


default search action
The Journal of Supercomputing, Volume 74
Volume 74, Number 1, January 2018
- Aryaf Al-Adwan

, Basel A. Mahafzah
, Ahmad Abdel-Aziz Sharieh
:
Solving traveling salesman problem using parallel repetitive nearest neighbor algorithm on OTIS-Hypercube and OTIS-Mesh optoelectronic architectures. 1-36 - Bob Zigon

, Luoding Zhu, Fengguang Song:
Interactive 3D simulation for fluid-structure interactions using dual coupled GPUs. 37-64 - King-Hang Wang

, Chien-Ming Chen
, Weicheng Fang, Tsu-Yang Wu
:
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. 65-70 - Samad Rostampour, Nasour Bagheri

, Mehdi Hosseinzadeh
, Ahmad Khademzadeh:
A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications. 71-86 - Esther Salamí

, Cristina Barrado
, Antonia Gallardo, Enric Pastor:
General queuing model for optimal seamless delivery of payload processing in multi-core processors. 87-104 - Zhegao Piao

, Seong Joon Yoo, Yeong Hyeon Gu, Jaechun No, Zhiyan Jiang, Helin Yin:
Recommender system architecture based on Mahout and a main memory database. 105-121 - Madnesh K. Gupta, Tarachand Amgoth

:
Resource-aware virtual machine placement algorithm for IaaS cloud. 122-140 - Yili Wang

, Kyung Tae Kim, Byung Jun Lee, Hee Yong Youn
:
A novel buffer management scheme based on particle swarm optimization for SSD. 141-159 - Armin Ahmadzadeh, Omid Hajihassani, Saeid Gorgin:

A high-performance and energy-efficient exhaustive key search approach via GPU on DES-like cryptosystems. 160-182 - Xianfu Meng:

A churn-aware durable data storage scheme in hybrid P2P networks. 183-204 - Ali Kazemi Niari, Reza Berangi

, Mahmood Fathy
:
ECCN: an extended CCN architecture to improve data access in vehicular content-centric network. 205-221 - Tuan Anh Nguyen

, Dugki Min, Eunmi Choi:
A comprehensive evaluation of availability and operational cost for a virtualized server system using stochastic reward nets. 222-276 - Ali Shokouhi Rostami, Marzieh Badkoobe, Farahnaz Mohanna

, Hengameh Keshavarz
, Ali Asghar Rahmani Hosseinabadi
, Arun Kumar Sangaiah
:
Survey on clustering in heterogeneous and homogeneous wireless sensor networks. 277-323 - Hazem M. Bahig

:
A fast optimal parallel algorithm for a short addition chain. 324-333 - Olusogo Popoola, Bernardi Pranggono

:
On energy consumption of switch-centric data center networks. 334-369 - Sambit Kumar Mishra, Deepak Puthal, Bibhudatta Sahoo

, Sanjay Kumar Jena, Mohammad S. Obaidat
:
An adaptive task allocation technique for green cloud computing. 370-385 - Sukhchandan Randhawa

, Sushma Jain:
Energy-efficient load balancing scheme for two-tier communication in wireless sensor networks. 386-416 - Nafiseh Fareghzadeh

, Mir Ali Seyyedi
, Mehran Mohsenzadeh
:
Dynamic performance isolation management for cloud computing services. 417-455 - Dae-Yeol Lee

, Jooyoung Lee
, Ji-Hoon Choi, Jong-Ok Kim, Hui Yong Kim
, Jin Soo Choi:
GPU-based real-time super-resolution system for high-quality UHD video up-conversion. 456-484 - Keqin Li

:
Energy constrained scheduling of stochastic tasks. 485-508 - Seyed Farhad Aghili

, Maede Ashouri-Talouki
, Hamid Mala:
DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT. 509-525
Volume 74, Number 2, February 2018
- George A. Gravvanis, John P. Morrison, Dan C. Marinescu, Christos K. Filelis-Papadopoulos

:
Special section: towards high performance computing in the cloud. 527-529 - Christos K. Filelis-Papadopoulos

, Konstantinos M. Giannoutakis
, George A. Gravvanis, Dimitrios Tzovaras
:
Large-scale simulation of a self-organizing self-management cloud computing framework. 530-550 - Hamidreza Khaleghzadeh

, Ziming Zhong, Ravi Reddy
, Alexey L. Lastovetsky
:
Out-of-core implementation for accelerator kernels on heterogeneous clouds. 551-568 - Panagiotis E. Kyziropoulos

, C. K. Filelis-Papadopoulos
, George A. Gravvanis, Christos Efthymiopoulos:
Toward the design of a novel hybrid parallel N-body method in scope of modern cloud architectures. 569-591 - Rajinder Sandhu

, Navroop Kaur
, Sandeep K. Sood
, Rajkumar Buyya
:
TDRM: tensor-based data representation and mining for healthcare data in cloud computing environments. 592-614 - Dawei Sun

, Hongbin Yan, Shang Gao, Xunyun Liu, Rajkumar Buyya
:
Rethinking elastic online scheduling of big data streaming applications over high-velocity continuous data streams. 615-636 - Hanul Sung, Myungsun Kim, Jeesoo Min, Hyeonsang Eom:

OLM: online LLC management for container-based cloud service. 637-664
- Nafiul Alam Siddique

, Patricia Grubel
, Abdel-Hameed A. Badawy, Jeanine E. Cook:
A performance study of the time-varying cache behavior: a study on APEX, Mantevo, NAS, and PARSEC. 665-695 - Mohammad Reza Khosravi

, Hamid Basri, Habib Rostami
:
Efficient routing for dense UWSNs with high-speed mobile nodes using spherical divisions. 696-716 - Mahnaz Toloueiashtian, Homayun Motameni:

A new clustering approach in wireless sensor networks using fuzzy system. 717-737 - Yung-Ting Chuang, Chung-Yen Yu, Qian-Wei Wu:

DSLM: a decentralized search for large and mobile networks. 738-767 - Pawel Czarnul

:
Parallelization of large vector similarity computations in a hybrid CPU+GPU environment. 768-786 - Jae-Sung Shim, Yong-Wan Ju, Seok-Cheon Park:

Design and implementation of a Pedestrian recognition algorithm using trilinear interpolation based on HOG-UDP. 787-800 - Noroddin Alaei, Faramarz Safi Esfahani

:
RePro-Active: a reactive-proactive scheduling method based on simulation in cloud computing. 801-829 - Sarvenaz Hatamirad, Mir Mohsen Pedram

:
Low-rank approximation of large-scale matrices via randomized methods. 830-844 - Teng Li

, Jianfeng Ma, Cong Sun
:
Dlog: diagnosing router events with syslogs for anomaly detection. 845-867 - Mónica Denham, Enrico Lamperti, Javier A. Areta

:
Weather radar data processing on graphic cards. 868-885 - Junsu Kim, Myoung Ho Kim

:
An efficient parallel processing method for skyline queries in MapReduce. 886-935 - Przemyslaw Stpiczynski

:
Vectorized algorithm for multidimensional Monte Carlo integration on modern GPU, CPU and MIC architectures. 936-952 - Zeynab Mohseni

, Midia Reshadi:
A deadlock-free routing algorithm for irregular 3D network-on-chips with wireless links. 953-969 - Ali M. Shatnawi, Mohammad Alsaedeen:

Reducing the second-level cache conflict misses using a set folding technique. 970-993
Volume 74, Number 3, March 2018
- James J. Park:

Fusion algorithms and high-performance applications for vehicular cloud computing. 995-1000 - Li Xu, Chi-Yao Weng, Lun-Pin Yuan, Mu-En Wu, Raylin Tso

