default search action
Concurrency and Computation: Practice and Experience, Volume 31
Volume 31, Number 1, 2019
- Sparsh Mittal:
A survey of techniques for dynamic branch prediction. - Ermeson C. Andrade, Bruno Costa e Silva Nogueira, Gustavo Callou, Gabriel Alves:
Dependability analysis of a cyber-physical system for smart environments. - Putt Sakdhnagool, Amit Sabne, Rudolf Eigenmann:
Comparative analysis of coprocessors. - Yalda Ebadi, Nima Jafari Navimipour:
An energy-aware method for data replication in the cloud environments using a Tabu search and particle swarm optimization algorithm. - Hongzhi Zhao, Yongchang Wang, Ke Xiong, Lihua Song:
An efficient Manhattan-distance-constrained disjoint paths algorithm for incomplete mesh network. - Mostafa Mehrabi, Nasser Giacaman, Oliver Sinnen:
@PT: Unobtrusive parallel programming with Java annotations. - Sukhpal Singh Gill, Inderveer Chana, Maninder Singh, Rajkumar Buyya:
RADAR: Self-configuring and self-healing in resource management for enhancing quality of cloud services. - Edoardo Coronado-Barrientos, Guillermo Indalecio Fernández, Antonio J. García-Loureiro:
AXC: A new format to perform the SpMV oriented to Intel Xeon Phi architecture in OpenCL. - Yasser H. Khalil, Mohammad Alshayeji, Imtiaz Ahmad:
Distributed Whale Optimization Algorithm based on MapReduce. - Yunqi Dong, Wenjun Jiang:
Brand purchase prediction based on time-evolving user behaviors in e-commerce.
Volume 31, Number 2, January 2019
Editorial
- Jesús Escudero-Sahuquillo, Pedro Javier García:
Trends in High-Performance Interconnection Networks in the Exascale and Big-Data Era (HiPINEB 2017).
- Felix Zahn, Steffen Lammel, Holger Fröning:
On link width scaling for energy-proportional direct interconnection networks. - Mariano Benito, Enrique Vallejo, Cruz Izu, Ramón Beivide:
Non-minimal adaptive routing based on explicit congestion notifications. - Francisco J. Andujar, Juan A. Villar, José L. Sánchez, Francisco J. Alfaro, José Duato, Holger Fröning:
Constructing virtual 5-dimensional tori out of lower-dimensional network cards. - Evangelos Tasoulas, Feroz Zahid, Ernst Gunnar Gran, Kyrre M. Begnum, Bjørn Dag Johnsen, Tor Skeie:
Efficient routing and reconfiguration in virtualized HPC environments with vSwitch-enabled lossless networks. - Pedro Yébenes, Jesús Escudero-Sahuquillo, Pedro Javier García, Francisco J. Quiles, Torsten Hoefler:
Head-of-line blocking avoidance in Slim Fly networks using deadlock-free non-minimal and adaptive routing.
- Ladjel Bellatreche, Carson Kai-Sang Leung, Yinglong Xia, Didier El Baz:
Advances in cloud and big data computing.
- Massimo Marchiori:
Learning the way to the cloud: Big Data Park. - Yudith Cardinale, Joyce El Haddad, Maude Manouvrier, Marta Rukoz:
Fuzzy ACID properties for self-adaptive composite cloud services execution. - Ehsan Ghasemi, Paul Chow:
Accelerating Apache Spark with FPGAs. - Thanh-Nghi Do, François Poulet:
Latent-lSVM classification of very high-dimensional and large-scale multi-class datasets. - Jean-Philippe Attal, Maria Malek, Marc Zolghadri:
Parallel and distributed core label propagation with graph coloring. - Hasna Njah, Salma Jamoussi, Walid Mahdi:
Deep Bayesian network architecture for Big Data mining.
Volume 31, Number 3, February 2019
Editorial
- Hai Zhuge, Xiaoping Sun:
Semantics, knowledge, and grids at the age of big data and AI.
- Mehmet S. Aktas, Merve Astekin:
Provenance aware run-time verification of things for self-healing Internet of Things applications. - Suyel Namasudra:
An improved attribute-based encryption technique towards the data security in cloud computing. - Jingqiang Chen, Hai Zhuge:
Automatic generation of related work through summarizing citations. - Sandi Gec, Dragi Kimovski, Uros Pascinski, Radu Prodan, Vlado Stankovski:
Semantic approach for multi-objective optimisation of the ENTICE distributed Virtual Machine and container images repository. - Mohamed Jehad Baeth, Mehmet S. Aktas:
Detecting misinformation in social networks using provenance data. - Zolzaya Dashdorj, Erdenebaatar Altangerel:
High-level event identification in social media. - Yan Wu, Wei Xu, Lu Liu, Dejun Miao:
Performance formula-based optimal deployments of multilevel indices for service retrieval. - Qichen Ma, Xiangfeng Luo, Hai Zhuge:
Finding influential users of web event in social media. - Mirela Riveni, Tien-Dung Nguyen, Mehmet S. Aktas, Schahram Dustdar:
Application of provenance in social computing: A case study. - Juan Yang, Michael S. C. Thomas, Hongtao Liu:
Rule extraction from autoencoder-based connectionist computational models.
Volume 31, Number 4, February 2019
- Tyler Crain, Vincent Gramoli, Michel Raynal:
A speculation-friendly binary search tree. - Jeffrey C. Murphy, Bhargav Shivkumar, Amy Pritchard, Grant Iraci, Dhruv Kumar, Sun Hyoung Kim, Lukasz Ziarek:
A survey of real-time capabilities in functional languages and compilers. - Maosheng Zhang, Ruimin Hu, Lin Jiang:
Three-dimensional sound reproduction in vehicle based on data mining technique. - M. Anand, T. Sasikala, M. Anbarasan:
Energy efficient channel aware multipath routing protocol for mobile ad-hoc network. - A. N. Gnana Jeevan, M. A. Maluk Mohamed:
SOGC: Implementing surrogate object garbage collector management for a Mobile Cloud Environment. - Jun Liu, Xiaoyong Li, Kaijun Ren, Junqiang Song:
Parallelizing uncertain skyline computation against n-of-N data streaming model. - Jingcheng Shen, Kentaro Shigeoka, Fumihiko Ino, Kenichi Hagihara:
GPU-based branch-and-bound method to solve large 0-1 knapsack problems with data-centric strategies. - Ravi Reddy Manumachu, Alexey L. Lastovetsky:
Design of self-adaptable data parallel applications on multicore clusters automatically optimized for performance and energy through load distribution. - Xing Fan, Oliver Sinnen, Nasser Giacaman:
Balancing parallelization and asynchronization in event-driven programs with OpenMP.
Volume 31, Number 5, March 2019
Editorial
- José Daniel García, Diego R. Llanos:
High-level parallel programming in a heterogeneous world.
- Rohit Atre, Zia Ul Huda, Felix Wolf, Ali Jannesari:
Dissecting sequential programs for parallelization - An approach based on computational units. - Ana Moreton-Fernandez, Arturo González-Escribano:
Automatic runtime calculation of communications for data-parallel expressions with periodic conditions. - Ari Rasch, Sergei Gorlatch:
ATF: A generic directive-based auto-tuning framework. - August Ernstsson, Christoph W. Kessler:
Extending smart containers for data locality-aware skeleton programming. - Massimo Torquati, Daniele De Sensi, Gabriele Mencagli, Marco Aldinucci, Marco Danelutto:
Power-aware pipelining with automatic concurrency control. - Anshu S. Anand, R. K. Shyamasundar, Sathya Peri:
STMs in practice: Partial rollback vs pure abort mechanisms. - Miguel Areias, Ricardo Rocha:
Multi-dimensional lock-free arrays for multithreaded mode-directed tabling in Prolog.
Volume 31, Number 6, March 2019
Editorial
- Pablo Ezzatti, Enrique S. Quintana-Ortí, Alfredo Remón, Jens Saak:
Power-aware computing.
- José Ignacio Aliaga, Maria Barreda, M. Asunción Castaño:
Energy-aware strategies for task-parallel sparse linear system solvers. - Hartwig Anzt, Jack J. Dongarra, Goran Flegar, Nicholas J. Higham, Enrique S. Quintana-Ortí:
Adaptive precision in block-Jacobi preconditioning for iterative sparse linear system solvers. - Peter Benner, Ernesto Dufrechou, Pablo Ezzatti, Alfredo Remón, Jens Saak:
A GPU-aware mixed-precision solver for low-rank algebraic Riccati equations. - Madhura Kumaraswamy, Anamika Chowdhury, Michael Gerndt, Zakaria Bendifallah, Othman Bouizi, Uldis Locans, Lubomír Ríha, Ondrej Vysocky, Martin Beseda, Jan Zapletal:
Domain knowledge specification for energy tuning. - Azzam Haidar, Heike Jagode, Phil Vaccaro, Asim YarKhan, Stanimire Tomov, Jack J. Dongarra:
Investigating power capping toward energy-efficient scientific applications. - Martin Köhler, Jens Saak:
Frequency scaling and energy efficiency regarding the Gauss-Jordan elimination scheme with application to the matrix-sign-function on OpenPOWER 8. - Juan José Escobar, Julio Ortega Lopera, Antonio Francisco Díaz, Jesús González, Miguel Damas:
Energy-aware load balancing of parallel evolutionary algorithms with heavy fitness functions in heterogeneous CPU-GPU architectures. - Krzysztof Rojek:
Machine learning method for energy reduction by utilizing dynamic mixed precision on GPU-based supercomputers.
