adb - Volume 20

  • 主办方 / 出版社
  • 关注的研究方向
  • CCF等级 / JCR分区
adb - Volume 20 - Number 3 - June 2012
Managing resources continuity from the edge to the cloud: Architecture and performance.

Xavier Masip-Bruin==Eva Marín-Tordera==Admela Jukan==Guang-Jie Ren==

Efficient CFD code implementation for the ARM-based Mont-Blanc architecture.

Guillermo Oyarzun==Ricard Borrell==Alexander Gorobets==F. Mantovani==Assensi Oliva==

A multi-criteria detection scheme of collusive fraud organization for reputation aggregation in social networks.

Bo Zhang==Qian Zhang==Zhenhua Huang==Meizi Li==Luqun Li==

An intelligent real-time cyber-physical toolset for energy and process prediction and optimisation in the future industrial Internet of Things.

Sarogini Grace Pease==Russell Trueman==Callum Davies==Jude Grosberg==Kai Hin Yau==Navjot Kaur==Paul P. Conway==Andrew A. West==

Virtual machine placement for elastic infrastructures in overbooked cloud computing datacenters under uncertainty.

Fabio López-Pires==Benjamín Barán==Leonardo Benítez==Saúl Zalimben==Augusto Amarilla==

Next generation cloud computing: New trends and research directions.

Blesson Varghese==Rajkumar Buyya==

Elastic-PPQ: A two-level autonomic system for spatial preference query processing over dynamic data streams.

Gabriele Mencagli==Massimo Torquati==Marco Danelutto==

Structure aware resource estimation for effective scheduling and execution of data intensive workflows in cloud.

K. Kanagaraj==S. Swamynathan==

MDP-IoT: MDP based interest forwarding for heterogeneous traffic in IoT-NDN environment.

Shapna Muralidharan==Abhishek Roy==Navrati Saxena==

IoT-based students interaction framework using attention-scoring assessment in eLearning.

Muhammad Farhan==Sohail Jabbar==Muhammad Aslam==Mohammad Hammoudeh==Mudassar Ahmad==Shehzad Khalid==Murad Khan==Kijun Han==

Immunization-based redundancy elimination in Mobile Opportunistic Networks-Generated big data.

Junbao Zhang==Haojun Huang==Yan Luo==Yinting Fan==Guan Yang==

Data envelopment analysis and interdiction median problem with fortification for enabling IoT technologies to relieve potential attacks.

Raheleh Khanduzi==M. Reza Peyghami==Arun Kumar Sangaiah==

A hybrid approach, Smart Street use case and future aspects for Internet of Things in smart cities.

Syed Hassan Ahmed==Shalli Rani==

Automated identification of shockable and non-shockable life-threatening ventricular arrhythmias using convolutional neural network.

U. Rajendra Acharya==Hamido Fujita==Shu Lih Oh==U. Raghavendra==Jen-Hong Tan==Muhammad Adam==Arkadiusz Gertych==Yuki Hagiwara==

Modelling and forecasting the stock market volatility of SSE Composite Index using GARCH models.

Zhe Lin==

Internet of Things, Big Data and Complex Information Systems: Challenges, solutions and outputs from IoTBD 2016, COMPLEXIS 2016 and CLOSER 2016 selected papers and CLOSER 2015 keynote.

Victor I. Chang==Dickson K. W. Chiu==Muthu Ramachandran==Chung-Sheng Li==

Special section: smarter periphery, easier central processing.

John Hallam==

Electrolocation of multiple objects based on temporal sweep motions.

Miyoung Sim==DaeEun Kim==

Effects of asymmetry and learning on phonotaxis in a robot based on the lizard auditory system.

Lei Zhang==John Hallam==Jakob Christensen-Dalsgaard==

A hierarchical Bayesian framework for multimodal active perception.

João Filipe Ferreira==Miguel Castelo-Branco==Jorge Dias==

A bio-inspired approach for online trajectory generation of industrial robots.

Yadollah Farzaneh==Alireza Akbarzadeh Tootoonchi==

From adaptive behavior to human cognition: a review of Enaction.

Tom Froese==

adb - Volume 20 - Number 2 - April 2012
Attribute-based cloud storage with secure provenance over encrypted data.

