default search action
Cluster Computing, Volume 19
Volume 19, Number 1, March 2016
Special Issue: ICITCS 2015;
Special Issue: Convergence Systems for Human Computing
- Antonio Llanes, José M. Cecilia, Antonia M. Sánchez, José M. García, Martyn Amos, Manuel Ujaldon:
Dynamic load balancing on heterogeneous clusters for parallel ant colony optimization. 1-11 - Mohammed Rebbah, Yahya Slimani, Abdelkader Benyettou, Lionel Brunie:
A decentralized fault tolerance model based on level of performance for grid environment. 13-27 - Chen Yang, Peng Chi, Xiao Song, Tingyu Lin, Bo Hu Li, Xudong Chai:
An efficient approach to collaborative simulation of variable structure systems on multi-core machines. 29-46 - Jianhong Zhang, Xubing Zhao:
Efficient chameleon hashing-based privacy-preserving auditing in cloud storage. 47-56 - Carlos M. Toledo, Ricardo J. Barrientos, Andrés I. Ávila:
Similarity (range and kNN) queries processing on an Intel Xeon Phi coprocessor. 57-71 - Tian Zhuo:
Face recognition from a single image per person using deep architecture neural networks. 73-77 - Erwin Adi, Zubair A. Baig, Philip Hingston, Chiou Peng Lam:
Distributed denial-of-service attacks against HTTP/2 services. 79-86 - S. Raja Ratna, R. Ravi:
Scrutiny of unruly and abuse in wireless networks to mitigate physical layer threats using discriminate based misbehavior prevention. 87-97 - Musaed A. Alhussein:
Automatic facial emotion recognition using weber local descriptor for e-Healthcare system. 99-108 - Mahmoud Alewiwi, Cengiz Örencik, Erkay Savas:
Efficient top-k similarity document search utilizing distributed file systems and cosine similarity. 109-126 - Jianhong Zhang, Pengyan Li, Jian Mao:
IPad: ID-based public auditing for the outsourced data in the standard model. 127-138 - Lingjun Zhao, Lajiao Chen, Rajiv Ranjan, Kim-Kwang Raymond Choo, Jijun He:
Geographical information system parallelization for spatial big data processing: a review. 139-152 - Yan Hu, Jun Yan, Kim-Kwang Raymond Choo:
PEDAL: a dynamic analysis tool for efficient concurrency bug reproduction in big data environment. 153-166 - Jiyuan Shi, Junzhou Luo, Fang Dong, Jinghui Zhang, Junxue Zhang:
Elastic resource provisioning for scientific workflow scheduling in cloud under budget and deadline constraints. 167-182 - Chao Yang, Bin Jiang, Isao Ono, Setsuya Kurahashi, Takao Terano:
A grid based simulation environment for agent-based models with vast parameter spaces. 183-195 - Jia Wang, Xiaoping Li:
Task scheduling for MapReduce in heterogeneous networks. 197-210 - Zhiang Wu, Guangliang Gao, Zhan Bu, Jie Cao:
SIMPLE: a simplifying-ensembling framework for parallel community detection from large networks. 211-221 - Hwa Gyoo Park, Weiming Shen:
A methodology for developing clinical collaborative communication systems. 223-235 - Yuan Cheng, Fazhi He, Yiqi Wu, Dejun Zhang:
Meta-operation conflict resolution for human-human interaction in collaborative feature-based CAD systems. 237-253 - Liping Gao, Fangyu Yu, Qingkui Chen, Naixue Xiong:
Consistency maintenance of Do and Undo/Redo operations in real-time collaborative bitmap editing systems. 255-267 - S. P. Malarvizhi, B. Sathiyabhama:
Frequent pagesets from web log by enhanced weighted association rule mining. 269-277 - Hye-Young Kim:
An energy-efficient load balancing scheme to extend lifetime in wireless sensor networks. 279-283 - Changhee Cho, Jisu Kim, Jinsul Kim, Sangjoon Lee, Kuinam J. Kim:
Detecting for high speed flying object using image processing on target place. 285-292 - Sanghyun Park, Jisu Kim, Gemoh Maliva Tihfon, HoYong Ryu, Jinsul Kim:
Dynamic multimedia transmission control virtual machine using weighted Round-Robin. 293-300 - Dae-Won Park, Suhyun Park:
Multiple-domain marine data utilization structure for e-navigation. 301-308 - Hoyoung Cheong, Jonwon Eun, Hyuncheol Kim, Kuinam J. Kim:
Belief propagation decoding assisted on-the-fly Gaussian elimination for short LT codes. 309-314 - Hyoung-Gook Kim, Hye-Seung Cho, Jin Young Kim:
Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment. 315-323 - Seung-Ho Kang, Kuinam J. Kim:
A feature selection approach to find optimal feature subsets for the network intrusion detection system. 325-333 - Wai-Kong Lee, Hon-Sang Cheong, Raphael C.-W. Phan, Bok-Min Goi:
Fast implementation of block ciphers and PRNGs in Maxwell GPU architecture. 335-347 - Munwar Ali Zardari, Low Tang Jung:
Data security rules/regulations based classification of file data using TsF-kNN algorithm. 349-368 - Kyung-shick Choi, Kyungseok Choo, Yong-eun Sung:
Demographic variables and risk factors in computer-crime: an empirical assessment. 369-377 - Kuinam J. Kim, Cheong Ghil Kim, Taeg Keun Whangbo, Kyoungro Yoon:
A continuous playing scheme on RESTful web service. 379-387 - Hamzeh Alabool, Ahmad Kamil Bin Mahmood:
A novel evaluation framework for improving trust level of Infrastructure as a Service. 389-410 - Sufian Sudeng, Naruemon Wattanapongsakorn:
A knee-based multi-objective evolutionary algorithm: an extension to network system optimization design problem. 411-425 - Taher Ahmed Ghaleb:
Techniques and countermeasures of website/wireless traffic analysis and fingerprinting. 427-438 - Saad Alqahtany, Nathan L. Clarke, Steven Furnell, Christoph Reich:
A forensic acquisition and analysis system for IaaS. 439-453 - Abdulwahid Al Abdulwahid, Nathan L. Clarke, Ingo Stengel, Steven Furnell, Christoph Reich:
Continuous and transparent multimodal authentication: reviewing the state of the art. 455-474 - Yoon-Su Jeong, Seung-Soo Shin, Kun-Hee Han:
High-dimentional data authentication protocol based on hash chain for Hadoop systems. 475-484 - Seong-Taek Park, Eun-Mi Park, Joung-Hae Seo, GuoZhong Li:
Factors affecting the continuous use of cloud service: focused on security risks. 485-495 - Kun-Hee Han, Woo-Sik Bae:
Proposing and verifying a security protocol for hash function-based IoT communication system. 497-504 - Kyungyong Chung, Roy C. Park:
PHR open platform based smart health service using distributed object group framework. 505-517 - Jong-Hak Oh, Jung-Wan Hong, Yen-Yoo You, Gwan-Sik Na:
Effects of patent indicators on national technological level: concentrated on mobile communication, network, and convergence technologies. 519-528 - IlKyu Yoon, JaMee Kim, WonGyu Lee:
The analysis and application of an educational programming language (RUR-PLE) for a pre-introductory computer science course. 529-546 - Yunsick Sung, Young-Sik Jeong, Jong Hyuk Park:
Beacon-based active media control interface in indoor ubiquitous computing environment. 547-556 - Emmanuel N. Millán, Silvana B. Goirán, María Fabiana Piccoli, Carlos García Garino, Julieta N. Aranibar, Eduardo M. Bringa:
Monte Carlo simulations of settlement dynamics in GPUs. 557-566
Volume 19, Number 2, June 2016
- Esmail Asyabi, Azadeh Azhdari, Mostafa Dehsangi, Michel Gokan Khan, Mohsen Sharifi, Sayed Vahid Azhari:
Kani: a QoS-aware hypervisor-level scheduler for cloud computing environments. 567-583 - Heithem Abbes, Thouraya Louati:
PGTrust: a decentralized free-riding prevention model for DG systems. 585-599 - Zeng Zeng, Tram Truong Huu, Bharadwaj Veeravalli, Chen-Khong Tham:
Operational cost-aware resource provisioning for continuous write applications in cloud-of-clouds. 601-614 - George Terzopoulos, Helen D. Karatza:
Power-aware Bag-of-Tasks scheduling on heterogeneous platforms. 615-631 - Prasanthi Sreekumari, Jae-Il Jung, Meejeong Lee:
A simple and efficient approach for reducing TCP timeouts due to lack of duplicate acknowledgments in data center networks. 633-645 - Yichuan Wang, Santosh Chandrasekhar, Mukesh Singhal, Jianfeng Ma:
A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing. 647-662 - Fawaz AL-Hazemi, Dong-Ki Kang, Seong-Hwan Kim, Yuyang Peng, S. H. Shah Newaz, Chan-Hyun Youn:
LPC \(_\mathrm{FreqSchd}\) : A local power controller using the frequency scheduling approach for virtualized servers. 663-678 - Tarandeep Kaur, Inderveer Chana:
Energy aware scheduling of deadline-constrained tasks in cloud computing. 679-698 - (Withdrawn) The model for improving big data sub-image retrieval performance using scalable vocabulary tree based on predictive clustering. 699-708
- Jiaxuan Wu, Bin Zhang, Lei Yang, Peng Wang, Changsheng Zhang:
A replicas placement approach of component services for service-based cloud application. 709-721 - Darren Quick, Kim-Kwang Raymond Choo:
Big forensic data reduction: digital forensic images and electronic evidence. 723-740 - Jie Wan, Guorui Ren, Jinfu Liu, Qinghua Hu, Daren Yu:
Ultra-short-term wind speed prediction based on multi-scale predictability analysis. 741-755 - Xinhui Xu, Fei Xie, Xingyu Zhou:
Research on spatial and temporal characteristics of drought based on GIS using Remote Sensing Big Data. 757-767 - Bing Zhao, Yanhong Gu, Yuan Ruan, Quanle Chen:
Two game-based solution concepts for a two-agent scheduling problem. 769-781 - Jie Zheng:
Research on a cluster system for binary data frames of wireless sensor network. 783-791 - Lizhe Wang, Weijing Song, Peng Liu:
Link the remote sensing big data to the image features via wavelet transformation. 793-810 - Jun Ye, Zheng Xu, Yong Ding:
Secure outsourcing of modular exponentiations in cloud and cluster computing. 811-820 - Jiemin Chen, Feiyi Tang, Jing Xiao, Jianguo Li, Jing He, Yong Tang:
CogTime_RMF: regularized matrix factorization with drifting cognition degree for collaborative filtering. 821-835 - K. P. Swaraj, D. Manjula:
A fast approach to identify trending articles in hot topics from XML based big bibliographic datasets. 837-848 - Ji Xue, Feng Yan, Alma Riska, Evgenia Smirni:
Scheduling data analytics work with performance guarantees: queuing and machine learning models in synergy. 849-864 - Alina Sîrbu, Özalp Babaoglu:
Towards operator-less data centers through data-driven, predictive, proactive autonomics. 865-878 - Rajath Subramanyam, Indranil Gupta, Luke M. Leslie, Wenting Wang:
Idempotent distributed counters using a forgetful bloom filter. 879-892 - Daniel J. Dubois, Giuliano Casale:
OptiSpot: minimizing application deployment cost using spot cloud resources. 893-909 - Hyun Mi Jung, Yong Hwan Jung, Jang Won Choi:
The integrated management method of heterogeneous WIPS sensors. 911-919 - Hanjo Jeong, Yong-Ki Kim, Jaesoo Kim:
An evaluation-committee recommendation system for national R&D projects using social network analysis. 921-930 - Min-Cheol Jeon, Man-Seok Han, Jae-Uk Jang, Yong-Kyun Kim, Sun-Youl Seo, Gab-Jung Kim, Chang-Gyu Kim:
Evaluation of image reconstruction according to changing physical parameter. 931-938 - Kyuman Jeong, Han-Jin Cho:
Photo quality enhancement by relocating subjects. 939-948 - Seung-Mi Moon, Sook-Youn Kwon, Jae-Hyun Lim:
Implementation of smartphone-based color temperature and wavelength control LED lighting system. 949-966 - Hoill Jung, Kyung-Yong Chung:
Life style improvement mobile service for high risk chronic disease based on PHR platform. 967-977 - Jung-Soo Han, Gui-Jung Kim:
A method of unsupervised machine learning based on self-organizing map for BCI. 979-985 - Ill-Woo Park, Jeonghye Han:
Teachers' views on the use of robots and cloud services in education for sustainable development. 987-999 - DongBum Seo, You-Boo Jeon, Song-Hee Lee, Keun-Ho Lee:
Cloud computing for ubiquitous computing on M2M and IoT environment mobile application. 1001-1013 - Seong-Taek Park, Eun-Mi Park, Joung-Hae Seo, GuoZhong Li:
