


default search action
Concurrency and Computation: Practice and Experience, Volume 32
Volume 32, Number 1, January 2020
Editorial
- Arun Kumar Sangaiah
, Hoang Pham, Tie Qiu, Khan Muhammad
:
Convergence of deep machine learning and parallel computing environment for bio-engineering applications.
- K. Shankar
, Mohamed Elhoseny
, S. K. Lakshmanaprabu, M. Ilayaraja
, Vidhyavathi RM, Mohamed A. Elsoud, Majid Alkhambashi:
Optimal feature level fusion based ANFIS classifier for brain MRI image classification. - Bo Wang
, Ying Wang, Li-jie Cui:
Fuzzy clustering recognition algorithm of medical image with multi-resolution feature. - Luo Yong-lian
:
Multi-feature data mining for CT image recognition. - Shouqiang Liu, Miao Li, Min Li, Qingzhen Xu
:
Research of animals image semantic segmentation based on deep learning. - Tian Bai
, Chunyu Wang, Ye Wang, Lan Huang, Fuyong Xing
:
A novel deep learning method for extracting unspecific biomedical relation. - Weijun Zhu, Yingjie Han, Huanmei Wu
, Yang Liu
, Xiaofei Nan, Qinglei Zhou:
Predicting the results of molecular specific hybridization using boosted tree algorithm. - Shuihua Wang
, Junding Sun, Irfan Mehmood, Chichun Pan, Yi Chen, Yudong Zhang
:
Cerebral micro-bleeding identification based on a nine-layer convolutional neural network with stochastic pooling. - Fayas Asharindavida, M. Shamim Hossain
, Azeemsha Thacham, Hédi Khammari, Irfan Ahmed
, Fahad Alraddady, Mehedi Masud
:
A forecasting tool for prediction of epileptic seizures using a machine learning approach. - Arunkumar N.
, Mazin Abed Mohammed
, Salama A. Mostafa
, Dheyaa Ahmed Ibrahim, Joel J. P. C. Rodrigues
, Victor Hugo C. de Albuquerque
:
Fully automatic model-based segmentation and classification approach for MRI brain tumor using artificial neural networks. - Shuaifang Wei, Wei Wu
, Gwanggil Jeon, Awais Ahmad, Xiaomin Yang
:
Improving resolution of medical images with deep dense convolutional neural network. - Sudeepa K. B
, Ganesh Aithal
:
Generation of pseudo random number sequence from discrete oscillating samples of equally spread objects and application for stream cipher system. - Chandan Kumar, Amit Kumar Singh
, Pardeep Kumar
, Rajiv Singh
, Siddharth Singh:
SPIHT-based multiple image watermarking in NSCT domain. - Shuai Liu
, Na Ta, Mengye Lu, Gaocheng Liu, Weiling Bai, Wenhui Li:
Parallel generated method of transcriptional regulatory networks. - Yupeng Wang
, Tianlong Liu, Chang Choi
, Haoxiang Wang:
Green resource allocation method for intelligent medical treatment-oriented service in a 5G mobile network. - Iyyakutti Iyappan Ganapathi
, Surya Prakash
, Ishan R. Dave, Sambit Bakshi
:
Unconstrained ear detection using ensemble-based convolutional neural network model. - Akshi Kumar
, Arunima Jaiswal
:
Systematic literature review of sentiment analysis on Twitter using soft computing techniques. - Guangzhou Yu, Weina Fu
:
Analysis of distributed database access path prediction based on recurrent neural network in internet of things. - Hoang Pham
, David H. Pham:
A novel generalized logistic dependent model to predict the presence of breast cancer based on biomarkers. - Xiaolong Liu
, Ruey-Kai Sheu, Win-Tsung Lo, Shyan-Ming Yuan
:
Automatic cloud service testing and bottleneck detection system with scaling recommendation.
- Irfan Awan, Muhammad Younas
, Farookh Khadeer Hussain:
Emerging challenges and frontiers in cloud computing.
- Georgios L. Stavrinides
, Helen D. Karatza
:
Scheduling real-time bag-of-tasks applications with approximate computations in SaaS clouds. - Elhadj Benkhelifa
, Thomas Welsh
, Lo'ai Tawalbeh
, Yaser Jararweh:
Automated negotiated user profiling across distributed social mobile clouds for resource optimisation. - Le Vinh Thinh
, Hervé Cagnon, Samia Bouzefrane, Soumya Banerjee:
Property-based token attestation in mobile computing. - Aya Omezzine
, Narjès Bellamine Ben Saoud
, Saïd Tazi, Gene Cooperman:
Towards a generic multilayer negotiation framework for efficient application provisioning in the cloud. - Peter Bull
, Stephen Murphy, Nelson Bruno Junior, Ron Austin, Mak Sharma:
A flow analysis and preemption framework for periodic traffic in an SDN network. - Dae-Young Kim
, Seokhoon Kim
, Jong Hyuk Park
:
A combined network control approach for the edge cloud and LPWAN-based IoT services. - Ehsan Khosrowshahi Asl, Jamal Bentahar
, Rebeca Estrada
, Hadi Otrok, Rabeb Mizouni, Babak Khosravifar:
Dynamic formation of service communities in the cloud under distribution and incomplete information settings. - Gebremariam Mesfin
, Gheorghita Ghinea
, Tor-Morten Grønli, Sahel Alouneh
:
REST4Mobile: A framework for enhanced usability of REST services on smartphones.
Volume 32, Number 2, January 2020
- (Withdrawn) Traffic identification and traffic analysis based on support vector machine.
- Reza Ghasemi
:
Resolving a common vulnerability in secret sharing scheme-based data outsourcing schemes. - Guosheng Kang
, Liqin Yang, Liang Zhang:
Toward configurable modeling for artifact-centric business processes. - Metehan Guzel
, Ibrahim Kok
, Diyar Akay
, Suat Ozdemir
:
ANFIS and Deep Learning based missing sensor data prediction in IoT. - Willian Barreiros Jr.