Volume 31, Number 7, April 2019
- Zhihua Jiang, Dongning Rao:
Scalable and optimal planning based on Pregel. - André Luís Barroso Almeida, Leonardo de Souza Cimino, José Estevão Eugênio de Resende, Lucas Henrique Moreira Silva, Samuel Queiroz Souza Rocha, Guilherme Aparecido Gregorio, Gustavo Silva Paiva, Saul E. Delabrida, Haroldo Gambini Santos, Marco Antonio Moreira de Carvalho, André Luiz Lins de Aquino, Joubert de Castro Lima:
A general-purpose distributed computing Java middleware. - Pramod Yelmewad, Basavaraj Talawar:
Parallel iterative hill climbing algorithm to solve TSP on GPU. - M. Anbarasan, S. Prakash, M. Anand, Arokiasamy Antonidoss:
Improving performance in mobile ad hoc networks by reliable path selection routing using RPS-LEACH. - Anshu S. Anand, Akash Srivastava, R. K. Shyamasundar:
A deadlock-free lock-based synchronization for GPUs. - Naman Shah, Matthew Malensek, Harshil Shah, Shrideep Pallickara, Sangmi Lee Pallickara:
Scalable network analytics for characterization of outbreak influence in voluminous epidemiology datasets. - Wen Zeng:
A methodology for cost-benefit analysis of information security technologies. - Raza Abbas Haidri, Chittaranjan Padmanabha Katti, Prem Chandra Saxena:
Cost-effective deadline-aware stochastic scheduling strategy for workflow applications on virtual machines in cloud computing. - Ali A. El-Moursy, Amr Saleh Elhelw:
Adaptive TB-LMI: An efficient memory controller and scheduler design.
- Chuan Sun, Wei Liu, Duanfeng Chu, Wushuang Li, Zhenji Lu, Jianyu Wang:
A novel method of symbolic representation in diving data mining: A case study of highways in China.
Volume 31, Number 8, April 2019
Editorial
- Mohammad Shojafar, Zahra Pooranian, Mehdi Sookhak, Rajkumar Buyya:
Recent advances in cloud data centers toward fog data centers.
- Mohammad Mahdi Tajiki, Behzad Akbari, Nader Mokari, Luca Chiaraviglio:
SDN-based resource allocation in MPLS networks: A hybrid approach. - Qiucheng Miao, Weipeng Jing, Houbing Song:
Differential privacy-based location privacy enhancing in edge computing. - Mohammad Mahdi Tajiki, Mohammad Shojafar, Behzad Akbari, Stefano Salsano, Mauro Conti:
Software defined service function chaining with failure consideration for fog computing. - Mauro Conti, Pallavi Kaliyar, Chhagan Lal:
CENSOR: Cloud-enabled secure IoT architecture over SDN paradigm. - Attiqa Rehman, Syed Sajid Hussain, Zia ur Rehman, Seemal Zia, Shahaboddin Shamshirband:
Multi-objective approach of energy efficient workflow scheduling in cloud environments. - Anum Khurshid, Abdul Nasir Khan, Fiaz Gul Khan, Mazhar Ali, Junaid Shuja, Atta ur Rehman Khan:
Secure-CamFlow: A device-oriented security model to assist information flow control systems in cloud environments for IoTs. - Adnan Khalid, Muhammad Shahbaz, Imran Ahmed Khan:
Intelligent use of fog devices in edge-cloud paradigm to assist in E-polling. - Mahboobeh Haghparast, Noorhidawati Abdullah, Fariza Hanum Nasaruddin:
Fog learning for cultivating critical thinking in information seeking process. - Nader Sohrabi Safa, Carsten Maple, Mahboobeh Haghparast, Tim Watson, Mehrdad Dianati:
An opportunistic resource management model to overcome resource-constraint in the Internet of Things.
Volume 31, Number 9, May 2019
Editorial
- Lin Mei, Zhiguo Yan, Jie Shao:
Special issue on multimodal information learning and analytics on cross-media big data.
- Yuanchao Zhang, Jingwei Gao, Qiao Li:
Study on tire-ice traction using a combined neural network and secondary development finite element modeling method. - Qinghua Wu, Zhixin Zhu, Xuesong Yan, Wenyin Gong:
An improved particle swarm optimization algorithm for AVO elastic parameter inversion problem. - Guang Yang, Shuofeng Yu:
Synthesized fault diagnosis method reasoned from rough set-neural network and evidence theory. - Xinwei Zhang, Shaohua Dong, Yanhui Liu:
p-hub median location optimization of hub-and-spoke air transport networks in express enterprise. - Xiang Yong, Cui Yan, Weiyao, Xu Qiang:
A study on the construction of evaluative system of Smart City based on entropy-weighted matter-element model method. - Qiansheng Zhao, Zi Chen, Chang Liu, Nianxue Luo:
Extracting and classifying typhoon disaster information based on volunteered geographic information from Chinese Sina microblog. - Yan Wang, Mengnan Wu:
A novel systematic algorithm paradigm for the electric vehicle data anomaly detection based on association data mining. - Jian Ji, Chuanchao Huang, Ya Cao, Sen Hu:
The network structure of Chinese finance market through the method of complex network and random matrix theory. - Yan Zhang, Haitao Pu:
Environmental indicators of sustainable computing applications for Smart City. - Xu Guo:
Performance analysis of Israeli-Jalfon's algorithm using probabilistic model checking. - Xi'na Ma, Jingyuan Zhao, Peng Guo:
The urban computing on the distribution of inhalable particulate matters to Smart City-based residential groups. - Wenhao Xie, Gongqian Liang, Qiao Guo:
A new improved FSVM algorithm based on SVDD. - Zejun Li, Jingjing Wang, Zhongheng Shi, Yan Zou:
Relieve the congestion by shuttle bus in rush hours using aggregation clustering algorithm on group travel pattern. - Zhipeng Lv, Ming Wu, Lan Liu, Haitao Liu, Zhenhao Song, Lijing Sun:
Energy router with virtual inertia control schemes and concurrency operation. - Bo Yang:
Analysis on profit model of multi-information products logistics using evolutionary game algorithm. - Guo Yue, Getachew Nathan Girma:
Research on the mass media effects to the learning efficiency based on social agents. - Qian Guo:
Research on index weight of logistics integration based on cloud models. - Cheng Wang, Zhuo Hu, Ming Xie, Yuxiang Bian:
Sustainable facility location-allocation problem under uncertainty. - Juan Li, Bin Chen:
Modeling for information spreading basing on dynamics. - Zhanjun Liu, Zhaoyi Li, Yuxia Cheng, Xiaoge Huang, Qianbin Chen:
A full-duplex relay selection strategy based on potential game in cognitive cooperative networks. - Qingguo Shen, Qinghua Chen, Jing Gong, Feng Zhou:
Networking of multi-domain unified communications systems: Structure design and performance evaluation. - Hong Chen, WenZhe Hu:
Research on exchange rate pass-through effect based on artificial intelligence approach.
