TJS - 2018 - volume 74 论文列表 |
点击这里查看 The Journal of Supercomputing 的JCR分区、影响因子等信息 |
Nam Yong Kim Jung Hyun Ryu Byoung Wook Kwon Yi Pan Jong Hyuk Park
Power function-based signal recovery transition optimization model of emergency traffic.Jiao Yao Kaimin Zhang Yaxuan Dai Jin Wang
Utilizing a lightweight PKI mechanism to guarantee a secure service in a cloud environment.Sangho Park Hyunjin Kim JaeCheol Ryou
Privacy-aware task data management using TPR*-Tree for trajectory-based crowdsourcing. Job submission and monitoring management in integrated computing environment for finite element analysis.Daeyong Jung Myungil Kim Jungha Lee Han-Yee Kim Dae-Won Lee
An efficient transmission method based on HEVC multi-view adaptive video streaming over P2P network in NFV.Linh Van Ma Gwanghyun Yu Jin-Young Kim Yonggwan Won Jinsul Kim
An event-driven plan recognition algorithm based on intuitionistic fuzzy theory.Xiaofan Wang Lei Wang Shengji Li Jin Wang
Accelerated bulk memory operations on heterogeneous multi-core systems.Jong-Hyuk Lee Weidong Shi Joon-Min Gil
On construction of a virtual GPU cluster with InfiniBand and 10 Gb Ethernet virtualization.Chao-Tung Yang Shuo-Tsung Chen Yu-Sheng Lo Endah Kristiani Yu-Wei Chan
IoT service classification and clustering for integration of IoT service platforms. Fog-based energy-efficient routing protocol for wireless sensor networks.Elham Mirzavand Borujeni Dadmehr Rahbari Mohsen Nickray
Multi-objective optimization design for multi-source multicasting MIMO AF relay systems.Min Zhu Dengyin Zhang Jin Wang
A dynamic multiple-keys game-based industrial wireless sensor-cloud authentication scheme.Dazhi Li Minglu Li Jianhua Liu
Semi-real-time removal of baseline fluctuations in electrocardiogram (ECG) signals by an infinite impulse response low-pass filter (IIR-LPF).Jeong-Hwan Kim Kang-Hwi Lee Jeong-Whan Lee Kyeong-Seop Kim
An energy-saving strategy based on multi-server vacation queuing theory in cloud data center. Deep feature learning for person re-identification in a large-scale crowdsourced environment.Seon Ho Oh Seung-Wan Han Bumsuk Choi Geon Woo Kim Kyung-Soo Lim
Logically isolated group network for virtual convergence environment over SD-WAN.Dongkyun Kim Yong-Hwan Kim Ki-Hyun Kim Joo-Beom Kim Gi-Seong You Joon-Min Gil
Compact deep learned feature-based face recognition for Visual Internet of Things.Seon Ho Oh Geon Woo Kim Kyung-Soo Lim
Detection of damaged files and measurement of similarity to originals using entropy graph characteristics.Chaeho Cho Kwang-Sik Chung Yoojae Won
Information science techniques for investigating research areas: a case study in telecommunications policy. Modified adaptive support weight and disparity search range estimation schemes for stereo matching processors.Seung-Ho Ok Jae Hoon Shim Byungin Moon
Secure mobile device structure for trust IoT.Yun-kyung Lee Jeong-Nyeo Kim Kyung-Soo Lim Hyunsoo Yoon
An improved ant colony optimization-based approach with mobile sink for wireless sensor networks.Jin Wang Jiayi Cao R. Simon Sherratt Jong Hyuk Park
Mobile forensic reference set (MFReS) and mobile forensic investigation for android devices.Dohyun Kim Yunho Lee Sangjin Lee
Enlargement of vulnerable web applications for testing.Fernando Román Muñoz Iván Israel Sabido Cortes Luis Javier García-Villalba
Energy management strategy in cloud computing: a perspective study.Taha Chaabouni Maher Khemakhem
Host load prediction with long short-term memory in cloud computing.Binbin Song Yao Yu Yu Zhou Ziqiang Wang Sidan Du
Cloud workflow scheduling with hybrid resource provisioning. A design and implementation of a framework for games in IoT. An energy efficiency grading system for mobile applications based on usage patterns.Dusan Baek Jae-Hyeon Park Jung-Won Lee
Resource provisioning for cloud applications: a 3-D, provident and flexible approach.Mohammad Sadegh Aslanpour Seyed Ebrahim Dashti Mostafa Ghobaei-Arani Ali Asghar Rahmanian
Analyzing the traffic of penetration testing tools with an IDS.Fernando Román Muñoz Esteban Alejandro Armas Vega Luis Javier García-Villalba
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers.Saru Kumari Marimuthu Karuppiah Ashok Kumar Das Xiong Li Fan Wu Neeraj Kumar
DCSACA: distributed constraint service-aware collaborative access algorithm based on large-scale access to the Internet of Things. Future computing with IoT and cloud computing.Saleh Abdel-Hafeez Ann Gordon-Ross Samer Abubaker
Approximation of conformal mappings and novel applications to shape recognition of planar domains. Tree-based reliable and energy-aware multicast routing protocol for mobile ad hoc networks. Cost-efficient reactive scheduling for real-time workflows in clouds.Huangke Chen Jianghan Zhu Guohua Wu Lisu Huo
Detection of the maximum error of mathematical functions.Hongyuan Qi Jinchen Xu Shaozhong Guo
Robust and efficient QCA cell-based nanostructures of elementary reversible logic gates. Zeroing memory deallocator to reduce checkpoint sizes in virtualized HPC environments.Ramy Gad Simon Pickartz Tim Süß Lars Nagel Stefan Lankes Antonello Monti André Brinkmann
Implementation of secret disclosure attack against two IoT lightweight authentication protocols.Masoumeh Safkhani Mahyar Shariat
The basic matrix library (BML) for quantum chemistry.Nicolas Bock Christian F. A. Negre Susan M. Mniszewski Jamaludin Mohd-Yusof Bálint Aradi Jean-Luc Fattebert Daniel Osei-Kuffuor Timothy C. Germann Anders M. N. Niklasson
