distributed coding for large-scale wireless sensor networks. 649-669 - Yen-Wen Chen, Shaoh Chen Ke:
A uplink radio resource allocation scheme for localized SC-FDMA transmission in LTE network. 670-685 - Xibin Wang, Xia Xie, Hai Jin, Xuanhua Shi, Wenzhi Cao, Xijiang Ke:
A disk bandwidth allocation mechanism with priority. 686-699 - Yong-Hyuk Moon, Jeong-Nyeo Kim, Chan-Hyun Youn:
Churn-aware optimal layer scheduling scheme for scalable video distribution in super-peer overlay networks. 700-720 - Ming-Chin Juang, Chen-Che Huang, Jiun-Long Huang:
Efficient algorithms for team formation with a leader in social networks. 721-737 - Iram Fatima, Muhammad Fahim, Young-Koo Lee, Sungyoung Lee:
MODM: multi-objective diffusion model for dynamic social networks using evolutionary algorithm. 738-759 - Iram Fatima, Muhammad Fahim, Young-Koo Lee, Sungyoung Lee:
Analysis and effects of smart home dataset characteristics for daily life activity recognition. 760-780
- Sang-Soo Yeo, Shiuh-Jeng Wang:
Editorial of special section on hybrid information security technologies - part I. 781-782 - Wei-Jen Wang, Yue-Shan Chang, Win-Tsung Lo, Yi-Kang Lee:
Adaptive scheduling for parallel tasks with QoS satisfaction for hybrid cloud environments. 783-811 - Fu-Hau Hsu, Min-Hao Wu, Shiuh-Jeng Wang, Chia-Ling Huang:
Reversibility of image with balanced fidelity and capacity upon pixels differencing expansion. 812-828 - Kitae Jeong:
Cryptanalysis of block cipher Piccolo suitable for cloud computing. 829-840 - Chun-I Fan, Shi-Yuan Huang, William Artan:
Design and implementation of privacy preserving billing protocol for smart grid. 841-862 - Raylin Tso:
Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol. 863-874 - Jewan Bang, Changhoon Lee, Sangjin Lee, Kyungho Lee:
Damaged backup data recovery method for Windows mobile. 875-887 - Ren-Junn Hwang, Yu-Kai Hsiao:
An anonymous distributed routing protocol in mobile ad-hoc networks. 888-906 - Tung-Shou Chen, Wei-Bin Lee, Jeanne Chen, Yuan-Hung Kao, Pei-Wen Hou:
Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving. 907-917 - Jungmin Lim, Yongki Kim, Dongyoung Koo, Soojin Lee, Seokjoo Doo, Hyunsoo Yoon:
A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology. 918-935 - Tae Youn Han, Mun-Kyu Lee:
Reordering computation sequences for memory-efficient binary field multiplication. 936-949 - Hyo Hyun Choi, Su Hyun Nam, Taeshik Shon, Myungwhan Choi:
Information delivery scheme of micro UAVs having limited communication range during tracking the moving target. 950-972 - Chih-ho Chou, Kuo-Yu Tsai, Chung-Fu Lu:
Two ID-based authenticated schemes with key agreement for mobile environments. 973-988 - Chi Lin, Guowei Wu:
Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach. 989-1007 - Te-Yu Chen, Cheng-Chi Lee, Min-Shiang Hwang, Jinn-Ke Jan:
Towards secure and efficient user authentication scheme using smart card for multi-server environments. 1008-1032 - Chi-Yao Weng, Yu Hong Zhang, Li Chun Lin, Shiuh-Jeng Wang:
Visible watermarking images in high quality of data hiding. 1033-1048 - Arash Nourian, Muthucumaru Maheswaran:
Privacy aware image template matching in clouds using ambient data. 1049-1070 - Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:
Secure and robust multipath routings for advanced metering infrastructure. 1071-1092 - Ya-Ting Chang, Cheng-Ta Huang, Chin-Feng Lee, Shiuh-Jeng Wang:
Image interpolating based data hiding in conjunction with pixel-shifting of histogram. 1093-1110 - Hsing-Chung Chen, Marsha Anjanette Violetta, Cheng-Ying Yang:
Contract RBAC in cloud computing. 1111-1131
Volume 66, Number 3, December 2013
- Hai Jin, Guofu Xiang, Deqing Zou, Song Wu, Feng Zhao, Min Li, Weide Zheng:
A VMM-based intrusion prevention system in cloud computing environment. 1133-1151 - Xuanhua Shi, Hai Jin, Song Wu, Wei Zhu, Li Qi:
Adapting grid computing environments dependable with virtual machines: design, implementation, and evaluations. 1152-1166 - Ming Zhong, Yaoxue Zhang, Yuezhi Zhou, Laurence Tianruo Yang, Pengwei Tian, Linkai Weng:
A novel component retrieval method based on weighted facet tree. 1167-1177 - Lizhe Wang, Tobias Kurze, Jie Tao, Marcel Kunze, Gregor von Laszewski:
On-demand service hosting on production grid infrastructures. 1178-1193 - Joon-Min Gil, Jong Hyuk Park, Young-Sik Jeong:
Data center selection based on neuro-fuzzy inference systems in cloud computing environments. 1194-1214 - Haijun Cao, Hai Jin, Song Wu, Shadi Ibrahim:
Petri net based Grid workflow verification and optimization. 1215-1230 - David Allenotor, Ruppa K. Thulasiram:
A fuzzy Grid-QoS framework for obtaining higher grid resources availability. 1231-1242 - Zhiyong Tan, Duo Liu, Xuejun Zhuo, Yiqi Dai, Laurence T. Yang:
Implementation and performance analysis of multilevel security system in pervasive computing environment. 1243-1259 - Zhiming Ding, Jiajie Xu, Qi Yang:
SeaCloudDM: a database cluster framework for managing and querying massive heterogeneous sensor sampling data. 1260-1284 - Ming Yang, Junzhou Luo, Lu Zhang, Xiaogang Wang, Xinwen Fu:
How to block Tor's hidden bridges: detecting methods and countermeasures. 1285-1305 - Jiang Liu, Mianxiong Dong, Laurence T. Yang, Shigeru Shimamoto:
A subcarrier modulation based optical wireless communication system employing transmission diversity. 1306-1319 - Weetit Wanalertlak, Ben Lee, Chansu Yu, Myungchul Kim, Seung-Min Park, Wontae Kim:
Scanless fast handoff technique based on global Path-Cache for WLANs. 1320-1349 - Sepideh Adabi, Ali Movaghar, Amir Masoud Rahmani, Hamid Beigy:
Negotiation strategies considering market, time and behavior functions for resource allocation in computational grid. 1350-1389 - Joon S. Park, Pratheep Chandramohan, Avinash T. Suresh, Joseph Giordano, Kevin A. Kwiat:
Component survivability at runtime for mission-critical distributed systems. 1390-1417 - Hu Guan, Huakang Li, Cheng-Zhong Xu, Minyi Guo:
Semi-sparse algorithm based on multi-layer optimization for recommender system. 1418-1437
- Alberto Cano, José María Luna, Sebastián Ventura:
High performance evaluation of evolutionary-mined association rules on GPUs. 1438-1461 - Fei Cao, Mengxia Michelle Zhu:
Distributed workflow mapping algorithm for maximized reliability under end-to-end delay constraint. 1462-1488 - Shin Gyu Kim, Hyeonsang Eom, Heon Y. Yeom:
Virtual machine consolidation based on interference modeling. 1489-1506 - Ben Akram Ahmed, Abderazek Ben Abdallah:
Architecture and design of high-throughput, low-latency, and fault-tolerant routing algorithm for 3D-network-on-chip (3D-NoC). 1507-1532 - Hosein Mohamadi, Abdul Samad Ismail, Shaharuddin Salleh, Ali Nodhei:
Learning automata-based algorithms for finding cover sets in wireless sensor networks. 1533-1552 - Yunliang Chen, Dan Chen, Samee Ullah Khan, Jianzhong Huang, Changsheng Xie:
Solving symbolic regression problems with uniform design-aided gene expression programming. 1553-1575 - David L. González-Álvarez, Miguel A. Vega-Rodríguez:
A parallel cooperative team of multiobjective evolutionary algorithms for motif discovery. 1576-1612 - Dongwoo Lee, Inhyuk Kim, Jee-hong Kim, Hyung Kook Jun, Wontae Kim, Sang-Won Lee, Young Ik Eom:
Light-weight kernel instrumentation framework using dynamic binary translation. 1613-1628 - Jinkyu Jeong, Sung-Hun Kim, Hwanju Kim, Joonwon Lee, Euiseong Seo:
Analysis of virtual machine live-migration as a method for power-capping. 1629-1655 - Guoqiang Gao, Ruixuan Li, Weijun Xiao, Zhiyong Xu:
Measurement study on P2P streaming systems. 1656-1686 - Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Atta ur Rehman Khan, Mazhar Ali:
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. 1687-1706 - Hossein Amir, Hadi Shahriar Shahhoseini:
Improving CompactMatrix phase in gang scheduling by changing transference condition and utilizing exchange. 1707-1728 - Biao Song, Wei Tang, Tien-Dung Nguyen, Mohammad Mehedi Hassan, Eui-Nam Huh:
An optimized hybrid remote display protocol using GPU-assisted M-JPEG encoding and novel high-motion detection algorithm. 1729-1748 - Romil Barthwal, Sudip Misra, Mohammad S. Obaidat:
Finding overlapping communities in a complex network of social linkages and Internet of things. 1749-1772 - Wenhong Tian, Qin Xiong, Jun Cao:
An online parallel scheduling method with application to energy-efficiency in cloud computing. 1773-1790
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.