default search action
International Journal of High Performance Computing and Networking, Volume 13
Volume 13, Number 1, 2019
- Takuma Yamaguchi, Kohei Fujita, Tsuyoshi Ichimura, Muneo Hori, Lalith Maddegedara:
Acceleration of unstructured implicit low-order finite-element earthquake simulation using OpenACC on Pascal GPUs. 3-18 - Nobuhiro Miki, Fumihiko Ino, Kenichi Hagihara:
PACC: a directive-based programming framework for out-of-core stencil computation on accelerators. 19-34 - Ahmad Lashgar, Amirali Baniasadi:
Efficient implementation of OpenACC cache directive on NVIDIA GPUs. 35-53 - Akihiro Hayashi, Jun Shirako, Ettore Tiotto, Robert Ho, Vivek Sarkar:
Performance evaluation of OpenMP's target construct on GPUs - exploring compiler optimisations. 54-69 - Jason Sewall, S. John Pennycook, Alejandro Duran, Christian Terboven, Xinmin Tian, Ravi Narayanaswamy:
Developments in memory management in OpenMP. 70-85 - Ian J. Bertolacci, Michelle Mills Strout, Jordan Riley, Stephen M. Guzik, Eddie C. Davis, Catherine Olschanowsky:
Using the loop chain abstraction to schedule across loops in existing code. 86-104 - Robert Searles, Stephen Herbein, Travis Johnston, Michela Taufer, Sunita Chandrasekaran:
Creating a portable, high-level graph analytics paradigm for compute and data-intensive applications. 105-118 - Shengwen Tian, Hongyong Yang:
Load-balanced overlay recovery scheme with delay minimisation. 119-128
Volume 13, Number 2, 2019
- Hongyu Wang, Haihua Han, Xiaoguang Wang, Ruochen Fang, Wenbo Mei:
A high efficient map-matching algorithm for the GPS data processing intended for the highways. 132-140 - Xinwei Gao, Jintai Ding, R. V. Saraswathy, Lin Li, Jiqiang Liu:
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol. 141-152 - Xiaolin Zhang, Xiaoyu He, Fang-Ming Yu, Lixin Liu, Huanxiang Zhang, Zhuolin Li:
Distributed and personalised social network privacy protection. 153-163 - Lu Yan, Xiao Chen, Haojiang Deng, Xiaozhou Ye:
A delegation token-based method to authenticate the third party in TLS. 164-174 - Ge Gao, Lei Wu, Yunxue Yan:
A secure storage scheme with key-updating in hybrid cloud. 175-183 - Pinki Sharma, Jyotsna Sengupta, P. K. Suri:
Survey of intrusion detection techniques and architectures in cloud computing. 184-198 - Nour El-Houda Golea, Kamal Eddine Melkemi:
ROI-based fragile watermarking for medical image tamper detection. 199-210 - Lydia Lazib, Yanyan Zhao, Bing Qin, Ting Liu:
Negation scope detection with recurrent neural networks models in review texts. 211-221 - Weipeng Jing, Tao Jiang, Xingge Zhang, Liangkuan Zhu:
The optimisation of speech recognition based on convolutional neural network. 222-231 - Muhammad Hilmi Kamarudin, Carsten Maple, Tim Watson:
Hybrid feature selection technique for intrusion detection system. 232-240 - Yifei Wei, Qiao Li, Xia Gong, Da Guo, Yong Zhang:
Spectrum prediction and aggregation strategy in multi-user cooperative relay networks. 241-250
Volume 13, Number 3, 2019
- Hanan A. Hassan, Mona S. Kashkoush, Mohamed Azab, Walaa M. Sheta:
Impact of using multi-levels of parallelism on HPC applications performance hosted on Azure cloud computing. 251-260 - Amril Nazir:
A dynamic and QoS-effective resource management system. 261-282 - You-Shyang Chen:
Performance identification in large-scale class data from advanced facets of computational intelligence and soft computing techniques. 283-293 - Jan Sliwa:
Assessing complex evolving cyber-physical systems (case study: smart medical devices). 294-303 - Yanping Ma, Qiming Liu, Cuifeng Li, Yi Tang, Hongtao Xie:
Distributed data-dependent locality sensitive hashing. 304-311 - Jiang Li, Xiaojuan Ban, Guang Yang, Yitong Li, Yu Wang:
Real-time human action recognition using depth motion maps and convolutional neural networks. 312-320 - Junqi Zhang, Haiying Gao:
A compact construction for non-monotonic key-policy attribute-based encryption. 321-330 - Qiong Gu, Zhao Wu, Bing Ning, Xianming Wang, Chunsheng Xin:
Research on link blocks recognition of web pages. 331-339 - Junying Chen, Jinhui Chen, Huaqing Min:
A united framework with multi-operator evolutionary algorithms and interior point method for efficient single objective optimisation problem solving. 340-353
Volume 13, Number 4, 2019
- Yingjie Zhang, Jianxing Xu, Heng-Da Cheng:
AdaBoost-based conformal prediction with high efficiency. 355-365 - Chirihane Gherbi, Zibouda Aliouat, Mohamed Benmohammed:
Comparative analysis of hierarchical cluster protocols for wireless sensor networks. 366-377 - Cairong Yan, Guangwei Xu:
Virtual cluster optimisation for MapReduce-like applications. 378-388 - Mydhili Palagummi, Ricardo Lent:
Harnessing betweenness centrality for virtual network embedding in tree topologies. 389-407 - Jun Zhao, Hong Wang:
Detecting fake reviews via dynamic multimode network. 408-416 - Guangsheng Chen, Yiqun Cheng, Weipeng Jing:
DBSCAN-PSM: an improvement method of DBSCAN algorithm on Spark. 417-426 - Feng Tian, Fuhua Shang, Ning Sun:
Multimedia auto-annotation via label correlation mining. 427-435 - Gang Wang, Jaehong Park, Ravi S. Sandhu, Jun Wang, Xiaolin Gui:
Dynamic trust evaluation model based on bidding and multi-attributes for social networks. 436-454 - Tian Wang, Jiyuan Zhou, Wenhua Wang, Guangxue Zhang, Ming Huang, Yongxuan Lai:
A personal local area information interaction system based on NFC and Bluetooth technology. 455-463 - Hongfa Ding, Changgen Peng, Youliang Tian, Shuwen Xiang:
A risk adaptive access control model based on Markov for big data in the cloud. 464-475
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.