Distributed random cooperation for VBF-based routing in high-speed dense underwater acoustic sensor networks.Mohammad Reza Khosravi Hamid Basri Habib Rostami Sadegh Samadi
Privacy-preserving auditing scheme for shared data in public clouds.Libing Wu Jing Wang Sherali Zeadally Debiao He
An adaptive breadth-first search algorithm on integrated architectures.Feng Zhang Heng Lin Jidong Zhai Jie Cheng Dingyi Xiang Jizhong Li Yunpeng Chai Xiaoyong Du
A virtual machine anomaly detection system for cloud computing infrastructure. Reliable congestion-aware path prediction mechanism in 2D NoCs based on EFuNN.Maryam Rezaei-Ravari Vahid Sattari Naeini
Internet of Music Things: an edge computing paradigm for opportunistic crowdsensing.Samarjit Roy Dhiman Sarkar Sourav Hati Debashis De
A joint feature selection framework for multivariate resource usage prediction in cloud servers using stability and prediction performance.Shaifu Gupta Aroor Dinesh Dileep Timothy A. Gonsalves
A survey on optimal utilization of preemptible VM instances in cloud computing.Ashish Kumar Mishra Brajesh Kumar Umrao Dharmendra Kumar Yadav
VMDFS: virtual machine dynamic frequency scaling framework in cloud computing.Kiamars Shojaei Faramarz Safi Esfahani Saeed Ayat
Remote user authentication and key agreement for mobile client-server environments on elliptic curve cryptography.Jiaqing Mo Zhongwang Hu Yuhua Lin
A framework with data-centric accountability and auditability for cloud storage. A camera-based attention level assessment tool designed for classroom usage.Chun-Hsiung Tseng Yung-Hui Chen
GPU-accelerated high-performance encoding and decoding of hierarchical RAID in virtual machines.Tae-Geon Song Mehdi Pirahandeh Cheong-Jin Ahn Deok-Hwan Kim
Improving performance by network-aware virtual machine clustering and consolidation.Gangyi Luo Zhuzhong Qian Mianxiong Dong Kaoru Ota Sanglu Lu
Attribute-based authentication on the cloud for thin clients.Maged Hamada Ibrahim Saru Kumari Ashok Kumar Das Vanga Odelu
An efficient cascaded method for network intrusion detection based on extreme learning machines.Yuanlong Yu Zhifan Ye Xianghan Zheng Chunming Rong
A security evaluation framework for cloud security auditing.Syed Rizvi Jungwoo Ryoo John Kissell William Aiken Yuhong Liu
Design and implementation of an attestation protocol for measured dynamic behavior.Toqeer Ali Syed Roslan Ismail Shahrulniza Musa Mohammad Nauman Sohail Khan
Early fault detection in IaaS cloud computing based on fuzzy logic and prediction technique.Dinh-Mao Bui Thien Huynh-The Sungyoung Lee
An SDN-enhanced load-balancing technique in the cloud system.Byung-Seok Kang Hyunseung Choo
A parallel pattern for iterative stencil + reduce.Marco Aldinucci Marco Danelutto Maurizio Drocco Peter Kilpatrick Claudia Misale Guilherme Peretti Pezzi Massimo Torquati
Assessing and discovering parallelism in C++ code for heterogeneous platforms.David del Rio Astorga Rafael Sotomayor Luis Miguel Sánchez Francisco Javier García Blas Alejandro Calderón Javier Fernández
Data stream processing via code annotations.Marco Danelutto Tiziano De Matteis Gabriele Mencagli Massimo Torquati
MeterPU: a generic measurement abstraction API - Enabling energy-tuned skeleton backend selection. Exploring the interoperability of remote GPGPU virtualization using rCUDA and directive-based programming models.Adrián Castelló Antonio J. Peña Rafael Mayo Judit Planas Enrique S. Quintana-Ortí Pavan Balaji
Reengineering for parallelism in heterogeneous parallel platforms.Chaobo He Xiang Fei Hanchao Li Yong Tang Hai Liu Shuangyin Liu
PL-DVFS: combining Power-aware List-based scheduling algorithm with DVFS technique for real-time tasks in Cloud Computing.Monire Safari Reihaneh Khorsand
CWBound: boundary node detection algorithm for complex non-convex mobile ad hoc networks. A stochastic link-fault-tolerant routing algorithm in folded hypercubes.Bui Thi Thuan Lam Boi Ngoc Keiichi Kaneko
Continuous memory allocation model for cloud services.Anwar Alyatama Asmaa Alsumait Maryam Alotaibi
Virtual sensor as a service: a new multicriteria QoS-aware cloud service composition for IoT applications.Mina Emami Khansari Saeed Sharifian Seyed Ahmad Motamedi
Prediction of air travel demand using a hybrid artificial neural network (ANN) with Bat and Firefly algorithms: a case study.Ali Mostafaeipour Alireza Goli Mojtaba Qolipour
Optimizing inter-nest data locality in imperfect stencils based on loop blocking.Yousef Seyfari Shahriar Lotfi Jaber Karimpour
E-OSched: a load balancing scheduler for heterogeneous multicores.Yasir Noman Khalid Muhammad Aleem Radu Prodan Muhammad Azhar Iqbal Muhammad Arshad Islam
Acknowledgment-based punishment and stimulation scheme for mobile ad hoc network.Mahdi Bounouni Louiza Bouallouche-Medjkoune
A hybrid data replication strategy with fuzzy-based deletion for heterogeneous cloud data centers.Najme Mansouri Mohammad Masoud Javidi
An optimization framework for the capacity allocation and admission control of MapReduce jobs in cloud systems.Marzieh Malekimajd Danilo Ardagna Michele Ciavotta Eugenio Gianniti Mauro Passacantando Alessandro Maria Rizzi
Design of DRAM-NAND flash hybrid main memory and Q-learning-based prefetching method.Su-Kyung Yoon Young-Sun Youn Jeong-Geun Kim Shin-Dug Kim