, Hung-Min Sun:
A shareable keyword search over encrypted data in cloud computing. 1001-1023 - Lewis Nkenyereye, Youngho Park, Kyung-Hyune Rhee:

Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing. 1024-1044 - Longbin Chen, Meikang Qiu, Jeungeun Song, Zenggang Xiong, Houcine Hassan:

E2FS: an elastic storage system for cloud computing. 1045-1060 - Fernando Román Muñoz

, Luis Javier García-Villalba:
An algorithm to find relationships between web vulnerabilities. 1061-1089 - JongBeom Lim, Young-Sik Jeong, Doo-Soon Park, HwaMin Lee

:
An efficient distributed mutual exclusion algorithm for intersection traffic control. 1090-1107 - Sai Ji, Chang Tan, Ping Yang, Yajie Sun, Desheng Fu, Jin Wang

:
Compressive sampling and data fusion-based structural damage monitoring in wireless sensor network. 1108-1131 - You-Shyang Chen, Chienwen Wu, Heng-Hsing Chu, Chien-Ku Lin, Huan-Ming Chuang:

Analysis of performance measures in cloud-based ubiquitous SaaS CRM project systems. 1132-1156 - Ravikumar Ramadoss, N. M. Elango, Satheesh Abimannan

, Ching-Hsien Hsu:
Non-intrusive transaction aware filtering during enterprise application modernization. 1157-1181 - Keon-Myung Lee

, Kyung Mi Lee, Sang Ho Lee:
Remote data integrity check for remotely acquired and stored stream data. 1182-1201 - Fei Hao

, Doo-Soon Park:
cSketch: a novel framework for capturing cliques from big graph. 1202-1214 - Hye-Young Kim:

A load balancing scheme with Loadbot in IoT networks. 1215-1226 - Seokhong Min

, Young-Sik Jeong, Jungho Kang:
Cross-layer design and performance analysis for maximizing the network utilization of wireless mesh networks in cloud computing. 1227-1254 - Won-Hyuk Lee, Jong-Seon Park, Seung-Hae Kim

, Jin-Hyung Park, Joon-Min Gil:
A method for enhancing end-to-end transfer efficiency via performance tuning factors on dedicated circuit networks with a public cloud platform. 1255-1266 - Chang Tan, Sai Ji, Ziyuan Gui, Jian Shen

, Desheng Fu, Jin Wang
:
An effective data fusion-based routing algorithm with time synchronization support for vehicular wireless sensor networks. 1267-1282 - Shin Hyoung Park

, Jienki Synn, Oh Hoon Kwon
, Yunsick Sung:
Apriori-based text mining method for the advancement of the transportation management plan in expressway work zones. 1283-1298
- Abbas Yazdinejad

, Ali Bohlooli
, Kamal Jamshidi:
Efficient design and hardware implementation of the OpenFlow v1.3 Switch on the Virtex-6 FPGA ML605. 1299-1320 - Hamidreza Khaleghzadeh

, Hossein Deldari, Ravi Reddy
, Alexey L. Lastovetsky
:
Hierarchical multicore thread mapping via estimation of remote communication. 1321-1340 - Romain Dolbeau

:
Theoretical peak FLOPS per instruction set: a tutorial. 1341-1377 - Manhyun Chung, Woo-Geun Ahn, Byung-gil Min, Jungtaek Seo

, Jongsub Moon
:
An analytical method for developing appropriate protection profiles of Instrumentation & Control System for nuclear power plants. 1378-1393 - Jihoon Kwon

, Seog Chung Seo, Seokhie Hong:
An efficient implementation of pairing-based cryptography on MSP430 processor. 1394-1417
Volume 74, Number 4, April 2018
- Ami Marowka, Przemyslaw Stpiczynski

:
Special section on parallel programming. 1419-1421 - Peter Thoman

, Kiril Dichev
, Thomas Heller
, Roman Iakymchuk
, Xavier Aguilar, Khalid Hasanov, Philipp Gschwandtner
, Pierre Lemarinier
, Stefano Markidis, Herbert Jordan, Thomas Fahringer
, Kostas Katrinis, Erwin Laure
, Dimitrios S. Nikolopoulos
:
A taxonomy of task-based parallel programming technologies for high-performance computing. 1422-1434 - Jonas Posner, Claudia Fohry:

Hybrid work stealing of locality-flexible and cancelable tasks for the APGAS library. 1435-1448 - Ami Marowka:

Python accelerators for high-performance computing. 1449-1460 - Przemyslaw Stpiczynski

:
Language-based vectorization and parallelization using intrinsics, OpenMP, TBB and Cilk Plus. 1461-1472 - Christopher Blöcker

, Ulrich Hoffmann:
Pardis: a process calculus for parallel and distributed programming in Haskell. 1473-1484 - Pawel Batko, Marcin Kuta

:
Actor model of Anemone functional language. 1485-1496 - Jaroslaw Bylina

:
Parallelization of stochastic bounds for Markov chains on multicore and manycore platforms. 1497-1509 - Hiroki Tokura, Toru Fujita, Koji Nakano

, Yasuaki Ito, Jacir Luiz Bordim:
Almost optimal column-wise prefix-sum computation on the GPU. 1510-1521 - Rene Halver

, Wilhelm Homberg, Godehard Sutmann
:
Function portability of molecular dynamics on heterogeneous parallel architectures with OpenCL. 1522-1533 - Lukasz Szustak

:
Strategy for data-flow synchronizations in stencil parallel computations on multi-/manycore systems. 1534-1546
- Adnan Nasri

, Mahmood Fathy
, Ali Broumandnia
:
An energy-efficient 3D-stacked STT-RAM cache architecture for cloud processors: the effect on emerging scale-out workloads. 1547-1561 - Ankita Sinha

, Prasanta K. Jana:
A hybrid MapReduce-based k-means clustering using genetic algorithm for distributed datasets. 1562-1579 - Siham Tabik

, Maurice Peemen, Luis F. Romero:
A tuning approach for iterative multiple 3d stencil pipeline on GPUs: Anisotropic Nonlinear Diffusion algorithm as case study. 1580-1608 - Ehsan Atoofian, Sean Rea:

Data-type specific cache compression in GPGPUs. 1609-1635 - Jung-hyun Seo

, Jong-Seok Kim, Hyung Jae Chang, Hyeong-Ok Lee
:
The hierarchical Petersen network: a new interconnection network with fixed degree. 1636-1654 - Jie Zhao

, Rongcai Zhao:
K-DT: a formal system for the evaluation of linear data dependence testing techniques. 1655-1675 - Ricardo Quislant

, Eladio Gutiérrez, Emilio L. Zapata, Oscar G. Plata:
Privatizing transactions for Lee's algorithm in commercial hardware transactional memory. 1676-1694 - An Braeken

, Pardeep Kumar
, Madhusanka Liyanage
, Ta Thi Kim Hue
:
An efficient anonymous authentication protocol in multiple server communication networks (EAAM). 1695-1714 - Ehsan Mousavi Khaneghah

, Nosratollah Shadnoush, Amir Hossein Ghobakhlou:
A mathematical model to calculate real cost/performance in software distributed shared memory on computing environments. 1715-1764 - Gregorio Bernabé

, Raúl Hernández, Manuel E. Acacio
:
Parallel implementations of the 3D fast wavelet transform on a Raspberry Pi 2 cluster. 1765-1778 - Wei Zhang, Shiwei Zhu, Jian Tang, Naixue Xiong:

A novel trust management scheme based on Dempster-Shafer evidence theory for malicious nodes detection in wireless sensor networks. 1779-1801
Volume 74, Number 5, May 2018
- José M. Cecilia, José-Matías Cutillas-Lozano

