default search action
Cluster Computing, Volume 21
Volume 21, Number 1, March 2018
- Ao Zhou, Shangguang Wang, Qibo Sun, Jinglin Li, Qinglin Zhao, Fangchun Yang:
Support for spot virtual machine purchasing simulation. 1-13 - Su-Kyung Yoon, Young-Sun Youn, Min-Ho Son, Shin-Dug Kim:
Harmonized memory system for object-based cloud storage. 15-28 - L. Priya, Sheila Anand:
Object recognition and 3D reconstruction of occluded objects using binocular stereo. 29-38 - R. Kishorekumar, P. Deepa:
Automatic change detection using multiindex information map on high-resolution remote sensing images. 39-49 - Opinder Singh, Jatinder Singh, Ravinder Singh:
Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET. 51-63 - R. Rajamohamed, J. Manokaran:
Improved credit card churn prediction based on rough clustering and supervised learning techniques. 65-77 - Ravi Subban, N. Susitha, Dattatreya P. Mankame:
Efficient iris recognition using Haralick features based extraction and fuzzy particle swarm optimization. 79-90 - Mukil Alagirisamy, Chee-Onn Chow:
An energy based cluster head selection unequal clustering algorithm with dual sink (ECH-DUAL) for continuous monitoring applications in wireless sensor networks. 91-103 - S. Angeline Julia, Paul Rodrigues:
A case study of HMS using CIPA. 105-113 - K. L. Neela, V. Kavitha:
Enhancement of data confidentiality and secure data transaction in cloud storage environment. 115-124 - M. Sugadev, E. Logashanmugam:
Corporate feed based metamaterial antenna for wireless applications. 125-134 - V. C. Maha Vishnu, M. Rajalakshmi, Raju Nedunchezhian:
Intelligent traffic video surveillance and accident detection system with dynamic traffic signal control. 135-147 - M. Veeresha, M. Sugumaran:
Hybrid spatial air index for processing queries in road networks. 149-161 - Dinesh Komarasamy, Muthuswamy Vijayalakshmi:
ScHeduling of jobs and Adaptive Resource Provisioning (SHARP) approach in cloud computing. 163-176 - A. Karthikeyan, P. Senthil Kumar:
GALS implementation of randomly prioritized buffer-less routing architecture for 3D NoC. 177-187 - Gunasekaran Manogaran, Daphne Lopez:
A Gaussian process based big data processing framework in cluster computing environment. 189-204 - I. Nelson, Chinnamuthu Annadurai, Rajakani Kalidoss, B. Partibane:
Mitigation of co-channel interferences in cognitive multi-carrier code division multiple access system by singular value decomposition techniques. 205-211 - Priyan Malarvizhi Kumar, Usha Devi Gandhi:
Energy efficient node selection algorithm based on node performance index and random waypoint mobility model in internet of vehicles. 213-227 - A. Ravi, M. N. Giriprasad, P. V. Naganjaneyulu:
SAR images denoising using a novel stochastic diffusion wavelet scheme. 229-237 - L. Javid Ali, G. S. Anandhamala:
Actor-oriented approach for fault tolerance in e-commerce events. 239-250 - Yubin Yang, Zongtao Wei, Yong Xu, Haiwu He, Wei Wang:
DroidWard: An Effective Dynamic Analysis Method for Vetting Android Applications. 265-275 - Ping Li, Jin Li, Zhengan Huang, Chong-Zhi Gao, Wenbin Chen, Kai Chen:
Privacy-preserving outsourced classification in cloud computing. 277-286 - Yamin Wen, Zheng Gong, Zhengan Huang, Weidong Qiu:
A new efficient authorized private set intersection protocol from Schnorr signature and its applications. 287-297 - Wenjuan Li, Weizhi Meng, Lam-for Kwok, Horace H. S. Ip:
Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks. 299-310 - Javid Ullah, Muhammad Arfan Jaffar:
Object and motion cues based collaborative approach for human activity localization and recognition in unconstrained videos. 311-322 - Sadia Arshid, Ayyaz Hussain, Asim Munir, Anum Nawaz, Sanneya Aziz:
Multi-stage binary patterns for facial expression recognition in real world. 323-331 - Shah Nazir, Sara Shahzad, Rodziah Binti Atan, Haleem Farman:
Estimation of software features based birthmark. 333-346 - E. Vijay Sekar, J. Anuradha, Anshita Arya, Balamurugan Balusamy, Victor I. Chang:
A framework for smart traffic management using hybrid clustering techniques. 347-362 - Babar Shah, Farkhund Iqbal, Omar Alfandi, Yoonsoo Kim, SeokYoon Kang, Ki-Il Kim:
Fuzzy searching and routing in unstructured mobile peer-to-peer networks. 363-375 - Zahid Halim, Uzma:
Optimizing the minimum spanning tree-based extracted clusters using evolution strategy. 377-391 - M. Arfan Jaffar, Abdul Basit Siddiqui, Mubashar Mushtaq:
Ensemble classification of pulmonary nodules using gradient intensity feature descriptor and differential evolution. 393-407 - Toqeer Ali Syed, Mohammad Nauman, Salman Jan:
Trust in IoT: dynamic remote attestation through efficient behavior capture. 409-421 - Adnan Amin, Babar Shah, Sajid Anwar, Feras N. Al-Obeidat, Asad Masood Khattak, Awais Adnan:
A prudent based approach for compromised user credentials detection. 423-441 - Fozia Mehboob, Muhammad Abbas, Richard Jiang, Abdul Rauf, Shoab Ahmad Khan, Saad Rehman:
Trajectory based vehicle counting and anomalous event visualization in smart cities. 443-452 - Zulfiqar Ali, Waseem Shahzad:
EPACO: a novel ant colony optimization for emerging patterns based classification. 453-467 - Saleh M. Al-Saleem, Aftab Ali, Naveed Khan:
Energy efficient key agreement scheme for ubiquitous and continuous remote healthcare systems using data mining technique. 469-480 - Abdul Shahid, Muhammad Tanvir Afzal:
Section-wise indexing and retrieval of research articles. 481-492 - Khawaja Tehseen Ahmed, Muhammad Amjad Iqbal:
Region and texture based effective image extraction. 493-502 - Naila Habib Khan, Awais Adnan, Sadia Basar:
Urdu ligature recognition using multi-level agglomerative hierarchical clustering. 503-514 - Muhammad Abid, Asad Habib, Jawad Ashraf, Abdul Shahid:
Urdu word sense disambiguation using machine learning approach. 515-522 - Haseeb Ahmad, Ali Daud, Licheng Wang, Ibrar Ahmad, Muhammad Hafeez, Yixian Yang:
Quantifying team precedence in the game of cricket. 523-537 - Muhammad Nazir, Zahoor Jan, Muhammad Sajjad:
Facial expression recognition using histogram of oriented gradients based transformed features. 539-548 - Muhammad Sajjad, Adnan Shah, Zahoor Jan, Syed Inayat Ali Shah, Sung Wook Baik, Irfan Mehmood:
Facial appearance and texture feature-based robust facial expression recognition framework for sentiment knowledge discovery. 549-567 - Mohammad Nauman, Tamleek Ali Tanveer, Sohail Khan, Toqeer Ali Syed:
Deep neural architectures for large scale android malware analysis. 569-588 - Bashir Hayat, Kyong Hoon Kim, Ki-Il Kim:
A study on fuzzy logic based cloud computing. 589-603 - Afsheen Khalid, Fakhri Alam Khan, Imran Ahmed:
Extracting reference text from citation contexts. 605-622 - Feras N. Al-Obeidat, Abdallah Tubaishat, Anna Dillon, Babar Shah:
Analyzing students' performance using multi-criteria classification. 623-632 - Imran Ahmed, Awais Adnan:
A robust algorithm for detecting people in overhead views. 633-654 - Muhammad Saad Razzaq, Fahad Maqbool, Maham Khalid, Iram Tariq, Aqsa Zahoor, Muhammad Ilyas:
Zombies Arena: fusion of reinforcement learning with augmented reality on NPC. 655-666 - Arif Jamal Malik, Farrukh Aslam Khan:
A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection. 667-680 - R. Varatharajan, Gunasekaran Manogaran, Priyan Malarvizhi Kumar, Revathi Sundarasekar:
Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. 681-690 - Syed Hamad Shirazi, Arif Iqbal Umar, Nuhman ul Haq, Saeeda Naz, Muhammad Imran Razzak, Ahmad Zaib:
Extreme learning machine based microscopic red blood cells classification. 691-701 - Ibrar Ahmad, Xiaojie Wang, Yuzhao Mao, Guang Liu, Haseeb Ahmad, Rahat Ullah:
Ligature based Urdu Nastaleeq sentence recognition using gated bidirectional long short term memory. 703-714 - Janeth López-Martínez, Alan Ramírez-Noriega, Reyes Juárez-Ramírez, Guillermo Licea, Samantha Jiménez:
User stories complexity estimation using Bayesian networks for inexperienced developers. 715-728 - Abdul Rauf, Muhammad Ramzan:
Parallel testing and coverage analysis for context-free applications. 729-739 - Muhammad Amin, Tamleek Ali Tanveer, Shakirullah Shah, Muhammad Abdullah, Muhammad Shafi:
DeepSIC: a deep model. 741-754 - R. Karthikeyan, P. Chitra:
Novel power reduction framework for enhancing cloud computing by integrated GSNN scheduling method. 755-766 - D. Danalakshmi, S. Kannan, V. Thiruppathy Kesavan:
Reactive power pricing using cloud service considering wind energy. 767-777 - (Withdrawn) Text mining and sustainable clusters from unstructured data in cloud computing. 779-788
- Zhanyu Liu:
Research on the Internet of Things and the development of smart city industry based on big data. 789-795 - Xiaoping Jiang, Chenghua Li, Jing Sun:
A modified K-means clustering for mining of multimedia databases based on dimensionality reduction and similarity measures. 797-804 - Shiqi Li, Mingming Wang, Shiping Liu, Yan Fu:
A novel pattern recognition technique based on group clustering computing and convex optimization for dimensionality reduction. 805-811 - Jianqin Zhang, Zhihong Chen, Yaqiong Liu, Mingyi Du, Weijun Yang, Liang Guo:
Space-time visualization analysis of bus passenger big data in Beijing. 813-825 - Zhengyan Cui, Taohua-Ouyang:
Research from the perspective of resource orchestration on digital ecosystem. 827-835 - ZheXi Yang, Wei Liu, Duo Xu:
Study of cloud service queuing model based on imbedding Markov chain perspective. 837-844 - Wei Xiong, Hejin Yuan, Lang You:
Prediction method of icing thickness of transmission line based on MEAO. 845-853 - Lanyong Zhang, Zewei Liu, Christos Papavassiliou, Sheng Liu:
Formation path control method for group coordination based on fuzzy logic control method. 855-868 - Yun Bai:
Industrial Internet of things over tactile Internet in the context of intelligent manufacturing. 869-877 - Yao-Hsu Tsai:
Simplified structural modeling of loyalty acquisition based on the conceptual clustering model. 879-892 - Xue Yang, Han-Qi Yu, Shi-Ming Sun, Wei Chen:
Using correspondence analysis to select training set for multi-modal information data. 893-905 - Xing Li, Jianmin He, BingJie Hou, Peiyang Zhang:
Exploring the innovation modes and evolution of the cloud-based service using the activity theory on the basis of big data. 907-922 - Qindong Sun, Yimin Qiao, Hongyi Zhou, Jiamin Wang, Nan Wang:
A loss prevention methodology for catering industry based on operation data analysis. 923-931 - Hui Li, Shu Zhang, Yun Hu, Jun Shi, Zhaoman Zhong:
Research of social recommendation based on social tag and trust relation. 933-943 - Hongtao Liu, Hongwei Guan, Jie Jian, Xueyan Liu, Ying Pei:
Clustering based on words distances. 945-953 - Fengjun Shang, Yalin Li, Xiaolin Deng, Dexiang He:
Android malware detection method based on naive Bayes and permission correlation algorithm. 955-966 - Xinyao Zou:
A four-gram unified event model for web mining. 967-975 - Jian Yang:
The artificial stock market model based on agent and scale-free network. 977-984 - Lirong Qiu, Jie Li:
Sentiment analysis of short texts in microblog based on ependency parsing. 985-995 - Min Xiao, Sheng Cui, Ruixing Ming, Tao Jiang:
Large deviations for the stochastic present value of aggregate net claims with infinite variance in the renewal risk model and its application in risk management. 997-1007 - Ming Qu, Yuchun Chang:
A collaboration centric approach for building the semantic knowledge network for knowledge advantage machine. 1009-1022 - Yanqing Han, Yuyan Lei, Guanju Chen:
Consumption experience model and identification based on IWOM and emotional computing. 1023-1031 - Akash Kumar Bhoi, Karma Sonam Sherpa, Bidita Khandelwal:
Arrhythmia and ischemia classification and clustering using QRS-ST-T (QT) analysis of electrocardiogram. 1033-1044 - Hyesung Ji, Youdong Yun, Seolhwa Lee, Kuekyeng Kim, Heuiseok Lim:
An adaptable UI/UX considering user's cognitive and behavior information in distributed environment. 1045-1058 - Yoon-Su Jeong, Seung-Soo Shin:
An IoT healthcare service model of a vehicle using implantable devices. 1059-1068 - Taegyu Kim, Jung-Hoon Cha, Jongchul Park:
Association between in-game performance parameters recorded via global positioning system and sports injuries to the lower extremities in elite female field hockey players. 1069-1078 - Doohwan Kim, Jang-Eui Hong, Ilchul Yoon, Sang-Ho Lee:
Code refactoring techniques for reducing energy consumption in embedded computing environment. 1079-1095 - SeolHwa Lee, Danial Hooshyar, Hyesung Ji, Kichun Nam, Heuiseok Lim:
Mining biometric data to predict programmer expertise and task difficulty. 1097-1107 - Seon-Chil Kim, Sun-Youl Seo, Ji-Hyun Yu, Sang-Deok Lee, Kwang-Hwan Kim, Chang-Gyu Kim:
Development of radiation shield providing medical support for radioactive disaster in computer awareness analysis convergence-based. 1109-1116 - Meijing Li, Xiuming Yu, Keun Ho Ryu, Sanghyuk Lee, Nipon Theera-Umpon:
Face recognition technology development with Gabor, PCA and SVM methodology under illumination normalization condition. 1117-1126 - GuoZhong Li, Jae-Rim Jung, Seong-Taek Park:
Factors enhancing mobile social networking friendship maintenance: a study of alumni community on Wechat. 1127-1138 - Hyun Yoo, Kyungyong Chung:
Heart rate variability based stress index service model using bio-sensor. 1139-1149 - Sungho Sim, Hanyong Choi:
A study on web services discovery system based on the internetof things user information. 1151-1160 - Hyung-Jin Mun, Sunghyuck Hong, Jungpil Shin:
A novel secure and efficient hash function with extra padding against rainbow table attacks. 1161-1173 - Sang-Hyun Lee, Sang-Joon Lee:
Development of remote automatic panorama VR imaging rig systems using smartphones. 1175-1185 - Hyung-Jin Mun, Sunghyuck Hong, Jungpil Shin:
Erratum to: A novel secure and efficient hash function with extra padding against rainbow table attacks. 1187
Volume 21, Number 2, June 2018
- Wai-Kong Lee, Raphael C.-W. Phan, Geong Sen Poh, Bok-Min Goi:
SearchaStore: fast and secure searchable cloud services. 1189-1202 - Sukhpal Singh Gill, Inderveer Chana, Maninder Singh, Rajkumar Buyya:
CHOPPER: an intelligent QoS-aware autonomic resource management approach for cloud computing. 1203-1241 - Vimalkumar Kumaresan, Ramachandran Baskaran, P. Dhavachelvan:
AEGEUS++: an energy-aware online partition skew mitigation algorithm for mapreduce in cloud. 1243-1260 - Francisco Luna, Alejandro Cervantes, Pedro Isasi, Juan F. Valenzuela-Valdés:
Grid-enabled evolution strategies for large-scale home care crew scheduling. 1261-1273 - Zhuo Liu, Bin Wang, Weikuan Yu:
HALO: a fast and durable disk write cache using phase change memory. 1275-1287 - Marcos Dias de Assunção, Laurent Lefèvre:
Bare-metal reservation for cloud: an analysis of the trade off between reactivity and energy efficiency. 1289-1300 - Shubo Chen, Kejing He, Lingcong You, Funan Lin:
Parallel multilayer particle collision detection method based on performance estimation. 1301-1309 - Nidhi Jain Kansal, Inderveer Chana:
An empirical evaluation of energy-aware load balancing technique for cloud data center. 1311-1329 - Chunlin Li, Jianhang Tang, Youlong Luo:
Distributed QoS-aware scheduling optimization for resource-intensive mobile application in hybrid cloud. 1331-1348 - Lin Li, Chee Shin Yeo, Chia-Yu Hsu, Liang-Chih Yu, K. Robert Lai:
Agent-based fuzzy constraint-directed negotiation for service level agreements in cloud computing. 1349-1363 - Sumalatha Saleti, R. B. V. Subramanyam:
A novel Bit Vector Product algorithm for mining frequent itemsets from large datasets using MapReduce framework. 1365-1380 - Safiye Ghasemi, Mohammad Reza Meybodi, Mehdi Dehghan Takht Fooladi, Amir Masoud Rahmani:
A cost-aware mechanism for optimized resource provisioning in cloud computing. 1381-1394 - Ying Li, Jing Zhang, Xiaojun Chen, Junhuai Li, JuLan Ding:
An accurate resource scheduling system for virtual machines based on CPU load monitoring and assessment. 1395-1410 - M. Thangavel, P. Varalakshmi:
Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud. 1411-1437 - Chao Shen, Weiqin Tong, Kim-Kwang Raymond Choo, Samina Kausar:
Performance prediction of parallel computing models to analyze cloud-based big data applications. 1439-1454 - Omar Batarfi, Radwa El Shawi, Ayman G. Fayoumi, Reza Nouri, Amin Beheshti, Ahmed Barnawi, Sherif Sakr:
Correction To: Large scale graph processing systems: survey and an experimental evaluation. 1455
Volume 21, Number 3, September 2018
- Achal Kaushik, Deo Prakash Vidyarthi:
A model for resource management in computational grid using sequential auction and bargaining procurement. 1457-1477 - Uras Tos, Riad Mokadem, Abdelkader Hameurlain, Tolga Ayav, Sebnem Bora:
Ensuring performance and provider profit through data replication in cloud systems. 1479-1492 - Izzat Alsmadi, Abdallah Khreishah, Dianxiang Xu:
Network slicing to improve multicasting in HPC clusters. 1493-1506 - Kang-Wook Chon, Min-Soo Kim:
BIGMiner: a fast and scalable distributed frequent pattern miner for big data. 1507-1520 - Ching-Wen Chen, An Hsia, Yong-Wei Zhan, Tzong-Jye Liu:
Energy-efficient hybrid coherence protocol for multicore processors. 1521-1541 - Guo Zhou, Rui Wang, Yongquan Zhou:
Flower pollination algorithm with runway balance strategy for the aircraft landing scheduling problem. 1543-1560 - Zhengyu Yang, Yufeng Wang, Janki Bhimani, Chiu C. Tan, Ningfang Mi:
EAD: elasticity aware deduplication manager for datacenters with multi-tier storage systems. 1561-1579 - Xiaoyong Tang, Xiaoyi Liao, Jie Zheng, Xiaopan Yang:
Energy efficient job scheduling with workload prediction on cloud data center. 1581-1593 - Christopher Liao, Yonatan Klausner, David Starobinski, Eran Simhon, Azer Bestavros:
A case study of a shared/buy-in computing ecosystem. 1595-1606 - Haiou Jiang, Haihong E, Meina Song:
Multi-prediction based scheduling for hybrid workloads in the cloud data center. 1607-1622 - Kanniga Devi Rangaswamy, Murugaboopathi Gurusamy, M. Muthukannan:
Load monitoring and system-traffic-aware live VM migration-based load balancing in cloud data center using graph theoretic solutions. 1623-1638 - Shimaa E. El-Sayyad, Ahmed I. Saleh, Hesham A. Ali:
A new semantic web service classification (SWSC) strategy. 1639-1665 - Altaf Hussain, Muhammad Aleem, Abid Khan, Muhammad Azhar Iqbal, Muhammad Arshad Islam:
RALBA: a computation-aware load balancing scheduler for cloud computing. 1667-1680 - Robayet Nasim, Enrica Zola, Andreas J. Kassler:
Robust optimization for energy-efficient virtual machine consolidation in modern datacenters. 1681-1709 - Reza Mohammadi Bahram Abadi, Amir Masoud Rahmani, Sasan Hossein Alizadeh:
Self-adaptive architecture for virtual machines consolidation based on probabilistic model evaluation of data centers in Cloud computing. 1711-1733
Volume 21, Number 4, December 2018
- Amjad Ullah, Jingpeng Li, Yindong Shen, Amir Hussain:
A control theoretical view of cloud elasticity: taxonomy, survey and challenges. 1735-1764 - K. Munivara Prasad, A. Rama Mohan Reddy, K. Venugopal Rao:
DEFAD: ensemble classifier for DDOS enabled flood attack defense in distributed network environment. 1765-1783 - Roktaek Lim, Yeongha Lee, Raehyun Kim, Jaeyoung Choi:
An implementation of matrix-matrix multiplication on the Intel KNL processor with AVX-512. 1785-1795 - Hicham Ben Alla, Said Ben Alla, Abdellah Touhafi, Abdellah Ezzati:
A novel task scheduling approach based on dynamic queues and hybrid meta-heuristic algorithms for cloud computing environment. 1797-1820 - Mehrdad Almasi, Mohammad Saniee Abadeh:
A new MapReduce associative classifier based on a new storage format for large-scale imbalanced data. 1821-1847 - Huiying Hou, Jia Yu, Hanlin Zhang, Yan Xu, Rong Hao:
Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage. 1849-1863 - Nae Young Song, Hwajung Kim, Hyuck Han, Heon Young Yeom:
Optimizing of metadata management in large-scale file systems. 1865-1879 - Mohammad Mahdi Tajiki, Behzad Akbari, Mohammad Shojafar, Seyed Hesomodding Ghasemi, Mahdi Latifi Barazandeh, Nader Mokari, Luca Chiaraviglio, Michael Zink:
CECT: computationally efficient congestion-avoidance and traffic engineering in software-defined cloud data centers. 1881-1897 - Sergio Serrano-Iglesias, Eduardo Gómez-Sánchez, Miguel L. Bote-Lorenzo, Juan I. Asensio-Pérez, Manuel Rodríguez-Cayetano:
A self-scalable distributed network simulation environment based on cloud computing. 1899-1915 - Taher Al-Shehari, Sami Zhioua:
An empirical study of web browsers' resistance to traffic analysis and website fingerprinting attacks. 1917-1931 - Anmin Fu, Yiming Zhu, Guomin Yang, Shui Yu, Yan Yu:
Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server. 1933-1947 - Dzmitry Makatun, Jérôme Lauret, Hana Rudová:
Planning of distributed data production for High Energy and Nuclear Physics. 1949-1965 - Chamseddine Hamdeni, Tarek Hamrouni, Faouzi Ben Charrada:
Evaluation of site availability exploitation towards performance optimization in data grids. 1967-1980 - Benay Kumar Ray, Avirup Saha, Sarbani Roy:
Migration cost and profit oriented cloud federation formation: hedonic coalition game based approach. 1981-1999 - Hatem M. Bahig, Khaled A. AbdElbari:
A fast GPU-based hybrid algorithm for addition chains. 2001-2011 - Chunlin Li, Jianhang Tang, Youlong Luo:
Towards operational cost minimization for cloud bursting with deadline constraints in hybrid clouds. 2013-2029
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.