Multi-queue scheduling of heterogeneous jobs in hybrid geo-distributed cloud environment.Li Chunlin Tang Jianhang Youlong Luo
Modeling SmallClient indexing framework for big data analytics.Aisha Siddiqa Ahmad Karim Victor Chang
A low cost wearable wireless sensing system for paretic hand management after stroke.Se Dong Min Chang-Won Wang Hwa-Min Lee Bong-Keun Jung
Multi-tenant intrusion detection system for public cloud (MTIDS).Mohamed Hawedi Chamseddine Talhi Hanifa Boucheneb
Confidential smart-sensing framework in the IoT era.Fadi Al-Turjman Sinem Alturjman
A security review of local government using NIST CSF: a case study.Ahmed Ibrahim Craig Valli Ian McAteer Junaid Ahsenali Chaudhry
NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks.Amjad Mehmood Mithun Mukherjee Syed Hassan Ahmed Houbing Song Khalid Mahmood Malik
An efficient approach for publishing microdata for multiple sensitive attributes.Adeel Anjum Naveed Ahmad Saif Ur Rehman Malik Samiya Zubair Basit Shahzad
Next-generation cybersecurity through a blockchain-enabled federated cloud framework.Olumide Malomo Danda B. Rawat Moses Garuba
CDCSS: cluster-based distributed cooperative spectrum sensing model against primary user emulation (PUE) cyber attacks.Muhammad Ayzed Mirza Mudassar Ahmad Muhammad Asif Habib Nasir Mahmood Chaudhry Muhammad Nadeem Faisal Usman Ahmad
Forensic investigation to detect forgeries in ASF files of contemporary IP cameras.Rashid Masood Khan Mian Muhammad Waseem Iqbal Muhammad Faisal Amjad Haider Abbas Hammad Afzal Abdul Rauf Maruf Pasha
Infrequent pattern mining in smart healthcare environment using data summarization.Mohiuddin Ahmed Abu S. S. M. Barkat Ullah
SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks.Saqib Ubaid Muhammad Farrukh Shafeeq Majid Hussain Ali Hammad Akbar Abdelrahman Abuarqoub M. Sultan Zia Beenish Abbas
Towards ontology-based multilingual URL filtering: a big data problem.Mubashar Hussain Mansoor Ahmed Hasan Ali Khattak Muhammad Imran Abid Khan Sadia Din Awais Ahmad Gwanggil Jeon Goutham Reddy Alavalapati
Security threats to critical infrastructure: the human factor.Ibrahim Ghafir Jibran Saleem Mohammad Hammoudeh Hanan Faour Vaclav Prenosil Sardar F. Jaf Sohail Jabbar Thar Baker
Identifying critical autonomous systems in the Internet.Abdullah Yasin Nur Mehmet Engin Tozal
Chain-based big data access control infrastructure.Emmanuel Boateng Sifah Qi Xia Kwame Opuni-Boachie Obour Agyekum Sandro Amofa Jianbin Gao Ruidong Chen Hu Xia James C. Gee Xiaojiang Du Mohsen Guizani
Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution.Hichem Sedjelmaci Sidi-Mohammed Senouci
Real-time identification of three Tor pluggable transports using machine learning techniques.Mohammad Hassan Mojtahed Soleimani Muharram Mansoorizadeh Mohammad Nassiri
ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures.Wencheng Yang Song Wang Guanglou Zheng Junaid Ahsenali Chaudhry Craig Valli
A machine learning approach for feature selection traffic classification using security analysis.Muhammad Shafiq Xiangzhan Yu Ali Kashif Bashir Hassan Nazeer Chaudhry Dawei Wang
Threats to critical infrastructure from AI and human intelligence.Junaid Chaudhry Al-Sakib Khan Pathan Mubashir Husain Rehmani Ali Kashif Bashir
Suleyman Tosun Vahid Babaei Ajabshir
Models for availability and power consumption evaluation of a private cloud with VMM rejuvenation enabled by VM Live Migration.Matheus Torquato I. M. Umesh Paulo R. M. Maciel
Novel designs of full adder in quantum-dot cellular automata technology. An efficient and secure design of multi-server authenticated key agreement protocol.Azeem Irshad Husnain Naqvi Shehzad Ashraf Chaudhry Shouket Raheem Saru Kumari Ambrina Kanwal Muhammad Usman
Adaptive correlated prefetch with large-scale hybrid memory system for stream processing.Sung Min Lee Su-Kyung Yoon Jeong-Geun Kim Shin-Dug Kim
Integer linear programming-based cost optimization for scheduling scientific workflows in multi-cloud environments.Somayeh Mohammadi Hossein Pedram Latif Pourkarimi
A novel fault-tolerant multiplexer in quantum-dot cellular automata technology.Seyed-Sajad Ahmadpour Mohammad Mosleh
SAFT-PHENIC: a thermal-aware microring fault-resilient photonic NoC.Michael Conrad Meyer Yuichi Okuyama Abderazek Ben Abdallah
Application mapping in hybrid photonic networks-on-chip for reducing insertion loss.Somayeh Khoroush Midia Reshadi Ahmad Khademzadeh
QoS-aware VM placement and migration for hybrid cloud infrastructure. Schmitt trigger-based single-ended 7T SRAM cell for Internet of Things (IoT) applications.Kishore Sanapala Ramachandran Sakthivel Sang-Soo Yeo
A model of FSM-based planner and dialogue supporting system for emergency call services.Keonsoo Lee Yang Sun Lee Yunyoung Nam
A dimensionality reduction-based efficient software fault prediction using Fisher linear discriminant analysis (FLDA).Anum Kalsoom Muazzam Maqsood Mustansar Ali Ghazanfar Farhan Aadil Seungmin Rho
Clustering algorithm for internet of vehicles (IoV) based on dragonfly optimizer (CAVDO).Farhan Aadil Waleed Ahsan Zahoor-Ur Rehman Peer Azmat Shah Seungmin Rho Irfan Mehmood
Anonymous group key agreement protocol for multi-server and mobile environments based on Chebyshev chaotic maps. Design and implementation of cybersecurity testbed for industrial IoT systems.Seokcheol Lee Seokjun Lee Hyunguk Yoo SungMoon Kwon Taeshik Shon