, Jeremias Moreira, Tahsin M. Kurç, Jun Kong, Alba C. M. A. Melo
, Joel H. Saltz, George Teodoro
:
Optimizing parameter sensitivity analysis of large-scale microscopy image analysis workflows with multilevel computation reuse. - Michael Gerhards
, Volker Sander
, Miroslav Zivkovic, Adam Belloum
, Marian Bubak
:
New approach to allocation planning of many-task workflows on clouds. - Shashank Sheshar Singh
, Ajay Kumar
, Kuldeep Singh
, Bhaskar Biswas:
IM-SSO: Maximizing influence in social networks using social spider optimization. - Lili Bo
, Shujuan Jiang, Rongcun Wang, Qiao Yu:
A bidirectional trace simplification approach based on a context switch linked list for concurrent programs. - Guang-Li Huang
, Ke Deng, Zhijun Xie, Jing He
:
Intelligent pseudo-location recommendation for protecting personal location privacy. - Simar Preet Singh
, Rajesh Kumar, Anju Sharma
:
Efficient content retrieval in fog zone using Nano-Caches. - Xiaoyan Wang
, Xingshu Chen, Yitong Wang, Long Ge:
An efficient scheme for SDN state consistency verification in cloud computing environment. - Jing Sha, Abdol Ghaffar Ebadi
, Dinesh Mavaluru
, Mohammed Alshehri
, Osama Alfarraj
, Lila Rajabion
:
A method for virtual machine migration in cloud computing using a collective behavior-based metaheuristics algorithm. - Mohammed Zaki Hasan
, Hussain M. Al-Rizzo:
Task scheduling in Internet of Things cloud environment using a robust particle swarm optimization. - Shunmei Meng
, Qianmu Li, Jing Zhang, Wenmin Lin, Wanchun Dou:
Temporal-aware and sparsity-tolerant hybrid collaborative recommendation method with privacy preservation. - Pratul K. Agarwal
, Thomas J. Naughton, Byung H. Park, David E. Bernholdt
, Joshua Hursey, Al Geist:
Application health monitoring for extreme-scale resiliency using cooperative fault management. - Rohit Handa
, C. Rama Krishna, Naveen Aggarwal
:
Efficient privacy-preserving scheme supporting disjunctive multi-keyword search with ranking. - Jamil Al-Sawwa
, Simone A. Ludwig
:
Parallel particle swarm optimization classification algorithm variant implemented with Apache Spark. - Abdellah Chehri
, Hussein T. Mouftah:
Internet of Things - integrated IR-UWB technology for healthcare applications. - Shengpu Li
, Yize Sun
:
Garden balsam optimization algorithm.
- Retracted: The mechanism and experimental study on the interference of high voltage lines to navigation system.
- Retracted: Study on measurement reliability based on Liu estimator.
- Retracted: Evaluation of the predictive performance of the principal component two-parameter estimator.
Volume 32, Number 3, February 2020
Editorial
- Hai Jin
, Xipeng Shen
, Róbert Lovas
, Xiaofei Liao:
Special Issue: Graph Computing.
- Chao Liu, Deze Zeng
, Hong Yao, Xuesong Yan, Linchen Yu
, Zhangjie Fu:
An efficient iterative graph data processing framework based on bulk synchronous parallel model. - Linchen Yu
:
CCHybrid: CPU co-scheduling in virtualization environment. - Jinbo Xiong
, Yuanyuan Zhang
, Li Lin
, Jian Shen
, Xuan Li, Mingwei Lin
:
ms-PoSW: A multi-server aided proof of shared ownership scheme for secure deduplication in cloud. - Li Yin, Cuiye Liu, Songtao Guo
, Yuanyuan Yang
:
Sparse random compressive sensing based data aggregation in wireless sensor networks. - Xiaofei Liao, Long Zheng
, Binsheng Zhang, Yu Zhang, Hai Jin, Xuanhua Shi, Yi Lin:
Dynamic cluster strategy for hierarchical rollback-recovery protocols in MPI HPC applications.
- Anthony Skjellum, Purushotham V. Bangalore
, Ryan E. Grant:
Foreword to the Special Issue of the Workshop on Exascale MPI (ExaMPI 2017).
- David E. Bernholdt
, Swen Boehm
, George Bosilca
, Manjunath Gorentla Venkata
, Ryan E. Grant, Thomas J. Naughton, Howard Pritchard, Martin Schulz
, Geoffroy R. Vallée:
A survey of MPI usage in the US exascale computing project. - Matthew G. F. Dosanjh
, Ryan E. Grant, Whit Schonbein, Patrick G. Bridges
:
Tail queues: A multi-threaded matching architecture. - S. Mahdieh Ghazimirsaeed
, Seyed Hessam Mirsadeghi, Ahmad Afsahi:
Communication-aware message matching in MPI. - Kurt B. Ferreira, Ryan E. Grant, Michael J. Levenhagen, Scott Levy
, Taylor L. Groves
:
Hardware MPI message matching: Insights into MPI matching behavior to inform design. - Sourav Chakraborty, Ignacio Laguna
, Murali Emani, Kathryn M. Mohror, Dhabaleswar K. Panda, Martin Schulz
, Hari Subramoni:
EReinit: Scalable and efficient fault-tolerance for bulk-synchronous MPI applications. - Scott Levy
, Kurt B. Ferreira, Patrick M. Widener
:
The unexpected virtue of almost: Exploiting MPI collective operations to approximately coordinate checkpoints. - Sam White
, Laxmikant V. Kalé:
Optimizing point-to-point communication between adaptive MPI endpoints in shared memory. - Samuel K. Gutiérrez
, Dorian C. Arnold, Kei Davis, Patrick S. McCormick:
On the memory attribution problem: A solution and case study using MPI. - Supun Kamburugamuve
, Kannan Govindarajan, Pulasthi Wickramasinghe, Vibhatha Abeykoon, Geoffrey C. Fox:
Twister2: Design of a big data toolkit.
Volume 32, Number 4, February 2020
Editorial
- Mohamed Abdel-Basset
, Yongquan Zhou, Florentin Smarandache
:
Special issue on recent advances in intelligent algorithms and its applications.