Hui Cui==Robert H. Deng==Yingjiu Li==

Parallel ant colony optimization on multi-core SIMD CPUs.

Yi Zhou==Fazhi He==Neng Hou==Yimin Qiu==

Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers.

Mohannad J. Alhanahnah==Peter Bertók==Zahir Tari==Sahel Alouneh==

Software defined neighborhood area network for smart grid applications.

Nazmus S. Nafi==Khandakar Ahmed==Mark A. Gregory==Manoj Datta==

Data service generation framework from heterogeneous printed forms using semantic link discovery.

Han Yu==Hongming Cai==Jun Zhou==Lihong Jiang==

Leveraging content similarity among VMI files to allocate virtual machines in cloud.

Huixi Li==Wenjun Li==Qilong Feng==Shigeng Zhang==Haodong Wang==Jianxin Wang==

Performance study and enhancement of multichannel access methods in the future generation VHT WLAN.

Souhila Mammeri==Mohand Yazid==Louiza Bouallouche-Medjkoune==Asma Mazouz==

Dendron : Genetic trees driven rule induction for network intrusion detection systems.

Dimitrios Papamartzivanos==Félix Gómez Mármol==Georgios Kambourakis==

Towards a service-oriented cyber-physical systems of systems for smart city mobility applications.

Mohamed Elshenawy==Baher Abdulhai==Mohamed El-Darieby==

Reward-based Markov chain analysis adaptive global resource management for inter-cloud computing.

Ben-Jye Chang==Yu-Wei Lee==Ying-Hsin Liang==

Towards a scenario-based solution for extreme metocean event simulation applying urgent computing.

Anna V. Kalyuzhnaya==Denis A. Nasonov==Sergey V. Ivanov==Sergey S. Kosukhin==Alexander V. Boukhanovsky==

Storage tier-aware replicative data reorganization with prioritization for efficient workload processing.

Anton Spivak==Andrew Razumovskiy==Denis A. Nasonov==Alexander Boukhanovsky==Anton Redice==

Hybrid scheduling algorithm in early warning systems.

Alexander A. Visheratin==Mikhail Melnik==Denis A. Nasonov==Nikolay Butakov==Alexander V. Boukhanovsky==

Special section on functional paradigm for high performance computing.

Aleksander Byrski==Katarzyna Rycerz==John Hughes==Kevin Hammond==

Erlang-based desynchronized urban traffic simulation for high-performance computing systems.

Wojciech Turek==

Automatically deriving cost models for structured parallel processes using hylomorphisms.

David Castro==Kevin Hammond==Susmit Sarkar==Yasir Alguwaifli==

Finding parallel functional pearls: Automatic parallel recursion scheme detection in Haskell functions via anti-unification.

Adam D. Barwell==Christopher Brown==Kevin Hammond==

Free the Conqueror! Refactoring divide-and-conquer functions.

Tamás Kozsik==Melinda Tóth==István Bozó==

Special Issue: Recent trends in cloud computing.

George A. Gravvanis==John P. Morrison==Dana Petcu==Theo Lynn==Christos K. Filelis-Papadopoulos==

A framework for simulating large scale cloud infrastructures.

Christos K. Filelis-Papadopoulos==George A. Gravvanis==Panagiotis E. Kyziropoulos==

Energy modeling in cloud simulation frameworks.

Antonios T. Makaratzis==Konstantinos M. Giannoutakis==Dimitrios Tzovaras==

An empirical study for evaluating the performance of multi-cloud APIs.

Reginaldo Ré==Rômulo Manciola Meloca==Douglas Nassif Roma Junior==Marcelo Alexandre da Cruz Ismael==Gabriel Costa Silva==

Scheduling dynamic workloads in multi-tenant scientific workflow as a service platforms.

Maria Alejandra Rodriguez==Rajkumar Buyya==

VM reassignment in hybrid clouds for large decentralised companies: A multi-objective challenge.

Takfarinas Saber==James Thorburn==Liam Murphy==Anthony Ventresque==

Resource provisioning for data-intensive applications with deadline constraints on hybrid clouds using Aneka.

Adel Nadjaran Toosi==Richard O. Sinnott==Rajkumar Buyya==

A review of long-term memory in natural and synthetic systems.