Enforcing high-level security policies for Internet of Things. Performance evaluation framework design for smart sensor business. AnyNoC: new network on a chip switching using the shared-memory and output-queue techniques for complex Internet of things systems.Jia-Yang Lin Yi-Ting Hsieh Trong Nghia Le Wen-Long Chin
High-performance fieldbus application-specific integrated circuit design for industrial smart sensor networks.Ching-Han Chen Ming-Yi Lin Xing-Chen Guo
Field classification-based novel fuzzing case generation for ICS protocols. A REST-based industrial web of things' framework for smart warehousing.Sohail Jabbar Murad Khan Bhagya Nathali Silva Kijun Han
WISE: web of object architecture on IoT environment for smart home and building energy management.Jaehak Yu Namkyung Lee Cheol Sig Pyo Yang Sun Lee
FS-IIoTSim: a flexible and scalable simulation framework for performance evaluation of industrial Internet of things systems.Hwi-Ho Lee Jung-Hyok Kwon Eui-Jik Kim
New parallel swarm algorithm for smart sensor systems redundancy allocation problems in the Internet of Things. Cloud-based smart manufacturing for personalized candy packing application.Shiyong Wang Jiafu Wan Muhammad Imran Di Li Chunhua Zhang
Smart service relying on Internet of Things technology in parking systems.Ming-Fong Tsai Ye Chin Kiong Ang Sinn
VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements.Cheng-Ta Huang Min-Yi Tsai Li-Chiun Lin Wei-Jen Wang Shiuh-Jeng Wang
A secure ECC-based RFID mutual authentication protocol for internet of things.Amjad Ali Alamr Firdous Kausar Jongsung Kim Changho Seo
Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications.Sung Ryoung Kim Jeong-Nyeo Kim Sung Tae Kim Sunwoo Shin Jeong Hyun Yi
The intelligent IoT common service platform architecture and service implementation.Jihyun Kim Yonghun Jeon Howon Kim
Validation of virtualization platforms for I-IoT purposes.Jordi Mongay Batalla Konrad Sienkiewicz Waldemar Latoszek Piotr Krawiec Constandinos X. Mavromoustakis George Mastorakis
Semantic code clone detection for Internet of Things applications using reaching definition and liveness analysis.Rajkumar Tekchandani Rajesh Kumar Bhatia Maninder Singh
RCB: leakage-resilient authenticated encryption via re-keying.Megha Agrawal Tarun Kumar Bansal Donghoon Chang Amit Kumar Chauhan Seokhie Hong Jinkeon Kang Somitra Kumar Sanadhya
Editorial of special section on enabling technologies for industrial and smart sensor internet of things systems.Borja Bordel Ramón Alcarria Diego Sánchez de Rivera Tomás Robles
Performance of preconditioned iterative solvers in MFiX-Trilinos for fluidized beds.V. M. Krushnarao Kotteda Vinod Kumar William F. Spotz
Performance prediction for supporting mobile applications' offloading.Thiago Felipe da Silva Pinheiro Francisco Airton Silva Iure Fe Sokol Kosta Paulo Romero Martins Maciel
QUICK: QoS-guaranteed efficient cloudlet placement in wireless metropolitan area networks.Long Chen Jigang Wu Gangqiang Zhou Longjie Ma
Optimization of resources in parallel systems using a multiobjective artificial bee colony algorithm.César Gómez-Martín Miguel A. Vega-Rodríguez
An efficient parallel algorithm for the coupling of global climate models and regional climate models on a large-scale multi-core cluster.Yuzhu Wang Jinrong Jiang Junqiang Zhang Juanxiong He He Zhang Xuebin Chi Tianxiang Yue
CPU and GPU parallelized kernel K-means.Mohammed Baydoun Hassan Ghaziri Mohammed Al-Husseini
Scaling-up versus scaling-out networking in data centers: a comparative robustness analysis.Leila Shooshtarian Farshad Safaei Semnani Ali Tizghadam
Dimensionality reduction via the Johnson-Lindenstrauss Lemma: theoretical and empirical bounds on embedding dimension.John Fedoruk Byron Schmuland Julia Ann Johnson Giseon Heo
Fair bandwidth allocating and strip-aware prefetching for concurrent read streams and striped RAIDs in distributed file systems.Sangmin Lee Soon J. Hyun Hong-Yeon Kim Young-Kyun Kim
NVM Streaker: a fast and reconfigurable performance simulator for non-volatile memory-based memory architecture.Danqi Hu Fang Lv Chenxi Wang Huimin Cui Lei Wang Ying Liu Xiaobing Feng
Representation and automatic generation of state-transition mapping tree.Je-Ho Park Young Bom Park Soo-Kyung Choi
Photo collage-based photograph display system on mobile computing platform. Redressing fork constraints in nanoscale quasi-delay-insensitive asynchronous pipelines. Toward a fair indictment for sealed-bid auction with self-enforcing privacy. Forecasting power consumption for higher educational institutions based on machine learning.Jihoon Moon Jinwoong Park Eenjun Hwang Sanghoon Jun
Raw reversibility of information hiding on the basis of VQ systems.Cheng-Ta Huang Cheng-Hsing Yang Wei-Jen Wang Shiau-Rung Tsui Shiuh-Jeng Wang
LBFT: a fault-tolerant routing algorithm for load-balancing network-on-chip based on odd-even turn model.Ruilian Xie Jueping Cai Xin Xin Bo Yang
Digital forensic science approach by file recovery research.Wooyeon Jo Hyun Soo Chang Taeshik Shon
An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data.Imran Khan Shehzad Ashraf Chaudhry Muhammad Sher Muhammad Khurram Khan
Fast depth estimation using semi-global matching and adaptive stripe-based optimization.Maziar Loghman Joohee Kim Kyuwon Choi
Cognitive social network analysis for supporting the reliable decision-making process. Erratum to: Development of a low-cost wearable sensing glove with multiple inertial sensors and a light and fast orientation estimation algorithm.Younggeun Choi Kyounghwan Yoo Shin-Jin Kang Beomjoo Seo Soo Kyun Kim
