default search action
Future Generation Computer Systems, Volume 55
Volume 55, February 2016
- Somayeh Kianpisheh
, Nasrollah Moghadam Charkari
, Mehdi Kargahi:
Reliability-driven scheduling of time/cost-constrained grid workflows. 1-16 - Ertem Esiner, Anwitaman Datta
:
Auditable versioned data storage outsourcing. 17-28 - Hamid Arabnejad
, Jorge G. Barbosa
, Radu Prodan
:
Low-time complexity budget-deadline constrained workflow scheduling on heterogeneous resources. 29-40 - Marcos Dias de Assunção
, Carlos Cardonha, Marco A. S. Netto, Renato Luiz de Freitas Cunha
:
Impact of user patience on auto-scaling resource capacity for cloud services. 41-50 - Klavdiya Bochenina
, Nikolay Butakov, Alexander Boukhanovsky
:
Static scheduling of multiple workflows with soft deadlines in non-dedicated heterogeneous environments. 51-61 - Mohammad Hasanzadeh
, Omid Jalilian, Alireza Rezvanian
, Mohammad Reza Meybodi:
Service level agreement based adaptive Grid superscheduling. 62-73 - Gang Sun, Dan Liao, Vishal Anand, Dongcheng Zhao, Hongfang Yu:
A new technique for efficient live migration of multiple virtual machines. 74-86 - Yongzhi Wang
, Jinpeng Wei, Shaolei Ren
, Yulong Shen:
Toward integrity assurance of outsourced computing - a game theoretic perspective. 87-100 - Emanuele Carlini
, Alessandro Lulli, Laura Ricci
:
dragon: Multidimensional range queries on distributed aggregation trees. 101-115 - Thepparit Banditwattanawong
, Masawee Masdisornchote
, Putchong Uthayopas
:
Multi-provider cloud computing network infrastructure optimization. 116-128 - Maristella Agosti
, Nicola Ferro
, Gianmaria Silvello
:
Digital library interoperability at high level of abstraction. 129-146 - Bartosz Balis
:
HyperFlow: A model of computation, programming approach and enactment engine for complex distributed workflows. 147-162
- Markus Helfert
:
New Horizons of Cloud Computing. 163-164 - Chris Piechotta
, Martin Grooss Olsen, Adam Enø Jensen, Joey W. Coleman, Peter Gorm Larsen
:
A secure dynamic collaboration environment in a cloud context. 165-175 - Giuseppe Di Modica
, Orazio Tomarchio
:
Matchmaking semantic security policies in heterogeneous clouds. 176-185 - Nadia Ranaldo, Eugenio Zimeo:
Capacity-driven utility model for service level agreement negotiation of cloud services. 186-199 - Jesús García-Galán
, Pablo Trinidad
, Omer F. Rana
, Antonio Ruiz Cortés
:
Automated configuration support for infrastructure migration to the cloud. 200-212 - Javier Conejero
, Omer F. Rana
, Pete Burnap
, Jeffrey Morgan, María Blanca Caminero
, Carmen Carrión
:
Analyzing Hadoop power consumption and impact on application QoS. 213-223
- Jemal H. Abawajy, Guojun Wang, Laurence T. Yang, Bahman Javadi:
Trust, Security and Privacy in Emerging Distributed Systems. 224-226 - Abdullah Alamri
, Peter Bertók
, James A. Thom
, Adil Fahad:
The mediator authorization-security model for heterogeneous semantic knowledge bases. 227-237 - Sadegh Dorri Nogoorani
, Rasool Jalili:
TIRIAC: A trust-driven risk-aware access control framework for Grid environments. 238-254 - Farag Azzedin, Mohammed Onimisi Yahaya:
Modeling BitTorrent choking algorithm using game theory. 255-265 - Ahmed Lounis
, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, Yacine Challal
:
Healing on the cloud: Secure cloud architecture for medical wireless sensor networks. 266-277 - Mohiuddin Ahmed
, Abdun Naser Mahmood
, Md. Rafiqul Islam
:
A survey of anomaly detection techniques in financial domain. 278-288 - Narges Roshanbin
, James Miller:
ADAMAS: Interweaving unicode and color to enhance CAPTCHA security. 289-310 - Dongsheng Li
, Chao Chen, Qin Lv, Li Shang, Yingying Zhao
, Tun Lu, Ning Gu:
An algorithm for efficient privacy-preserving item-based collaborative filtering. 311-320 - Daniel Díaz López
, Ginés Dólera Tormo, Félix Gómez Mármol
, Gregorio Martínez Pérez:
Dynamic counter-measures for risk-based access control systems: An evolutive approach. 321-335 - Wei Ye, Ruixuan Li, Xiwu Gu, Yuhua Li, Kunmei Wen:
Role mining using answer set programming. 336-343 - Sk. Md. Mizanur Rahman
, M. Anwar Hossain
, Mohammad Mehedi Hassan
, Atif Alamri, Abdullah S. Alghamdi, Mukaddim Pathan:
Secure privacy vault design for distributed multimedia surveillance system. 344-352 - Wei Wang, Peng Xu
, Hui Li, Laurence Tianruo Yang
:
Secure hybrid-indexed search for high efficiency over keyword searchable ciphertexts. 353-361 - Chafika Benzaid
, Karim Lounis, Ameer Al-Nemrat, Nadjib Badache, Mamoun Alazab
:
Fast authentication in wireless sensor networks. 362-375 - Md. Shamsul Huda, Jemal H. Abawajy, Mamoun Alazab
, Mali Abdollahian
, Md. Rafiqul Islam
, John Yearwood:
Hybrids of support vector machine wrapper and filter based framework for malware detection. 376-390 - Shuhong Chen
, Guojun Wang, Weijia Jia
:
Cluster-group based trusted computing for mobile social networks using implicit social behavioral graph. 391-400
- José Ángel Bañares
, Jörn Altmann
, Kurt Vanmechelen:
Economics of computing services. 401-402 - Alfonso Quarati
, Andrea Clematis
, Daniele D'Agostino
:
Delivering cloud services with QoS requirements: Business opportunities, architectural solutions and energy-saving aspects. 403-427 - Mircea Moca, Cristian Marius Litan, Gheorghe Cosmin Silaghi
, Gilles Fedak:
Multi-criteria and satisfaction oriented scheduling for hybrid distributed computing infrastructures. 428-443 - Rafael Tolosana-Calasanz
, José Ángel Bañares
, Congduc Pham, Omer F. Rana
:
Resource management for bursty streams on multi-tenancy cloud environments. 444-459 - Mario Macías, Jordi Guitart
:
Analysis of a trust model for SLA negotiation and enforcement in cloud markets. 460-472 - Fernando Koch, Marcos Dias de Assunção
, Carlos Cardonha, Marco A. S. Netto:
Optimising resource costs of cloud computing for education. 473-479 - Gregory Katsaros
, Pascal Stichler, Josep Subirats, Jordi Guitart
:
Estimation and forecasting of ecological efficiency of virtual machines. 480-494 - Netsanet Haile
, Jörn Altmann
:
Value creation in software service platforms. 495-509
- Mao Lin Huang
, Tze-Haw Huang, Xuyun Zhang
:
A novel virtual node approach for interactive visual analytics of big datasets in parallel coordinates. 510-523 - Mingzhong Wang
, Liehuang Zhu, Zijian Zhang:
Risk-aware intermediate dataset backup strategy in cloud-based data intensive workflows. 524-533 - Hanhua Chen, Xiaolong Cui, Hai Jin:
Top-k followee recommendation over microblogging systems by exploiting diverse information sources. 534-543
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.