, Domingo Giménez
, Baldomero Imbernón
:
Exploiting multilevel parallelism on a many-core system for the application of hyperheuristics to a molecular docking problem. 1803-1814 - ThienLuan Ho, Seungrohk Oh, Hyunjin Kim

:
New algorithms for fixed-length approximate string matching and approximate circular string matching under the Hamming distance. 1815-1834 - ThienLuan Ho, Seungrohk Oh, Hyunjin Kim

:
Correction to: New algorithms for fixed-length approximate string matching and approximate circular string matching under the Hamming distance. 1835 - Juan Mompean

, Juan L. Aragón
, Pedro Prieto, Pablo Artal:
Design of an accurate and high-speed binocular pupil tracking system based on GPGPUs. 1836-1862 - Jan Fousek

:
Efficient sparse matrix-delayed vector multiplication for discretized neural field model. 1863-1884 - Minki Kim, Haengrae Cho

:
Popularity-based covering sets for energy proportionality in shared-nothing clusters. 1885-1910 - Martti Forsell

, Jussi Roivainen, Ville Leppänen
:
REPLICA MBTAC: multithreaded dual-mode processor. 1911-1933 - Nasour Bagheri

, Masoumeh Safkhani
, Mojtaba Eslamnezhad Namin, Samad Rostampour:
An improved low-cost yoking proof protocol based on Kazahaya's flaws. 1934-1948 - Ali Kadhum Idrees, Karine Deschinkel, Michel Salomon

, Raphaël Couturier
:
Multiround Distributed Lifetime Coverage Optimization protocol in wireless sensor networks. 1949-1972 - Olufunke R. Vincent, Olarewaju Mubashiru Lawal:

A key agreement authentication protocol using an improved parallel Pollard rho for electronic payment system. 1973-1993 - Saeed Rasouli Heikalabad

, Mazaher Naji Asfestani, Mehdi Hosseinzadeh
:
A full adder structure without cross-wiring in quantum-dot cellular automata with energy dissipation analysis. 1994-2005 - Veronica Gil-Costa

, Mauricio Marín
, Carolina Bonacic, Roberto Solar:
A graph-based cache for large-scale similarity search engines. 2006-2034 - Ravneet Kaur

, Inderveer Chana, Jhilik Bhattacharya
:
Data deduplication techniques for efficient cloud storage management: a systematic review. 2035-2085 - Ha Nguyen Tran

, Erik Cambria
:
A survey of graph processing on graphics processing units. 2086-2115 - Shahin Vakilinia, Mohamed Cheriet:

Preemptive cloud resource allocation modeling of processing jobs. 2116-2150 - Amir Hossein Akhavan Rahnama, Mehdi Toloo

, Nezer Jacob Zaidenberg
:
An LP-based hyperparameter optimization model for language modeling. 2151-2160 - Michele Scarpiniti

, Enzo Baccarelli, Paola Gabriela Vinueza Naranjo, Aurelio Uncini:
Energy performance of heuristics and meta-heuristics for real-time joint resource scaling and consolidation in virtualized networked data centers. 2161-2198 - P. S. Tamizharasan

, N. Ramasubramanian:
Analysis of large deviations behavior of multi-GPU memory access in deep learning. 2199-2212 - Athena Abdi, Hamid R. Zarandi:

HYSTERY: a hybrid scheduling and mapping approach to optimize temperature, energy consumption and lifetime reliability of heterogeneous multiprocessor systems. 2213-2238 - Sung-Hoon Park, Su-Chang Yoo, Bokyoung Kim:

An election protocol based on group membership detection algorithm in mobile ad hoc distributed systems. 2239-2253 - Jihoon Kwon, Seog Chung Seo, Seokhie Hong:

Correction to: An efficient implementation of pairing-based cryptography on MSP430 processor. 2254
Volume 74, Number 6, June 2018
- Semra Aydin, Refik Samet

, Ömer Faruk Bay:
Real-time parallel image processing applications on multicore CPUs with OpenMP and GPGPU with CUDA. 2255-2275 - Iain A. Stewart

, Alejandro Erickson:
The influence of datacenter usage on symmetry in datacenter network design. 2276-2313 - Nuno Neves

, Pedro Tomás
, Nuno Roma
:
Stream data prefetcher for the GPU memory interface. 2314-2328 - Peyman Neamatollahi

, Mahmoud Naghibzadeh:
Distributed unequal clustering algorithm in large-scale wireless sensor networks using fuzzy logic. 2329-2352 - Sina Mahmoodi Khorandi, Mohsen Sharifi

:
Non-clairvoyant online scheduling of synchronized jobs on virtual clusters. 2353-2384 - Narges Arastouie, Masoud Sabaei:

Self-adaptive risk-aware routing in opportunistic network. 2385-2411 - Anwesha Mukherjee

, Priti Deb, Debashis De
, Rajkumar Buyya
:
C2OF2N: a low power cooperative code offloading method for femtolet-based fog network. 2412-2448 - Yoshimichi Andoh

, Soichiro Suzuki, Satoshi Ohshima
, Tatsuya Sakashita
, Masao Ogino, Takahiro Katagiri, Noriyuki Yoshii, Susumu Okazaki:
A thread-level parallelization of pairwise additive potential and force calculations suitable for current many-core architectures. 2449-2469 - Paola Gabriela Vinueza Naranjo

, Enzo Baccarelli, Michele Scarpiniti:
Design and energy-efficient resource management of virtualized networked Fog architectures for the real-time support of IoT applications. 2470-2507 - Jun Wang, Dezhi Han, Ruijun Wang:

A new rule-based power-aware job scheduler for supercomputers. 2508-2527 - Hosein Bagherlou, Ali Ghaffari

:
A routing protocol for vehicular ad hoc networks using simulated annealing algorithm and neural networks. 2528-2552 - Xianfu Meng:

speedTrust: a super peer-guaranteed trust model in hybrid P2P networks. 2553-2580 - Shadi Torabi, Faramarz Safi Esfahani

:
A dynamic task scheduling framework based on chicken swarm and improved raven roosting optimization methods in cloud computing. 2581-2626 - Helena Caminal

, Diego Caballero, Juan M. Cebrian
, Roger Ferrer
, Marc Casas
, Miquel Moretó
, Xavier Martorell, Mateo Valero:
Performance and energy effects on task-based parallelized applications - User-directed versus manual vectorization. 2627-2637 - Hon-Chan Chen

:
The panpositionable panconnectedness of crossed cubes. 2638-2655 - Jaagup Viil, Satish Narayana Srirama

:
Framework for automated partitioning and execution of scientific workflows in the cloud. 2656-2683 - Peng Luo, Deqing Zou, Hai Jin, Yajuan Du, Long Zheng, Jinan Shen:

DigHR: precise dynamic detection of hidden races with weak causal relation analysis. 2684-2704 - Abdullah Al Hasib, Juan M. Cebrian

, Lasse Natvig:
A vectorized k-means algorithm for compressed datasets: design and experimental analysis. 2705-2728 - Hong-Bin Tsai, Chin-Laung Lei

:
Time-shift replacement algorithm for main memory performance optimization. 2729-2746 - Fumiya Kono

, Naohito Nakasato, Kensaku Hayashi, Alexander Vazhenin, Stanislav Sedukhin:
Evaluations of OpenCL-written tsunami simulation on FPGA and comparison with GPU implementation. 2747-2775 - Wanfeng Dou, Yanan Li:

A fault-tolerant computing method for Xdraw parallel algorithm. 2776-2800 - Somayeh Abdi

, Latif Pourkarimi
, Mahmood Ahmadi
, Farzad Zargari:
Cost minimization for bag-of-tasks workflows in a federation of clouds. 2801-2822 - Edoardo Coronado-Barrientos