- K. Shankar
, S. K. Lakshmanaprabu, Deepak Gupta
, Ashish Khanna
, Victor Hugo C. de Albuquerque
:
Adaptive optimal multi key based encryption for digital image security. - V. Sivakumar
, D. Rekha:
A QoS-aware energy-efficient memetic flower pollination routing protocol for underwater acoustic sensor network. - E. M. Roopa Devi
, R. C. Suganthe:
Enhanced transductive support vector machine classification with grey wolf optimizer cuckoo search optimization for intrusion detection system. - B. Kalaiselvi
, M. Thangamani:
Gibbs entropy simulated annealing based Edman firefly optimization for big data protein sequencing. - Mohamed Abdel-Basset
, Doaa El-Shahat
, Ibrahim M. El-Henawy:
A modified hybrid whale optimization algorithm for the scheduling problem in multimedia data objects. - T. Ramesh
, R. M. Suresh:
Co-scheduling of data intensive jobs and processor redistribution under temperature constraints. - Chellammal P
, Sheba Kezia Malarchelvi P. D:
Real-time anomaly detection using parallelized intrusion detection architecture for streaming data. - S. Sankara Narayanan
, G. Murugaboopathi
:
Modified secure AODV protocol to prevent wormhole attack in MANET. - N. S. Srivatchan
, P. Rangarajan:
A novel low-cost smart energy meter based on IoT for developing countries' micro grids. - P. Epsiba
, N. Kumaratharan
, G. Suresh:
A novel discrete CURVELET transform and modified WHOG for video surveillance services. - Edwin Fenil
, P. Mohan Kumar:
Survey on DDoS defense mechanisms. - M. Rajkumar
, R. M. Suresh, R. Sasikumar
:
An effective cluster based data dissemination in a hybrid cellular ad hoc network. - Saravanakumar Kandasamy
, Aswani Kumar Cherukuri
:
Query expansion using named entity disambiguation for a question-answering system. - G. Savitha, S. Karthikeyan
:
Architecture for diverse modulation techniques in SDR. - S. Sekar
, B. Latha
:
Lightweight reliable and secure multicasting routing protocol based on cross-layer for MANET.
Volume 32, Number 5, March 2020
- Weihao Li
, Ben Niu, Jin Cao, Yurong Luo, Hui Li:
A personalized range-sensitive privacy-preserving scheme in LBSs. - Penghong Wang
, Jianrou Huang, Zhihua Cui, Liping Xie, Jinjun Chen
:
A Gaussian error correction multi-objective positioning model with NSGA-II. - Zhanquan Sun
, Feng Li, Huifen Huang, Jian Wang
:
Image steganalysis based on convolutional neural network and feature selection. - Malayam Parambath Gilesh
, Subham Jain, S. D. Madhu Kumar
, Lillykutty Jacob, Umesh Bellur:
Opportunistic live migration of virtual machines. - Xingjuan Cai, Yun Niu, Shaojin Geng
, Jiangjiang Zhang
, Zhihua Cui, Jianwei Li, Jinjun Chen:
An under-sampled software defect prediction method based on hybrid multi-objective cuckoo search. - Chao Wang, Wenjin Liu, Giorgos Jimenez
:
Using chaos world cup optimization algorithm for medical images contrast enhancement. - Hao Wu
, Xin Chen, Xiaoyu Song, He Guo:
Cost minimization of scheduling scientific workflow applications on clouds. - Hyunjun Kim
, Sungin Hong, Jeonghwan Park, Hwansoo Han
:
Static code transformations for thread-dense memory accesses in GPU computing. - Tarunpreet Bhatia
, A. K. Verma, Gaurav Sharma:
Towards a secure incremental proxy re-encryption for e-healthcare data sharing in mobile cloud computing. - Todor Ivanov
, Matteo Pergolesi
:
The impact of columnar file formats on SQL-on-hadoop engine performance: A study on ORC and Parquet. - Zhengming Yi
, Fei Chen, Yiping Yao:
A barrier optimization framework for NUMA multi-core system. - Eduardo C. Vasconcellos
, Esteban Walter Gonzalez Clua
, Flavio H. Fenton
, Marcelo Zamith:
Accelerating simulations of cardiac electrical dynamics through a multi-GPU platform and an optimized data structure. - Mahmoud Imdoukh, Imtiaz Ahmad, Mohammad Gh. Alfailakawi
:
Optimizing scheduling decisions of container management tool using many-objective genetic algorithm. - Camelia Muñoz-Caro
, Alfonso Niño
, Sebastián Reyes
:
A fine-grained loop-level parallel approach to efficient fuzzy community detection in complex networks. - Seyed-Sajad Ahmadpour
, Mohammad Mosleh
:
A novel ultra-dense and low-power structure for fault-tolerant three-input majority gate in QCA technology. - Yuuichi Asahi
, Guillaume Latu, Julien Bigot
, Shinya Maeyama
, Virginie Grandgirard, Yasuhiro Idomura
:
Overlapping communications in gyrokinetic codes on accelerator-based platforms. - Yi-Han Xu
, Meng-Lian Liu, Jing-Wei Xie, Jun Zhou:
An IEEE 802.21 MIS-based mobility management for D2D communications over heterogeneous networks (HetNets). - Nikos Parlavantzas
, Linh Manh Pham
, Christine Morin, Sandie Arnoux, Gaël Beaunée, Luyuan Qi, Philippe Gontier
, Pauline Ezanno
:
A service-based framework for building and executing epidemic simulation applications in the cloud. - Yang Xu
, Quanrun Zeng, Guojun Wang
, Cheng Zhang, Ju Ren, Yaoxue Zhang:
An efficient privacy-enhanced attribute-based access control mechanism.
Volume 32, Number 6, March 2020
Editorial
- Zheng Xu
, Qingyuan Zhou:
Special Issue on Applications and Techniques in Cyber Intelligence Concurrency and Computation: Practice and Experience.
- Bo Li, Shi Wang
:
Cutting and nesting system of cloud manufacturing based on SOA. - Yongchang Wang
, Ligu Zhu:
Research on improved text classification method based on combined weighted model. - Hongdan Liu
, Rong Sun, Qi Liu:
The tactics of ship collision avoidance based on Quantum-behaved Wolf Pack Algorithm. - Hailong Jia, Jie Yang
:
Research on joint ranking recommendation model based on Markov chain. - Fengzhen Jiang
, Xu Zhao, Qingguo Bai:
Simulation and stability analysis of conflict events between employees and organization based on the social network. - Zhao Yu
, Xun Lin:
Social car: The research of interaction design on the driver's communication system. - He Xiaoyan
:
Research on the evolution mechanism of the electric vehicle market driven by big data. - Min Hu, Yunru Liu
:
E-maintenance platform design for public infrastructure maintenance based on IFC ontology and Semantic Web services. - Hamid Darabian, Ali Dehghantanha, Sattar Hashemi, Sajad Homayoun
, Kim-Kwang Raymond Choo
:
An opcode-based technique for polymorphic Internet of Things malware detection. - Hua Jiang
, Weidi Qiu
, Weixia Gui, Jiarong Liang:
Local diagnosability under the PMC model with application to matching composition networks.