Development of a low-cost wearable sensing glove with multiple inertial sensors and a light and fast orientation estimation algorithm.Younggeun Choi Kyounghwan Yoo Shin-Jin Kang Beomjoo Seo Soo Kyun Kim
Design of additive homomorphic encryption with multiple message spaces for secure and practical storage services over encrypted data.Taek-Young Youn Nam-Su Jho Ku-Young Chang
A study of the effect of social trust, trust in social networking services, and sharing attitude, on two dimensions of personal information sharing behavior.Mohammad Salehan Dan J. Kim Chulmo Koo
Design and implementation of user-level dynamic binary instrumentation on ARM architecture.Dongwoo Kim Sangwho Kim Jaecheol Ryou
Twitter news-in-education platform for social, collaborative, and flipped learning.Yongsung Kim Eenjun Hwang Seungmin Rho
Uplink scheduling of MU-MIMO gateway for massive data acquisition in Internet of things. Cost-effective monitoring algorithm for cyber-physical system platform using combined spatio-temporal model.Kwanghoon Choi Sung-Hwa Lim Jai-Hoon Kim
Erratum to: Secure IoT framework and 2D architecture for End-To-End security.Jongseok Choi Youngjin In Changjun Park Seonhee Seok Hwajeong Seo Howon Kim
Secure IoT framework and 2D architecture for End-To-End security.Jongseok Choi Youngjin In Changjun Park Seonhee Seok Hwajeong Seo Howon Kim
An improved and robust biometrics-based three factor authentication scheme for multiserver environments.Shehzad Ashraf Chaudhry Husnain Naqvi Mohammad Sabzinejad Farash Taeshik Shon Muhammad Sher
Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient.Bin Lao Ge Nong Wai Hong Chan Yi Pan
Physically based visual simulation of the Lattice Boltzmann method on the GPU: a survey.Octavio Navarro-Hinojosa Sergio Ruiz-Loza Moises Alencastre-Miranda
Load balancing in reducers for skewed data in MapReduce systems by using scalable simple random sampling.Elaheh Gavagsaz Ali Rezaee Hamid Haj Seyyed Javadi
SRAM- and STT-RAM-based hybrid, shared last-level cache for on-chip CPU-GPU heterogeneous architectures.Lan Gao Rui Wang Yunlong Xu Hailong Yang Zhongzhi Luan Depei Qian Han Zhang Jihong Cai
Brokerage-based dependability integration in cloud computing services. Learning-based dynamic scalable load-balanced firewall as a service in network function-virtualized cloud computing environments.Naghmeh Dezhabad Saeed Sharifian
Design and performance evaluation of mixed multicast architecture for internet of things environment. A heuristic search algorithm based on subspaces for PageRank computation. Simulation of an inelastic dispersive phenomenon: stimulated Brillouin scattering in a single-mode fiber segment through parallelism.R. Sanchez-Lara Joel Antonio Trejo-Sánchez José L. López-Martínez J. A. Alvarez-Chavez
A hybrid GPU cluster and volunteer computing platform for scalable deep learning.Ekasit Kijsipongse Apivadee Piyatumrong Suriya U.-ruekolan
Balancing the learning ability and memory demand of a perceptron-based dynamically trainable neural network.Edward Richter Spencer Valancius Josiah McClanahan John Mixter Ali Akoglu
Efficient implementation of space-time adaptive processing for adaptive weights calculation based on floating point FPGAs.Narjes Hasanikhah Siavash Amin-Nejad Ghafar Darvish M. R. Moniri
System-wide trade-off modeling of performance, power, and resilience on petascale systems.Li Yu Zhou Zhou Yuping Fan Michael E. Papka Zhiling Lan
An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment.S. Anandhi Anitha Ramalingam Venkatasamy Sureshkumar
Priority-based capacity and power allocation in co-located WBANs using Stackelberg and bargaining games.Jingxian Wang Yongmei Sun Yuefeng Ji
Real-time tsunami inundation forecast system for tsunami disaster prevention and mitigation.Akihiro Musa Osamu Watanabe Hiroshi Matsuoka Hiroaki Hokari Takuya Inoue Yoichi Murashima Yusaku Ohta Ryota Hino Shunichi Koshimura Hiroaki Kobayashi
Improving all-reduce collective operations for imbalanced process arrival patterns. On benchmarking task scheduling algorithms for heterogeneous computing systems.Ashish Kumar Maurya Anil Kumar Tripathi
Incentive-aware virtual machine scheduling in cloud computing.Heyang Xu Yang Liu Wei Wei Wenqiang Zhang
A multi-objective decision support framework for virtual machine placement in cloud data centers: a real case study.Montassar Riahi Saoussen Krichen
Resource optimization of container orchestration: a case study in multi-cloud microservices-based applications.Carlos Guerrero Isaac Lera Carlos Juiz
Improving the energy efficiency and performance of data-intensive workflows in virtualized clouds.Xilong Qu Peng Xiao Lirong Huang
A joint optimization method for NoC topology generation.Yonghui Li Kun Wang Huaxi Gu Yintang Yang Nan Su Yawen Chen Haibo Zhang
A highly efficient dynamic router for application-oriented network on chip.Tuan Anh Nguyen Dugki Min Eunmi Choi
APS: adaptable prefetching scheme to different running environments for concurrent read streams in distributed file systems.Sangmin Lee Soon J. Hyun Hong-Yeon Kim Young-Kyun Kim
Parallel synchronous and asynchronous coupled simulated annealing.Kayo Gonçalves-e-Silva Daniel Aloise Samuel Xavier de Souza