Erratum to: Factors affecting the continuous use of cloud service: focused on security risks. 1015
Volume 19, Number 3, September 2016
- Mostafa Ghobaei-Arani, Sam Jabbehdari, Mohammad Ali Pourmina:
An autonomic approach for resource provisioning of cloud services. 1017-1036 - Sandra Catalán, Francisco D. Igual, Rafael Mayo, Rafael Rodríguez-Sánchez, Enrique S. Quintana-Ortí:
Architecture-aware configuration and scheduling of matrix multiplication on asymmetric multicore processors. 1037-1051 - Somayeh Kianpisheh, Nasrollah Moghaddam Charkari, Mehdi Kargahi:
Ant colony based constrained workflow scheduling for heterogeneous computing systems. 1053-1070 - Najme Mansouri:
QDR: a QoS-aware data replication algorithm for Data Grids considering security factors. 1071-1087 - Hang Zhou, Qing Li, Weiqin Tong, Samina Kausar, Hai Zhu:
P-Aware: a proportional multi-resource scheduling strategy in cloud data center. 1089-1103 - Anna Sikora, Tomàs Margalef, Josep Jorba:
Automated and dynamic abstraction of MPI application performance. 1105-1137 - Mohsin Fayyaz, Khurram Aziz, Ghulam Mujtaba:
Performance analysis of optical interconnects' architectures for data center networks. 1139-1161 - Nasrin Akhter, Mohamed Othman:
Energy aware resource allocation of cloud data center: review and open issues. 1163-1182 - Dmitry A. Zaitsev, Tatiana R. Shmeleva, Werner Retschitzegger, Birgit Pröll:
Security of grid structures under disguised traffic attacks. 1183-1200 - Lei Wang, Lingyu Xu, Yunlan Xue, Gaowei Zhang:
Group behavior time series anomaly detection in specific network space based on separation degree. 1201-1210 - Jianhong Zhang, Jian Mao:
Efficient public key encryption with revocable keyword search in cloud computing. 1211-1217 - Gonzalo Hernández, Roberto León, Alejandra Urtubia:
Detection of abnormal processes of wine fermentation by support vector machines. 1219-1225 - Raed Karim, Chen Ding, Ali Miri, Md Shahinur Rahman:
Incorporating service and user information and latent features to predict QoS for selecting and recommending cloud service compositions. 1227-1242 - Jie Zhang, Jining Yan, Yan Ma, Dong Xu, Pengfei Li, Wei Jie:
Infrastructures and services for remote sensing data production management across multiple satellite data centers. 1243-1260 - Jeongmin Kim, Hyun-Sook Chung, MyounJae Lee, Yunseok Chang, Jongjin Jung, Pan-Seop Shin:
Design of user-centric semantic rights model for validation of user-generated content. 1261-1273 - Qingyuan Zhou:
Research on heterogeneous data integration model of group enterprise based on cluster computing. 1275-1282 - Zheng Xu, Lin Mei, Chuanping Hu, Yunhuai Liu:
The big data analytics and applications of the surveillance system using video structured description technology. 1283-1292 - Bao Zhu, Le-An Yu, Zhiqiang Geng:
Cost estimation method based on parallel Monte Carlo simulation and market investigation for engineering construction project. 1293-1308 - Jia Zhu, Chuanhua Xu, Zhixu Li, Gabriel Pui Cheong Fung, Xueqin Lin, Jin Huang, Changqin Huang:
An examination of on-line machine learning approaches for pseudo-random generated data. 1309-1321 - Yushan Zhang, Han Huang, Zhifeng Hao, Guiwu Hu:
First hitting time analysis of continuous evolutionary algorithms based on average gain. 1323-1332 - Lin Li, Jingjing Ye, Fang Deng, Shengwu Xiong, Luo Zhong:
A comparison study of clustering algorithms for microblog posts. 1333-1345 - R. Suganya Devi, D. Manjula, Vijayan Sugumaran:
Efficient indexing structure to handle durable queries through web crawling. 1347-1358 - Shanliang Yang, Mei Yang, Song Wang, Kedi Huang:
Adaptive immune genetic algorithm for weapon system portfolio optimization in military big data environment. 1359-1372 - Chuanliang Xia:
Property preservation of refinement for Petri net based representation for embedded systems. 1373-1384 - Qingsheng Zhu, Ji Feng, Jinlong Huang:
Weighted natural neighborhood graph: an adaptive structure for clustering and outlier detection with no neighborhood parameter. 1385-1397 - Shunxiang Zhang, Yin Wang, Shiyao Zhang, Guangli Zhu:
Building associated semantic representation model for the ultra-short microblog text jumping in big data. 1399-1410 - Chunchun Hu, Nianxue Luo, Qiansheng Zhao:
Fast fuzzy trajectory clustering strategy based on data summarization and rough approximation. 1411-1420 - Lei Wang, Lingyu Xu, Jie Yu, Yunlan Xue, Gaowei Zhang:
Context-aware edge similarity segmentation algorithm of time series. 1421-1436 - Penghao Xu, Bing Yan, Shouwei Hu:
DOA estimation of multiple sources in sparse space with an extended array technique. 1437-1447 - Fanqi Meng, Xiaohong Su, Zhaoyang Qu:
Nonlinear approach for estimating WCET during programming phase. 1449-1459 - Zhige Jia, Zhengsong Chen, Dijin Wang, Pengfei Yu:
Time series analysis of carrier phase differences for dual-frequency GPS high-accuracy positioning. 1461-1474 - Xiao Wei, Jun Zhang, Daniel Dajun Zeng, Qing Li:
A multi-level text representation model within background knowledge based on human cognitive process for big data analysis. 1475-1487 - Jie-Yu Wang, Hai-Cheng Xu:
Transportation route optimization with cost object in China. 1489-1501 - Junping Xiang, Zonghai Chen:
An adaptive traffic signal coordination optimization method based on vehicle-to-infrastructure communication. 1503-1514 - Seoyoung Kim, Jieun Choi, Yoonhee Kim:
Adaptive application-aware job scheduling optimization strategy in heterogeneous infrastructures. 1515-1526 - Md. Azam Hossain, Cao Ngoc Nguyen, Jik-Soo Kim, Soonwook Hwang:
Exploiting resource profiling mechanism for large-scale scientific computing on grids. 1527-1539 - Yongseok Son, Hara Kang, Hyuck Han, Heon Young Yeom:
An empirical evaluation and analysis of the performance of NVM express solid state drive. 1541-1553 - Yoonsung Nam, Minkyu Kang, Hanul Sung, Jincheol Kim, Hyeonsang Eom:
Workload-aware resource management for software-defined compute. 1555-1570 - Jaehun Lee, Kihan Choi, Youngjin Kim, Hyuck Han, Sooyong Kang:
Exploiting remote GPGPU in mobile devices. 1571-1583 - Gemoh Maliva Tihfon, Sanghyun Park, Jinsul Kim, Yongmin Kim:
An efficient multi-task PaaS cloud infrastructure based on docker and AWS ECS for application deployment. 1585-1597 - Jaehyung Park, Younho Jung, Yongmin Kim:
Cost-effective multicast routings in wireless mesh networks with multiple gateways. 1599-1605 - Jeong-ile Jeong:
A study on smart door lock control system. 1607-1617 - V. Saravanan, V. Mohanraj:
Maximizing QoS by cooperative vertical and horizontal handoff for tightly coupled WiMAX/WLAN overlay networks. 1619-1633 - Youngki Kim, Tae-Ung Kim, Seong-Taek Park, Jae-Rim Jung:
Establishing the importance weight of appropriability mechanism by using AHP: the case of the China's electronic industry. 1635-1646 - Eun-Mi Park, Joung-Hae Seo, Mi-Hyun Ko:
The effects of leadership by types of soccer instruction on big data analysis. 1647-1658 - Kyoo-Sung Noh:
A study on the position of CDO for improving competitiveness based big data in cluster computing environment. 1659-1669 - Won Il Seo, Jae-Hyun Lim:
Implementation of context prediction system based on event recurrence time. 1671-1682 - Sang Yeob Oh, Kyungyong Chung:
Vocabulary optimization process using similar phoneme recognition and feature extraction. 1683-1690
Volume 19, Number 4, December 2016
- Xiao Zhang, Yanjun Wu, Chen Zhao:
MrHeter: improving MapReduce performance in heterogeneous environments. 1691-1701 - Weiwei Zheng, Zhili Wang, Haoqiu Huang, Luoming Meng, Xuesong Qiu:
SPSRG: a prediction approach for correlated failures in distributed computing systems. 1703-1721 - Narendra Kumar Kamila, Lambodar Jena, Hemanta Kumar Bhuyan:
Pareto-based multi-objective optimization for classification in data mining. 1723-1745 - Binh Minh Nguyen, Dang Tran, Giang Nguyen:
Enhancing service capability with multiple finite capacity server queues in cloud data centers. 1747-1767 - Wanfeng Dou, Shoushuai Miao:
A fast parallel re-computation with redundancy mechanism for parallel digital terrain analysis. 1769-1785 - Sukhpal Singh, Inderveer Chana, Maninder Singh, Rajkumar Buyya:
SOCCER: Self-Optimization of Energy-efficient Cloud Resources. 1787-1800 - Chamseddine Hamdeni, Tarek Hamrouni, Faouzi Ben Charrada:
Adaptive measurement method for data popularity in distributed systems. 1801-1818 - Sanem Arslan, Haluk Rahmi Topcuoglu, Mahmut Taylan Kandemir, Oguz Tosun:
Asymmetrically reliable caches for multicore architectures under performance and energy constraints. 1819-1833 - Hyuncheol Kim, Seunghyun Yoon, Hongseok Jeon, Wonhyuk Lee, Seungae Kang:
Service platform and monitoring architecture for network function virtualization (NFV). 1835-1841 - Jinhong Yang, Hyojin Park, Kyuyeong Jeon, Jeong-ile Jeong, Jun Kyun Choi:
Serving a video into an image carousel: system design and implementation. 1843-1851 - Tomás Cerný, Michael J. Donahoo:
On energy impact of web user interface approaches. 1853-1863 - ByungRae Cha, Sun Park, JongWon Kim:
Availability analysis and case study of mobile-OTP key generation using skip sampling of voice. 1865-1878 - Jonghyuk Park, Nakhoon Baek, Sung-Ho Kim:
A text-based user interface scheme for low-tier embedded systems: an object-oriented approach. 1879-1884 - Jinlou Xie, Jianjian Luo, Qingyuan Zhou:
Data mining based quality analysis on informants involved applied research. 1885-1893 - Shunxiang Zhang, Xiaobo Yin, Congna He:
The automatic estimating method of the in-degree of nodes in associated semantic network oriented to big data. 1895-1905 - Yun-chuan Yang, Li-ping Liao, Liubin Yan, Xiao-chuan Hu, Hong-bao Huang, Shuai Xiao:
The big data analysis of land use evolution and its ecological security responses in Silver Beach of China by the clustering of spatial patterns. 1907-1924 - Ziyuan Sun, Yunhai Zhu, Ying Li, Mengdi Xie, Gang Li, Jianhua Song:
Machine learning based control rights analysis of critical resources and the optimal ownership for management integration. 1925-1935 - Meng Fansheng, Li Bin, Donghui Yang, Yue Zenglei, Liu Zhi:
Energy efficiency evaluation method based on multi-model fusion strategy. 1937-1949 - Youyuan Wang, Hang Liu, Jiangang Bi, Feng Wang, Chunyu Yan, Taiyun Zhu:
An approach for Condition Based Maintenance strategy optimization oriented to multi-source data. 1951-1962 - Di Shen, Lei Wang, Chengfan Li:
Event energy clustering and evaluation based on shock wave model. 1963-1974 - Kunfang Song, Hongwei Lu:
High-performance XML modeling of parallel queries based on MapReduce framework. 1975-1986 - Ming Huang, Xinhan Huang, Xikai Tu, Zefang Li, Yue Wen:
An online gain tuning proxy-based sliding mode control using neural network for a gait training robotic orthosis. 1987-2000 - Juan Du, Renzhi He, Vijayan Sugumaran:
Clustering and ontology-based information integration framework for surface subsidence risk mitigation in underground tunnels. 2001-2014 - Guodong Li, Wenxia Xu, Bing Yang, Awudong Buhailiqiemu, Xiaojuan Chang:
A method analysis for hail cloudy prediction based on CNN. 2015-2026 - Ming Huang, Yanzhu Du, Jianguang Zhang, Yong Zhang:
A topological enabled three-dimensional model based on constructive solid geometry and boundary representation. 2027-2037 - Long Zhao, LinFeng Jiang, Xiangjun Dong:
Supervised feature selection method via potential value estimation. 2039-2049 - Shao Aijun, Liya Zhao, Wang Shiwen:
Analysis of the dynamic impact of Three-Gorge Project on regime of soil water and salt in Yangtze River Delta. 2051-2060 - Wei Duan, Changqing Li, Pei Zhang, Qing Chang:
Game modeling and policy research on the system dynamics-based tripartite evolution for government environmental regulation. 2061-2074 - Qinghua Wu, Hanmin Liu, Xuesong Yan:
Multi-label classification algorithm research based on swarm intelligence. 2075-2085 - Xiao Liang, Guanglei Meng, Haitao Luo, Xia Chen:
Dynamic path planning based on improved boundary value problem for unmanned aerial vehicle. 2087-2096 - Shuwei Jing, Zhanwen Niu, Chun-Bin Tung, Zih-Ping Ho:
The application of terms mining technique to clustering participant's character patterns in the enterprise management. 2097-2107 - Qingyuan Zhou, Ranran Liu:
Strategy optimization of resource scheduling based on cluster rendering. 2109-2117 - Yu Wang, Yao Chen:
Multi-CODP adjustment model and algorithm driven by customer requirements in dynamic environments. 2119-2131 - Chao Lu, Jia-lu Chang:
Beijing Cultural and Creative Industry policy effect evaluation based on fuzzy comprehensive evaluation. 2133-2143 - Zhen You, Jinyun Xue, Zhengkang Zuo:
Unified formal derivation and automatic verification of three binary-tree traversal non-recursive algorithms. 2145-2156 - Xiaoqing Zuo, Hongchu Yu, Chenbo Zi, Xiaokun Xu:
The atmospheric disturbance correction model in slope deformation monitoring using IBIS-L system. 2157-2167 - Chuanhe Shen, Zhe Xu, Yanchun Yang:
A reduced pricing model for mezzanine financing based on options and support vector machines. 2169-2177 - Bin Hu, Huanyan Qian, Yi Shen, Jia-xing Yan:
An optimal path finding strategy in networks based on random walk. 2179-2188 - Hui Zhang, Jinzhao Wu, Jianguang Lu, Juan Tang:
Safety verification of finite real-time nonlinear hybrid systems using enhanced group preserving scheme. 2189-2199 - Wei Gao, Yun Guo, Kaiyun Wang:
Ontology algorithm using singular value decomposition and applied in multidisciplinary. 2201-2210 - Xiaoxi Fu, Zhanwen Niu, Ming-Kuei Yeh:
Research trends in sustainable operation: a bibliographic coupling clustering analysis from 1988 to 2016. 2211-2223 - Eunji Hwang, Seontae Kim, Jik-Soo Kim, Soonwook Hwang, Young-ri Choi:
On the role of application and resource characterizations in heterogeneous distributed computing systems. 2225-2240 - Baoyu Xu, Wu Zhang, Xian-He Sun, Yang Wang:
A memory-driven scheduling scheme and optimization for concurrent execution in GPU. 2241-2250 - Atif Alamri:
Nature-inspired multimedia service composition in a media cloud-based healthcare environment. 2251-2260 - Hoill Jung, Hyun Yoo, Kyungyong Chung:
Associative context mining for ontology-driven hidden knowledge discovery. 2261-2271 - Ji-won Han, Jaechoon Jo, Hyesung Ji, Heuiseok Lim:
A collaborative recommender system for learning courses considering the relevance of a learner's learning skills. 2273-2284 - Seok-Woo Jang, Myunghee Jung:
Robust detection of mosaic regions in visual image data. 2285-2293 - Hyun Mi Jung, Ki-Bong Kim, Han-Jin Cho:
A study of android malware detection techniques in virtual environment. 2295-2304 - Young-Seok Choi, Kwangmin Hyun, Jae Yeon Choi:
Assessing multiscale permutation entropy for short electroencephalogram recordings. 2305-2314 - Jungsun Jang, Yeonsoo Lee, Seolhwa Lee, Dongwon Shin, Dongjun Kim, Hae-Chang Rim:
A novel density-based clustering method using word embedding features for dialogue intention recognition. 2315-2326 - Seoung-hyun Koh, Yen-Yoo You, Do-sung Na:
Object-based dynamic influence measurement model (DIMM) using social data (on facebook). 2327-2334 - Kun-Hee Han, Woo-Sik Bae:
Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices. 2335-2341
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.