Volume 32, Number 7, April 2020
- Rathinaraja Jeyaraj
, Ananthanarayana V. S.
, Anand Paul
:
Improving MapReduce scheduler for heterogeneous workloads in a heterogeneous environment. - Feiran Wang
, Yiping Wen, Tianhang Guo, Jianxun Liu, Buqing Cao:
Collaborative filtering and association rule mining-based market basket recommendation on spark. - Jia Zhao
, Jingjing Tang, Tanghuai Fan, Chenming Li, Lizhong Xu:
Density peaks clustering based on circular partition and grid similarity. - Ziyan Gao
, Yong Wang, Yifan Gao, Xingtian Ren:
Multiobjective noncooperative game model for cost-based task scheduling in cloud computing. - Penghua Xie
, Ming Lv, Juanjuan Zhao:
An improved energy-low clustering hierarchy protocol based on ensemble algorithm. - Kazuhiko Komatsu
, Ayumu Gomi, Ryusuke Egawa
, Daisuke Takahashi
, Reiji Suda, Hiroyuki Takizawa
:
Xevolver: A code transformation framework for separation of system-awareness from application codes. - Yanan Li
, Xiaotao Feng, Jan Xie, Hanwen Feng, Zhenyu Guan, Qianhong Wu:
A decentralized and secure blockchain platform for open fair data trading. - Lilian M. de Oliveira, Fortunato S. de Menezes
, Marcelo Ângelo Cirillo, André Vital Saúde, Flávio Meira Borém, Gilberto Rodrigues Liska
:
Machine Learning techniques in muliclass problems with application in sensorial analysis. - Bushra Jamil
, Mohammad Shojafar
, Israr Ahmed, Atta Ullah, Kashif Munir, Humaira Ijaz
:
A job scheduling algorithm for delay and performance optimization in fog computing. - Yuling Wang
, Wei He, Minghu Jiang, Yunlong Huang, Peijun Qiu:
CHOpinionMiner: An unsupervised system for Chinese opinion target extraction. - Tao Jiang
, Pei-ming Guo, Jianping Wu
:
One-sided on-demand communication technology for the semi-Lagrange scheme in the YHGSM. - Marcello W. M. Ribeiro, Alexandre A. B. Lima, Daniel de Oliveira
:
OLAP parallel query processing in clouds with C-ParGRES. - Changbing Jiang
, Tinggui Chen
, Ruolan Li, Liang Li, Gongfa Li, Chonghuan Xu, Shufang Li:
Construction of extended ant colony labor division model for traffic signal timing and its application in mixed traffic flow model of single intersection. - Yean-Fu Wen
, Yu-Fang Chen, Tse Kai Chiu, Yen-Chou Chen:
Performance enhancement for iterative data computing with in-memory concurrent processing. - Shahbaz Hassan Wasti
, Muhammad Jawad Hussain
, Guangjian Huang
, Aftab Akram
, Yuncheng Jiang
, Yong Tang:
Assessing semantic similarity between concepts: A weighted-feature-based approach. - Ning Li
, Lu Wang, Xinquan Li, Qing Zhu:
An effective deep learning neural network model for short-term load forecasting. - Guixia He, Renjie Yin, Jiaquan Gao
:
An efficient sparse approximate inverse preconditioning algorithm on GPU. - Xiancheng Wang, Zhangwei Jiang, Wei Li, Roozbeh Zarei, Guangyan Huang, Anwaar Ulhaq
, Xiaoxia Yin, Bailing Zhang, Peng Shi, Mengjiao Guo
, Jing He
:
Active contours with local and global energy based-on fuzzy clustering and maximum a posterior probability for retinal vessel detection.
Volume 32, Number 8, April 2020
Editorial
- Lidia Ogiela
:
Cognitive and innovative computation paradigms for big data and cloud computing applications.
- ByeongHo Jung, Seong Il Bae, Chang Choi
, Eul Gyu Im
:
Packer identification method based on byte sequences. - Bruno Carpentieri, Arcangelo Castiglione
, Alfredo De Santis
, Francesco Palmieri
, Raffaele Pizzolante:
Compression-based steganography. - Hoon Ko
, Sung Bum Pan
, Libor Mesícek:
Personal identification study for touchable devices with ECG. - Shigenari Nakamura
, Tomoya Enokido
, Makoto Takizawa
:
Information flow control in object-based peer-to-peer publish/subscribe systems. - Fabio Clarizia, Francesco Colace, Massimo De Santo, Marco Lombardi, Francesco Pascale, Domenico Santaniello, Allan Tucker:
A multilevel graph approach for rainfall forecasting: A preliminary study case on London area. - Donald Elmazi
, Miralda Cuka
, Makoto Ikeda, Leonard Barolli:
Effect of Size of Giant Component for actor node selection in WSANs: A comparison study. - Bhattu Bhaskar, Chandrashekar Jatoth
, G. R. Gangadharan
, Ugo Fiore:
A MapReduce-based modified Grey Wolf optimizer for QoS-aware big service composition. - Lidia Ogiela
, Marek R. Ogiela
:
Cognitive security paradigm for cloud computing applications. - Václav Snásel, Pavel Krömer
, Jakub Safarik
, Jan Platos
:
JPEG steganography with particle swarm optimization accelerated by AVX.
Volume 32, Number 9, May 2020
- Mayssa Fayala, Haithem Mezni
:
Web service recommendation based on time-aware users clustering and multi-valued QoS prediction. - Zhong Tang
, Wenqiang Li
, Yan Li:
An improved term weighting scheme for text classification. - Peng Cheng
, Yong Wang, Yutong Lu, Yunfei Du, Zhiguang Chen:
UniIndex: An index and query middleware for parallel file systems. - Rongna Xie
, Guozhen Shi, Yunchuan Guo, Fenghua Li:
A topic-centric access control model for the publish/subscribe paradigm. - Jing Cai
, Yimin Shi, Ting Lin:
E-Bayesian and hierarchical Bayesian estimations for parallel system model in the presence of masked data. - Xingjuan Cai, Shaojin Geng
, Di Wu, Lei Wang, Qidi Wu:
A unified heuristic bat algorithm to optimize the LEACH protocol. - Navonil Mustafee
, Nik Bessis
, Simon J. E. Taylor
, Jianhua Hou, Peter Matthew:
Co-citation analysis of literature in e-science and e-infrastructures. - Chuitian Rong
, Lili Chen, Yasin N. Silva
:
Parallel time series join using spark. - Keke Zhai
, Tania Banerjee, David Zwick, Jason Hackl, Rahul Koneru, Sanjay Ranka
:
Dynamic load balancing for a mesh-based scientific application. - Bin Li, Jingjuan Zhao, Hui Fu
:
MFDC-net: Multifeature-based deep convolutional neural network for single image haze removal. - Liang Liu, Songtao Guo
, Guiyan Liu, Yue Zeng
:
Priority-based online flow scheduling for network throughput maximization in software defined networking. - Thanasekhar Balaiah
, Ranjani Parthasarathi:
Autotuning of configuration for program execution in GPUs. - Wenxia Guo
, Chaojie Huang, Wenhong Tian
:
Handling data skew at reduce stage in Spark by ReducePartition. - Ouafa Ajarroud
, Ahmed Zellou
, Ali Idri:
A coverage-based approach for filtering and prioritizing regions in a semantic cache.
