default search action
The Journal of Supercomputing, Volume 70
Volume 70, Number 1, October 2014
- Sang-Soo Yeo, Shiuh-Jeng Wang:
Editorial of special section on Hybrid Information Security Technologies: part II. 1-2 - Hyongsoon Kim, EunYoung Lee:
Secure component composition with modular behavioral properties. 3-19 - Seokjun Lee, Taeshik Shon:
Improved deleted file recovery technique for Ext2/3 filesystem. 20-30 - Jia-Ning Luo, Ming-Hour Yang:
An anonymous e-rental protocol based on ID-based cryptography and NFC. 31-53 - Chin-Ling Chen, Yu-Yi Chen, Cheng-Chi Lee, Cheng-Hsun Wu:
Design and analysis of a secure and effective emergency system for mountaineering events. 54-74 - Jue-Sam Chou:
An efficient mutual authentication RFID scheme based on elliptic curve cryptography. 75-94 - Changhoon Lee:
Biclique cryptanalysis of PRESENT-80 and PRESENT-128. 95-103 - Sohail Jabbar, Abid Ali Minhas, Anand Paul, Seungmin Rho:
Multilayer cluster designing algorithm for lifetime improvement of wireless sensor networks. 104-132 - WenBin Hsieh, Jenq-Shiou Leu:
An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures. 133-148 - Sekie Amanuel Majore, Hyunguk Yoo, Taeshik Shon:
Secure and reliable electronic record management system using digital forensic technologies. 149-165 - Sang Un Ahn, Il Yeon Yeo, Sang Oh Park:
Secure and efficient high-performance PROOF-based cluster system for high-energy physics. 166-176 - Liming Zuo, Neeraj Kumar, Hang Tu, Ankit Singh, Naveen K. Chilamkurti, Seungmin Rho:
Detection and analysis of secure intelligent universal designated verifier signature scheme for electronic voting system. 177-199 - Heejun Yoon, Il Yeon Yeo, Jeong-Heon Kim:
Updating the trusted connection of re-organized computing resource under the automated system management platform. 200-210 - Chang-Moo Lee, Hangbae Chang:
A study on security strategy in ICT convergence environment. 211-223 - Hang Tu, Neeraj Kumar, Debiao He, Jongsung Kim, Changhoon Lee:
An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks. 224-235 - Bonwook Koo, Dongyoung Roh, Daesung Kwon:
Converting random bits into random numbers. 236-246 - Fu-Hau Hsu, Min-Hao Wu, Cheng-Hsing Yang, Shiuh-Jeng Wang:
Visible watermarking with reversibility of multimedia images for ownership declarations. 247-268 - Danli Wang, Liang He, Keqin Dou:
StoryCube: supporting children's storytelling with a tangible tool. 269-283 - Luobin Yang, Steve C. Chiu, Wei-keng Liao, Michael A. Thomas:
High performance data clustering: a comparative analysis of performance for GPU, RASC, MPI, and OpenMP implementations. 284-300 - Dawid Zydek, Grzegorz Chmaj, Steve Chiu:
Modeling computational limitations in H-Phy and Overlay-NoC architectures. 301-320 - Yonggang Che, Lilun Zhang, Yongxian Wang, Chuanfu Xu, Wei Liu, Zhenghua Wang:
Microarchitectural performance comparison of Intel Knights Corner and Intel Sandy Bridge with CFD applications. 321-348 - Evgenios Karanikolaou, Emina I. Milovanovic, Igor Z. Milovanovic, Michael P. Bekakos:
Performance scalability and energy consumption on distributed and many-core platforms. 349-364 - George A. Gravvanis, Christos K. Filelis-Papadopoulos:
Distributed generic approximate sparse inverses. 365-384 - Su Hu, Wenzheng Xu, Jing Lin, Xiaola Lin:
Probabilistic odd-even: an adaptive wormhole routing algorithm for 2D mesh network-on-chip. 385-407 - Xiaoyu Yang, David Wallom, Simon Waddington, Jianwu Wang, Arif Shaon, Brian Matthews, Michael D. Wilson, Yike Guo, Li Guo, Jon D. Blower, Athanasios V. Vasilakos, Kecheng Liu, Philip Kershaw:
Cloud computing in e-Science: research challenges and opportunities. 408-464 - Vijayalakshmi Saravanan, Alagan Anpalagan, Dwarkadas Pralhaddas Kothari, Isaac Woungang, Mohammad S. Obaidat:
A comparative simulation study on the power-performance of multi-core architecture. 465-487 - Yan Su, Feng Shi, Shahnawaz Talpur, Jin Wei, Hai Tan:
Exploiting controlled-grained parallelism in message-driven stream programs. 488-509
Volume 70, Number 2, November 2014
- José Ranilla, Ester M. Garzón, Jesús Vigo-Aguiar:
High performance computing: an essential tool for science and engineering breakthroughs. 511-513 - Jorge Francés, Sergio Bleda, Andrés Márquez, Cristian Neipp, Sergi Gallego, Beatriz Otero, Augusto Beléndez:
Performance analysis of SSE and AVX instructions in multi-core CPUs and GPU computing on FDTD scheme for solid and fluid vibration problems. 514-526 - Roberto Uribe Paredes, Diego Cazorla, Enrique Arias, José L. Sánchez:
Towards an efficient static scheduling scheme for delivering queries to heterogeneous clusters in the similarity search problem. 527-540 - Carla Ramiro, M. Ángeles Simarro, Francisco-Jose Martínez-Zaldívar, Antonio M. Vidal, Alberto González:
A GPU implementation of an iterative receiver for energy saving MIMO ID-BICM systems. 541-551 - Victor Fernández-Bauset, Juan M. Orduña, Pedro Morillo:
Comparative performance evaluation of CAR systems based on mobile phones and feature tracking. 552-563 - Pedro Alonso, Víctor M. García, Francisco-Jose Martínez-Zaldívar, Addisson Salazar, Luis Vergara, Antonio M. Vidal:
Parallel approach to NNMF on multicore architecture. 564-576 - Siham Tabik, Gloria Ortega López, Ester M. Garzón:
Performance evaluation of kernel fusion BLAS routines on the GPU: iterative solvers as case study. 577-587 - Jorge Sevilla, Sergio Bernabé, Antonio J. Plaza:
Unmixing-based content retrieval system for remotely sensed hyperspectral imagery on GPUs. 588-599 - A. G. Arrondo, Juana López Redondo, José Fernández, Pilar Martínez Ortigosa:
Solving a leader-follower facility problem via parallel evolutionary approaches. 600-611 - Miguel López-Portugués, Jesús Alberto López-Fernández, N. Díaz-Gracia, Rafael González Ayestarán, José Ranilla:
Aircraft noise scattering prediction using different accelerator architectures. 612-622 - Jesús Peinado-Pinilla, Pedro Alonso, Jacinto Javier Ibáñez, Vicente Hernández, Murilo Boratto:
Solving time-invariant differential matrix Riccati equations using GPGPU computing. 623-636 - Josep Arnal, Héctor Migallón Gomis, Violeta Migallón, Juan Alejandro Palomino Benito, José Penadés:
Parallel relaxed and extrapolated algorithms for computing PageRank. 637-648 - Alejandro Acosta, Francisco Almeida:
Android $$^\mathrm{TM}$$ TM development and performance analysis. 649-659 - Iván Cores, Gabriel Rodríguez, María J. Martín, Patricia González:
In-memory application-level checkpoint-based migration for MPI programs. 660-670 - Pablo Piñol, Héctor Migallón Gomis, Otoniel Mario López Granado, Manuel P. Malumbres:
Parallel strategies analysis over the HEVC encoder. 671-683 - J. M. García-Martínez, Ester M. Garzón, Pilar Martínez Ortigosa:
A GPU implementation of a hybrid evolutionary algorithm: GPuEGO. 684-695 - Oscar G. Lorenzo, Tomás F. Pena, José Carlos Cabaleiro, Juan Carlos Pichel, Francisco F. Rivera:
3DyRM: a dynamic roofline model including memory latency information. 696-708 - José Antonio Álvarez-Bermejo, M. A. Lodroman, Juan Antonio López Ramos:
A decentralized protocol for mobile control access. 709-720 - Carlos Brun, Tomàs Margalef, Ana Cortés, Anna Sikora:
Enhancing multi-model forest fire spread prediction by exploiting multi-core parallelism. 721-732 - Murilo Boratto, Pedro Alonso, Domingo Giménez, Marcos Barreto:
Automatic routine tuning to represent landform attributes on multicore and multi-GPU systems. 733-745 - Juan Pablo Silva, José Hagopian, Marcel Burdiat, Ernesto Dufrechou, Martín Pedemonte, Alejandro Gutiérrez Arce, Gabriel Cazes, Pablo Ezzatti:
Another step to the full GPU implementation of the weather research and forecasting model. 746-755 - Csaba Mate Józsa, Fernando Domene, Antonio M. Vidal, Gema Piñero, Alberto González:
High performance lattice reduction on heterogeneous computing platform. 772-785 - Hector Ortega-Arranz, Yuri Torres, Arturo González-Escribano, Diego R. Llanos:
Optimizing an APSP implementation for NVIDIA GPUs using kernel characterization criteria. 786-798 - Pedro Valero-Lara:
Accelerating solid-fluid interaction based on the immersed boundary method on multicore and GPU architectures. 799-815 - Jorge González-Domínguez, Osni A. Marques, María J. Martín, Juan Touriño:
A 2D algorithm with asymmetric workload for the UPC conjugate gradient method. 816-829 - Gregorio Bernabé, Javier Cuenca, Luis-Pedro García, Domingo Giménez:
Improving an autotuning engine for 3D Fast Wavelet Transform on manycore systems. 830-844
- Ali Pahlavan, Mahmoud Momtazpour, Maziar Goudarzi:
Power reduction in HPC data centers: a joint server placement and chassis consolidation approach. 845-879 - David L. González-Álvarez, Miguel A. Vega-Rodríguez, Álvaro Rubio-Largo:
Parallelizing and optimizing a hybrid differential evolution with Pareto tournaments for discovering motifs in DNA sequences. 880-905 - Somayyeh Gholizadeh, Azizol Abdullah, Mohamed Othman, Zurina Mohd Hanapi, Mohsen Heydarian:
Optimized performance data transmission in Mobile IP networks. 906-929 - Guoming Lai, Dehui Yuan, Shenyun Yang:
A new hybrid combinatorial genetic algorithm for multidimensional knapsack problems. 930-945 - Abdul Nasir Khan, Miss Laiha Mat Kiah, Mazhar Ali, Sajjad Ahmad Madani, Atta ur Rehman Khan, Shahaboddin Shamshirband:
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment. 946-976 - Behnam Rahnama:
Towards improved parallelism through order reduction of accessing data in nD matrices. 977-986 - Mohammad Sabzinejad Farash:
Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. 987-1001 - Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari:
An efficient client-client password-based authentication scheme with provable security. 1002-1022
Volume 70, Number 3, December 2014
- Lanping Chen, Zhengzhi Han, Zhenghua Ma:
Research on robust control and exponential stabilization for large scale impulsive hybrid network systems with time-delay. 1023-1035 - Imen Elbouabidi, Faouzi Zarai, Mohammad S. Obaidat, Lotfi Kamoun:
Design and analysis of secure host-based mobility protocol for wireless heterogeneous networks. 1036-1050 - Zheng Yan, Yu Chen, Yue Shen:
PerContRep: a practical reputation system for pervasive content services. 1051-1074 - Juan Manuel Marín Pérez, Jorge Bernal Bernabé, José M. Alcaraz Calero, Félix J. García Clemente, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta:
Taxonomy of trust relationships in authorization domains for cloud computing. 1075-1099 - Jyh-haw Yeh:
The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it. 1100-1119 - Mikko Nieminen, Nikolay Tcholtchev, Ina Schieferdecker, Tomi Räty:
Robust architecture for distributed intelligence in an IP-based mobile wide-area surveillance system. 1120-1141 - Mianxiong Dong, Kaoru Ota, Man Lin, Zunyi Tang, Suguo Du, Haojin Zhu:
UAV-assisted data gathering in wireless sensor networks. 1142-1155 - Chao Luo, Hiroyuki Okamura, Tadashi Dohi:
Performance evaluation of snapshot isolation in distributed database system under failure-prone environment. 1156-1179 - Xingang Liu, Wenjie Yang, Zhixin Shen:
H.264/AVC video error concealment algorithm by employing motion vector recovery under cloud computing environment. 1180-1199 - M. Mohsin Saleemi, Johan Lilius:
Exploiting smart spaces for interactive TV applications development. 1200-1217 - André C. Santos, João M. P. Cardoso, Pedro C. Diniz, Diogo R. Ferreira, Zlatko Petrov:
A DSL for specifying run-time adaptations for embedded systems: an application to vehicle stereo navigation. 1218-1248 - Xiaoli Cui, Pingfei Zhu, Xin Yang, Keqiu Li, Changqing Ji:
Optimized big data K-means clustering using MapReduce. 1249-1259 - Liang Zhu, Hai Jin, Xiaofei Liao, Jianhui Yue:
Performance-energy adaptation of parallel programs in pervasive computing. 1260-1278 - Zhuo Tang, Yanqing Mo, Kenli Li, Keqin Li:
Dynamic forecast scheduling algorithm for virtual machine placement in cloud computing environment. 1279-1296 - Yufeng Wang, Jing Tang, Qun Jin, Jianhua Ma:
On studying business models in mobile social networks based on two-sided market (TSM). 1297-1317 - Huang Xu, Zhiwen Yu, Zhu Wang, Hongbo Ni:
SmartMic: a smartphone-based meeting support system. 1318-1330 - Zhijian Chen, Wenhai Luo, Dan Wu, Xiang Huang, Jian He, Yuanhuan Zheng, Di Wu:
Exploiting application-level similarity to improve SSD cache performance in Hadoop. 1331-1344 - Jie Dai, Yu Zhao, Yunhuai Liu, Li Qi, Chuanping Hu:
Cloud-assisted analysis for energy efficiency in intelligent video systems. 1345-1364 - Xu Zhang, Hai Wang, Qingyuan Gong, Xin Wang:
Decluster: a complex network model-based data center network topology. 1365-1382 - Wenfeng Xia, Yonggang Wen, Haiyong Xie, Bin Liu:
μ DC2: unified data collection for data centers. 1383-1404 - Mingwu Zhang, Chunzhi Wang, Kirill Morozov:
LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces. 1405-1432 - Jinfeng Yuan, Weizhong Qiang, Hai Jin, Deqing Zou:
CloudTaint: an elastic taint tracking framework for malware detection in the cloud. 1433-1450 - Thomas Rauber, Gudula Rünger, Michael Schwind, Haibin Xu, Simon Melzner:
Energy measurement, modeling, and prediction for processors with frequency scaling. 1451-1476 - Renlong Tu, Xin Wang, Yue Yang:
Energy-saving model for SDN data centers. 1477-1495 - Song Wu, Yaqiong Peng, Hai Jin, Jun Zhang:
Peacock: a customizable MapReduce for multicore platform. 1496-1513 - Ibrahim Takouna, Kai Sachs, Christoph Meinel:
Multiperiod robust optimization for proactive resource provisioning in virtualized data centers. 1514-1536 - Zhi Wang, Jinsong Han, Wei Xi, Jizhong Zhao:
Efficient and secure key extraction using channel state information. 1537-1554 - Danilo Pani, Alessandro Pani, Luigi Raffo:
Real-time blind audio source separation: performance assessment on an advanced digital signal processor. 1555-1576 - Xia Xie, Wenzhi Cao, Hai Jin, Xijiang Ke, Shuwen Luo:
Design and implementation of process-aware predictive scheduling scheme for virtual machine. 1577-1587 - Pablo Basanta-Val, Marisol García-Valls:
A simple distributed garbage collector for distributed real-time Java. 1588-1616 - M. Mohsin Saleemi, Natalia Díaz Rodríguez, Johan Lilius:
Erratum to: Exploiting smart spaces for interactive TV applications development. 1617
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.