, Guillermo Indalecio Fernández
, Antonio J. García-Loureiro
:
Improving performance of iterative solvers with the AXC format using the Intel Xeon Phi. 2823-2840 - Kayo Gonçalves-e-Silva

, Daniel Aloise
, Samuel Xavier de Souza
:
Parallel synchronous and asynchronous coupled simulated annealing. 2841-2869 - Sangmin Lee

, Soon J. Hyun, Hong-Yeon Kim, Young-Kyun Kim:
APS: adaptable prefetching scheme to different running environments for concurrent read streams in distributed file systems. 2870-2902 - Tuan Anh Nguyen

, Dugki Min, Eunmi Choi:
Correction to: A comprehensive evaluation of availability and operational cost for a virtualized server system using stochastic reward nets. 2903
Volume 74, Number 7, July 2018
- Nan Su, Huaxi Gu

, Kun Wang, Xiaoshan Yu, Bowen Zhang:
A highly efficient dynamic router for application-oriented network on chip. 2905-2915 - Yonghui Li, Kun Wang, Huaxi Gu

, Yintang Yang, Nan Su, Yawen Chen
, Haibo Zhang
:
A joint optimization method for NoC topology generation. 2916-2934 - Xilong Qu

, Peng Xiao, Lirong Huang:
Improving the energy efficiency and performance of data-intensive workflows in virtualized clouds. 2935-2955 - Carlos Guerrero

, Isaac Lera, Carlos Juiz:
Resource optimization of container orchestration: a case study in multi-cloud microservices-based applications. 2956-2983 - Montassar Riahi, Saoussen Krichen

:
A multi-objective decision support framework for virtual machine placement in cloud data centers: a real case study. 2984-3015 - Heyang Xu, Yang Liu, Wei Wei, Wenqiang Zhang

:
Incentive-aware virtual machine scheduling in cloud computing. 3016-3038 - Ashish Kumar Maurya

, Anil Kumar Tripathi:
On benchmarking task scheduling algorithms for heterogeneous computing systems. 3039-3070 - Jerzy Proficz

:
Improving all-reduce collective operations for imbalanced process arrival patterns. 3071-3092 - Akihiro Musa

, Osamu Watanabe, Hiroshi Matsuoka, Hiroaki Hokari, Takuya Inoue, Yoichi Murashima, Yusaku Ohta
, Ryota Hino, Shunichi Koshimura
, Hiroaki Kobayashi:
Real-time tsunami inundation forecast system for tsunami disaster prevention and mitigation. 3093-3113 - Jingxian Wang, Yongmei Sun, Yuefeng Ji:

Priority-based capacity and power allocation in co-located WBANs using Stackelberg and bargaining games. 3114-3147 - S. Anandhi, Anitha Ramalingam, Venkatasamy Sureshkumar:

An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment. 3148-3167 - Li Yu

, Zhou Zhou, Yuping Fan, Michael E. Papka
, Zhiling Lan:
System-wide trade-off modeling of performance, power, and resilience on petascale systems. 3168-3192 - Narjes Hasanikhah

, Siavash Amin-Nejad
, Ghafar Darvish
, M. R. Moniri:
Efficient implementation of space-time adaptive processing for adaptive weights calculation based on floating point FPGAs. 3193-3210 - Edward Richter, Spencer Valancius, Josiah McClanahan, John Mixter, Ali Akoglu

:
Balancing the learning ability and memory demand of a perceptron-based dynamically trainable neural network. 3211-3235 - Ekasit Kijsipongse, Apivadee Piyatumrong

, Suriya U.-ruekolan
:
A hybrid GPU cluster and volunteer computing platform for scalable deep learning. 3236-3263 - Rafael Sanchez-Lara

, Joel Antonio Trejo-Sánchez
, José Luis López-Martínez
, José A. Álvarez-Chávez
:
Simulation of an inelastic dispersive phenomenon: stimulated Brillouin scattering in a single-mode fiber segment through parallelism. 3264-3277 - Takafumi Miyata

:
A heuristic search algorithm based on subspaces for PageRank computation. 3278-3294 - Omar Said

, Amr Tolba
:
Design and performance evaluation of mixed multicast architecture for internet of things environment. 3295-3328 - Naghmeh Dezhabad, Saeed Sharifian

:
Learning-based dynamic scalable load-balanced firewall as a service in network function-virtualized cloud computing environments. 3329-3358 - Wiem Abderrahim

, Zièd Choukair:
Brokerage-based dependability integration in cloud computing services. 3359-3387 - Lan Gao

, Rui Wang, Yunlong Xu, Hailong Yang, Zhongzhi Luan, Depei Qian, Han Zhang, Jihong Cai:
SRAM- and STT-RAM-based hybrid, shared last-level cache for on-chip CPU-GPU heterogeneous architectures. 3388-3414 - Elaheh Gavagsaz

, Ali Rezaee
, Hamid Haj Seyyed Javadi
:
Load balancing in reducers for skewed data in MapReduce systems by using scalable simple random sampling. 3415-3440 - Bin Lao

, Ge Nong, Wai Hong Chan, Yi Pan
:
Fast induced sorting suffixes on a multicore machine. 3468-3485 - Wenbing Zhao

, Mary Qu Yang:
Correction to: Dependability enhancing mechanisms for integrated clinical environments. 3486-3487
Volume 74, Number 8, August 2018
- TaeJin Lee, Bomin Choi, Youngsang Shin, Jin Kwak

:
Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient. 3489-3503 - Shehzad Ashraf Chaudhry

, Husnain Naqvi, Mohammad Sabzinejad Farash
, Taeshik Shon, Muhammad Sher:
An improved and robust biometrics-based three factor authentication scheme for multiserver environments. 3504-3520 - Jongseok Choi, Youngjin In, Changjun Park, Seonhee Seok, Hwajeong Seo, Howon Kim:

Secure IoT framework and 2D architecture for End-To-End security. 3521-3535 - Jongseok Choi, Youngjin In, Changjun Park, Seonhee Seok, Hwajeong Seo, Howon Kim:

Erratum to: Secure IoT framework and 2D architecture for End-To-End security. 3536 - Kwanghoon Choi, Sung-Hwa Lim, Jai-Hoon Kim:

Cost-effective monitoring algorithm for cyber-physical system platform using combined spatio-temporal model. 3537-3548 - Tae-Yoon Kim

, Eui-Jik Kim:
Uplink scheduling of MU-MIMO gateway for massive data acquisition in Internet of things. 3549-3563 - Yongsung Kim

, Eenjun Hwang, Seungmin Rho:
Twitter news-in-education platform for social, collaborative, and flipped learning. 3564-3582 - Dongwoo Kim, Sangwho Kim, Jaecheol Ryou

:
Design and implementation of user-level dynamic binary instrumentation on ARM architecture. 3583-3595 - Mohammad Salehan

, Dan J. Kim, Chulmo Koo
:
A study of the effect of social trust, trust in social networking services, and sharing attitude, on two dimensions of personal information sharing behavior. 3596-3619 - Taek-Young Youn, Nam-Su Jho, Ku-Young Chang:

Design of additive homomorphic encryption with multiple message spaces for secure and practical storage services over encrypted data. 3620-3638 - Younggeun Choi, Kyounghwan Yoo, Shin-Jin Kang, Beomjoo Seo, Soo Kyun Kim

:
Development of a low-cost wearable sensing glove with multiple inertial sensors and a light and fast orientation estimation algorithm. 3639-3652 - Younggeun Choi, Kyounghwan Yoo, Shin-Jin Kang, Beomjoo Seo, Soo Kyun Kim

:
Erratum to: Development of a low-cost wearable sensing glove with multiple inertial sensors and a light and fast orientation estimation algorithm. 3653 - Mucheol Kim, Sangyong Han:

Cognitive social network analysis for supporting the reliable decision-making process. 3654-3665 - Maziar Loghman, Joohee Kim

, Kyuwon Choi:
Fast depth estimation using semi-global matching and adaptive stripe-based optimization. 3666-3684 - Imran Khan, Shehzad Ashraf Chaudhry

, Muhammad Sher, Muhammad Khurram Khan
:
An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data. 3685-3703 - Wooyeon Jo, Hyun Soo Chang, Taeshik Shon:

Digital forensic science approach by file recovery research. 3704-3725 - Ruilian Xie

, Jueping Cai, Xin Xin, Bo Yang:
LBFT: a fault-tolerant routing algorithm for load-balancing network-on-chip based on odd-even turn model. 3726-3747 - Cheng-Ta Huang

, Cheng-Hsing Yang, Wei-Jen Wang, Shiau-Rung Tsui, Shiuh-Jeng Wang:
Raw reversibility of information hiding on the basis of VQ systems. 3748-3777 - Jihoon Moon, Jinwoong Park, Eenjun Hwang

, Sanghoon Jun:
Forecasting power consumption for higher educational institutions based on machine learning. 3778-3800 - Kok-Seng Wong

, Myung Ho Kim
:
Toward a fair indictment for sealed-bid auction with self-enforcing privacy. 3801-3819 - Mohsen Raji

, Behnam Ghavami:
Redressing fork constraints in nanoscale quasi-delay-insensitive asynchronous pipelines. 3820-3840 - Dongwann Kang, Sanghyun Seo:

Photo collage-based photograph display system on mobile computing platform. 3841-3854 - Je-Ho Park, Young Bom Park, Soo-Kyung Choi:

Representation and automatic generation of state-transition mapping tree. 3855-3874 - Danqi Hu, Fang Lv

, Chenxi Wang, Huimin Cui, Lei Wang, Ying Liu, Xiaobing Feng:
NVM Streaker: a fast and reconfigurable performance simulator for non-volatile memory-based memory architecture. 3875-3903
- Sangmin Lee

, Soon J. Hyun, Hong-Yeon Kim, Young-Kyun Kim:
Fair bandwidth allocating and strip-aware prefetching for concurrent read streams and striped RAIDs in distributed file systems. 3904-3932 - John Fedoruk, Byron Schmuland

, Julia Ann Johnson
, Giseon Heo:
Dimensionality reduction via the Johnson-Lindenstrauss Lemma: theoretical and empirical bounds on embedding dimension. 3933-3949 - Leila Shooshtarian, Farshad Safaei Semnani, Ali Tizghadam:

Scaling-up versus scaling-out networking in data centers: a comparative robustness analysis. 3950-3974 - Mohammed Baydoun

, Hassan Ghaziri, Mohammed Al-Husseini
:
CPU and GPU parallelized kernel K-means. 3975-3998 - Yuzhu Wang

, Jinrong Jiang, Junqiang Zhang, Juanxiong He, He Zhang, Xuebin Chi, Tianxiang Yue:
An efficient parallel algorithm for the coupling of global climate models and regional climate models on a large-scale multi-core cluster. 3999-4018 - César Gómez-Martín

, Miguel A. Vega-Rodríguez
:
Optimization of resources in parallel systems using a multiobjective artificial bee colony algorithm. 4019-4036 - Long Chen

, Jigang Wu, Gangqiang Zhou, Longjie Ma:
QUICK: QoS-guaranteed efficient cloudlet placement in wireless metropolitan area networks. 4037-4059 - Thiago Felipe da Silva Pinheiro

, Francisco Airton Silva
, Iure Fe, Sokol Kosta
, Paulo Romero Martins Maciel:
Performance prediction for supporting mobile applications' offloading. 4060-4103 - V. M. Krushnarao Kotteda

, Vinod Kumar
, William F. Spotz:
Performance of preconditioned iterative solvers in MFiX-Trilinos for fluidized beds. 4104-4126 - Borja Bordel

, Ramón Alcarria
, Diego Sánchez de Rivera, Tomás Robles:
Process execution in Cyber-Physical Systems using cloud and Cyber-Physical Internet services. 4127-4169
Volume 74, Number 9, September 2018
- Jaeik Cho, Naveen K. Chilamkurti, S. J. Wang:

Editorial of special section on enabling technologies for industrial and smart sensor internet of things systems. 4171-4172 - Megha Agrawal, Tarun Kumar Bansal, Donghoon Chang, Amit Kumar Chauhan, Seokhie Hong, Jinkeon Kang

, Somitra Kumar Sanadhya
:
RCB: leakage-resilient authenticated encryption via re-keying. 4173-4198 - Rajkumar Tekchandani, Rajesh Kumar Bhatia, Maninder Singh

:
Semantic code clone detection for Internet of Things applications using reaching definition and liveness analysis. 4199-4226 - Jordi Mongay Batalla

, Konrad Sienkiewicz
, Waldemar Latoszek, Piotr Krawiec
, Constandinos X. Mavromoustakis, George Mastorakis:
Validation of virtualization platforms for I-IoT purposes. 4227-4241 - Jihyun Kim, Yonghun Jeon, Howon Kim:

The intelligent IoT common service platform architecture and service implementation. 4242-4260 - Sung Ryoung Kim, Jeong-Nyeo Kim, Sung Tae Kim, Sunwoo Shin, Jeong Hyun Yi

:
Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications. 4261-4280 - Amjad Ali Alamr, Firdous Kausar

, Jongsung Kim, Changho Seo:
A secure ECC-based RFID mutual authentication protocol for internet of things. 4281-4294 - Cheng-Ta Huang

, Min-Yi Tsai, Li-Chiun Lin, Wei-Jen Wang, Shiuh-Jeng Wang:
VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements. 4295-4314 - Ming-Fong Tsai, Ye Chin Kiong, Ang Sinn:

Smart service relying on Internet of Things technology in parking systems. 4315-4338 - Shiyong Wang, Jiafu Wan

, Muhammad Imran, Di Li, Chunhua Zhang:
Cloud-based smart manufacturing for personalized candy packing application. 4339-4357 - Wei-Chang Yeh

, Jsen-Shung Lin:
New parallel swarm algorithm for smart sensor systems redundancy allocation problems in the Internet of Things. 4358-4384 - Hwi-Ho Lee, Jung-Hyok Kwon, Eui-Jik Kim

:
FS-IIoTSim: a flexible and scalable simulation framework for performance evaluation of industrial Internet of things systems. 4385-4402 - Jaehak Yu, Namkyung Lee, Cheol Sig Pyo, Yang Sun Lee

:
WISE: web of object architecture on IoT environment for smart home and building energy management. 4403-4418 - Sohail Jabbar

, Murad Khan, Bhagya Nathali Silva
, Kijun Han:
A REST-based industrial web of things' framework for smart warehousing. 4419-4433 - SungJin Kim, Taeshik Shon:

Field classification-based novel fuzzing case generation for ICS protocols. 4434-4450 - Ching-Han Chen, Ming-Yi Lin

, Xing-Chen Guo:
High-performance fieldbus application-specific integrated circuit design for industrial smart sensor networks. 4451-4469 - Jia-Yang Lin, Yi-Ting Hsieh, Trong Nghia Le, Wen-Long Chin:

AnyNoC: new network on a chip switching using the shared-memory and output-queue techniques for complex Internet of things systems. 4470-4480 - Hangbae Chang:

Performance evaluation framework design for smart sensor business. 4481-4496 - Chang Jin Koo, JeongYeon Kim

:
Enforcing high-level security policies for Internet of Things. 4497-4505 - Seokcheol Lee, Seokjun Lee, Hyunguk Yoo, SungMoon Kwon, Taeshik Shon:

Design and implementation of cybersecurity testbed for industrial IoT systems. 4506-4520 - Tzu-Wei Lin

, Chien-Lung Hsu:
Anonymous group key agreement protocol for multi-server and mobile environments based on Chebyshev chaotic maps. 4521-4541 - Farhan Aadil

, Waleed Ahsan, Zahoor-Ur Rehman
, Peer Azmat Shah
, Seungmin Rho, Irfan Mehmood:
Clustering algorithm for internet of vehicles (IoV) based on dragonfly optimizer (CAVDO). 4542-4567 - Anum Kalsoom, Muazzam Maqsood

, Mustansar Ali Ghazanfar, Farhan Aadil
, Seungmin Rho
:
A dimensionality reduction-based efficient software fault prediction using Fisher linear discriminant analysis (FLDA). 4568-4602 - Keonsoo Lee, Yang Sun Lee

, Yunyoung Nam:
A model of FSM-based planner and dialogue supporting system for emergency call services. 4603-4612 - Kishore Sanapala

, Ramachandran Sakthivel, Sang-Soo Yeo:
Schmitt trigger-based single-ended 7T SRAM cell for Internet of Things (IoT) applications. 4613-4622
- Kamran

, Babar Nazir
:
QoS-aware VM placement and migration for hybrid cloud infrastructure. 4623-4646 - Somayeh Khoroush, Midia Reshadi, Ahmad Khademzadeh:

Application mapping in hybrid photonic networks-on-chip for reducing insertion loss. 4647-4671 - Michael Conrad Meyer, Yuichi Okuyama, Abderazek Ben Abdallah

:
SAFT-PHENIC: a thermal-aware microring fault-resilient photonic NoC. 4672-4695 - Seyed-Sajad Ahmadpour

, Mohammad Mosleh:
A novel fault-tolerant multiplexer in quantum-dot cellular automata technology. 4696-4716 - Somayeh Mohammadi

, Hossein Pedram, Latif Pourkarimi
:
Integer linear programming-based cost optimization for scheduling scientific workflows in multi-cloud environments. 4717-4745 - Sung Min Lee, Su-Kyung Yoon, Jeong-Geun Kim, Shin-Dug Kim

:
Adaptive correlated prefetch with large-scale hybrid memory system for stream processing. 4746-4770 - Azeem Irshad

, Husnain Naqvi, Shehzad Ashraf Chaudhry
, Shouket Raheem, Saru Kumari
, Ambrina Kanwal, Muhammad Usman
:
An efficient and secure design of multi-server authenticated key agreement protocol. 4771-4797 - Lei Wang, Guangjun Xie:

Novel designs of full adder in quantum-dot cellular automata technology. 4798-4816 - Matheus Torquato

, I. M. Umesh, Paulo R. M. Maciel:
Models for availability and power consumption evaluation of a private cloud with VMM rejuvenation enabled by VM Live Migration. 4817-4841 - Suleyman Tosun

, Vahid Babaei Ajabshir:
Energy-aware partitioning of fault-tolerant irregular topologies for 3D network-on-chips. 4842-4863
Volume 74, Number 10, October 2018
- Junaid Chaudhry, Al-Sakib Khan Pathan

, Mubashir Husain Rehmani
, Ali Kashif Bashir
:
Threats to critical infrastructure from AI and human intelligence. 4865-4866 - Muhammad Shafiq

, Xiangzhan Yu, Ali Kashif Bashir
, Hassan Nazeer Chaudhry
, Dawei Wang:
A machine learning approach for feature selection traffic classification using security analysis. 4867-4892 - Wencheng Yang

, Song Wang
, Guanglou Zheng, Junaid Ahsenali Chaudhry, Craig Valli
:
ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures. 4893-4909 - Mohammad Hassan Mojtahed Soleimani, Muharram Mansoorizadeh

, Mohammad Nassiri
:
Real-time identification of three Tor pluggable transports using machine learning techniques. 4910-4927 - Hichem Sedjelmaci

, Sidi-Mohammed Senouci
:
Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution. 4928-4944 - Emmanuel Boateng Sifah, Qi Xia

, Kwame Opuni-Boachie Obour Agyekum
, Sandro Amofa
, Jianbin Gao
, Ruidong Chen, Hu Xia, James C. Gee, Xiaojiang Du, Mohsen Guizani:
Chain-based big data access control infrastructure. 4945-4964 - Abdullah Yasin Nur

, Mehmet Engin Tozal:
Identifying critical autonomous systems in the Internet. 4965-4985 - Ibrahim Ghafir, Jibran Saleem, Mohammad Hammoudeh

, Hanan Faour, Vaclav Prenosil
, Sardar F. Jaf
, Sohail Jabbar
, Thar Baker
:
Security threats to critical infrastructure: the human factor. 4986-5002 - Mubashar Hussain, Mansoor Ahmed

, Hasan Ali Khattak
, Muhammad Imran
, Abid Khan
, Sadia Din
, Awais Ahmad, Gwanggil Jeon, Goutham Reddy Alavalapati
:
Towards ontology-based multilingual URL filtering: a big data problem. 5003-5021 - Saqib Ubaid

, Muhammad Farrukh Shafeeq, Majid Hussain, Ali Hammad Akbar, Abdelrahman Abuarqoub
, M. Sultan Zia, Beenish Abbas:
SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks. 5022-5040 - Mohiuddin Ahmed

, Abu S. S. M. Barkat Ullah
:
Infrequent pattern mining in smart healthcare environment using data summarization. 5041-5059 - Rashid Masood Khan, Mian Muhammad Waseem Iqbal

, Muhammad Faisal Amjad, Haider Abbas
, Hammad Afzal
, Abdul Rauf
, Maruf Pasha:
Forensic investigation to detect forgeries in ASF files of contemporary IP cameras. 5060-5081 - Muhammad Ayzed Mirza

, Mudassar Ahmad, Muhammad Asif Habib
, Nasir Mahmood, Chaudhry Muhammad Nadeem Faisal
, Usman Ahmad:
CDCSS: cluster-based distributed cooperative spectrum sensing model against primary user emulation (PUE) cyber attacks. 5082-5098 - Olumide Malomo, Danda B. Rawat

, Moses Garuba:
Next-generation cybersecurity through a blockchain-enabled federated cloud framework. 5099-5126 - Adeel Anjum, Naveed Ahmad, Saif Ur Rehman Malik

, Samiya Zubair, Basit Shahzad:
An efficient approach for publishing microdata for multiple sensitive attributes. 5127-5155 - Amjad Mehmood

, Mithun Mukherjee
, Syed Hassan Ahmed
, Houbing Song
, Khalid Mahmood Malik
:
NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks. 5156-5170 - Ahmed Ibrahim

, Craig Valli
, Ian McAteer, Junaid Ahsenali Chaudhry:
A security review of local government using NIST CSF: a case study. 5171-5186 - Fadi Al-Turjman, Sinem Alturjman:

Confidential smart-sensing framework in the IoT era. 5187-5198 - Mohamed Hawedi, Chamseddine Talhi, Hanifa Boucheneb:

Multi-tenant intrusion detection system for public cloud (MTIDS). 5199-5230
- Se Dong Min

, Chang-Won Wang
, Hwa-Min Lee
, Bong-Keun Jung
:
A low cost wearable wireless sensing system for paretic hand management after stroke. 5231-5240 - Aisha Siddiqa

, Ahmad Karim, Victor Chang
:
Modeling SmallClient indexing framework for big data analytics. 5241-5262 - Chunlin Li, Jianhang Tang, Youlong Luo:

Multi-queue scheduling of heterogeneous jobs in hybrid geo-distributed cloud environment. 5263-5292 - Su-Kyung Yoon, Young-Sun Youn, Jeong-Geun Kim, Shin-Dug Kim