Volume 32, Number 10, May 2020
Editorial
- Ivan Merelli
, Pietro Liò
, Igor V. Kotenko
, Daniele D'Agostino:
Latest advances in parallel, distributed, and network-based processing.
- Andrew Owenson
, Steven A. Wright
, Richard A. Bunt, Yoon Ho, Matthew J. Street, Stephen A. Jarvis
:
An unstructured CFD mini-application for the performance prediction of a production CFD code. - Sahar Nikbakht Aali
, Nader Bagherzadeh
:
Divisible load scheduling of image processing applications on the heterogeneous star and tree networks using a new genetic algorithm. - Bilal Fakih
, Didier El Baz
, Igor V. Kotenko
:
GRIDHPC: A decentralized environment for high performance computing. - Mehrdad Ghorbani, Seyed Morteza Babamir
:
Runtime deadlock tracking and prevention of concurrent multithreaded programs: A learning-based approach. - Patrick Eitschberger, Jörg Keller
:
Comparing optimal and heuristic taskgraph scheduling on parallel machines with frequency scaling. - Srboljub Stepanovic
, Georgios Georgakarakos, Simon Holmbacka, Johan Lilius
:
An efficient model for quantifying the interaction between structural properties of software and hardware in the ARM big.LITTLE architecture. - Lucia Morganti
, Elena Corni, Luca Lama, Carmelo Pellegrino
, Francieli Zanon Boito, Ivan Merelli, Daniele D'Agostino, Daniele Cesini:
On low-power SoCs as storage bricks for Bioinformatics. - Jiayu Qin, Gang Mei
, Salvatore Cuomo
, Sixu Guo, Yixuan Li:
CudaCHPre2D: A straightforward preprocessing approach for accelerating 2D convex hull computations on the GPU. - Ernesto Dufrechou
, Pablo Ezzatti
:
Using analysis information in the synchronization-free GPU solution of sparse triangular systems. - Rafal Krawczyk
, Tomasz Czarski
, Pawel Linczuk
, Andrzej Wojenski, Maryna Chernyshova, Krzysztof Pozniak
, Didier Mazon, Piotr Kolasinski, Grzegorz Kasprowicz
, Wojciech Zabolotny
, Michal Gaska, Ewa Kowalska-Strzeciwilk, Karol Malinowski
, Axel Jardin
, Philippe Malard:
Parallel computing in soft X-rays plasma diagnostic systems for thermal fusion reactors - feasibility studies for GPUs. - Aurelio Nicolas Mata
, Graciela Román-Alonso, Gabriel López Garza, Jose Rafael Godínez-Fernández, Miguel Alfonso Castro-García, Norma Pilar Castellanos-Abrego:
Parallel simulation of the synchronization of heterogeneous cells in the sinoatrial node. - Daniel Sundfeld
, George Teodoro
, Jakob Hull Havgaard, Jan Gorodkin
, Alba C. M. A. Melo
:
Using GPU to accelerate the pairwise structural RNA alignment with base pair probabilities.
Volume 32, Number 11, June 2020
- Victor Artigues, Katharina Kormann
, Markus Rampp
, Klaus Reuter
:
Evaluation of performance portability frameworks for the implementation of a particle-in-cell code. - Liping Sun
, Shang Ci
, Xiaoqing Liu, Xiaoyao Zheng, Qingying Yu, Yonglong Luo:
A privacy-preserving density peak clustering algorithm in cloud computing. - Yuanze Du
, Qiang Wu, Yingwang Zhao, Xiaoyan Zhang, Yi Yao, Hua Xu:
A parallel time-varying earliest arrival path algorithm for evacuation planning of underground mine water inrush accidents. - Bo Liu, Huaipu Zhao
, Yinxing Liu
, Suyu Wang
, Jianqiang Li, Yong Li, Jianlei Lang, Rentao Gu:
Discovering multi-dimensional motifs from multi-dimensional time series for air pollution control. - Sira Yongchareon
, Chengfei Liu, Xiaohui Zhao:
UniFlexView: A unified framework for consistent construction of BPMN and BPEL process views. - Saleem Iqbal, Abdul Hanan Abdullah
, Kashif Naseer Qureshi
:
An adaptive interference-aware and traffic-aware channel assignment strategy for backhaul networks. - Abderraziq Semmoud
, Mourad Hakem, Badr Benmammar
, Jean-Claude Charr
:
Load balancing in cloud computing environments based on adaptive starvation threshold. - Tingting Dong
, Fei Xue, Chuangbai Xiao, Juntao Li:
Task scheduling based on deep reinforcement learning in a cloud manufacturing environment. - Weibei Fan
, Jing He
, Zhijie Han
, Peng Li
, Ruchuan Wang:
Reconfigurable Fault-tolerance mapping of ternary N-cubes onto chips. - Ruizhen Liu
, Zhiyi Sun, Anhong Wang, Kai Yang, Yin Wang, Qianlai Sun:
Lightweight efficient network for defect classification of polarizers. - José S. Costa Filho
, Denis M. Cavalcante, Leonardo O. Moreira
, Javam C. Machado:
An adaptive replica placement approach for distributed key-value stores. - Min Gao
, Li Xu
, Limei Lin, Yanze Huang, Xinxin Zhang:
Influence maximization based on activity degree in mobile social networks. - Yongqiang Song
, Hong Wang, Changyong Zhang, Lutong Wang:
Impression space model for the evaluation of Internet advertising effectiveness. - Madeleine Victoria Kongshavn, Hårek Haugerud
, Anis Yazidi
, Torleiv Maseng, Hugo Hammer
:
Mitigating DDoS using weight-based geographical clustering.