Volume 31, Number 10, May 2019
Special Issue Papers
- Mohamed Abdel-Basset, Gunasekaran Manogaran, Mai Mohamed, Ehab Rushdy:
Internet of things in smart education environment: Supportive framework in the decision-making process. - Bi Zhang, Wei Li:
Intelligent air quality detection based on genetic algorithm and neural network: An urban China case study. - Ge Ke, Qijie Jiang:
Application of Internet of Things technology in the construction of wisdom museum. - Shunli Zhang, Guohua Geng, Jian Zhao:
Fast parallel image reconstruction for cone-beam FDK algorithm. - Liqiang Gao, Xiong Hu, Wei Liu, Dejian Sun:
Study on wear mechanism of gear pump end plate of combined harvester based on CFD fluid analysis. - Wenqi Liu, Mingyu Fan, Guangwei Wang:
Adaptive flow abnormity identification based on information entropy. - Bin Li, Jian Li, Shilin Yan, Linfeng Ju, Xu He:
Impacts of porous material fluid bulk properties on noise attenuation performance of cylinder shell structure based on finite element model. - Yu-Long Zhou, Ren-Jie Han, Qian Xu, Qi-Jie Jiang, Wei-Ke Zhang:
Long short-term memory networks for CSI300 volatility prediction with Baidu search volume. - Lunlong Zhong, Zhongjun Qu, Félix Mora-Camino:
A model-based flight qualities evaluation approach for civil aircraft. - Zigang Lu, Zhinong Wei, Yonghui Sun:
Power system dynamic state estimation considering correlation of measurement error from PMU and SCADA. - Xiao-Yi Li, Jiaqi Li, Xiaolin Tian:
A suspected lunar volcano identification algorithm based on convolutional neural network by the rapid location of light shadow impacts. - Wangshu Su, Jinzheng Ren:
Risk propagation model based on social life and credit activities multilayers fusion network. - Danwen Bao, Zhiwei Di, Tianxuan Zhang:
A reliability-based method for optimizing airport collection and distribution network. - Xi Chen, Xin Li, Zhenzhen Huang:
Exploration of power consumption monitoring based on Internet of things. - Xiaofei Li, Da Li:
Study on the public intention for environmental protection based on social network. - Kehong Li, Yadong Zhang, Jin Guo, Xiaocheng Ge, Yuebin Su:
System dynamics model for high-speed railway operation safety supervision system based on evolutionary game theory. - Hong-chao Ding, Min-rong Lian, Xue-Ying Chen, Jia-Ming Liu, Zu-Chang Zhong, Yu-fan Zhang, Min-yao Zhou:
Research on the correlation of port logistics and regional economic growth base on gray relational analysis method. - Jian Qiao, Qinghua Lu, Wenbao Zhang, Xiangyao Xue:
The research about micromachining accuracy control based on fuzzy evaluation algorithm. - Xiao-Qin Liu, Qiu-Lin Wu, Wen-Tsao Pan:
Sentiment classification of micro-blog comments based on Randomforest algorithm. - Yong Xie, Huiming Su:
Research on the application of cloud computing mode in athletes' technical movement capture. - Yina Sun, Fanhe Zhu, Weimin Dai:
Acquisition of transgenic salt-tolerant upland rice based on genetic algorithm and its resistance. - Zhang Bochen:
Research on the integration of photographic images and photography art based on 3D virtual reality technology. - Mei-Ling He, Qijie Jiang, Zheng Hong:
Mathematical analysis of financial decentralization and economic efficiency in both state-owned and private enterprises. - Ke Niu, Weining Fang, Beiyuan Guo:
A team task complexity measure for emergency procedures in fully automatic metro. - Chong Wu, Yanlei Yin, Xuemei Yang, Lijuan Feng, Haixia Tang, Jihan Tao:
A Markov-based model for predicting the development trend of soil microbial communities in saline-alkali land in Wudi County. - Tao Gu, Lijun Song, Hua Wang, Maozhu Jin:
Key analysis of smart tourism project setting and tourists' satisfaction degree based on data mining. - Chensi Yu, Wei Zha:
Detection and application of breaking of automobile mechanical transmission rod based on ant colony algorithm. - Saurabh Mathur, Daphne Lopez:
A scaled-down neural conversational model for chatbots. - Hejun Liang, Lily Sun:
Improve cloud manufacturing supply chain note-enterprises optimize combination of the Cuckoo search. - Junjian Tang, Shunli Hao, Wenqi Qu:
Sentiment analysis of online Chinese comments based on statistical learning combining with pattern matching. - Jinbo Chen, Ye Huang, Pengxiao Xia, Yuying Zhang, Yu Zhong:
Design and implementation of real-time traceability monitoring system for agricultural products supply chain under Internet of Things architecture. - Feihong Xu:
Accurate measurement of structural vibration based on digital image processing technology. - Weipeng Zhang, Ying Xu, Chanti Wu:
Comparative study of PLS path algorithm in water utilization rate of sponge city. - Yunlu Gong, Nannan Lu, Jiajian Zhang:
Application of deep learning fusion algorithm in natural language processing in emotional semantic analysis. - Wei Yu, Shijun Li:
Research on financial data analysis based on data mining algorithm. - Litao Guo, Xiaofeng Guo:
A new kind of parameter for fault tolerance of graphs. - Dapeng Zhu:
Digital generation of non-Gaussian random vibration signals in railway transportation and package response analysis. - Dongsheng Wang, Chuanhe Huang:
Distributed cache memory data migration strategy based on cloud computing. - Rong Lu, Fengshan Ma, Jie Guo, Haijun Zhao:
Analysis and monitoring of roadway deformation mechanisms in nickel mine, China. - Yeqin Wang, Zhen Wu, Aoyun Xia, Chang Guo, Yuyan Chen, Yan Yang, Zhongyi Tang:
Energy management strategy for HEV based on KFCM and neural network. - Zhigang Yan, Jiazheng Han, Jieqing Yu, Yuanxuan Yang:
Water inrush sources monitoring and identification based on mine IoT. - Wenting Chen, Qian Zhang, Maozhu Jin, Jie Yang:
Research on online consumer behavior and psychology under the background of big data. - Delu Li:
Study on control strategy and application of a new harmonic detection method in three-phase four-wire APF. - Zhewei Zhang, Tao Jing, Chunhua Tian, Meilin Gao, Xuejing Li:
Hybrid context modeling and wavelet transform for region of interest detection and rate control based on VP9 video codec. - Chenxi Zeng:
Optimal resource allocation in mobile satellite networks: A noncooperative dynamic game-based approach. - Yu Jiang, Hua Zhu, Reza Malekian, Cong Ding:
An improved quantitative recurrence analysis using artificial intelligence based image processing applied to sensor measurements. - Tingting Luo, Guangyao Li, Naijiang Yu:
Research on manufacturing productivity based on improved genetic algorithms under internet information technology. - Fei Wang, Yi Hong, Cong Xu:
PPLTCAM: A parallel TCAM-based IP address lookup structure with high incremental update performance. - Xia Lin, Qingjia Huang, Fei Bai, Dun Jin, Wei Lu, Hongbing Tao:
Study on the posts and performance evaluation model of inpatients in public hospitals based on .NET platform DRGs payment mode. - Pengfei Li, Hongyun Chen, Shangshang Wang, Zhipeng Xu, Zhenyu Lei:
Research on dynamic optimal control strategy of distributed super capacitor energy storage system based on convolution neural network. - Liangxu Liu, Zhenghua Hu, Chaolan Zhou, Guohu Xu:
Research on the clustering algorithm of the bicycle stations based on OPTICS. - Yuxue Li, Lijun Song, Yucheng Zeng:
Research on information security and privacy protection model based on consumer behavior in big data environment. - Jing Jia, Geng Tu, Xin Deng, Chuchu Zhao, Wenlong Yi:
Real-time hand gestures system based on leap motion. - Dapeng Bao:
Exploration of virtual human running based on CCD algorithm. - Yan Huang, Yadong Huang:
Informatization design of raw material purchase and payment for feed processing enterprises under ERP system environment.
Volume 31, Number 11, June 2019
- Rafael Keller Tesser, Lucas Mello Schnorr, Arnaud Legrand, Franz Christian Heinrich, Fabrice Dupros, Philippe O. A. Navaux:
Performance modeling of a geophysics application to accelerate over-decomposition parameter tuning through simulation. - Bing Yang, Kenneth B. Kent, Eric Aubanel, Stephen A. MacKay, Tobi Agila:
A multi-granularity locking scheme for java packedobjects based on a concurrent multiway tree. - Gianpaolo Coro, Marco Palma, Anton Ellenbroek, Giancarlo Panichi, Thiviya Nair, Pasquale Pagano:
Reconstructing 3D virtual environments within a collaborative e-infrastructure. - Fangliang Xu, Yijie Wang, Xiaoqiang Pei, Xingkong Ma:
LAR: Locality-Aware Reconstruction for erasure-coded distributed storage systems. - Marco Antonio C. de Figueiredo, Edans Flavius de Oliveira Sandes, Genaína Nunes Rodrigues, George Luiz Medeiros Teodoro, Alba Cristina Magalhaes Alves de Melo:
MASA-OpenCL: Parallel pruned comparison of long DNA sequences with OpenCL. - Dandong Yin, Yan Liu, Hao Hu, Jeff Terstriep, Xingchen Hong, Anand Padmanabhan, Shaowen Wang:
CyberGIS-Jupyter for reproducible and scalable geospatial analytics. - Wai-Kong Lee, Bok-Min Goi, Raphael C.-W. Phan:
Terabit encryption in a second: Performance evaluation of block ciphers in GPU with Kepler, Maxwell, and Pascal architectures. - Jason W. Woodworth, Mohsen Amini Salehi:
S3BD: Secure semantic search over encrypted big data in the cloud. - Haiyang Yu, Yongquan Cai, Richard O. Sinnott, Zhen Yang:
ID-based dynamic replicated data auditing for the cloud. - Ashish Kumar Maurya, Anil Kumar Tripathi:
An edge priority-based clustering algorithm for multiprocessor environments.
Volume 31, Number 12, June 2019
Special Issue Papers
- Jingmei Li, Qiao Tian, Fangyuan Zheng, Weifei Wu, Jiaxiang Wang:
Research on parallel solution of GRAPES Helmholtz equation. - A. Senthil Selvi, R. Sukumar:
Removal of salt and pepper noise from images using hybrid filter (HF) and fuzzy logic noise detector (FLND). - V. Sujitha, D. Chitra:
Highly secure palmprint based biometric template using fuzzy vault. - Qing Yang, Zhong Yang, Tianyi Zhang, Guoxiong Hu:
A random chemical reaction optimization algorithm based on dual containers strategy for multi-rotor UAV path planning in transmission line inspection. - Qin Yang:
A robust recommended system based on attack detection. - Weiguang Li, Wang Wei, Qiang Han, Mingquan Shi:
Collaborating visual tracker based on particle filter and correlation filter. - Yaqin Liu, Xinxing Luo:
C2C interaction quality identification with SVM based on Kano model. - Jinyu Du, Jiayu Yi, Zhongming Yang, Yi Yu, Bo Tu, Xiangchao An:
Theoretical and experimental study on the astigmatism self-compensation in multi-disk laser resonator based on exhaustive method. - Zhaojun Tang, Chuandong Li:
Tracking control with event-triggered strategy for multi-agent systems with noises. - (Withdrawn) Study on measurement reliability based on Liu estimator.