Rachel Wood==Paul Baxter==Tony Belpaeme==

A simple metric for turn-taking in emergent communication.

Peter A. Raffensperger==Russell Y. Webb==Philip J. Bones==Allan I. McInnes==

Attributes of two-dimensional magnetic self-assembly.

Shuhei Miyashita==Rolf Pfeifer==

Moth-inspired plume tracing via multiple autonomous vehicles under formation control.

Xiaodong Kang==Wei Li==

adb - Volume 20 - Number 1 - February 2012
Configuring in-memory cluster computing using random forest.

Zhendong Bei==Zhibin Yu==Ni Luo==Chuntao Jiang==Chengzhong Xu==Shengzhong Feng==

PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system.

Chuan Zhang==Liehuang Zhu==Chang Xu==Rongxing Lu==

Enhancing large-scale docking simulation on heterogeneous systems: An MPI vs rCUDA study.

Baldomero Imbernón==Javier Prades==Domingo Giménez==José M. Cecilia==Federico Silla==

Price forecasting for spot instances in Cloud computing.

Zhicheng Cai==Xiaoping Li==Rubén Ruiz==Qianmu Li==

A learning automata-based ensemble resource usage prediction algorithm for cloud computing environment.

Ali A. Rahmanian==Mostafa Ghobaei Arani==Sajjad Tofighy==

Regression based performance modeling and provisioning for NoSQL cloud databases.

Victor A. E. de Farias==Flávio R. C. Sousa==José Gilvan Rodrigues Maia==João Paulo Pordeus Gomes==Javam C. Machado==

ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks.

XinDi Ma==Jianfeng Ma==Hui Li==Qi Jiang==Sheng Gao==

A novel cost-efficient approach for deadline-constrained workflow scheduling by dynamic provisioning of resources.

Vishakha Singh==Indrajeet Gupta==Prasanta K. Jana==

Urgent computing for decision support in critical situations.

Alexander V. Boukhanovsky==Valeria V. Krzhizhanovskaya==Marian Bubak==

Reprint of "A robust reliable energy-aware urgent computing resource allocation for flash-flood ensemble forecasting on HPC infrastructures for decision support".

Siew Hoon Leong==Antonio Parodi==Dieter Kranzlmüller==

Holistic approach to management of IT infrastructure for environmental monitoring and decision support systems with urgent computing capabilities.

Bartosz Balis==Robert Brzoza-Woch==Marian Bubak==Marek Kasztelnik==Bartosz Kwolek==Piotr Nawrocki==Piotr Nowakowski==Tomasz Szydlo==Krzysztof Zielinski==

Distributed data-driven platform for urgent decision making in cardiological ambulance control.

Sergey V. Kovalchuk==Evgeniy Krotov==Pavel A. Smirnov==Denis A. Nasonov==Alexey N. Yakovlev==

Multimodel agent-based simulation environment for mass-gatherings and pedestrian dynamics.

Vladislav A. Karbovskii==Daniil V. Voloshin==Andrey Karsakov==Alexey Bezgodov==Carlos Gershenson==

Editorial INDIS special section FGCS.

Paola Grosso==Malathi Veeraraghavan==Brian Tierney==Cees de Laat==

Bridging the gap between peak and average loads on science networks.

Sam Nickolay==Eun-Sung Jung==Rajkumar Kettimuthu==Ian T. Foster==

Network measurement for 100 GbE network links using multicore processors.

Xiaoban Wu==Peilong Li==Yongyi Ran==Yan Luo==

Maximizing the performance of scientific data transfer by optimizing the interface between parallel file systems and advanced research networks.

Nicholas Mills==Frank Alex Feltus==Walter B. Ligon III==

mdtmFTP and its evaluation on ESNET SDN testbed.

Liang Zhang==Wenji Wu==Phil DeMar==Eric Pouyoul==

Enabling intent to configure scientific networks for high performance demands.

Mariam Kiran==Eric Pouyoul==Anu Mercian==Brian Tierney==Chin Guok==Inder Monga==

Energy-efficient data transfers in radio astronomy with software UDP RDMA.