Volume 32, Number 12, June 2020
Editorial
- Stefano Ferretti
, Gabriele D'Angelo
:
Foreword to the special issue on cryptocurrencies and blockchains for distributed systems.
- Guillaume Vizier
, Vincent Gramoli:
ComChain: A blockchain with Byzantine fault-tolerant reconfiguration. - Yao-Chieh Hu, Ting-Ting Lee, Dimitris Chatzopoulos
, Pan Hui:
Analyzing smart contract interactions and contract level state consensus. - Naif Alzahrani
, Nirupama Bulusu:
A new product anti-counterfeiting blockchain using a truly decentralized dynamic consensus protocol. - Paul D. Ezhilchelvan
, Amjad Aldweesh, Aad van Moorsel:
Non-blocking two-phase commit using blockchain. - Cristina Pérez-Solà
, Jordi Herrera-Joancomartí
:
BArt: Trading digital contents through digital assets. - Lasse Herskind, Alberto Giaretta
, Michele De Donno, Nicola Dragoni
:
BitFlow: Enabling real-time cash-flow evaluations through blockchain. - Arnaud Durand
, Pascal Gremaud
, Jacques Pasquier
:
Decentralized LPWAN infrastructure using blockchain and digital signatures. - Zaheer Abbas Khan
, Abdul Ghafoor Abbasi, Zeeshan Pervez
:
Blockchain and edge computing-based architecture for participatory smart city applications. - Otto Julio Ahlert Pinno
, André Ricardo Abed Grégio
, Luis Carlos Erpen De Bona:
ControlChain: A new stage on the IoT access control authorization. - Aniruddh Rao Kabbinale
, Emmanouil Dimogerontakis, Mennan Selimi
, Anwaar Ali, Leandro Navarro, Arjuna Sathiaseelan, Jon Crowcroft:
Blockchain for economically sustainable wireless mesh networks. - Stefano Ferretti
, Gabriele D'Angelo
:
On the Ethereum blockchain structure: A complex networks theory perspective. - Sara Bergman, Mikael Asplund
, Simin Nadjm-Tehrani
:
Permissioned blockchains and distributed databases: A performance study.
Volume 32, Number 13, July 2020
Editorials
- Michal Hodon
, Janusz Furtak
, Günter Fahrnberger
, Ali Ismail Awad
:
Editorial on Innovative Network Systems and Applications together with the Conference on Information Systems Innovations for Community Services.
- Jozef Papán
, Pavel Segec
, Peter Paluch, Jana Uramová, Marek Moravcik
:
The new Multicast Repair (M-REP) IP fast reroute mechanism. - Michal Kvet
, Emil Krsák
, Karol Matiasko
:
Locating and accessing large datasets using Flower Index Approach. - Michal Kvet
, Stefan Toth
, Emil Krsák
:
Concept of temporal data retrieval: Undefined value management. - Jakub Daubner, Martin Klimo, Jozef Papán
, Juraj Smiesko
, Ondrej Such
:
On the distribution of queue length in ideal links. - Marzena Banach
, Tomasz Talaska
, Jakub Dalecki, Rafal Dlugosz
:
New technologies for smart cities - high-resolution air pollution maps based on intelligent sensors. - Peter Fecilak
, Adrián Pekár
, Norbert Ádám
, Anton Baláz
, Eva Chovancová
:
A non-intrusive Smart metering system: Analytics and simulation of power consumption. - Thi Kim Thoa Ho
, Quang Vu Bui, Marc Bui:
Dynamic social network analysis: A novel approach using agent-based model, author-topic model, and pretopology. - Sebastian Apel
, Florian Hertrampf, Steffen Späthe
:
Toward a knowledge model focusing on microservices and cloud computing. - Juraj Machaj
, Peter Brida
, Norbert Majer:
Challenges introduced by heterogeneous devices for Wi-Fi-based indoor localization. - Peter Papcun
, Erik Kajati
, Dominika Cupkova, Jozef Mocnej, Martin Miskuf, Iveta Zolotová
:
Edge-enabled IoT gateway criteria selection and evaluation. - Michal Duracík
, Emil Krsák
, Patrik Hrkút
:
Searching source code fragments using incremental clustering. - Janusz Furtak
, Zbigniew Zielinski
, Jan Chudzikiewicz
:
Procedures for sensor nodes operation in the secured domain.
- Xiaohui Cui, Bilial Suman, Zhibo Wang
:
Foreword to the special issue of the Intelligent Systems for the Internet of Things (ISIT2017).
- Maosheng Zhang
, Ruimin Hu, Lin Jiang:
Three-dimensional sound reproduction in vehicle based on data mining technique.
- Dengshi Li
, Ruimin Hu, Xiaochen Wang, Weiping Tu:
Loudspeaker triplet selection based on low distortion within head for multichannel conversion of smart 3D home theater. - Lin Jiang
, Shaoqian Yu, Xiaochen Wang, Chao Wang, Tonghan Wang:
A new source-filter model audio bandwidth extension using high frequency perception feature for IoT communications. - Zhibo Wang
, Yuechuan Guo, Senzhe Zheng, Wei Xu, Lin Liu, Zixin Liu, Xiaohui Cui:
Users' location analysis based on Chinese mobile social media.