Improving performance of iterative solvers with the AXC format using the Intel Xeon Phi.Edoardo Coronado-Barrientos Guillermo Indalecio Fernández Antonio J. García-Loureiro
Cost minimization for bag-of-tasks workflows in a federation of clouds.Somayeh Abdi Latif Pourkarimi Mahmood Ahmadi Farzad Zargari
A fault-tolerant computing method for Xdraw parallel algorithm. Evaluations of OpenCL-written tsunami simulation on FPGA and comparison with GPU implementation.Fumiya Kono Naohito Nakasato Kensaku Hayashi Alexander Vazhenin Stanislav Sedukhin
Time-shift replacement algorithm for main memory performance optimization. A vectorized k-means algorithm for compressed datasets: design and experimental analysis.Abdullah Al Hasib Juan M. Cebrian Lasse Natvig
DigHR: precise dynamic detection of hidden races with weak causal relation analysis.Peng Luo Deqing Zou Hai Jin Yajuan Du Long Zheng Jinan Shen
Framework for automated partitioning and execution of scientific workflows in the cloud.Jaagup Viil Satish Narayana Srirama
The panpositionable panconnectedness of crossed cubes. Performance and energy effects on task-based parallelized applications - User-directed versus manual vectorization.Helena Caminal Diego Caballero Juan M. Cebrian Roger Ferrer Marc Casas Miquel Moretó Xavier Martorell Mateo Valero
A dynamic task scheduling framework based on chicken swarm and improved raven roosting optimization methods in cloud computing.Shadi Torabi Faramarz Safi Esfahani
speedTrust: a super peer-guaranteed trust model in hybrid P2P networks. A routing protocol for vehicular ad hoc networks using simulated annealing algorithm and neural networks. A new rule-based power-aware job scheduler for supercomputers.Jun Wang Dezhi Han Ruijun Wang
Design and energy-efficient resource management of virtualized networked Fog architectures for the real-time support of IoT applications.Paola Gabriela Vinueza Naranjo Enzo Baccarelli Michele Scarpiniti
A thread-level parallelization of pairwise additive potential and force calculations suitable for current many-core architectures.Yoshimichi Andoh Soichiro Suzuki Satoshi Ohshima Tatsuya Sakashita Masao Ogino Takahiro Katagiri Noriyuki Yoshii Susumu Okazaki
C2OF2N: a low power cooperative code offloading method for femtolet-based fog network.Anwesha Mukherjee Priti Deb Debashis De Rajkumar Buyya
Self-adaptive risk-aware routing in opportunistic network.Narges Arastouie Masoud Sabaei
Non-clairvoyant online scheduling of synchronized jobs on virtual clusters.Sina Mahmoodi Khorandi Mohsen Sharifi
Distributed unequal clustering algorithm in large-scale wireless sensor networks using fuzzy logic.Peyman Neamatollahi Mahmoud Naghibzadeh
Stream data prefetcher for the GPU memory interface.Nuno Neves Pedro Tomás Nuno Roma
The influence of datacenter usage on symmetry in datacenter network design. Real-time parallel image processing applications on multicore CPUs with OpenMP and GPGPU with CUDA.Jihoon Kwon Seog Chung Seo Seokhie Hong
An election protocol based on group membership detection algorithm in mobile ad hoc distributed systems.Sung-Hoon Park Su-Chang Yoo Bokyoung Kim
HYSTERY: a hybrid scheduling and mapping approach to optimize temperature, energy consumption and lifetime reliability of heterogeneous multiprocessor systems. Analysis of large deviations behavior of multi-GPU memory access in deep learning.P. S. Tamizharasan N. Ramasubramanian
Energy performance of heuristics and meta-heuristics for real-time joint resource scaling and consolidation in virtualized networked data centers.Michele Scarpiniti Enzo Baccarelli Paola Gabriela Vinueza Naranjo Aurelio Uncini
An LP-based hyperparameter optimization model for language modeling.Amir Hossein Akhavan Rahnama Mehdi Toloo Nezer Jacob Zaidenberg
Preemptive cloud resource allocation modeling of processing jobs.Shahin Vakilinia Mohamed Cheriet
A survey of graph processing on graphics processing units. Data deduplication techniques for efficient cloud storage management: a systematic review.Ravneet Kaur Inderveer Chana Jhilik Bhattacharya
A graph-based cache for large-scale similarity search engines.Veronica Gil-Costa Mauricio Marín Carolina Bonacic Roberto Solar
A full adder structure without cross-wiring in quantum-dot cellular automata with energy dissipation analysis.Saeed Rasouli Heikalabad Mazaher Naji Asfestani Mehdi Hosseinzadeh
A key agreement authentication protocol using an improved parallel Pollard rho for electronic payment system.Olufunke R. Vincent Olarewaju Mubashiru Lawal
Multiround Distributed Lifetime Coverage Optimization protocol in wireless sensor networks.Ali Kadhum Idrees Karine Deschinkel Michel Salomon Raphaël Couturier
An improved low-cost yoking proof protocol based on Kazahaya's flaws.Nasour Bagheri Masoumeh Safkhani Mojtaba Eslamnezhad Namin Samad Rostampour
REPLICA MBTAC: multithreaded dual-mode processor.Martti Forsell Jussi Roivainen Ville Leppänen
Popularity-based covering sets for energy proportionality in shared-nothing clusters. Efficient sparse matrix-delayed vector multiplication for discretized neural field model. Design of an accurate and high-speed binocular pupil tracking system based on GPGPUs.Juan Mompean Juan L. Aragón Pedro Prieto Pablo Artal
Correction to: New algorithms for fixed-length approximate string matching and approximate circular string matching under the Hamming distance.ThienLuan Ho Seungrohk Oh Hyunjin Kim