- (Withdrawn) Evaluation of the predictive performance of the principal component two-parameter estimator.
- Xijun Ye, Bingcong Chen:
Model updating and variability analysis of modal parameters for super high-rise structure. - (Withdrawn) The mechanism and experimental study on the interference of high voltage lines to navigation system.
- Jiaoying Huang, Daming Yang, Cheng Gao, Chengcheng Fu:
A PCA and Mahalanobis distance-based detection method for logical hardware Trojan. - Kun Wang, Wei Wang, Xiong Yan:
Effect of hole on sound absorption coefficient of micro-perforated panels investigated by Melling computing. - Nisha Soms, P. Malathi:
Secured and anonymous data transmission in Manet environment using zone-based intrusion detection system. - Venkat Vignesh, K. Premalatha:
Channel load based interference-aware scheduling in military communication environment. - N. Suresh Kumar, Paramasivam K:
Energy efficient low-power full-adder by 65 nm CMOS technology in ALU. - Ming He:
Distinguish computer generated and digital images: A CNN solution. - Tichun Wang, Changsheng Tong, Sheng-hu Yao:
An improved prediction algorithm of seamless tubing corrosion based on an extension neural network. - Cheng Gao, Rui Zhang, Jiaoying Huang, Chengcheng Fu:
Study of single event transient induced by heavy-ion in NMOS transistor and CMOS inverter. - Sheping Zhai:
Distance variety preserving hashing for large-scale retrieval. - Fan Yang, Limei Yan, Jianjun Xu, Hongyu Li:
Analysis of an optimal PMU configuration method based on incomplete observation. - Kaijun Wu, Yu Chao, Dicong Wang:
The dynamics behaviors of Chay neuron model under different parameters. - Jing Zhao, Jianqi Liu, Zhenting Zhao, Miao Xin, Yu Chen:
A high-performance maintenance strategy for stochastic selective maintenance. - Kanimozhi Sakthivel, Arputharaj Kannan, K. SuganyaDevi, Selvamani Kadirvelu:
Secure cloud-based e-learning system with access control and group key mechanism. - S. Raja Shree, A. Chilambu Chelvan, M. Rajesh:
An efficient RSA cryptosystem by applying cuckoo search optimization algorithm. - G. S. Satheesh Kumar, C. Nagarajan:
Design and implementation of intelligent energy control for tariff management using multi-agent system in smart/micro grid. - Hejun Zhu, Liehuang Zhu:
Online and automatic identification of encryption network behaviors in big data environment. - Akila K, S. Chitrakala:
An efficient method to resolve intraclass variability using highly refined HOG description model for human action recognition. - T. Karthick, M. Manikandan:
Fog assisted IoT based medical cyber system for cardiovascular diseases affected patients. - Velumadhava Rajasekaran, Selvamani Kadirvelu, Kanimozhi Sakthivel, Arputharaj Kannan:
Hierarchical group key management for secure data sharing in a cloud-based environment. - P. C. Prabhu Kumar, G. Geetha:
Web-cloud architecture levels and optimized MQTT and COAP protocol suites for web of things. - Nalini Subramanian, J. Andrews:
Strong authentication framework using statistical approach for cloud environments. - P. Sundara Vadivel, D. Yuvaraj, S. Navaneetha Krishnan, S. R. Mathusudhanan:
An efficient CBIR system based on color histogram, edge, and texture features.
- (Withdrawn) Retracted: A hybrid feature selection algorithm for microarray data.
Volume 31, Number 13, July 2019
- Tatiana Pereira Filgueiras, Leonardo M. Rodrigues, Luciana de Oliveira Rech, Luciana Moreira Sá de Souza, Hylson Vescovi Netto:
RT-JADE: A preemptive real-time scheduling middleware for mobile agents. - Mohammad Mosleh:
A novel design of multiplexer based on nano-scale quantum-dot cellular automata. - Fred G. Gustavson, David W. Walker:
Algorithms for in-place matrix transposition. - Fredrik Robertsen, Keijo Mattila, Jan Westerholm:
High-performance SIMD implementation of the lattice-Boltzmann method on the Xeon Phi processor. - Mohamed Moussaoui, Montaceur Zaghdoud, Jalel Akaichi:
A possibilistic framework for the detection of terrorism-related Twitter communities in social media. - Mahdi Hajiali, Maryam Amirmazlaghani, Hossain Kordestani:
Preventing phishing attacks using text and image watermarking. - Isil Öz, Haluk Rahmi Topcuoglu, Oguz Tosun:
A user-assisted thread-level vulnerability assessment tool. - Junchang Wang, Tao Li, Xiong Fu:
Accurate counting algorithm for high-speed parallel applications. - Karthick Seshadri, K. Viswanathan Iyer, Mercy Shalinie Selvaraj:
Design and evaluation of a parallel document clustering algorithm based on hierarchical latent semantic analysis. - Richard E. Kavanagh, Karim Djemame:
Rapid and accurate energy models through calibration with IPMI and RAPL.
Volume 31, Number 14, July 2019
- S. Sakthitharan, S. Jayashri:
Establishing an emergency communication network and optimal path using multiple autonomous rover robots. - R. Poovendran, S. Sumathi:
An area-efficient low-power SCM topology for high performance network-on Chip (NoC) architecture using an optimized routing design. - N. Suresh Kumar, M. Thangamani:
Parallel Semi-supervised enhanced fuzzy Co-Clustering (PSEFC) and Rapid Association Rule Mining (RARM) based frequent route mining algorithm for travel sequence recommendation on big social media. - S. Kanithan, G. M. Tamilselvan:
A novel enhanced bat optimization based energy efficiency and imperfect channel state information in cooperative MIMO-AF systems. - Gayathiri N. R., Natarajan A. M.:
MapReduce-based storage and indexing for big health data. - A. Maria Jossy, T. Vigneswaran, S. Malarvizhi, K. K. Nagarajan:
Characterization and modeling of dual material double gate tunnel field effect transistor using superposition approximation method. - Kavitha Balamurugan, K. Chitra, A. Jawahar:
Reconfigurable routing protocol with optical sphere in FSO MANET. - N. Nirmala, S. Sumathi:
An area-efficient FFT processor for the OFDMA transceiver communication system. - S. Deva priya, N. Kannan:
Enhanced spectrum aggregation based frequency-band selection routing protocol for cognitive radio ad-hoc networks. - Sundar Suvitha, J. Magdalene Mathana:
A novel automated MOALO algorithm aided RF low-noise amplifier design for wireless applications. - P. Bhuvaneswari, L. Nithyanandan:
Improving energy efficiency in LTE-A networks with the reduction of failure rate in eNB components. - Subramanian Maruthathurai Vijayarajan, P. Jaganathan:
A novel comparative study on breast cancer detection using different types of classification techniques. - R. Arun Sekar, S. Sasipriya:
Implementation of FIR filter using reversible modified carry select adder. - P. J. A. Alphonse, Venkatramana Reddy Y:
Scalable and secure group key agreement for wireless ad-hoc networks by extending RSA scheme. - Kaliram Perumal, Suganthi Muthusamy, Gowrison Gengavel:
Sparse data encoder and decoder to improve security in video steganography. - N. V. Shibu, P. Malathi:
Accurate and reliable reversible data hiding using sequential encoding techniques. - Michael Angelo Kandavalli, S. Abraham Lincon:
Design and implementation of colour texture-based multiple object detection using morphological gradient approach. - S. Gayathri Devi, M. Sabrigiriraj:
A hybrid multi-objective firefly and simulated annealing based algorithm for big data classification. - S. Shanmugapriya, A. Valarmathi, D. Yuvaraj:
The personal authentication service and security enhancement for optimal strong password. - R. Kanthavel, J. Banumathi, R. Dhaya, Fahad Algarni:
On demand knowledge-based memory-aided rebroadcast algorithm for multimedia voice data transmission in MANET. - M. Maragatharajan, Bala Subramanian Chokkalingam, S. P. Balakannan:
A secured MANET using position-based opportunistic routing and SEMI MARKOV process. - J. P. Nivash, L. D. Dhinesh Babu:
Analyzing the impact of news trends on research publications and scientific collaboration networks. - R. Mohanapriya, K. B. Jayanthi:
Performance improvement in vertical heterogeneous handoff methodology using CANFIS classification approaches. - R. Geetha Ramani, K. Priya:
Improvised emotion and genre detection for songs through signal processing and genetic algorithm. - Poonguzhali Ilango, Arun Chokkalingam:
A Novel Architecture of Modified Turbo Codes with an area efficient high speed interleaver. - V. Sakthivelmurugan, R. Vimala, K. R. Aravind Britto:
Magnum opus of an efficient hospitality technique for load balancing in cloud environment. - Mallikarjun M. Kodabagi, Ahelam Mainoddin Tikotikar:
Clustering-based approach for medical data classification. - M. Samayaraj Murali Kishanlal, A. Jawahar:
Enabling internal methods in passive optical network architecture for next generation OFDM-PON supporting radio-over-fiber. - Ramayanam Suresh, A. Nagaraja Rao, B. Eswara Reddy:
Detection and classification of normal and abnormal patterns in mammograms using deep neural network. - S. Poongodi, M. Rajesh Babu:
Analysis of crop suitability using clustering technique in Coimbatore region of Tamil Nadu. - Zisang Xu, Cheng Xu, Haixian Chen, Fang Yang:
A lightweight anonymous mutual authentication and key agreement scheme for WBAN. - M. A. Mukunthan, S. Selvakumar:
Multilevel Petri net-based ticket assignment and IT management for improved IT organization support. - P. Priya Ponnuswamy, R. Vidhya Priya, C. P. Shabari Ram:
File retrieval and storage in the open source cloud tool using digital bipartite and digit compact prefix indexing method. - V. Sudarsan, Rajendran Sugumar:
Building a distributed K-Means model for Weka using remote method invocation (RMI) feature of Java.
