default search action
International Journal of High Performance Computing and Networking, Volume 8
Volume 8, Number 1, 2015
- James Elton, Paul W. H. Chung:
An integrated communications platform incorporating SMS and e-mail to support mobile applications. 3-15 - Axel Korthaus, Wei Dai:
Opportunities and challenges for mobile crowdsourcing - conceptualisation of a platform architecture. 16-27 - Paul Moynihan, Wei Dai:
A rule-based service framework for supply chain management. 28-46 - Lixin Zhou, Catherine Xiaocui Lou, Yiran Chen, Yaxi Xia, Ping Li:
Multi-agent-based smart cargo tracking system. 47-60 - Donghua Chen, Xiaomin Zhu, Wei Dai, Runtong Zhang:
Socially aware mobile application integrations in heterogeneous environments. 61-70 - Catherine Xiaocui Lou, Wei Dai:
Optimal and stable supply chain services system: integrating management services with robust optimisation modelling. 71-80 - Yongqiang Li, Wei Dai, Anona Armstrong, Andrew Clarke, Miaoli Du:
Developing an integrated supply chain system for small businesses consortium in Australia: a service-oriented PHOENIX solution. 81-89
Volume 8, Number 2, 2015
- Can Xiang, Chunming Tang:
Securely verifiable outsourcing schemes of matrix calculation. 93-101 - Chuan Yao, Li Xu, Xinyi Huang:
Batch public auditing for distributed mobile cloud computing. 102-109 - Zhu Song, Shijie Zhou, Jiaqing Luo, Weiwei Deng:
The B+-tree-based method for nearest neighbour queries in traffic simulation systems. 110-123 - Hao Wang, Zhihua Zheng, Bo Yang:
New identity-based key-encapsulation mechanism and its applications in cloud computing. 124-134 - Yongqiang Zhang, Qiang Liu, Chengpei Tang, Haibo Tian:
A lattice-based designated verifier signature for cloud computing. 135-143 - Teng Li, Jian Mao, Yue Chen, Pei Li, Jie Chen:
Rating cloud storage service by collaborative remote data checking. 144-153 - Yilei Wang, Willy Susilo, Tao Li, Qiuliang Xu:
File sharing in cloud computing using win stay lose shift strategy. 154-166 - Xiufeng Zhao, Xiang Wang, Hao Xu, Yilei Wang:
Cloud data integrity checking protocol from lattice. 167-175 - Guoyan Zhang, Jing Qin:
Lattice-based threshold cryptography and its applications in distributed cloud computing. 176-185 - Mir Sajjad Hussain Talpur, Md. Zakirul Alam Bhuiyan, Guojun Wang:
Energy-efficient healthcare monitoring with smartphones and IoT technologies. 186-194
Volume 8, Number 3, 2015
- Francesco Gargiulo, Gabriella Gigante, Massimo Ficco:
A semantic driven approach for requirements consistency verification. 201-211 - Konstantinos Kostantos, Dimosthenis Kyriazis, Marinos Themistocleous:
Real-time event management in cloud environments. 212-221 - Taimur Al Said, Omer F. Rana, Pete Burnap:
VMInformant: an instrumented virtual machine to support trustworthy cloud computing. 222-234 - Francesco Longo, Dario Bruneo, Massimo Villari, Antonio Puliafito, Eliot E. Salant, Yaron Wolfsthal:
Towards the future internet: the RESERVOIR, VISION Cloud, and CloudWave experiences. 235-247 - Giuseppe Caragnano, Lorenzo Mossucca, Matteo Alessandro Francavilla, Pietro Ruiu, Olivier Terzo:
Design and implementation of a cloud computing platform for electromagnetic modelling. 248-258 - Francesco Moscato:
Exploiting model profiles in requirements verification of cloud systems. 259-274 - Irina A. Leshcheva, Tatiana Gavrilova:
How the cognitive features testing can assist in evaluating collective ontology engineering. 275-284 - Alberto De Francesco, Claudia Di Napoli, Maurizio Giordano, Giuseppe Ottaviano, Raffaele Perego, Nicola Tonellotto:
MIDAS: a cloud platform for SOA testing as a service. 285-300
Volume 8, Number 4, 2015
- Di Zhao:
High-accuracy non-gradient optimiser by vectorised iterative discrete approximation and single-GPU computing. 301-314 - Antoine Bossard, Keiichi Kaneko, Shietung Peng:
Node-to-set disjoint paths routing in a metacube. 315-323 - Fei Cao, Mengxia Michelle Zhu:
Decentralised hybrid workflow scheduling algorithm for minimum end-to-end delay in heterogeneous computing environment. 324-336 - Wanfeng Dou, Shoushuai Miao, Yan Li:
Fault-tolerant parallel computing for DEM data blocks with layered dependent relationships based on redundancy mechanism. 337-344 - Eric Gamess, Manuel Contreras:
A proposal for an algorithm to count nodes using wireless technologies. 345-357 - Sheela Divakaran, Chellamuthu Chinnagounder:
A framework for topology-based traffic grooming with restoration in optical networks. 358-369 - Deng-ao Li, Hailong Hao, Guolong Ji, Jumin Zhao:
An adaptive clustering algorithm based on improved particle swarm optimisation in wireless sensor networks. 370-380 - Yan-Shan Tian, Qingguo Zhou, Hongyu Sun, Jiong Wu, Xun-Chao Zhang, Kuan-Ching Li:
GPU-accelerated visualisation of ADS granular flow target model. 381-389
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.