New algorithms for fixed-length approximate string matching and approximate circular string matching under the Hamming distance.ThienLuan Ho Seungrohk Oh Hyunjin Kim
Exploiting multilevel parallelism on a many-core system for the application of hyperheuristics to a molecular docking problem.José M. Cecilia José-Matías Cutillas-Lozano Domingo Giménez Baldomero Imbernón
Wei Zhang Shiwei Zhu Jian Tang Naixue Xiong
Parallel implementations of the 3D fast wavelet transform on a Raspberry Pi 2 cluster.Gregorio Bernabé Raúl Hernández Manuel E. Acacio
A mathematical model to calculate real cost/performance in software distributed shared memory on computing environments.Ehsan Mousavi Khaneghah Nosratollah Shadnoush Amir Hossein Ghobakhlou
An efficient anonymous authentication protocol in multiple server communication networks (EAAM).An Braeken Pardeep Kumar Madhusanka Liyanage Ta Thi Kim Hue
Privatizing transactions for Lee's algorithm in commercial hardware transactional memory.Ricardo Quislant Eladio Gutiérrez Emilio L. Zapata Oscar G. Plata
K-DT: a formal system for the evaluation of linear data dependence testing techniques. The hierarchical Petersen network: a new interconnection network with fixed degree.Jung-hyun Seo Jong-Seok Kim Hyung Jae Chang Hyeong-Ok Lee
Data-type specific cache compression in GPGPUs. A tuning approach for iterative multiple 3d stencil pipeline on GPUs: Anisotropic Nonlinear Diffusion algorithm as case study.Siham Tabik Maurice Peemen Luis F. Romero
A hybrid MapReduce-based k-means clustering using genetic algorithm for distributed datasets. An energy-efficient 3D-stacked STT-RAM cache architecture for cloud processors: the effect on emerging scale-out workloads.Adnan Nasri Mahmood Fathy Ali Broumandnia
Strategy for data-flow synchronizations in stencil parallel computations on multi-/manycore systems. Function portability of molecular dynamics on heterogeneous parallel architectures with OpenCL.Rene Halver Wilhelm Homberg Godehard Sutmann
Almost optimal column-wise prefix-sum computation on the GPU.Hiroki Tokura Toru Fujita Koji Nakano Yasuaki Ito Jacir Luiz Bordim
Parallelization of stochastic bounds for Markov chains on multicore and manycore platforms. Actor model of Anemone functional language. Pardis: a process calculus for parallel and distributed programming in Haskell.Christopher Blöcker Ulrich Hoffmann
Language-based vectorization and parallelization using intrinsics, OpenMP, TBB and Cilk Plus. Python accelerators for high-performance computing. Hybrid work stealing of locality-flexible and cancelable tasks for the APGAS library. A taxonomy of task-based parallel programming technologies for high-performance computing.Peter Thoman Kiril Dichev Thomas Heller Roman Iakymchuk Xavier Aguilar Khalid Hasanov Philipp Gschwandtner Pierre Lemarinier Stefano Markidis Herbert Jordan Thomas Fahringer Kostas Katrinis Erwin Laure Dimitrios S. Nikolopoulos
Special section on parallel programming.Jihoon Kwon Seog Chung Seo Seokhie Hong
An analytical method for developing appropriate protection profiles of Instrumentation & Control System for nuclear power plants.Manhyun Chung Woo-Geun Ahn Byung-gil Min Jungtaek Seo Jongsub Moon
Theoretical peak FLOPS per instruction set: a tutorial. Hierarchical multicore thread mapping via estimation of remote communication.Hamidreza Khaleghzadeh Hossein Deldari Ravi Reddy Alexey L. Lastovetsky
Efficient design and hardware implementation of the OpenFlow v1.3 Switch on the Virtex-6 FPGA ML605.Abbas Yazdinejad Ali Bohlooli Kamal Jamshidi
Apriori-based text mining method for the advancement of the transportation management plan in expressway work zones.Shin Hyoung Park Jienki Synn Oh Hoon Kwon Yunsick Sung
An effective data fusion-based routing algorithm with time synchronization support for vehicular wireless sensor networks.Chang Tan Sai Ji Ziyuan Gui Jian Shen Desheng Fu Jin Wang
A method for enhancing end-to-end transfer efficiency via performance tuning factors on dedicated circuit networks with a public cloud platform.Won-Hyuk Lee Jong-Seon Park Seung-Hae Kim Jin-Hyung Park Joon-Min Gil
Cross-layer design and performance analysis for maximizing the network utilization of wireless mesh networks in cloud computing.Seokhong Min Young-Sik Jeong Jungho Kang
A load balancing scheme with Loadbot in IoT networks. cSketch: a novel framework for capturing cliques from big graph. Remote data integrity check for remotely acquired and stored stream data.Keon-Myung Lee Kyung Mi Lee Sang Ho Lee
Non-intrusive transaction aware filtering during enterprise application modernization.Ravikumar Ramadoss N. M. Elango Satheesh Abimannan Ching-Hsien Hsu
Analysis of performance measures in cloud-based ubiquitous SaaS CRM project systems.You-Shyang Chen Chienwen Wu Heng-Hsing Chu Chien-Ku Lin Huan-Ming Chuang
Compressive sampling and data fusion-based structural damage monitoring in wireless sensor network.Sai Ji Chang Tan Ping Yang Yajie Sun Desheng Fu Jin Wang
An efficient distributed mutual exclusion algorithm for intersection traffic control.JongBeom Lim Young-Sik Jeong Doo-Soon Park HwaMin Lee
An algorithm to find relationships between web vulnerabilities.Fernando Román Muñoz Luis Javier García-Villalba
E2FS: an elastic storage system for cloud computing.Longbin Chen Meikang Qiu Jeungeun Song Zenggang Xiong Houcine Hassan
Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing.Lewis Nkenyereye Youngho Park Kyung-Hyune Rhee
