default search action
International Journal of Parallel, Emergent and Distributed Systems, Volume 30
Volume 30, Number 1, 2015
- Ivan Stojmenovic:
Editorial. 1-2 - Shui Yu
:
Special Issue on networking aspects in Big Data. 3-4
- Jemal H. Abawajy:
Comprehensive analysis of big data variety landscape. 5-14 - Krzysztof Walkowiak
, Michal Wozniak
, Miroslaw Klinkowski
, Wojciech Kmiecik
:
Optical networks for cost-efficient and scalable provisioning of big data traffic. 15-28 - Guobin Xu, Wei Yu
, Zhijiang Chen, Hanlin Zhang
, Paul Moulema, Xinwen Fu, Chao Lu:
A cloud computing based system for cyber security management. 29-45 - Mauro Femminella, Emilia Nunzi, Gianluca Reali, Dario Valocchi:
Networking issues related to delivering and processing genomic big data. 46-64 - Tom Tofigh, Sasan Adibi, Amin Mobasher
, Masood Mortazavi:
Novel approach to big data collaboration with network operators network function virtualisation (NFV). 65-78
Volume 30, Number 2, 2015
- Pete Burnap
, Omer F. Rana
, Matthew L. Williams
, William Housley, Adam Edwards
, Jeffrey Morgan, Luke Sloan, Javier Conejero
:
COSMOS: Towards an integrated and scalable service for analysing social media on demand. 80-100 - Bidi Ying, Dimitrios Makrakis:
Protecting location privacy in vehicular networks against location-based attacks. 101-117 - M. Sridevi
, C. Mala, Siddhant Sanyam:
Optimised template matching techniques in parallel environment with exhaustive search and swarm intelligence. 118-134 - Ramesh Singh
, Sandip Chakraborty, Sushanta Karmakar:
Concurrent deterministic 1-2 skip list in distributed message passing systems. 135-174
Volume 30, Number 3, 2015
- Monalisa Mandal
, Anirban Mukhopadhyay
:
A novel PSO-based graph-theoretic approach for identifying most relevant and non-redundant gene markers from gene expression data. 175-192 - Aleksandr Khasymski, Dimitrios S. Nikolopoulos
:
Scalable black-box prediction models for multi-dimensional adaptation on NUMA multi-cores. 193-210 - Nana Yaw Asabere
, Feng Xia
, Qinxue Meng, Fengqi Li, Haifeng Liu:
Scholarly paper recommendation based on social awareness and folksonomy. 211-232 - Kinga Lipskoch, Oliver E. Theel:
Relaxing data consistency along different dimensions for increasing operation availabilities. 233-261
Volume 30, Number 4, 2015
- Mrinal Nandi
, Amiya Nayak
, Bimal K. Roy, Santanu Sarkar
:
Hypothesis testing and decision theoretic approach for fault detection in wireless sensor networks. 262-285 - Ali El-Moursy
, Walid El-Reedy, Hossam A. H. Fahmy:
Fair memory access scheduling algorithms for multicore processors. 286-308 - Mayez Al-Mouhamed, Ayaz ul Hassan Khan
:
Exploration of automatic optimisation for CUDA programming. 309-324 - Mohammad Rayati
, Aras Sheikhi, Ali Mohammad Ranjbar:
Optimising operational cost of a smart energy hub, the reinforcement learning approach. 325-341
Volume 30, Number 5, 2015
- Toktam Ghafarian-M.
, Bahman Javadi, Rajkumar Buyya:
Decentralised workflow scheduling in volunteer computing systems. 343-365 - Xiaonan Wang, Hongbin Cheng, Yufeng Yao:
Mobility support for IPv6-based VANET. 366-379 - Wei-Tee Lin, Chih-Ping Chu:
Determining the appropriate number of nodes for fast mining of frequent patterns in distributed computing environments. 380-392 - Kangkang Li, Huanyang Zheng, Jie Wu, Xiaojiang Du:
Virtual machine placement in cloud systems through migration process. 393-410 - Abdullah Alamri, Peter Bertók
, Adil Fahad:
Towards an architecture for managing semantic knowledge in semantic repositories. 411-425
Volume 30, Number 6, 2015
Guest Editorial
- Xavi Masip
, Abdelhamid Mellouk, Stefano Testa, Eva Marín-Tordera, Guang-Jie Ren, Said Hoceini:
Smart Communications in Network Technologies. 426-427
- Carolina Fernandez
, Carlos Bermudo, Gino Carrozzo
, Roberto Monno, Bartosz Belter, Kostas Pentikousis, Umar Toseef, Tomohiro Kudoh, Atsuko Takefusa, Jason Haga, Bart Puype, Jin Tanaka:
A recursive orchestration and control framework for large-scale, federated SDN experiments: the FELIX architecture and use cases. 428-446 - Mohammad Fal Sadikin, Marcel Kyas:
IMAKA-Tate: secure and efficient privacy preserving for indoor positioning applications. 447-463 - Antonio Cuadra Sánchez
, Javier Aracil, Javier Ramos de Santiago
:
Proposal of a new information theory-based technique based on traffic anomaly detection analysis. 464-477 - Roger Immich
, Pedro Borges, Eduardo Cerqueira, Marília Curado
:
QoE-driven video delivery improvement using packet loss prediction. 478-493 - Jing Wang, Miodrag Bolic:
Reducing the phase cancellation effect in augmented RFID system. 494-514 - Mohamed Oulmahdi, Christophe Chassot, Nicolas Van Wambeke:
Transport protocols: limitations, evolution obstacles and solutions for an actual deployment in the Internet. 515-535
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.