Volume 31, Number 15, August 2019
- Marcos Amaris, Giorgio Lucarelli, Clément Mommessin, Denis Trystram:
Generic algorithms for scheduling applications on heterogeneous platforms. - Yan Yao, Jian Cao, Shiyou Qian, Shanshan Feng:
Decentralized executions of privacy awareness data analytics workflows in the cloud. - Sparsh Mittal, Venkat Mattela:
A survey of techniques for improving efficiency of mobile web browsing. - Rohit Handa, C. Rama Krishna, Naveen Aggarwal:
Document clustering for efficient and secure information retrieval from cloud. - Raoudha Ben Djemaa, Hajer Nabli, Ikram Amous Ben Amor:
Enhanced semantic similarity measure based on two-level retrieval model. - Rong Gu, Chongjie Li, Peng Shu, Chunfeng Yuan, Yihua Huang:
Adaptive cache policy scheduling for big data applications on distributed tiered storage system. - A. Murat Yagci, Tevfik Aytekin, Fikret S. Gürgen:
Parallel pairwise learning to rank for collaborative filtering. - Thankaraja Raja Sree, Somasundaram Mary Saira Bhanu:
Secure logging scheme for forensic analysis in cloud. - Demis Gomes, Guto Leoni Santos, Daniel Rosendo, Glauco Estácio Gonçalves, André L. C. Moreira, Judith Kelner, Djamel Sadok, Patricia Takako Endo:
Measuring the impact of data center failures on a cloud-based emergency medical call system. - Beytullah Yildiz, Kesheng Wu, Suren Byna, Arie Shoshani:
Parallel membership queries on very large scientific data sets using bitmap indexes. - Pengfei Wang, Jens Krinke, Xu Zhou, Kai Lu:
AVPredictor: Comprehensive prediction and detection of atomicity violations. - Eman AbdElhalim, Marwa Ismael Obayya, Sherif S. Kishk:
Distributed Fog-to-Cloud computing system: A minority game approach. - K. Saravanakumar, R. Rajeswari:
Microbial fuel cell-based self-powered biosensor for environment monitoring in IoT cloud framework. - Xiaoling Li, Xiaoyong Li, Yusong Tan, Hao Zhu, Shuang Tan:
Multi-resource workload mapping with minimum cost in cloud environment.
Volume 31, Number 16, August 2019
Editorial
- Abhinav Thota, Yun He:
Special Issue of the Cray User Group (CUG 2018).
- Douglas M. Jacobsen, Randy Kleinman, Harold Longley:
Managing a Cray supercomputer as a git branch. - Alex Kristiansen:
Use of the ERD for administrative monitoring of Theta. - Scott A. Lathrop, Celso L. Mendes, Jeremy Enos, Brett M. Bode, Gregory H. Bauer, Roberto Sisneros, William T. Kramer:
Best practices for management and operation of large HPC installations. - JaeHyuk Kwack, Galen Arnold, Celso L. Mendes, Gregory H. Bauer:
Roofline analysis with Cray performance analysis tools (CrayPat) and roofline-based performance projections for a future architecture. - Brandon Cook, Thorsten Kurth, Jack Deslippe, Pierre Carrier, Nick Hill, Nathan Wichmann:
Eigensolver performance comparison on Cray XC systems. - Simon McIntosh-Smith, James Price, Tom Deakin, Andrei Poenaru:
A performance analysis of the first generation of HPC-optimized Arm processors. - Verónica G. Vergara Larrea, Michael J. Brim, Wayne Joubert, Swen Boehm, Matthew B. Baker, Oscar R. Hernandez, Sarp Oral, James Simmons, Don Maxwell:
Are we witnessing the spectre of an HPC meltdown? - Andreas Jocksch, Matthias Kraushaar, David Daverio:
Optimized all-to-all communication on multicore architectures applied to FFTs with pencil decomposition. - Nick Brown, Michael R. Bareford, Michèle Weiland:
Leveraging MPI RMA to optimize halo-swapping communications in MONC on Cray machines. - Thorsten Kurth, Mikhail Smorkalov, Peter Mendygral, Srinivas Sridharan, Amrita Mathuriya:
TensorFlow at Scale: Performance and productivity analysis of distributed training with Horovod, MLSL, and Cray PE ML. - Alexander Heye:
Scaling deep learning without increasing batchsize. - Alex Gittens, Kai Rothauge, Shusen Wang, Michael W. Mahoney, Jey Kottalam, Lisa Gerhardt, Prabhat, Michael F. Ringenburg, Kristyn J. Maschhoff:
Alchemist: An Apache Spark ⇔ MPI interface. - Jonathan Sparks:
Enabling Docker for HPC.
- Maytal Dahan, Paul A. Navrátil:
Special issue XSEDE16 & PEARC17 - Practice and experience in advanced research computing.
- Hao Hu, Dandong Yin, Yan Y. Liu, Jeff Terstriep, Xingchen Hong, Jeff Wendel, Shaowen Wang:
TopoLens: Building a CyberGIS community data service for enhancing the usability of high-resolution national topographic datasets. - David Y. Hancock, Craig A. Stewart, Matthew Vaughn, Jeremy Fischer, John Michael Lowe, George W. Turner, Tyson Lee Swetnam, Tyler K. Chafin, Enis Afgan, Marlon E. Pierce, Winona Snapp-Childs:
Jetstream - Early operations performance, adoption, and impacts. - Feng Li, Fengguang Song:
Building a scientific workflow framework to enable real-time machine learning and visualization.
Volume 31, Number 17, September 2019
- Prema Soundararajan, Rupesh Nasre, R. Jehadeesan, B. K. Panigrahi:
A study on popular auto-parallelization frameworks. - Xianqian Zhou, Liyuan Fang, HaiMing Xie, Wanchun Jiang:
TAP: Timeliness-aware predication-based replica selection algorithm for key-value stores. - Namom Alencar, Angelo Brayner, José Maria Monteiro, José de Aguiar Moraes Filho:
DaC-Join: A join operator for improving database performance on modern hardware. - Xiaojun Zhai, Abbes Amira, Faycal Bensaali, AlMaha Al-Shibani, Asma Al-Nassr, Asmaa El-Sayed, Mohammad Eslami, Sarada Prasad Dakua, Julien Abinahed:
Zynq SoC based acceleration of the lattice Boltzmann method. - Karzan Wakil, Arshad Badfar, Pooyan Dehghani, Seyed Mojtaba Shoja Sadati, Nima Jafari Navimipour:
A fuzzy logic-based method for solving the scheduling problem in the cloud environments using a non-dominated sorted algorithm. - Einollah Jafarnejad Ghomi, Amir Masoud Rahmani, Nooruldeen Nasih Qader:
Applying queue theory for modeling of cloud computing: A systematic review. - Shashank Gupta, Monika Sharma, Dhrub Kumar:
SEC-H5: Secure and efficient integration of settings of enhanced HTML5 XSS vector defensive framework on edge network of fog nodes. - Mala Kalra, Sarbjeet Singh:
Multi-criteria workflow scheduling on clouds under deadline and budget constraints. - Gang Tian, Qibo Wang, Jian Wang, Keqing He, Weidong Zhao, Panpan Gao, Yanjun Peng:
Leveraging contextual information for cold-start Web service recommendation. - Adam S. Z. Belloum, Spiros Koulouzis, Tomasz Wiktorski, Andrea Manieri:
Bridging the demand and the offer in data science. - Rohit Handa, C. Rama Krishna, Naveen Aggarwal:
Searchable encryption: A survey on privacy-preserving search schemes on encrypted outsourced data. - Hari Singh, Seema Bawa:
An improved integrated Grid and MapReduce-Hadoop architecture for spatial data: Hilbert TGS R-Tree-based IGSIM. - Kang Yang, Hongye He, Kamal Al-Sabahi, Zuping Zhang:
EcForest: Extractive document summarization through enhanced sentence embedding and cascade forest. - Nileshchandra K. Pikle, Shailesh R. Sathe, Arvind Y. Vyavahare:
Accelerating the finite element analysis of functionally graded materials using fixed-grid strategy on CUDA-enabled GPUs. - Wanfeng Dou, Yanan Li, Yanli Wang:
An equal-area triangulated partition method for parallel Xdraw viewshed analysis. - Chuan Xu, Zhenzhen Han, Qianyun Wang, Guofeng Zhao, Shui Yu:
Modelling the impact of interference on the energy efficiency of WLANs. - Vahideh Panahi, Nima Jafari Navimipour:
Join query optimization in the distributed database system using an artificial bee colony algorithm and genetic operators. - Shashikant Ilager, Kotagiri Ramamohanarao, Rajkumar Buyya:
ETAS: Energy and thermal-aware dynamic virtual machine consolidation in cloud data center with proactive hotspot mitigation. - Olivier Valery, Pangfeng Liu, Jan-Jan Wu:
A collaborative CPU-GPU approach for deep learning on mobile devices. - Paul Margheritta, Michel R. Dagenais:
LTTng-HSA: Bringing LTTng tracing to HSA-based GPU runtimes. - A. Anasuya Threse Innocent, K. Sangeeta, G. Prakash:
Universal gates on garbled circuit construction. - Feng Yao, Yiping Yao, Huangke Chen, Tianlin Li, Menglong Lin, Xiaoxiong Zhang:
An efficient virtual machine allocation algorithm for parallel and distributed simulation applications. - Elham Azhir, Nima Jafari Navimipour, Mehdi Hosseinzadeh, Arash Sharifi, Aso Mohammad Darwesh:
Deterministic and non-deterministic query optimization techniques in the cloud computing. - Swati Gupta, Isha Agarwal, Ravi Shankar Singh:
Workflow scheduling using Jaya algorithm in cloud. - David W. Walker, Stephan C. Kramer, Fabian R. A. Biebl, Paul D. Ledger, Malcolm Brown:
Accelerating magnetic induction tomography-based imaging through heterogeneous parallel computing. - Xiaole Li, Hua Wang, Shanwen Yi, Linbo Zhai:
Cost-efficient disaster backup for multiple data centers using capacity-constrained multicast. - Le Luo, Yi Liu:
Improving parallel efficiency for asynchronous graph analytics using Gauss-Seidel-based matrix computation. - Yashuang Mu, Xiaodong Liu, Lidong Wang, Aamer Bilal Asghar:
A parallel tree node splitting criterion for fuzzy decision trees. - Dengao Li, Zheng Wei, Jumin Zhao, Junbing Cheng, Zhiying Ma:
Integrated positioning algorithm based on GPS/WLAN. - Arturo Téllez-Velázquez, Raúl Cruz-Barbosa:
A Spark image processing toolkit. - Hoang Pham, Jason Woodworth, Mohsen Amini Salehi:
Survey on secure search over encrypted data on the cloud. - Ali Pourghaffari, Morteza Barari, Saeed Sedighian Kashi:
An efficient method for allocating resources in a cloud computing environment with a load balancing approach.