:
Design of DRAM-NAND flash hybrid main memory and Q-learning-based prefetching method. 5293-5313 - Marzieh Malekimajd

, Danilo Ardagna
, Michele Ciavotta
, Eugenio Gianniti, Mauro Passacantando
, Alessandro Maria Rizzi:
An optimization framework for the capacity allocation and admission control of MapReduce jobs in cloud systems. 5314-5348 - Najme Mansouri, Mohammad Masoud Javidi

:
A hybrid data replication strategy with fuzzy-based deletion for heterogeneous cloud data centers. 5349-5372 - Mahdi Bounouni

, Louiza Bouallouche-Medjkoune
:
Acknowledgment-based punishment and stimulation scheme for mobile ad hoc network. 5373-5398 - Yasir Noman Khalid, Muhammad Aleem

, Radu Prodan, Muhammad Azhar Iqbal, Muhammad Arshad Islam:
E-OSched: a load balancing scheduler for heterogeneous multicores. 5399-5431 - Yousef Seyfari

, Shahriar Lotfi
, Jaber Karimpour
:
Optimizing inter-nest data locality in imperfect stencils based on loop blocking. 5432-5460 - Ali Mostafaeipour, Alireza Goli

, Mojtaba Qolipour
:
Prediction of air travel demand using a hybrid artificial neural network (ANN) with Bat and Firefly algorithms: a case study. 5461-5484 - Mina Emami Khansari, Saeed Sharifian

, Seyed Ahmad Motamedi
:
Virtual sensor as a service: a new multicriteria QoS-aware cloud service composition for IoT applications. 5485-5512 - Anwar Alyatama

, Asmaa Alsumait, Maryam Alotaibi:
Continuous memory allocation model for cloud services. 5513-5538 - Bui Thi Thuan, Lam Boi Ngoc, Keiichi Kaneko

:
A stochastic link-fault-tolerant routing algorithm in folded hypercubes. 5539-5557 - Se-Hang Cheong, Yain-Whar Si

:
CWBound: boundary node detection algorithm for complex non-convex mobile ad hoc networks. 5558-5577 - Monire Safari, Reihaneh Khorsand:

PL-DVFS: combining Power-aware List-based scheduling algorithm with DVFS technique for real-time tasks in Cloud Computing. 5578-5600 - Chaobo He

, Xiang Fei
, Hanchao Li
, Yong Tang, Hai Liu, Shuangyin Liu:
Improving NMF-based community discovery using distributed robust nonnegative matrix factorization with SimRank similarity measure. 5601-5624
Volume 74, Number 11, November 2018
- José Daniel García

, Kevin Hammond, Lutz Schubert
:
Reengineering for parallelism in heterogeneous parallel platforms. 5625-5627 - Adrián Castelló

, Antonio J. Peña
, Rafael Mayo
, Judit Planas
, Enrique S. Quintana-Ortí
, Pavan Balaji:
Exploring the interoperability of remote GPGPU virtualization using rCUDA and directive-based programming models. 5628-5642 - Lu Li, Christoph W. Kessler:

MeterPU: a generic measurement abstraction API - Enabling energy-tuned skeleton backend selection. 5643-5658 - Marco Danelutto

, Tiziano De Matteis
, Gabriele Mencagli
, Massimo Torquati
:
Data stream processing via code annotations. 5659-5673 - David del Rio Astorga

, Rafael Sotomayor, Luis Miguel Sánchez, Francisco Javier García Blas
, Alejandro Calderón
, Javier Fernández
:
Assessing and discovering parallelism in C++ code for heterogeneous platforms. 5674-5689 - Marco Aldinucci

, Marco Danelutto
, Maurizio Drocco
, Peter Kilpatrick
, Claudia Misale, Guilherme Peretti Pezzi, Massimo Torquati
:
A parallel pattern for iterative stencil + reduce. 5690-5705
- Byung-Seok Kang

, Hyunseung Choo:
An SDN-enhanced load-balancing technique in the cloud system. 5706-5729 - Dinh-Mao Bui

, Thien Huynh-The
, Sungyoung Lee:
Early fault detection in IaaS cloud computing based on fuzzy logic and prediction technique. 5730-5745 - Toqeer Ali Syed

, Roslan Ismail, Shahrulniza Musa
, Mohammad Nauman
, Sohail Khan
:
Design and implementation of an attestation protocol for measured dynamic behavior. 5746-5773 - Syed Rizvi, Jungwoo Ryoo

, John Kissell, William Aiken, Yuhong Liu:
A security evaluation framework for cloud security auditing. 5774-5796
- Yuanlong Yu, Zhifan Ye, Xianghan Zheng, Chunming Rong

:
An efficient cascaded method for network intrusion detection based on extreme learning machines. 5797-5812 - Maged Hamada Ibrahim, Saru Kumari

, Ashok Kumar Das, Vanga Odelu
:
Attribute-based authentication on the cloud for thin clients. 5813-5845 - Gangyi Luo, Zhuzhong Qian

, Mianxiong Dong, Kaoru Ota
, Sanglu Lu:
Improving performance by network-aware virtual machine clustering and consolidation. 5846-5864
- Tae-Geon Song, Mehdi Pirahandeh

, Cheong-Jin Ahn, Deok-Hwan Kim:
GPU-accelerated high-performance encoding and decoding of hierarchical RAID in virtual machines. 5865-5888 - Chun-Hsiung Tseng

, Yung-Hui Chen:
A camera-based attention level assessment tool designed for classroom usage. 5889-5902 - Hao Jin

, Ke Zhou, Yan Luo:
A framework with data-centric accountability and auditability for cloud storage. 5903-5926 - Jiaqing Mo

, Zhongwang Hu, Yuhua Lin:
Remote user authentication and key agreement for mobile client-server environments on elliptic curve cryptography. 5927-5943 - Kiamars Shojaei, Faramarz Safi Esfahani

, Saeed Ayat:
VMDFS: virtual machine dynamic frequency scaling framework in cloud computing. 5944-5979 - Ashish Kumar Mishra

, Brajesh Kumar Umrao, Dharmendra Kumar Yadav:
A survey on optimal utilization of preemptible VM instances in cloud computing. 5980-6032 - Shaifu Gupta

, Aroor Dinesh Dileep, Timothy A. Gonsalves:
A joint feature selection framework for multivariate resource usage prediction in cloud servers using stability and prediction performance. 6033-6068 - Samarjit Roy

, Dhiman Sarkar, Sourav Hati, Debashis De
:
Internet of Music Things: an edge computing paradigm for opportunistic crowdsensing. 6069-6101 - Maryam Rezaei-Ravari, Vahid Sattari Naeini

:
Reliable congestion-aware path prediction mechanism in 2D NoCs based on EFuNN. 6102-6125 - Yang Hui:

A virtual machine anomaly detection system for cloud computing infrastructure. 6126-6134 - Feng Zhang

, Heng Lin, Jidong Zhai, Jie Cheng, Dingyi Xiang, Jizhong Li, Yunpeng Chai, Xiaoyong Du:
An adaptive breadth-first search algorithm on integrated architectures. 6135-6155 - Libing Wu

, Jing Wang, Sherali Zeadally, Debiao He
:
Privacy-preserving auditing scheme for shared data in public clouds. 6156-6183 - Mohammad Reza Khosravi

, Hamid Basri, Habib Rostami
, Sadegh Samadi:
Distributed random cooperation for VBF-based routing in high-speed dense underwater acoustic sensor networks. 6184-6200 - Nicolas Bock, Christian F. A. Negre, Susan M. Mniszewski, Jamaludin Mohd-Yusof

