default search action
International Journal of High Performance Computing and Networking, Volume 9
Volume 9, Numbers 1/2, 2016
- Tianzhu Wen, Aiqiang Xu, Jiayu Tang:
Study on extension negative selection algorithm. 1-7 - Liqiong Chen, Guisheng Fan, Huanhuan Zhang, Lizhong Xiao:
Petri nets-based method to model and analyse the self-healing web service composition. 8-18 - Shuchih Ernest Chang, Yu-Teng Jacky Jang, Wei-Cheng Shen, Wen-Chi Su:
Cocktail: a service-oriented cloud storage architecture for enhancing service quality. 19-30 - ZhiHui Lv, Jie Wu, Jie Bao, Patrick C. K. Hung:
OCReM: OpenStack-based cloud datacentre resource monitoring and management scheme. 31-44 - Guibo Liu, Zhan Wang, Dayong Luo, Ying Guo, Moon Ho Lee:
Fast circulant block Jacket transform based on the Pauli matrices. 45-51 - Weina Lu, Xiaohui Hu, Xiaotao Li, Yuan Wei:
A new method of QoS prediction based on probabilistic latent feature analysis and cloud similarity. 52-60 - Aobing Sun, Tongkai Ji, Jun Wang:
Cloud platform scheduling strategy based on virtual machine resource behaviour analysis. 61-69 - Xiaogang Wang, Jian Cao, Jie Wang:
A dynamic cloud service selection strategy using adaptive learning agents. 70-81 - Man Zhang, Zhenhua Duan, Qingshan Li, Hua Chu:
Transformation from business process models to BPEL with overlapped patterns involved. 82-92 - Guosheng Kang, Liqin Yang, Wei Xu, Zhaoyang Tian, Liang Zhang:
Artefact-centric business process configuration. 93-103 - Chang-Ai Sun, Guan Wang, Qing Wen, Dave Towey, Tsong Yueh Chen:
MT4WS: an automated metamorphic testing system for web services. 104-115 - Helan Liang, Yanhua Du:
Two-stage dynamic optimisation of service processes with temporal constraints. 116-126 - Qiping She, Qing Li, Juan Deng:
The study of multi-instance purchase decision-making for minimising customers' cost under fluctuating cloud demands. 127-133 - Shijun Liu, Ze-yu Di, Lei Wu, Li Pan, Yuliang Shi:
Probabilistic-based workload forecasting and service redeployment for multi-tenant services. 134-149 - Junling Zhang, Shijun Liu, Lizhen Cui, Lei Wu, Li Pan:
A Bayesian approach to performance modelling for multi-tenant applications using Gaussian models. 150-159 - Gang Tian, Chengai Sun, Keqing He, Xiang-min Ji:
Transferring auxiliary knowledge to enhance heterogeneous web service clustering. 160-169
Volume 9, Number 3, 2016
- Kok-Leong Ong, Andrzej Goscinski, Yuzhang Han, Peter Brezany, Zahir Tari, Lei Yan:
SSC: cloud-based data stream management in distributed environments. 171-189 - Yoshihiro Oyama, Jun Murakami, Shun Ishiguro, Osamu Tatebe:
Implementation of a deduplication cache mechanism using content-defined chunking. 190-205 - Sapna U. Prabhu, Rohin D. Daruwala:
Shared resource management in multi-core systems using LV competition model. 206-217 - Guangwei Xu, Yanbin Yang, Cairong Yan, Yanglan Gan:
A probabilistic verification algorithm against spoofing attacks on remote data storage. 218-229 - Rashmi M. Jogdand, S. B. Batlad, Durgaprasad Gangodkar:
CSaaS - a multi-cloud framework for secure file storage technology using open ZFS. 230-241 - Seppo J. Ovaska, Roy E. Dragseth, Svenn A. Hanssen:
Direct-to-chip liquid cooling for reducing power consumption in a subarctic supercomputer centre. 242-249 - Amit Barve, Brijendra Kumar Joshi:
Fast parallel lexical analysis on multi-core machines. 250-257 - Ying Tang, Zhan Zhou, Xiaoying Shi, Jing Fan:
Parallel computing of texture-optimisation-based flow visualisation on CUDA. 258-270
Volume 9, Number 4, 2016
- Haythem Ahmad Bany Salameh, Mohammed Fozi Dhainat:
Event-driven hybrid MAC protocol for a two-tier cognitive wireless sensor network: design and implementation. 271-280 - Izzat Alsmadi:
The integration of access control levels based on SDN. 281-290 - Fouad Benamrane, Francisco J. Ros, Mouad Ben Mamoun:
Synchronisation cost of multi-controller deployments in software-defined networks. 291-298 - Somchart Fugkeaw, Hiroyuki Sato:
Embedding lightweight proxy re-encryption for efficient attribute revocation in cloud computing. 299-309 - Samer Samarah:
Vector-based data prediction model for wireless sensor networks. 310-315 - Qiang Duan, Athanasios V. Vasilakos:
Federated selection of network and cloud services for high-performance software-defined cloud computing. 316-327 - Lo'ai Tawalbeh, Yousef Haddad, Omar Khamis, Elhadj Benkhelifa, Yaser Jararweh, Fahd M. Al-Dosari:
Efficient and secure software-defined mobile cloud computing infrastructure. 328-341 - Fatiha Houacine, Samia Bouzefrane, Aghiles Adjaz:
Service architecture for multi-environment mobile cloud services. 342-355
Volume 9, Numbers 5/6, 2016
- Lingbo Jiang, Yuping Wang, Tiehua Wen, Jianfeng Tan:
Remote attestation approach by cross-layer security policy translation. 357-371 - Junfeng Tian, Hongqiang Jiao, Baomin Wang, Chao Chen:
An e-commerce trust model based on expanded subjective logic. 372-381 - Qian Gao, Zhen Han, Yong-Zhong He, Daoshun Wang:
Two image encryption methods with hiding effect based on moiré pattern. 382-393 - Longfei Liu, Xiaoyuan Yang, Xiaoni Du, Bin Wei:
On the k-error linear complexity of generalised cyclotomic sequences. 394-400 - Lixia Wang, Qing Zhu:
Utility-based anonymisation for dataset with multiple sensitive attributes. 401-408 - Hao Peng, Dandan Zhao, Jianmin Han, Jianfeng Lu:
An anonymity mechanism with reduced server-side cost in peer-to-peer networks. 409-416 - Tanping Zhou, Xiaoyuan Yang, Wei Zhang, Liqiang Wu:
Efficient fully homomorphic encryption with circularly secure key switching process. 417-422 - Linchen Yu, Hong Yao, Xiaofei Liao:
A novel GPU resources management and scheduling system based on virtual machines. 423-430 - Xiang Shuang, Zhao Bo, Xiao Yu, An Yang:
Security risk analysis of IaaS based on the abstract state machine model. 431-442 - Yanfeng Shi, Jiqiang Liu, Zhen Han, Shuo Qiu:
Deterministic attribute-based encryption. 443-450 - Yixuan Zhang, Jingsha He, Bin Zhao, Ruohong Liu:
Application of game theory for dynamic access control in security systems. 451-461 - Ting Feng, Kenli Li, Yunchuan Qin, Siyang Yu:
A dynamic active shield against shield rerouting attack. 462-469 - Hongwei Zhou, Wenchang Shi, Jinhui Yuan, Fulin Li:
BeCFI: detecting hidden control flow with performance monitoring counters. 470-479 - Jing-Jing Wang, Jiayong Chen, Xiaoyuan Yang:
Research on generating good key sequence based on chaos. 480-488 - Zongmin Cui, Guangyong Gao, Caixue Zhou, Jing Yu, An-Yuan Deng, Changshou Deng:
Efficient key management for publish/subscribe system in cloud scenarios. 489-498
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.