default search action
International Journal of Grid and Utility Computing, Volume 11
Volume 11, Number 1, 2020
- Aomei Li, Wanli Jiang, Po Ma, Jiahui Guo, Weihua Yuan, Dehui Dai:
A real-time matching algorithm using sparse matrix. 1-9 - Huanyu Li:
A novel web image retrieval method: bagging weighted hashing based on local structure information. 10-20 - Tetsuya Shigeyasu, Ayaka Sonoda:
Detection and mitigation of collusive interest flooding attack on content centric networking. 21-29 - Abdelhalim Hacini, Mourad Amad:
A new overlay P2P network for efficient routing in group communication with regular topologies. 30-48 - Rodrigo Moreira, Flávio de Oliveira Silva, Pedro Frosi Rosa, Rui L. Aguiar:
A smart network and compute-aware Orchestrator to enhance QoS on cloud-based multimedia services. 49-61 - Alessandro Cilardo, Mirko Gagliardi, Daniele Passaretti:
Hardware support for thread synchronisation in an experimental manycore system. 62-71 - Nuno Guimarães, Filipe Miranda, Álvaro Figueira:
Identifying journalistically relevant social media texts using human and automatic methodologies. 72-83 - Kazunori Uchida, Leonard Barolli:
Dijkstra algorithm-based ray tracing for tunnel-like structures. 84-92 - Tomoyuki Ishida, Yangzhicheng Lu, Akihiro Miyakawa, Kaoru Sugita, Yoshitaka Shibata:
Implementation of a high-presence immersive traditional crafting system with remote collaborative work support. 93-102 - Alessandro Di Stefano, Antonella Di Stefano, Giovanni Morana:
Scheduling communication-intensive applications on Mesos. 103-114 - Arianit Maraj, Ermir Rogova, Genc Jakupi:
Testing of network security systems through DoS, SQL injection, reverse TCP and social engineering attacks. 115-133
Volume 11, Number 2, 2020
- Silvia Angeloni:
Domo Farm 4.0. 135-142 - Ihtisham Ali, Susmit Bagchi:
Algorithmic node classification in AND/OR mobile workflow graph. 143-168 - Abrar Omar Alkhamisi, Seyed M. Buhari, Georgios Tsaramirsis, Mohammed Basheri:
An integrated incentive and trust-based optimal path identification in ad hoc on-demand multipath distance vector routing for MANET. 169-184 - Jia-Chun Lin, Ming-Chang Lee, Ingrid Chieh Yu, Einar Broch Johnsen:
A configurable and executable model of Spark Streaming on Apache YARN. 185-195 - Carlos Melo, Jamilson Dantas, Paulo R. M. Maciel, Danilo Mendonça Oliveira, Jean Araujo, Rúbens de Souza Matos Júnior, Iure Fé:
Models for hyper-converged cloud computing infrastructures planning. 196-208 - Caio Yuri da Silva Costa, Eduardo Alchieri:
Architecture for diversity in the implementation of dependable and secure services using the state machine replication approach. 209-220 - Koichiro Sugihara, Naohiro Hayashibara:
Target exploration by Nomadic Lévy walk on unit disk graphs. 221-229 - Vinícius Fülber-Garcia, Giovanni Venâncio de Souza, Elias Procópio Duarte Jr., Thales Nicolai Tavares, Leonardo da Cruz Marcuzzo, Carlos R. P. dos Santos, Muriel Figueredo Franco, Lucas Bondan, Lisandro Zambenedetti Granville, Alberto Egon Schaeffer Filho, Filip De Turck:
On the design and development of emulation platforms for NFV-based infrastructures. 230-242 - Marco de Benedictis, Antonio Lioy, Paolo Smiraglia:
Towards a secure and lightweight network function virtualisation environment. 243-252 - Wendy Osborn:
A spatial access method approach to continuous k-nearest neighbour processing for location-based services. 253-266 - Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
A methodology for automated penetration testing of cloud applications. 267-277 - Raziq Yaqub, Fahd Ali Shifa, Muhammad Fasih Uddin Butt:
Preferential charging for government authorised emergency electric vehicles. 278-289
Volume 11, Number 3, 2020
- Jie Yang, Tao Gao, Shengli Yuan, Heng Shi, Zhenli Zhang:
Research on hardware-in-the-loop simulation of single point suspension system based on fuzzy PID. 291-301 - Amel Ksentini, Maha Jebalia, Sami Tabbane:
A study on fog computing architectures and energy consumption approaches regarding QoS requirements. 302-314 - Dietmar Nedbal, Mark Stieninger:
Success factor analysis for cloud services: a comparative study on software as a service. 315-329 - Maxwell Eduardo Monteiro, Rodolfo da Silva Villaça, Kaio Cesar Ferreira Simonassi, Renan Freire Tavares, Cássio Chaves Reginato:
Implementing the software defined management framework. 330-344 - Mitali Bansal, Sanjay Kumar Malik, Sanjay Kumar Dhurandher, Isaac Woungang:
Policies and mechanisms for enhancing the resource management in cloud computing: a performance perspective. 345-366 - Jing Wang, Arun Kumar Sangaiah, Wei Liu:
A hybrid collaborative filtering recommendation algorithm: integrating content information and matrix factorisation. 367-377 - Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:
Classification of cognitive algorithms for managing services used in cloud computing. 378-387 - Naoto Fukae, Hiroyoshi Miwa, Akihiro Fujihara:
Model for generation of social network considering human mobility and interaction. 388-397 - Eliza Gomes, Mario A. R. Dantas, Patricia Della Méa Plentz:
A proposal for a healthcare environment with a real-time approach. 398-408 - Takuro Fujita, Yusuke Gotoh:
Design and implementation of broadcasting system for selective contents considering interruption time. 409-418 - João Ferreira, Gustavo Callou, Paulo R. M. Maciel, Dietmar Tutsch:
An algorithm to optimise the energy distribution of data centre electrical infrastructures. 419-433
Volume 11, Number 4, 2020
- P. Jayalakshmi, R. Saravanan:
ACO-based enhanced energy-efficient intelligent routing protocol for MANET. 435-442 - K. S. Preetha, S. Kalaivani:
Analysis of spectrum handoff schemes for cognitive radio networks considering secondary user mobility. 443-456 - Kalaivani Dhanasegaran, P. V. S. S. R. Chandra Mouli:
Link survivability rate-based clustering for QoS maximisation in VANET. 457-467 - Qiaoge Xu:
Research on data access control algorithm based on fine-grained cloud storage. 468-473 - Dante Arias Torres, José Adán Hernández-Nolasco, Miguel A. Wister, Pablo Pancardo:
Detection of fatigue on gait using accelerometer data and supervised machine learning. 474-485 - José dos Santos Machado, Edward David Moreno, Admilson de Ribamar Lima Ribeiro:
A survey on Fog Computing and its research challenges. 486-495 - A. Stephen Dass, J. Prabhu:
Hybrid coherent encryption scheme for multimedia big data management using cryptographic encryption methods. 496-508 - Priyan Malarvizhi Kumar, Usha Devi Gandhi, Shakila Basheer, Parthasarathy Panchatcharam:
A study on data de-duplication schemes in cloud storage. 509-516 - Mingcheng Qu, Xianghu Wu, Yongchao Tao, Guannan Wang, Ziyu Dong:
Research on regression test method based on multiple UML graphic models. 517-524 - Weibin Wang, Minoru Uehara, Haruo Ozaki:
Evaluation of navigation based on system optimal traffic assignment for connected cars. 525-532 - Lin Cheng:
Research on relationship between geomantic omen and housing choice in big data era. 533-539 - Jianqiang Xiong, Le Yuan, Dingding Liao, Jun Wu:
Study on NVH robustness evaluation method of high-mileage automobile based on systematic sampling. 540-546 - Li Jian:
Multi-objective optimisation of traffic signal control based on particle swarm optimisation. 547-553 - José dos Santos Machado, Danilo Souza Silva, Raphael Silva Fontes, Adauto Cavalcante Menezes, Edward David Moreno, Admilson de Ribamar Lima Ribeiro:
Performance analysis of StaaS on IoT devices in fog computing environment using embedded systems. 554-567 - Deepali Rahul Vora, R. Kamatchi:
Predicting students' academic performance: Levy search of cuckoo-based hybrid classification. 568-585
Volume 11, Number 5, 2020