Volume 31, Number 18, September 2019
Editorial
- Cristina Boeres, Cristiana Bentes, Edward D. Moreno:
New advances in high-performance computing systems.
- Mateus Ferreira e Freitas, Daniel Xavier de Sousa, Wellington S. Martins, Thierson Couto Rosa, Rodrigo M. Silva, Marcos André Gonçalves:
Parallel rule-based selective sampling and on-demand learning to rank. - Rommel Anatoli Quintanilla Cruz, Cristiana Bentes, Bernardo B. Labronici, Eduardo C. Vasconcellos, Esteban Clua, Pablo Carvalho, Lúcia M. A. Drummond:
Maximizing the GPU resource usage by reordering concurrent kernels submission. - Pablo J. Pavan, Ricardo K. Lorenzoni, Vinícius R. Machado, Jean Luca Bez, Edson L. Padoin, Francieli Zanon Boito, Philippe O. A. Navaux, Jean-François Méhaut:
Energy efficiency and I/O performance of low-power architectures. - Gustavo Portella, Genaína Nunes Rodrigues, Eduardo Yoshio Nakano, Alba C. M. A. Melo:
Statistical analysis of Amazon EC2 cloud pricing models. - Leandro A. J. Marzulo, Alexandre da Costa Sena, Alexandre Solon Nery, Cristiana Bentes, Igor Machado Coelho, Maria Clicia Stelling de Castro, Saulo T. Oliveira, Tiago A. O. Alves, Felipe M. G. França:
DTM@GPU: Characterizing and evaluating trace redundancy in GPU. - Leandro Rouberte, Alexandre da Costa Sena, Alexandre Solon Nery, Leandro A. J. Marzulo, Tiago A. O. Alves, Felipe M. G. França:
DF-DTM: Dynamic Task Memoization and reuse in dataflow. - Thiago Carrijo Nasciutti, Jairo Panetta, Pedro Pais Lopes:
Evaluating optimizations that reduce global memory accesses of stencil computations in GPGPUs.
- César A. F. De Rose, Márcio Castro:
Foreword to the special issue of the workshop on high performance computing systems (XVIII Simpósio em Sistemas Computacionais de Alto Desempenho, WSCAD 2017).
- Antonio Guimarães, Diego de Freitas Aranha, Edson Borin:
Optimized implementation of QC-MDPC code-based cryptography. - Mario João Jr., Alexandre da Costa Sena, Vinod E. F. Rebello:
On the parallelization of Hirschberg's algorithm for multi-core and many-core systems. - Danilo Carastan-Santos, David Correa Martins Jr., Siang W. Song, Luiz C. S. Rozante, Raphael Y. de Camargo:
A hybrid CPU-GPU-MIC algorithm for minimal hitting set enumeration. - Pedro Henrique Penna, Antônio Tadeu A. Gomes, Márcio Castro, Patricia Della Méa Plentz, Henrique C. Freitas, François Broquedis, Jean-François Méhaut:
A comprehensive performance evaluation of the BinLPT workload-aware loop scheduler. - Uillian L. Ludwig, Miguel G. Xavier, Dionatra F. Kirchoff, Ian B. Cezar, César A. F. De Rose:
Optimizing multi-tier application performance with interference and affinity-aware placement algorithms. - Jeronimo Costa Penha, Lucas B. da Silva, Jansen Silva, Kristtopher Coelho, Hector P. Baranda, José Augusto Miranda Nacif, Ricardo Ferreira:
ADD: Accelerator Design and Deploy - A tool for FPGA high-performance dataflow computing.
Volume 31, Number 19, October 2019
Editorial
- Roman Wyrzykowski, Boleslaw K. Szymanski:
Algorithmic advances in parallel architectures and energy-efficient computing.
- Konstantinos Krestenitis, Tobias Weinzierl:
A multi-core ready discrete element method with triangles using dynamically adaptive multiscale grids. - Carl Christian Kjelgaard Mikkelsen, Angelika Beatrix Schwarz, Lars Karlsson:
Parallel robust solution of triangular linear systems. - Louise Spellacy, Darach Golden, Ivan Rungger:
Performance analysis of a pairwise method for partial inversion of complex block tridiagonal matrices. - Raimondas Ciegis, Vadimas Starikovicius, Svetozar Margenov, Rima Kriauziene:
Scalability analysis of different parallel solvers for 3D fractional power diffusion problems. - Giuliano Laccetti, Marco Lapegna, Valeria Mele, Raffaele Montella:
An adaptive algorithm for high-dimensional integrals on heterogeneous CPU-GPU systems. - Kohei Yamashita, Yasuaki Ito, Koji Nakano:
Bulk execution of the dynamic programming for the optimal polygon triangulation problem on the GPU. - Krzysztof Kaczmarski, Albert Wolant:
GPU R-Trie: Dictionary with ultra fast lookup. - Lukasz Masko, Marek S. Tudruj:
Application global state monitoring in optimization of parallel event-driven simulation. - Vladimir V. Stegailov, Grigory S. Smirnov, Vyacheslav S. Vecher:
VASP hits the memory wall: Processors efficiency comparison. - Thomas Rauber, Gudula Rünger:
A scheduling selection process for energy-efficient task execution on DVFS processors.
Editorial
- Lei Pan, Jun Zhang, Jonathan J. Oliver:
Editorial: Recent advances in machine learning for cybersecurity.
- Yu Wang, Weizhi Meng, Wenjuan Li, Zhe Liu, Yang Liu, Hanxiao Xue:
Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems. - Chee Keong Ng, Frank Jiang, Leo Yu Zhang, Wanlei Zhou:
Static malware clustering using enhanced deep embedding method. - Xinbo Ban, Shigang Liu, Chao Chen, Caslon Chua:
A performance evaluation of deep-learnt features for software vulnerability detection. - Yuying Liu, Yonggang Huang, Jiao Zhang, Hualei Shen:
Anti-noise image source identification. - Yonghang Tai, Lei Wei, Hailing Zhou, Qiong Li, Xiaoqiao Huang, Junsheng Shi, Saeid Nahavandi:
Machine learning-based haptic-enabled surgical navigation with security awareness. - Lefeng Zhang, Ping Xiong, Wei Ren, Tianqing Zhu:
A differentially private method for crowdsourcing data submission. - Bo Liu, Ming Ding, Tianqing Zhu, Yong Xiang, Wanlei Zhou:
Adversaries or allies? Privacy and deep learning in big data era.