Volume 32, Number 14, July 2020
- Ameni Hedhli, Haithem Mezni
:
A DFA-based approach for the deployment of BPaaS fragments in the cloud. - Tianming Jiang
, Ping Huang, Ke Zhou:
Cost-efficiency disk failure prediction via threshold-moving. - Mahdi Hajiali
:
Big data and sentiment analysis: A comprehensive and systematic literature review. - Georges Da Costa
, Jean-Marc Pierson
, Leandro Fontoura Cupertino:
Fast maximum coverage of system behavior from a performance and power point of view. - Hui Cui
, Tsz Hon Yuen
, Robert H. Deng
, Guilin Wang:
Server-aided revocable attribute-based encryption for cloud computing services. - Peiying Shi, Feng Hou, Xiangwei Zheng
, Feng Yuan
:
Analysis of electronic health records based on long short-term memory. - Fei Xue, Yang Cao
, Zhiming Ding, Hengliang Tang, Xi Yang, Lei Chen, Juntao Li:
Urban population density estimation based on spatio-temporal trajectories. - Wei Bao, Chuang Ye Pan, Lu Wang, Qing Zhang, Nenggang Xie:
Parallel computing modes of multiobjective game. - Lei Du
, Zhihua Cui, Lifang Wang, Junming Ma:
Structure tuning method on deep convolutional generative adversarial network with nondominated sorting genetic algorithm II. - Jun Luo
, Senchun Chai, Baihai Zhang, Yuanqing Xia, Jianlei Gao, Guoqiang Zeng:
A novel intrusion detection method based on threshold modification using receiver operating characteristic curve. - Yan Song
, Weiyun Si, Feifan Dai, Guisong Yang:
Weighted ReliefF with threshold constraints of feature selection for imbalanced data classification. - Subin Huang
, Xiangfeng Luo
, Jing Huang, Hao Wang, Shengwei Gu, Yike Guo:
Improving taxonomic relation learning via incorporating relation descriptions into word embeddings. - Hong Fu
, Bo Chen
, Bin Zhang:
A multi-Internet service provider game: Equilibrium, stability, and characteristics. - Flávia Pisani
, Lucas Pascotti Valem
, Daniel Carlos Guimarães Pedronette
, Ricardo da Silva Torres
, Edson Borin
, Maurício Breternitz Jr.
:
A unified model for accelerating unsupervised iterative re-ranking algorithms. - Yiping Wen
, Feiran Wang
, Rui Wu, Jianxun Liu, Buqing Cao:
Improving the novelty of retail commodity recommendations using multiarmed bandit and gradient boosting decision tree. - Haibo Wu
, Shiliang Shi, Yi Lu, Yong Liu, Weihong Huang:
Top corner gas concentration prediction using t-distributed Stochastic Neighbor Embedding and Support Vector Regression algorithms. - Xiaowu Chen
, Guozhang Jiang, Le Yang, Gongfa Li, Feng Xiang:
Redesign of enterprise lean production system based on environmental dynamism. - Yizhou Zhang, Yibao Wang, Tinggui Chen
, Jiawen Shi:
Agent-based modeling approach for group polarization behavior considering conformity and network relationship strength. - Xiaolin Shi, Pei Zhan, Yimin Shi:
Statistical inference for a hybrid system model with incomplete observed data under adaptive progressive hybrid censoring. - Lei Li
, Zhiming Luo, Mengting Zhang, Yuanzheng Cai, Candong Li, Shaozi Li:
An iterative transfer learning framework for cross-domain tongue segmentation. - Fabrizio Marozzo
, Domenico Talia, Paolo Trunfio
:
A sleep-and-wake technique for reducing energy consumption in BitTorrent networks. - Chee Keong Ng
, Sutharshan Rajasegarar
, Lei Pan
, Frank Jiang
, Leo Yu Zhang
:
VoterChoice: A ransomware detection honeypot with multiple voting framework. - Rui Wang
, Shi Ying:
SaaS software performance issue diagnosis using independent component analysis and restricted Boltzmann machine. - Yiping Wen
, Yuan Wang, Jianxun Liu, Buqing Cao, Qi Fu:
CPU usage prediction for cloud resource provisioning based on deep belief network and particle swarm optimization. - Xiuzhen Xie, Lei Li
, Sheng Lian
, Shaohao Chen, Zhiming Luo:
SERU: A cascaded SE-ResNeXT U-Net for kidney and tumor segmentation.
Volume 32, Number 15, August 2020
Editorial
- Khalil Drira
, Mohamed Jmaiel:
New trends in adaptive smart systems, services, and architectures.
- Takoua Abdellatif
, Mohamed Mosbah
:
Efficient monitoring for intrusion detection in wireless sensor networks. - Taher Labidi
, Achraf Mtibaa, Walid Gaaloul
, Faïez Gargouri
:
Cloud SLA negotiation and re-negotiation: An ontology-based context-aware approach. - Abderrahim Ait Wakrime
, Mouna Rekik, Saïd Jabbour:
Cloud service composition using minimal unsatisfiability and genetic algorithm. - Wehbi Benallal, Mahmoud Barhamgi
, Djamal Benslimane
, Zakaria Maamar
, Noura Faci, Ameni Bellaaj:
A knowledge-based approach to manage configurable business processes. - Farah Bellaaj Elloumi
, Mohamed Sellami, Sami Bhiri
:
Avoiding resource misallocations in business processes. - Rymel Benabidallah
, Salah Sadou
, Armel Esnault, Mohamed Ahmed-Nacer:
Simulating systems of systems using situation/reaction paradigm. - Imen Graja, Slim Kallel
, Nawal Guermouche, Saoussen Cheikhrouhou, Ahmed Hadj Kacem:
A comprehensive survey on modeling of cyber-physical systems.
- Alexey L. Lastovetsky
, Ravi Reddy Manumachu
:
The 27th International Heterogeneity in Computing Workshop and the 16th International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Platforms.
- Thomas Grützmacher
, Terry Cojean
, Goran Flegar
, Fritz Göbel, Hartwig Anzt
:
A customized precision format based on mantissa segmentation for accelerating sparse linear algebra. - Giulio Stramondo
, Catalin Bogdan Ciobanu
, Cees de Laat, Ana Lucia Varbanescu:
Designing and building application-centric parallel memories. - Lei Yu
, Fei Teng
, Shangming Ning, Yunshu Li, Zhe Cui, Shengdong Du:
A two steps method of resources utilization predication for large Hadoop data center. - Ali Mohammed
, Florina M. Ciorba
:
SimAS: A simulation-assisted approach for the scheduling algorithm selection under perturbations. - Massinissa Ait Aba, Lilia Zaourar
, Alix Munier:
Efficient algorithm for scheduling parallel applications on hybrid multicore machines with communications delays and energy constraint.
Volume 32, Number 16, August 2020
Editorial
- Yulei Wu
, Zheng Yan
, Zhiwei Zhao, Ahmed Al-Dubai:
Editorial: Special issue on SDN-based wireless network virtualization.