A shareable keyword search over encrypted data in cloud computing.Li Xu Chi-Yao Weng Lun-Pin Yuan Mu-En Wu Raylin Tso Hung-Min Sun
Fusion algorithms and high-performance applications for vehicular cloud computing.Ali M. Shatnawi Mohammad Alsaedeen
A deadlock-free routing algorithm for irregular 3D network-on-chips with wireless links. Vectorized algorithm for multidimensional Monte Carlo integration on modern GPU, CPU and MIC architectures. An efficient parallel processing method for skyline queries in MapReduce. Weather radar data processing on graphic cards.Mónica Denham Enrico Lamperti Javier A. Areta
Dlog: diagnosing router events with syslogs for anomaly detection. Low-rank approximation of large-scale matrices via randomized methods.Sarvenaz Hatamirad Mir Mohsen Pedram
RePro-Active: a reactive-proactive scheduling method based on simulation in cloud computing.Noroddin Alaei Faramarz Safi Esfahani
Design and implementation of a Pedestrian recognition algorithm using trilinear interpolation based on HOG-UDP.Jae-Sung Shim Yong-Wan Ju Seok-Cheon Park
Parallelization of large vector similarity computations in a hybrid CPU+GPU environment. DSLM: a decentralized search for large and mobile networks.Yung-Ting Chuang Chung-Yen Yu Qian-Wei Wu
A new clustering approach in wireless sensor networks using fuzzy system.Mahnaz Toloueiashtian Homayun Motameni
Efficient routing for dense UWSNs with high-speed mobile nodes using spherical divisions.Mohammad Reza Khosravi Hamid Basri Habib Rostami
A performance study of the time-varying cache behavior: a study on APEX, Mantevo, NAS, and PARSEC.Nafiul Alam Siddique Patricia Grubel Abdel-Hameed A. Badawy Jeanine E. Cook
OLM: online LLC management for container-based cloud service.Hanul Sung Myungsun Kim Jeesoo Min Hyeonsang Eom
Rethinking elastic online scheduling of big data streaming applications over high-velocity continuous data streams.Dawei Sun Hongbin Yan Shang Gao Xunyun Liu Rajkumar Buyya
TDRM: tensor-based data representation and mining for healthcare data in cloud computing environments.Rajinder Sandhu Navroop Kaur Sandeep K. Sood Rajkumar Buyya
Toward the design of a novel hybrid parallel N-body method in scope of modern cloud architectures.Panagiotis E. Kyziropoulos C. K. Filelis-Papadopoulos George A. Gravvanis Christos Efthymiopoulos
Out-of-core implementation for accelerator kernels on heterogeneous clouds.Hamidreza Khaleghzadeh Ziming Zhong Ravi Reddy Alexey L. Lastovetsky
Large-scale simulation of a self-organizing self-management cloud computing framework.Christos K. Filelis-Papadopoulos Konstantinos M. Giannoutakis George A. Gravvanis Dimitrios Tzovaras
Special section: towards high performance computing in the cloud.George A. Gravvanis John P. Morrison Dan C. Marinescu Christos K. Filelis-Papadopoulos
Seyed Farhad Aghili Maede Ashouri-Talouki Hamid Mala
Energy constrained scheduling of stochastic tasks. GPU-based real-time super-resolution system for high-quality UHD video up-conversion.Dae-Yeol Lee Jooyoung Lee Ji-Hoon Choi Jong-Ok Kim Hui Yong Kim Jin Soo Choi
Dynamic performance isolation management for cloud computing services.Nafiseh Fareghzadeh Mir Ali Seyyedi Mehran Mohsenzadeh
Energy-efficient load balancing scheme for two-tier communication in wireless sensor networks.Sukhchandan Randhawa Sushma Jain
An adaptive task allocation technique for green cloud computing.Sambit Kumar Mishra Deepak Puthal Bibhudatta Sahoo Sanjay Kumar Jena Mohammad S. Obaidat
On energy consumption of switch-centric data center networks.Olusogo Popoola Bernardi Pranggono
A fast optimal parallel algorithm for a short addition chain. Survey on clustering in heterogeneous and homogeneous wireless sensor networks.Ali Shokouhi Rostami Marzieh Badkoobe Farahnaz Mohanna Hengameh Keshavarz Ali Asghar Rahmani Hosseinabadi Arun Kumar Sangaiah
A comprehensive evaluation of availability and operational cost for a virtualized server system using stochastic reward nets.Tuan Anh Nguyen Dugki Min Eunmi Choi
ECCN: an extended CCN architecture to improve data access in vehicular content-centric network.Ali Kazemi Niari Reza Berangi Mahmood Fathy
A churn-aware durable data storage scheme in hybrid P2P networks. A high-performance and energy-efficient exhaustive key search approach via GPU on DES-like cryptosystems.Armin Ahmadzadeh Omid Hajihassani Saeid Gorgin
A novel buffer management scheme based on particle swarm optimization for SSD.Yili Wang Kyung Tae Kim Byung Jun Lee Hee Yong Youn
Resource-aware virtual machine placement algorithm for IaaS cloud.Madnesh K. Gupta Tarachand Amgoth
Recommender system architecture based on Mahout and a main memory database.Zhegao Piao Seong Joon Yoo Yeong Hyeon Gu Jaechun No Zhiyan Jiang Helin Yin
General queuing model for optimal seamless delivery of payload processing in multi-core processors.Esther Salamí Cristina Barrado Antonia Gallardo Enric Pastor
A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications.Samad Rostampour Nasour Bagheri Mehdi Hosseinzadeh Ahmad Khademzadeh
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags.King-Hang Wang Chien-Ming Chen Weicheng Fang Tsu-Yang Wu
Interactive 3D simulation for fluid-structure interactions using dual coupled GPUs. Solving traveling salesman problem using parallel repetitive nearest neighbor algorithm on OTIS-Hypercube and OTIS-Mesh optoelectronic architectures.