Volume 31, Number 20, October 2019
- Xiaoli Ren, Juan Zhao, Xiaoyong Li, Kaijun Ren, Junqiang Song, Difu Sun:
PAGCM: A scalable parallel spectral-based atmospheric general circulation model. - M. Pradeep, P. Sampath:
An optimized multi-attribute vertical handoff approach for heterogeneous wireless networks. - Youzhong Ma, Ruiling Zhang, Shijie Jia, Yongxin Zhang, Xiaofeng Meng:
An efficient similarity join approach on large-scale high-dimensional data using random projection. - Chen Gu, Matthew Bradbury, Arshad Jhumka:
Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks. - Kuldeep R. Kurte, Jibonananda Sanyal, Anne Berres, Dalton D. Lunga, Mark Coletti, Hsiuhan Lexie Yang, Daniel Graves, Benjamin Liebersohn, Amy N. Rose:
Performance analysis and optimization for scalable deployment of deep learning models for country-scale settlement mapping on Titan supercomputer. - Sara Kardani-Moghaddam, Rajkumar Buyya, Kotagiri Ramamohanarao:
Performance anomaly detection using isolation-trees in heterogeneous workloads of web applications in computing clouds. - Deepa K, Radhamani G, Vinod P, Mohammad Shojafar, Neeraj Kumar, Mauro Conti:
Identification of Android malware using refined system calls. - UmaMaheswari Gurusamy, K. Hariharan, M. S. K. Manikandan:
Detection and mitigation of UDP flooding attack in a multicontroller software defined network using secure flow management model. - Mohammad Sajid, Zahid Raza:
Energy-efficient quantum-inspired stochastic Q-HypE algorithm for batch-of-stochastic-tasks on heterogeneous DVFS-enabled processors. - Einollah Jafarnejad Ghomi, Amir Masoud Rahmani, Nooruldeen Nasih Qader:
Service load balancing, scheduling, and logistics optimization in cloud manufacturing by using genetic algorithm. - Sara Ouaftouh, Ahmed Zellou, Ali Idri:
Social recommendation: A user profile clustering-based approach. - Xuefeng Fu, Xiangfeng Luo, Yike Guo:
Entity emotion mining in social media environment. - Mehmet Belgin, Tyler A. Perini, Fang (Cherry) Liu, Nuyun Zhang, Semir Sarajlic, Andre C. McNeill, Paul Manno, Neil Bright:
A data-driven support strategy for a sustainable research software repository. - Chuitian Rong, Xiaohai Cheng, Ziliang Chen, Na Huo:
Similarity joins for high-dimensional data using Spark. - Damodar Sahasrabudhe, Martin Berzins, John A. Schmidt:
Node failure resiliency for Uintah without checkpointing. - Ruo-Fan Qiu, Hai-Ning Wang, Jianfeng Zhu, Rong-Qian Chen, Chengxiang Zhu, Yancheng You:
Compressible lattice Boltzmann simulations on high-performance and low-cost GeForce GPU. - Jiangjiang Zhang, Fei Xue, Xingjuan Cai, Zhihua Cui, Yu Chang, Wensheng Zhang, Wuzhao Li:
Privacy protection based on many-objective optimization algorithm. - Martin Andreoni Lopez, Diogo M. F. Mattos, Otto Carlos M. B. Duarte, Guy Pujolle:
Toward a monitoring and threat detection system based on stream processing as a virtual network function for big data. - Savyan P. Velayudhan, Somasundaram Mary Saira Bhanu:
Compromised account detection in online social networks: A survey. - Yuan Zhuang, Xiaohui Wei, Hongliang Li, Yongfang Wang, Xubin He:
An optimal checkpointing model with online OCI adjustment for stream processing applications. - Jingya Yang, Linfu Sun, Qishi Wu:
Constraint projections for semi-supervised spectral clustering ensemble.
Volume 31, Number 21, November 2019
Editorial
- Yang Xiang, Md. Zakirul Alam Bhuiyan, Aniello Castiglione, Yu Wang:
Foreword to the special issue on security, privacy, and social networks.
- Xiangyu Hu, Lemin Li, Tingmin Wu, Xiaoxiang Ai, Jie Gu, Sheng Wen:
Every word is valuable: Studied influence of negative words that spread during election period in social media. - Shashank Gupta, Brij B. Gupta, Pooja Chaudhary:
A client-server JavaScript code rewriting-based framework to detect the XSS worms from online social network. - Xu Yang, Xun Yi, Ibrahim Khalil, Hui Cui, Xuechao Yang, Surya Nepal, Xinyi Huang, Yali Zeng:
A new privacy-preserving authentication protocol for anonymous web browsing. - Youwen Zhu, Yue Zhang, Xingxin Li, Hongyang Yan, Jing Li:
Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud. - Haining Yang, Jiameng Sun, Jing Qin, Jixin Ma:
An improved scheme for outsourced computation with attribute-based encryption. - Xiao Zhang, Faguo Wu, Wang Yao, Zhao Wang, Wenhua Wang:
Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation. - Chen Wang, Lu Xiao, Jian Shen, Rui Huang:
Neighborhood trustworthiness-based vehicle-to-vehicle authentication scheme for vehicular ad hoc networks. - Rui Chang, Liehui Jiang, Yaobin Xie, Hongqi He, Danmin Chen, Lu Ren:
Implementing a hardware-assisted memory management mechanism for ARM platforms using the B method. - DongXing Huang, Yong Tang, Yi Wang, Shuning Wei:
Toward efficient and accurate function-call graph matching of binary codes. - Yubin Yang, Liming Cheng:
An SDN-based MTD model. - Chun Shan, Jun Cai, Yan Liu, Jian-Zhen Luo:
Node importance to community based caching strategy for information centric networking.
- Hong Shen, Hui Tian, Yingpeng Sang:
Foreword to the Special Section on Parallel and Distributed Computing, Applications and Technologies.
- Liyang Xu, Miao Wang, Xinhai Xu, Chen Cui, Xuejun Yang:
Dynamic mesh re-partitioning considering iterative convergence rate for multiphase flows in OpenFOAM. - Yuedan Chen, Kenli Li, Xiongwei Fei, Zhe Quan, Keqin Li:
Implementation and optimization of a data protecting model on the Sunway TaihuLight supercomputer with heterogeneous many-core processors. - Huaiwen He, Hong Shen, Dieyan Liang:
Cost-minimizing online algorithm for internet green data centers on multi-source energy.
- Manuel E. Acacio, Julio Sahuquillo:
Foreword to the Special Issue on Processors, Interconnects, Storage, and Caches for Exascale Systems.
- Joshua Lant, Caroline Concatto, Andrew Attwood, Jose Antonio Pascual, Mike Ashworth, Javier Navaridas, Mikel Luján, John Goodacre:
Enabling shared memory communication in networks of MPSoCs. - Juan-José Crespo, José L. Sánchez, Francisco J. Alfaro-Cortes:
Silicon photonic networks: Signal loss and power challenges. - Jose Duro, Jose Antonio Pascual, Salvador Petit, Julio Sahuquillo, María Engracia Gómez:
Modeling and analysis of the performance of exascale photonic networks. - Juan Piernas, Pilar González-Férez:
Leveraging OSD+ devices for implementing a high-throughput parallel file system. - Jose Antonio Pascual, Joshua Lant, Caroline Concatto, Andrew Attwood, Javier Navaridas, Mikel Luján, John Goodacre:
On the effects of allocation strategies for exascale computing systems with distributed storage and unified interconnects. - Francisco M. Castro, Nicolás Guil, Manuel J. Marín-Jiménez, Jesús Pérez Serrano, Manuel Ujaldon:
Energy-based tuning of convolutional neural networks on multi-GPUs.
Volume 31, Number 22, November 2019
Editorial
- Slawomir Zólkiewski, Leszek Chybowski:
Foreword to the special issue of the World Conference on Information Systems and Technologies (WorldCIST 2017).
- Marius-Constantin Vochin, Sorin Zoican, Eugen Borcoci:
Intelligent vehicle navigation system with assistance and alerting capabilities. - Piotr Sulikowski, Tomasz Zdziebko, Dominik Turzynski:
Modeling online user product interest for recommender systems and ergonomics studies. - Yassine Drias, Samir Kechid:
Dynamic Web information foraging using self-interested agents: Application to scientific citations network. - Jezreel Mejía, Freddy Íñiguez, Mirna Muñoz:
Analyzing the requirements to implement a data analysis model for software process improvement. - Elzbieta Jarzebowska, Krzysztof Augustynek, Andrzej Urbas:
Automated generation of reference dynamical models for constrained robotic systems in the presence of friction and damping effects. - Ricardo Bragança, Filipe Portela, Manuel Santos:
A regression data mining approach in Lean Production.
- Sheng Wen, Aniello Castiglione, Tian Wang, Md. Zakirul Alam Bhuiyan:
Forward to the special issue of the 9th International Symposium on Cyberspace Safety and Security (CSS 2017).
