default search action
International Journal of High Performance Computing and Networking, Volume 10
Volume 10, Numbers 1/2, 2017
- Baker Alrubaiey, Jemal H. Abawajy:
Virtual networks dependability assessment framework. 3-12 - Sudha Senthilkumar, V. Madhu Viswanatham:
HB-PPAC: hierarchy-based privacy preserving access control technique in public cloud. 13-22 - Rukmani Panjanathan, Ganesan Ramachandran:
Enhanced low latency queuing algorithm with active queue management for multimedia applications in wireless networks. 23-33 - Harini Sriraman, Pattabiraman Venkatasubbu:
On the field design bug tolerance on a multi-core processor using FPGA. 34-43 - M. Sivagami, T. Revathi, L. Jeganathan:
An optimised background modelling for efficient foreground extraction. 44-53 - V. Subramaniyaswamy, Logesh Ravi, M. Chandrashekhar, Anirudh Challa, Vijayakumar Varadharajan:
A personalised movie recommendation system based on collaborative filtering. 54-63 - S. Rajaraajeswari, R. Selvarani, Pethuru Raj, P. Mohanavadivu:
Fuzzy logic for decision-enablement: a novel context-awareness framework for smarter environments. 64-77 - M. Thenmozhi, H. Srimathi:
An analysis on the performance of hash table-based dictionary implementations with different data usage models. 78-90 - Ambika Vishal Pawar, Ajay R. Dani:
Privacy preserving framework for brute force attacks in cloud environment. 91-99 - H. Santhi, Natarajan Jaisankar:
Fuzzy cost probability-based suppressed flooding multi-constrained QoS multicast routing for MANETs. 100-108 - Balamurugan Balusamy, Siddharth Ramachandran, Nalini Priya:
Achieving fine-grained access control and mitigating role explosion by utilising ABE with RBAC. 109-117 - Sujata Joshi, Sanjay Bhatia, Kiran Raikar, Harmanpreet Pall:
Customer experience and associated customer behaviour in end user devices and technologies (smartphones, mobile internet, mobile financial services). 118-126 - K. S. Umadevi, Arunkumar Thangavelu:
DCRMRP: distributed cooperative relay-based multihop routing protocol for WiMedia networks. 127-133 - Abhinit Modi, Raghavendra Achar, P. Santhi Thilagam:
Live migration of virtual machines with their local persistent storage in a data intensive cloud. 134-147 - Anitha R. Balaji, Saswati Mukherjee:
Bloom filter-based framework for cache management in large cloud metadata databases. 148-155
Volume 10, Number 3, 2017
- Wei-Tee Lin, Chih-Ping Chu:
A fast and parallel algorithm for frequent pattern mining from big data in many-task environments. 157-167 - Hua-Yi Lin, Jiann-Gwo Doong, Meng-Yen Hsieh, Kuan-Ching Li:
A real time vehicle management system implementation on cloud computing platform. 168-178 - Wei Wang, Miodrag Bolic, Jonathan Parri:
pvFPGA: paravirtualising an FPGA-based hardware accelerator towards general purpose computing. 179-193 - M. Sakthi Ganesh, P. Venkata Krishna:
Improving the performance by message broadcasting in VANETS. 194-200 - Wenbo Wang, Binqiang Wang, Yuxiang Hu, Bangzhou Liu:
ReconsMap: a reliable controller-switch mapping in software defined networks. 201-206 - Maheswari Raja, Pattabiraman Venkatasubbu:
Improved reconfigurable hyper-pipeline soft-core processor on FPGA for SIMD. 207-217 - Peiyan Yuan, Shangwang Liu, En Zhang:
Modelling epidemic routing with heterogeneous infection rate. 218-225 - Chengyu Hu, Pengtao Liu, Shanqing Guo, Qiuliang Xu:
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application. 226-239 - Jianhong Zhang, Xubing Zhao, Weina Zhen:
OGPADSM2: oriented-group public auditing for data sharing with multi-user modification. 240-249
Volume 10, Numbers 4/5, 2017
- Xiang Xu, Shuming Zhou, Li Xu:
Diagnosabilities of regular networks under three-valued comparison models. 251-258 - Yanhua Du, Ruyue Li, Benyuan Yang:
A sprouting graph-based approach to analysing timed workflow processes with shared resources. 259-268 - Chonglin Gu, Zhixiang He, Shi Chen, Hejiao Huang, Xiaohua Jia:
Detecting spammers using review graph. 269-278 - Zhen Yu, Zhen Yang, Xiaohong Su, Peijun Ma:
Evaluation and comparison of ten data race detection techniques. 279-288 - Jian Tang, Mikel Larrea, Sergio Arévalo, Ernesto Jiménez:
Reliable broadcast in anonymous distributed systems with fair lossy channels. 289-297 - Tehui Huang, Tao Li, Qiankun Dong, Kezhao Zhao, Wenjing Ma, Yulu Yang:
Communication-aware task scheduling algorithm for heterogeneous computing. 298-309 - Quan Liu, Xiaorui Li, Zizhong Quan, Duzhong Zhang, Wenjun Xu:
An adaptive hybrid ARQ method for coexistence of ZigBee and WiFi. 310-319 - Ruxia Fan, Dingyi Fang, Zhanyong Tang, Xiaojiang Chen, Fangyuan Liu, Zhengqiao Li:
Thwarting Android app repackaging by executable code fragmentation. 320-331 - Casimer M. DeCusatis, Ioannis Papapanagiotou:
A service industry perspective on software defined radio access networks. 332-340 - Pengfei Yin, Guojun Wang, Wenjun Jiang:
U-Search: usage-based search with collective intelligence. 341-351 - Yonghua Xiong, Ya Chen, Keyuan Jiang, Yongbing Tang:
An energy-aware task consolidation algorithm for cloud computing data centre. 352-358 - Mei-Ling Chiang, Ching-Chung Tseng, Yen-Chu Chang, Shu-Chun Chao, Han Wang:
Kernel mechanisms for turning a 3D MMOG from single into multi-server architecture. 359-371 - Weilian Xue, Wenxin Li, Heng Qi, Keqiu Li, Xiaoyi Tao, Xinhua Ji:
Communication-aware virtual machine migration in cloud data centres. 372-380 - Cairong Yan, Jian Wang, Bin Zhu, Wenjing Guo:
Para-Join: an efficient parallel method for string similarity join. 381-390 - Yanhua Li, Youhui Zhang, Cihang Jiang, Weiming Zheng:
Hardware support for message-passing in chip multi-processors. 391-402 - Carlos Augusto S. Cunha, Luis A. M. Silva:
Reboot-based recovery of performance anomalies in adaptive bitrate video-streaming services. 403-414 - Nao Wang, Gaocai Wang, Tianxiao Xie:
An energy-aware cooperative content distributed strategy based on MST for the mobile environment. 415-422 - Cong Xu, Jiahai Yang, Jianping Weng, Ye Wang, Hui Yu:
Optimising the deployment of virtual machine image replicas in cloud storage clusters. 423-435 - Qiang Guan, Nathan DeBardeleben, Sean Blanchard, Song Fu:
Addressing statistical significance of fault injection: empirical studies of the soft error susceptibility. 436-452
Volume 10, Number 6, 2017
- Qiang Lin, Guowei Wu, Zihao Song, Chen Xu:
A probabilistic mix-critical task scheduling algorithm for wireless networked control system. 453-462 - Jumin Zhao, Deng-ao Li, Haibin Wen, Qingming Tang:
Load balanced and efficient data collection protocol for wireless sensor networks. 463-473 - Yang Gao, Keqiu Li:
Maximising resource utilisation and minimising hardware cost in specific cloud. 474-480 - Bin Feng, Xiangjie Kong, Han Yao, Junyi Li, Jiusheng Peng:
Study on routing protocol based on traffic density in VANET. 481-487 - Fucheng Cao, Yuanchun Li, Lirong Wang, Zhen Liu:
A low-cost and highly integrated control system for lower limb rehabilitation robot. 488-497 - Wenying Zhang, Zhen Xiao, Mengzhu Li:
Optimised the differential trail of the authenticated encryption algorithm Tiaoxin-346. 498-504 - Hamdi Hassen, Kay Dörnemann, Maher Khemakhem:
Advanced distributed architecture for a complex and large scale Arabic handwriting recognition framework. 505-514 - Jiayong Tang, Fangguo Zhang:
A new code-based encryption scheme and its applications. 515-523 - Jing Wei, Leyou Zhang:
Ciphertext policy attribute-based encryption with hierarchical domain authorities and users in cloud. 524-533 - João Almeida, Joaquim Ferreira, Arnaldo S. R. Oliveira:
Fail silence mechanism for dependable vehicular communications. 534-545
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.