, Bálint Aradi, Jean-Luc Fattebert
, Daniel Osei-Kuffuor
, Timothy C. Germann
, Anders M. N. Niklasson:
The basic matrix library (BML) for quantum chemistry. 6201-6219 - Masoumeh Safkhani

, Mahyar Shariat
:
Implementation of secret disclosure attack against two IoT lightweight authentication protocols. 6220-6235 - Ramy Gad, Simon Pickartz

, Tim Süß, Lars Nagel
, Stefan Lankes
, Antonello Monti
, André Brinkmann:
Zeroing memory deallocator to reduce checkpoint sizes in virtualized HPC environments. 6236-6257 - M. M. Abutaleb

:
Robust and efficient QCA cell-based nanostructures of elementary reversible logic gates. 6258-6274 - Hongyuan Qi, Jinchen Xu

, Shaozhong Guo:
Detection of the maximum error of mathematical functions. 6275-6290 - Huangke Chen

, Jianghan Zhu, Guohua Wu
, Lisu Huo:
Cost-efficient reactive scheduling for real-time workflows in clouds. 6291-6309 - Amir Tavizi, Ali Ghaffari

:
Tree-based reliable and energy-aware multicast routing protocol for mobile ad hoc networks. 6310-6332 - Sa'ar Hersonsky

:
Approximation of conformal mappings and novel applications to shape recognition of planar domains. 6333-6368 - Saleh Abdel-Hafeez, Ann Gordon-Ross, Samer Abubaker:

A comparison-free sorting algorithm on CPUs and GPUs. 6369-6400
Volume 74, Number 12, December 2018
- D. S. Park:

Future computing with IoT and cloud computing. 6401-6407 - Yi Meng, Qingkui Chen:

DCSACA: distributed constraint service-aware collaborative access algorithm based on large-scale access to the Internet of Things. 6408-6427 - Saru Kumari

, Marimuthu Karuppiah
, Ashok Kumar Das
, Xiong Li
, Fan Wu
, Neeraj Kumar
:
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. 6428-6453 - Fernando Román Muñoz, Esteban Alejandro Armas Vega

, Luis Javier García-Villalba:
Analyzing the traffic of penetration testing tools with an IDS. 6454-6469 - Mohammad Sadegh Aslanpour

, Seyed Ebrahim Dashti
, Mostafa Ghobaei-Arani
, Ali Asghar Rahmanian:
Resource provisioning for cloud applications: a 3-D, provident and flexible approach. 6470-6501 - Dusan Baek, Jae-Hyeon Park, Jung-Won Lee:

An energy efficiency grading system for mobile applications based on usage patterns. 6502-6515 - Hye-Young Kim:

A design and implementation of a framework for games in IoT. 6516-6528 - Long Chen, Xiaoping Li

:
Cloud workflow scheduling with hybrid resource provisioning. 6529-6553 - Binbin Song, Yao Yu, Yu Zhou, Ziqiang Wang, Sidan Du:

Host load prediction with long short-term memory in cloud computing. 6554-6568 - Taha Chaabouni, Maher Khemakhem

:
Energy management strategy in cloud computing: a perspective study. 6569-6597 - Fernando Román Muñoz

, Iván Israel Sabido Cortes, Luis Javier García-Villalba:
Enlargement of vulnerable web applications for testing. 6598-6617 - Dohyun Kim

, Yunho Lee, Sangjin Lee:
Mobile forensic reference set (MFReS) and mobile forensic investigation for android devices. 6618-6632 - Jin Wang

, Jiayi Cao
, R. Simon Sherratt
, Jong Hyuk Park
:
An improved ant colony optimization-based approach with mobile sink for wireless sensor networks. 6633-6645 - Yun-kyung Lee

, Jeong-Nyeo Kim, Kyung-Soo Lim, Hyunsoo Yoon:
Secure mobile device structure for trust IoT. 6646-6664 - Seung-Ho Ok, Jae Hoon Shim, Byungin Moon

:
Modified adaptive support weight and disparity search range estimation schemes for stereo matching processors. 6665-6690 - Sung-Kil Kim, Junseok Oh:

Information science techniques for investigating research areas: a case study in telecommunications policy. 6691-6718 - Chaeho Cho, Kwang-Sik Chung

, Yoojae Won
:
Detection of damaged files and measurement of similarity to originals using entropy graph characteristics. 6719-6728 - Seon Ho Oh

, Geon Woo Kim, Kyung-Soo Lim:
Compact deep learned feature-based face recognition for Visual Internet of Things. 6729-6741 - Dongkyun Kim, Yong-Hwan Kim, Ki-Hyun Kim, Joo-Beom Kim, Gi-Seong You, Joon-Min Gil:

Logically isolated group network for virtual convergence environment over SD-WAN. 6742-6752 - Seon Ho Oh

, Seung-Wan Han, Bumsuk Choi, Geon Woo Kim, Kyung-Soo Lim
:
Deep feature learning for person re-identification in a large-scale crowdsourced environment. 6753-6765 - Chunxia Yin

, Shunfu Jin:
An energy-saving strategy based on multi-server vacation queuing theory in cloud data center. 6766-6784 - Jeong-Hwan Kim, Kang-Hwi Lee, Jeong-Whan Lee, Kyeong-Seop Kim:

Semi-real-time removal of baseline fluctuations in electrocardiogram (ECG) signals by an infinite impulse response low-pass filter (IIR-LPF). 6785-6793 - Dazhi Li, Minglu Li, Jianhua Liu

:
A dynamic multiple-keys game-based industrial wireless sensor-cloud authentication scheme. 6794-6814 - Min Zhu

, Dengyin Zhang
, Jin Wang
:
Multi-objective optimization design for multi-source multicasting MIMO AF relay systems. 6815-6830 - Elham Mirzavand Borujeni, Dadmehr Rahbari

, Mohsen Nickray:
Fog-based energy-efficient routing protocol for wireless sensor networks. 6831-6858 - Dae-Won Lee

, Hwa-Min Lee
:
IoT service classification and clustering for integration of IoT service platforms. 6859-6875 - Chao-Tung Yang

, Shuo-Tsung Chen, Yu-Sheng Lo, Endah Kristiani
, Yu-Wei Chan:
On construction of a virtual GPU cluster with InfiniBand and 10 Gb Ethernet virtualization. 6876-6897 - Jong-Hyuk Lee, Weidong Shi, Joon-Min Gil:

Accelerated bulk memory operations on heterogeneous multi-core systems. 6898-6922 - Xiaofan Wang

, Lei Wang, Shengji Li, Jin Wang
:
An event-driven plan recognition algorithm based on intuitionistic fuzzy theory. 6923-6938 - Linh Van Ma, Gwanghyun Yu, Jin-Young Kim, Yonggwan Won, Jinsul Kim:

An efficient transmission method based on HEVC multi-view adaptive video streaming over P2P network in NFV. 6939-6959 - Daeyong Jung, Myungil Kim

, Jungha Lee, Han-Yee Kim, Dae-Won Lee
:
Job submission and monitoring management in integrated computing environment for finite element analysis. 6960-6975 - Yan Li, Byeong-Seok Shin:

Privacy-aware task data management using TPR*-Tree for trajectory-based crowdsourcing. 6976-6987 - Sangho Park, Hyunjin Kim

, JaeCheol Ryou
:
Utilizing a lightweight PKI mechanism to guarantee a secure service in a cloud environment. 6988-7002 - Jiao Yao

, Kaimin Zhang, Yaxuan Dai, Jin Wang
:
Power function-based signal recovery transition optimization model of emergency traffic. 7003-7023 - Nam Yong Kim, Jung Hyun Ryu, Byoung Wook Kwon, Yi Pan

, Jong Hyuk Park
:
CF-CloudOrch: container fog node-based cloud orchestration for IoT networks. 7024-7045

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