- Dongjin Yu, Yike Jin, Yuqun Zhang, Xi Zheng:
A survey on security issues in services communication of Microservices-enabled fog applications. - Fan Zhao, Xiangyang Luo, Yong Gan, Shuodi Zu, Qingfeng Cheng, Fenlin Liu:
IP Geolocation based on identification routers and local delay distribution similarity. - Donghai Tian, Xiaoqi Jia, Zhaolong Zhang, Li Zhan, Changzhen Hu, Jingfeng Xue:
An online approach to defeating ROP attacks∗. - Hong Zhang, Yifan Yang, Ding Yuan, Daniel Sun, Jun Zhang, Guoqiang Li, Mingui Sun:
Video denoising for security and privacy in fog computing. - Jie Li, Jinshu Su, Rongmao Chen, Xiaofeng Wang, Shuhui Chen:
Practical privacy-preserving deep packet inspection outsourcing. - Hui Cao, Shubo Liu, Longfei Wu, Zhitao Guan, Xiaojiang Du:
Achieving differential privacy against non-intrusive load monitoring in smart grid: A fog computing approach. - Yun Zhou, Lianyong Qi, Alexander Raake, Tao Xu, Marta Piekarska, Xuyun Zhang:
User attitudes and behaviors toward personalized control of privacy settings on smartphones. - Jing Li, Licheng Wang, Lihua Wang, Xianmin Wang, Zhengan Huang, Jin Li:
Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios. - Pooneh Nikkhah Bahrami, Hamid H. S. Javadi, Tooska Dargahi, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A hierarchical key pre-distribution scheme for fog networks. - Liangliang Wang, Mi Wen, Kefei Chen, Zhongqin Bi, Yu Long:
A new VRSA-based pairing-free certificateless signature scheme for fog computing. - Longxia Huang, Gongxuan Zhang, Shui Yu, Anmin Fu, John Yearwood:
SeShare: Secure cloud data sharing based on blockchain and public auditing. - Hui Huang, Kuan-Ching Li, Xiaofeng Chen:
Blockchain-based fair three-party contract signing protocol for fog computing.
Volume 31, Number 23, December 2019
Editorial
- Jinjun Chen:
Special issue: 2016 International Conference on Information Technology in Medicine and Education (ITME2016).
- Hong Liu, Yan Li, Wenhao Li, Dianjie Lu, Guijuan Zhang:
A grouping approach based on non-uniform binary grid partitioning for crowd evacuation simulation. - Li-Hui Lin, Cheng-Hsuan Li, Sheng Yang, Shao-Zi Li, Yi Wei:
Automated classification of Wuyi rock tealeaves based on support vector machine. - Guijuan Zhang, Dianjie Lu, Hong Liu:
Visualization of fluid simulation: An SPH-based multi-resolution method. - Dazhen Lin, Ben Ma, Donglin Cao, Shaozi Li:
Chinese microblog rumor detection based on deep sequence context. - Taoyun Zhou, Yun Cheng, Baowang Lian, Bibi Irfana, Hongwei Zhao:
Research on high-precision passive localization based on phase difference changing rate. - Guorong Cai, Songzhi Su, Chengcai Leng, Jipeng Wu, Yun-Dong Wu, Shaozi Li:
Cover patches: A general feature extraction strategy for spoofing detection. - Zuoyong Li, Zhaochai Yu, Weixia Liu, Yong Xu, Daoqiang Zhang, Yong Cheng:
Tongue image segmentation via color decomposition and thresholding. - Xiangwei Zheng, Yuang Zhang, Hui Zhang, Qingshui Xue:
An RBF neural network-based dynamic virtual network embedding algorithm. - Liang Dai, Jia Zhang, Candong Li, Changen Zhou, Shaozi Li:
Multi-label feature selection with application to TCM state identification.
- Xianghan Zheng, Chunming Rong, Tuyatsetseg Badarch:
Foreword to the special issue of green cloud computing: Methodology and practice.
- Ayesha Siddiqa, Faisal Fayyaz Qureshi, Munam Ali Shah, Rahat Iqbal, Abdul Wahid, Victor Chang:
CCN: A novel energy efficient greedy routing protocol for green computing. - Xing Chen, Junxin Lin, Bing Lin, Tao Xiang, Ying Zhang, Gang Huang:
Self-learning and self-adaptive resource allocation for cloud-based software services. - Dongyang Zhan, Lin Ye, Binxing Fang, Hongli Zhang:
SAVM: A practical secure external approach for automated in-VM management. - Xiaofeng Ding, Yangling Ou, Jianhong Jia, Hai Jin, Jixue Liu:
Efficient subgraph search on large anonymized graphs. - Yi-Lei Wang, Wen-Zhe Tang, Xian-Jun Yang, Ying-Jie Wu, Fu-Ji Chen:
An efficient method for autoencoder-based collaborative filtering. - Ayong Ye, Xiaoliang Yang, Qing Li, Aimin Chen:
A novel adaptive radio map for RSS-based indoor positioning. - Dehua Chen, Nannan Che, Jiajin Le, Qiao Pan:
A co-training based entity recognition approach for cross-disease clinical documents. - Wenwu He, Fumin Zou, Quan Liang:
Online learning with sparse labels.
- Priyadarsi Nanda, Deepak Puthal, Saraju P. Mohanty:
Editorial to the Special Issue on Recent Advances on Trust, Security and Privacy in Computing and Communications.
- Thomas Given-Wilson, Annelie Heuser, Nisrine Jafri, Axel Legay:
An automated and scalable formal process for detecting fault injection vulnerabilities in binaries. - Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault analysis of AEZ. - Michael Bewong, Jixue Liu, Lin Liu, Jiuyong Li, Kim-Kwang Raymond Choo:
A relative privacy model for effective privacy preservation in transactional data. - Mosarrat Jahan, Suranga Seneviratne, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay K. Jha:
Light weight and fine-grained access mechanism for secure access to outsourced data. - Da-Zhi Sun, Ze-Guang Zhu, Guangquan Xu, Wei Guo:
One-round provably secure yoking-proof for RFID applications. - Lansheng Han, Man Zhou, Shuxia Han, Wenjing Jia, Changhua Sun, Cai Fu:
Targeting malware discrimination based on reversed association task. - Annie Gilda Roselin Arockia Baskaran, Priyadarsi Nanda, Surya Nepal, Sean He:
Testbed evaluation of Lightweight Authentication Protocol (LAUP) for 6LoWPAN wireless sensor networks.
Volume 31, Number 24, December 2019
Editorial
- Gang Li, Lynn Batten:
Foreword to the Special Issue of the 8th International Conference on Applications and Techniques for Information Security (ATIS 2017).
- Xu Bai, Jiajia Yang, Qiong Dai, Zhaolin Chen:
A hybrid ARM-FPGA cluster for cryptographic algorithm acceleration. - Sharon X. Lee, Kaleb L. Leemaqz, Geoffrey J. McLachlan:
PPEM: Privacy-preserving EM learning for mixture models. - Ziqi Yan, Qiong Wu, Meng Ren, Jiqiang Liu, Shaowu Liu, Shuo Qiu:
Locally private Jaccard similarity estimation.
- Luca Foschini, Hyunbum Kim:
Foreword to the Special Issue on the 2017 Edition of the Workshop on Performance Evaluation of communications in DIstributed Systems and WEb-based Service Architectures (PEDISWESA 2017).
- Omar Ait Oualhaj, Abdellatif Kobbane, Jalel Ben-Othman:
Mobile delay-tolerant networks with energy-harvesting and wireless energy transfer cooperation. - Walid Bouksani, Boucif Amar Bensaber:
RIN: A dynamic pseudonym change system for privacy in VANET. - Tawfiq Nebbou, Mohamed Lehsaini, Hacène Fouchal, Marwane Ayaida:
An urban location service for vehicular area networks. - Teodora Sanislav, Sherali Zeadally, George Dan Mois, Hacène Fouchal:
Reliability, failure detection and prevention in cyber-physical systems (CPSs) with agents. - Walid Serrai, Abdelkrim Abdelli, Lynda Mokdad, Ashref Serrai:
How to deal with QoS value constraints in MCDM based Web service selection. - Emmanouil Lakiotakis, Christos Liaskos, Xenofontas A. Dimitropoulos:
Improving networked music performance systems using application-network collaboration.
- Fang Dong, Chenshu Wu, Shangce Gao:
Cloud computing-based big data processing and intelligent analytics.
- Jingya Zhou, Jianxi Fan, Jin Wang, Juncheng Jia:
Dynamic service deployment for budget-constrained mobile edge computing. - Junxu Xia, Deke Guo, Geyao Cheng:
In-network block repairing for erasure coding storage systems. - Fusheng Xu, Zhongxiang Huang, Hao Dai, Xueying Zhu, Hongwei Wu, Jun Zhang:
A real-time traffic index model for expressways. - Jinghui Zhang, Jian Chen, Jun Zhan, Jiahui Jin, Aibo Song:
Graph partition-based data and task co-scheduling of scientific workflow in geo-distributed datacenters. - Dian Shen, Pengcheng Zhou, Yidan Gao, Xiaolin Guo, Runqun Xiong:
Rendering differential performance preference through intelligent network edge in cloud data centers. - Meiya Dong, Jumin Zhao, Biaokai Zhu, Zhaobin Liu:
CHAMELEON: Hides privacy in cloud IoT system by LSB and CSE. - Yuxiang Wang, Zhangpeng Ge, Haijiang Yan, Xiaoliang Xu, Yixing Xia:
Semantic locality-based approximate knowledge graph query. - Junbing Cheng, Dengao Li:
A SINS-aided two-step fast acquisition method for GNSS signal based on compressive sensing. - Youquan Wang, Changjian Fang, Dongqin Shen, Zhiang Wu, Jie Cao:
Verifying the claimed sale-ranking trustworthy: A maximum marginal relevance-based ranking method.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.