Przemyslaw Lenkiewicz==P. Chris Broekema==Bernard Metzler==

Advance reservation access control using software-defined networking and tokens.

Joaquín Chung==Eun-Sung Jung==Rajkumar Kettimuthu==Nageswara S. V. Rao==Ian T. Foster==Russell J. Clark==Henry L. Owen==

CoreFlow: Enriching Bro security events using network traffic monitoring data.

Ralph Koning==Nick Buraglio==Cees de Laat==Paola Grosso==

Special Issue on Advanced Persistent Threat.

Jiageng Chen==Chunhua Su==Kuo-Hui Yeh==Moti Yung==

Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps.

Christian Javier D'Orazio==Kim-Kwang Raymond Choo==

PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds.

Huaqun Wang==Debiao He==Yanfei Sun==Neeraj Kumar==Kim-Kwang Raymond Choo==

The flexible and privacy-preserving proximity detection in mobile social network.

Ayong Ye==Qiuling Chen==Li Xu==Wei Wu==

An over-the-air key establishment protocol using keyless cryptography.

Yuexin Zhang==Yang Xiang==Tao Wang==Wei Wu==Jian Shen==

Norm-based deontic logic for access control, some computational results.

Xin Sun==Xishun Zhao==Livio Robaldo==

A novel statistical technique for intrusion detection systems.

Md. Enamul Kabir==Jiankun Hu==Hua Wang==Guangping Zhuo==

Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network.

Shashank Gupta==Brij Bhooshan Gupta==Pooja Chaudhary==

Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat.

Man Ho Au==Kaitai Liang==Joseph K. Liu==Rongxing Lu==Jianting Ning==

Cybermatics: Advanced Strategy and Technology for Cyber-Enabled Systems and Applications.

Xiaokang Zhou==Albert Y. Zomaya==Weimin Li==Ivan Ruchkin==

Cloud computing based bushfire prediction for cyber-physical emergency applications.

Saurabh Kumar Garg==Jagannath Aryal==Hao Wang==Tejal Shah==Gabor Kecskemeti==Rajiv Ranjan==

Scalable and secure access control policy update for outsourced big data.

Somchart Fugkeaw==Hiroyuki Sato==

A cyber-enabled visual inspection system for rail corrugation.

Qingyong Li==Zhiping Shi==Huayan Zhang==Yunqiang Tan==Shengwei Ren==Peng Dai==Weiyi Li==

Event recommendation in social networks based on reverse random walk and participant scale control.

Yijun Mo==Bixi Li==Bang Wang==Laurence T. Yang==Minghua Xu==

Integration of numerical model and cloud computing.

Chong Chen==Dan Chen==Yingnan Yan==Gaofeng Zhang==Qingguo Zhou==Rui Zhou==

Overlap community detection using spectral algorithm based on node convergence degree.

Weimin Li==Shu Jiang==Qun Jin==

A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems.

Xiaohong Li==Feng Liu==Zhiyong Feng==Guangquan Xu==Zhangjie Fu==

Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM.

Ajay Kumara M. A.==Jaidhar C. D.==

Geo-QTI: A quality aware truthful incentive mechanism for cyber-physical enabled Geographic crowdsensing.

Wei Dai==Yufeng Wang==Qun Jin==Jianhua Ma==

Predator-prey interactions paradigm: a new tool for artificial intelligence.

Pierre Legreneur==Michel Laurin==Vincent Bels==

Co-evolving predator and prey robots.

Stefano Nolfi==

Sequential analyses of foraging behavior and attack speed in ambush and widely foraging lizards.

Eric J. McElroy==Lance D. McBrayer==Steven C. Williams==Roger A. Anderson==Stephen M. Reilly==

Armed and dangerous: predicting the presence and function of defensive weaponry in mammals.

Theodore Stankowich==

Information transfer and antipredator maneuvers in schooling herring.

Stefano Marras==Robert S. Batty==Paolo Domenici==

Sensory perception, neurobiology, and behavioral adaptations for predator avoidance in planktonic copepods.

Edward J. Buskey==Petra H. Lenz==Daniel K. Hartline==

Convergent exaptation of leap up for escape in distantly related arboreal amniotes.

Pierre Legreneur==Michel Laurin==Karine M. Monteil==Vincent Bels==