default search action
Future Generation Computer Systems, Volume 55
Volume 55, February 2016
- Somayeh Kianpisheh, Nasrollah Moghadam Charkari, Mehdi Kargahi:
Reliability-driven scheduling of time/cost-constrained grid workflows. 1-16 - Ertem Esiner, Anwitaman Datta:
Auditable versioned data storage outsourcing. 17-28 - Hamid Arabnejad, Jorge G. Barbosa, Radu Prodan:
Low-time complexity budget-deadline constrained workflow scheduling on heterogeneous resources. 29-40 - Marcos Dias de Assunção, Carlos Cardonha, Marco A. S. Netto, Renato Luiz de Freitas Cunha:
Impact of user patience on auto-scaling resource capacity for cloud services. 41-50 - Klavdiya Bochenina, Nikolay Butakov, Alexander Boukhanovsky:
Static scheduling of multiple workflows with soft deadlines in non-dedicated heterogeneous environments. 51-61 - Mohammad Hasanzadeh, Omid Jalilian, Alireza Rezvanian, Mohammad Reza Meybodi:
Service level agreement based adaptive Grid superscheduling. 62-73 - Gang Sun, Dan Liao, Vishal Anand, Dongcheng Zhao, Hongfang Yu:
A new technique for efficient live migration of multiple virtual machines. 74-86 - Yongzhi Wang, Jinpeng Wei, Shaolei Ren, Yulong Shen:
Toward integrity assurance of outsourced computing - a game theoretic perspective. 87-100 - Emanuele Carlini, Alessandro Lulli, Laura Ricci:
dragon: Multidimensional range queries on distributed aggregation trees. 101-115 - Thepparit Banditwattanawong, Masawee Masdisornchote, Putchong Uthayopas:
Multi-provider cloud computing network infrastructure optimization. 116-128 - Maristella Agosti, Nicola Ferro, Gianmaria Silvello:
Digital library interoperability at high level of abstraction. 129-146 - Bartosz Balis:
HyperFlow: A model of computation, programming approach and enactment engine for complex distributed workflows. 147-162
- Markus Helfert:
New Horizons of Cloud Computing. 163-164 - Chris Piechotta, Martin Grooss Olsen, Adam Enø Jensen, Joey W. Coleman, Peter Gorm Larsen:
A secure dynamic collaboration environment in a cloud context. 165-175 - Giuseppe Di Modica, Orazio Tomarchio:
Matchmaking semantic security policies in heterogeneous clouds. 176-185 - Nadia Ranaldo, Eugenio Zimeo:
Capacity-driven utility model for service level agreement negotiation of cloud services. 186-199 - Jesús García-Galán, Pablo Trinidad, Omer F. Rana, Antonio Ruiz Cortés:
Automated configuration support for infrastructure migration to the cloud. 200-212 - Javier Conejero, Omer F. Rana, Pete Burnap, Jeffrey Morgan, María Blanca Caminero, Carmen Carrión:
Analyzing Hadoop power consumption and impact on application QoS. 213-223
- Jemal H. Abawajy, Guojun Wang, Laurence T. Yang, Bahman Javadi:
Trust, Security and Privacy in Emerging Distributed Systems. 224-226 - Abdullah Alamri, Peter Bertók, James A. Thom, Adil Fahad:
The mediator authorization-security model for heterogeneous semantic knowledge bases. 227-237 - Sadegh Dorri Nogoorani, Rasool Jalili:
TIRIAC: A trust-driven risk-aware access control framework for Grid environments. 238-254 - Farag Azzedin, Mohammed Onimisi Yahaya:
Modeling BitTorrent choking algorithm using game theory. 255-265 - Ahmed Lounis, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, Yacine Challal:
Healing on the cloud: Secure cloud architecture for medical wireless sensor networks. 266-277 - Mohiuddin Ahmed, Abdun Naser Mahmood, Md. Rafiqul Islam:
A survey of anomaly detection techniques in financial domain. 278-288 - Narges Roshanbin, James Miller:
ADAMAS: Interweaving unicode and color to enhance CAPTCHA security. 289-310 - Dongsheng Li, Chao Chen, Qin Lv, Li Shang, Yingying Zhao, Tun Lu, Ning Gu:
An algorithm for efficient privacy-preserving item-based collaborative filtering. 311-320 - Daniel Díaz López, Ginés Dólera Tormo, Félix Gómez Mármol, Gregorio Martínez Pérez:
Dynamic counter-measures for risk-based access control systems: An evolutive approach. 321-335 - Wei Ye, Ruixuan Li, Xiwu Gu, Yuhua Li, Kunmei Wen:
Role mining using answer set programming. 336-343 - Sk. Md. Mizanur Rahman, M. Anwar Hossain, Mohammad Mehedi Hassan, Atif Alamri, Abdullah S. Alghamdi, Mukaddim Pathan:
Secure privacy vault design for distributed multimedia surveillance system. 344-352 - Wei Wang, Peng Xu, Hui Li, Laurence Tianruo Yang:
Secure hybrid-indexed search for high efficiency over keyword searchable ciphertexts. 353-361 - Chafika Benzaid, Karim Lounis, Ameer Al-Nemrat, Nadjib Badache, Mamoun Alazab:
Fast authentication in wireless sensor networks. 362-375 - Md. Shamsul Huda, Jemal H. Abawajy, Mamoun Alazab, Mali Abdollahian, Md. Rafiqul Islam, John Yearwood:
Hybrids of support vector machine wrapper and filter based framework for malware detection. 376-390 - Shuhong Chen, Guojun Wang, Weijia Jia:
Cluster-group based trusted computing for mobile social networks using implicit social behavioral graph. 391-400
- José Ángel Bañares, Jörn Altmann, Kurt Vanmechelen:
Economics of computing services. 401-402 - Alfonso Quarati, Andrea Clematis, Daniele D'Agostino:
Delivering cloud services with QoS requirements: Business opportunities, architectural solutions and energy-saving aspects. 403-427 - Mircea Moca, Cristian Marius Litan, Gheorghe Cosmin Silaghi, Gilles Fedak:
Multi-criteria and satisfaction oriented scheduling for hybrid distributed computing infrastructures. 428-443 - Rafael Tolosana-Calasanz, José Ángel Bañares, Congduc Pham, Omer F. Rana:
Resource management for bursty streams on multi-tenancy cloud environments. 444-459 - Mario Macías, Jordi Guitart:
Analysis of a trust model for SLA negotiation and enforcement in cloud markets. 460-472 - Fernando Koch, Marcos Dias de Assunção, Carlos Cardonha, Marco A. S. Netto:
Optimising resource costs of cloud computing for education. 473-479 - Gregory Katsaros, Pascal Stichler, Josep Subirats, Jordi Guitart:
Estimation and forecasting of ecological efficiency of virtual machines. 480-494 - Netsanet Haile, Jörn Altmann:
Value creation in software service platforms. 495-509
- Mao Lin Huang, Tze-Haw Huang, Xuyun Zhang:
A novel virtual node approach for interactive visual analytics of big datasets in parallel coordinates. 510-523 - Mingzhong Wang, Liehuang Zhu, Zijian Zhang:
Risk-aware intermediate dataset backup strategy in cloud-based data intensive workflows. 524-533 - Hanhua Chen, Xiaolong Cui, Hai Jin:
Top-k followee recommendation over microblogging systems by exploiting diverse information sources. 534-543
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.