- Srinivas Dibbur Byrappa, Sujay N. Hegde, Rajan M. A, Krishnappa H. K:
An efficient greedy task scheduling algorithm for heterogeneous inter-dependent tasks on computational grids. 587-601 - J. Devagnanam, N. M. Elango:
Chronological and exponential-based Lion optimisation for optimal resource allocation in cloud. 602-614 - Guto Leoni Santos, Demis Gomes, Djamel Sadok, Judith Kelner, Élisson Rocha, Patricia Takako Endo:
How do checkpoint mechanisms and power infrastructure failures impact on cloud applications? 615-628 - Diletta Cacciagrano, Flavio Corradini, Matteo Micheletti, Leonardo Mostarda:
Applying REECHD to non-uniformly distributed heterogeneous devices. 629-645 - Lucas Nunes Barbosa, Jonathan F. Gemmell, Miller Horvath, Tales Heimfarth:
Assessing distributed collaborative recommendations in different opportunistic network scenarios. 646-661 - Maharage Nisansala Sevwandi Perera, Takeshi Koshiba:
Combined interactive protocol for lattice-based group signature schemes with verifier-local revocation. 662-673 - Jung-Bin Li, Szu-Yin Lin, Yu-Hsiang Hsu, Ying-Chu Huang:
An empirical study of alternating least squares collaborative filtering recommendation for Movielens on Apache Hadoop and Spark. 674-682 - Júlio Mendonça, Ricardo Lima, Ermeson C. Andrade:
Evaluating and modelling solutions for disaster recovery. 683-704 - Olayinka Johnny, Marcello Trovati:
Big data inconsistencies and incompleteness: a literature review. 705-713 - Rui Humberto R. Pereira, João Vidal de Carvalho, Álvaro Rocha:
Towards an encompassing maturity model for the management of higher education institutions. 714-724 - Hisaaki Yamaba, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
On a user authentication method to realise an authentication system using s-EMG. 725-734
Volume 11, Number 6, 2020
- Modigari Narendra, M. L. Valarmathi, L. Jani Anbarasi, D. R. L. Prasanna:
A vector-based watermarking scheme for 3D models using block rearrangements. 737-746 - Ankita Sharma, Puja Munjal, Hema Banati:
Entropy-based classification of trust factors for cloud computing. 747-754 - Danilo Souza Silva, José dos Santos Machado, Admilson de Ribamar L. Ribeiro, Edward David Moreno Ordonez:
Towards self-optimisation in fog computing environments. 755-768 - Chinwe Peace Igiri, Yudhveer Singh, Deepshikha Bhargava, Samuel Shikaa:
Improved African buffalo optimisation algorithm for petroleum product supply chain management. 769-779 - Muneeb Ali Hamid, Yaser Hafeez, Bushra Hamid, Mamoona Humayun, N. Z. Jhanjhi:
Towards an effective approach for architectural knowledge management considering global software development. 780-791 - Pardeep Kumar, Seema Verma:
Hardware implementation of OLSR and improved OLSR (AOLSR) for AANETs. 792-800 - Vijaya Saraswathi R, L. Padma Sree, K. Anuradha:
Dynamic group key management scheme for clustered wireless sensor networks. 801-814 - Srinidhi NN, G. P. Sunitha, S. Raghavendra, S. M. Dilip Kumar, Victor Chang:
Hybrid energy-efficient and QoS-aware algorithm for intelligent transportation system in IoT. 815-826 - Kshira Sagar Sahoo, Somula Ramasubbareddy, Balamurugan Balusamy, B. Vikram Deep:
Analysing control plane scalability issue of software defined wide area network using simulated annealing technique. 827-837 - Sankar Sennan, P. Srinivasan, Somula Ramasubbareddy, Balamurugan Balusamy:
Energy-aware multipath routing protocol for internet of things using network coding techniques. 838-846 - Bruno Andriamanalimanana, Chen-Fu Chiang, Jorge E. Novillo, Sam Sengupta, Ali Tekeoglu:
Efficient variant transaction injection protocols and adaptive policy optimisation for decentralised ledger systems. 847-856 - Muddasar Ghani Khwaja, Saqib Mahmood, Ahmad Jusoh:
Online information bombardment! How does eWOM on social media lead to consumer purchase intentions? 857-867
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.