- Zhen Yao, Zheng Yan:
A trust management framework for software-defined network applications. - Zifeng Xu
, Fucai Zhou, Jin Li, Yuxi Li, Qiang Wang:
Graph encryption for all-path queries. - Tao Han, Syed Rooh Ullah Jan, Zhiyuan Tan, Muhammad Usman
, Mian Ahmad Jan
, Rahim Khan, Yongzhao Xu:
A comprehensive survey of security threats and their mitigation techniques for next-generation SDN controllers. - Changqing Gong, Delong Yu, Liang Zhao
, Xi-Guang Li, Xianwei Li:
An intelligent trust model for hybrid DDoS detection in software defined networks. - Reneilson Santos
, Danilo Souza Silva, Walter E. Santo, Admilson R. M. Ribeiro, Edward D. Moreno:
Machine learning algorithms to detect DDoS attacks in SDN. - Xiaohui Wang
, Haoran Gu, YuXian Yue
:
The optimization of virtual resource allocation in cloud computing based on RBPSO. - Xin Chen, Zhuo Li
, Ying Chen, Bing Du, Yongchao Zhang
:
Traffic modeling and performance evaluation of SDN-based NB-IoT access network. - Qiliang Li, Jie Cui
, Hong Zhong, Yichao Du, Yonglong Luo, Lu Liu
:
LBBESA: An efficient software-defined networking load-balancing scheme based on elevator scheduling algorithm.
- Tonglin Li, Bing Xie
, Boyu Zhang:
Foreword to the special issue of the workshop on data-intensive computing in the clouds.
- Ali Reza Zamani, Moustafa AbdelBaky, Daniel Balouek-Thomert, Juan J. Villalobos, Ivan Rodero
, Manish Parashar:
Submarine: A subscription-based data streaming framework for integrating large facilities and advanced cyberinfrastructure. - Zong Peng
, Beth Plale
:
Reliable access to massive restricted texts: Experience-based evaluation. - Spiros Koulouzis
, Paul Martin
, Huan Zhou
, Yang Hu, Junchao Wang, Thierry Carval
, Baptiste Grenier
, Jani Heikkinen
, Cees de Laat, Zhiming Zhao
:
Time-critical data management in clouds: Challenges and a Dynamic Real-Time Infrastructure Planner (DRIP) solution. - Miyuru Dayarathna
, Toyotaro Suzumura:
Multiple stream job performance optimization with source operator graph transformations.
Volume 32, Number 17, September 2020
Editorial
- Gwanggil Jeon
, Valerio Bellandi
:
Special Issue on Computational Intelligence Techniques for Industrial and Medical Applications.
- Jiaying Chen
, Jiong Yu, Yurong Qian, Ping Li, Chen Bian:
A novel recommender algorithm based on graph embedding and diffusion sampling.
- Rathinaraja Jeyaraj
, Ananthanarayana V. S.
, Anand Paul
:
Improving MapReduce scheduler for heterogeneous workloads in a heterogeneous environment.
- Maheswari Arumugam, Arun Kumar Sangaiah
:
Arrhythmia identification and classification using wavelet centered methodology in ECG signals. - Gwanggil Jeon
:
Structure and gradient-based industrial interpolation using computational intelligence. - Feiqiang Liu, Lihui Chen, Lu Lu
, Awais Ahmad, Gwanggil Jeon
, Xiaomin Yang
:
Medical image fusion method by using Laplacian pyramid and convolutional sparse representation.
- Mohamed Bakhouya, Mostapha Zbakh, Mohamed Essaaidi
, Pierre Manneback:
Cloud computing, IoT, and big data: Technologies and applications.
- Zhe Yang, Kun Ma
, Xiaoli Zhang, Lizhen Cui, Bo Yang:
RSCVC: Row-based semantic cache with incremental versioning consistency. - Hårek Haugerud
, Noha Xue, Anis Yazidi
:
On automated cloud bursting and hybrid cloud setups using Apache Mesos. - Maria Carla Calzarossa
, Luisa Massari
, Daniele Tessera
:
Evaluation of cloud autoscaling strategies under different incoming workload patterns. - Sidi Ahmed Mahmoudi
, Mohammed Amin Belarbi, Saïd Mahmoudi
, Ghalem Belalem
, Pierre Manneback:
Multimedia processing using deep learning technologies, high-performance computing cloud resources, and Big Data volumes. - Olivier Debauche
, Sidi Ahmed Mahmoudi
, Nicolas De Cock, Saïd Mahmoudi
, Pierre Manneback, Frédéric Lebeau:
Cloud architecture for plant phenotyping research. - Hamza Elkhoukhi, Youssef NaitMalek
, Mohamed Bakhouya
, Anass Berouine
, Abdelhak Kharbouch
, Fadwa Lachhab, Majdoulayne Hanifi, Driss El Ouadghiri
, Mohamed Essaaidi
:
A platform architecture for occupancy detection using stream processing and machine learning approaches. - Emiliano Casalicchio
, Stefano Iannucci
:
The state-of-the-art in container technologies: Application, orchestration and security. - Sogand Shirinbab, Lars Lundberg
, Emiliano Casalicchio
:
Performance evaluation of containers and virtual machines when running Cassandra workload concurrently. - Simone Patonico, Placide Shabisha, An Braeken
, Abdellah Touhafi
, Kris Steenhaut
:
Elliptic curve-based proxy re-signcryption scheme for secure data storage on the cloud.
Volume 32, Number 18, September 2020
Editorial
- Chang Choi
, Florin Pop, Jun Huang:
Novel data mining paradigms based on soft computing and machine learning in the current and upcoming information society revolution.
- Kyoungsoo Bok, Geonsik Ko, Jongtae Lim, Jaesoo Yoo
:
Personalized content recommendation scheme based on trust in online social networks. - Gen Li
, Chang Ha Lee, Jason J. Jung
, Young Chul Youn
, David Camacho
:
Deep learning for EEG data analytics: A survey. - Yoosang Park
, Jaehyung Ye, Jongsun Choi
, Jaeyoung Choi
, Hoon Ko
:
Extraction of abstracted sensory data to reduce the execution time of context-aware services in wearable computing environments. - Dan Li
, Lichao Zhao, Qingfeng Cheng, Ning Lu, Wenbo Shi:
Opcode sequence analysis of Android malware by a convolutional neural network. - Wenxia Wu, Jinxiu Zhu, Xin Su
, Xuewu Zhang:
DHGAN: Generative adversarial network with dark channel prior for single-image dehazing. - Yeongji Ju, Min-Gu Kim
, Juhyun Shin
:
Detection of malicious code using the direct hashing and pruning and support vector machine. - Mamta, Brij B. Gupta
:
An efficient KP design framework of attribute-based searchable encryption for user level revocation in cloud. - Vivekananda Bhat K.
, Ashok Kumar Das, Jong-Hyouk Lee
:
Design of a blind quantization-based audio watermarking scheme using singular value decomposition. - Hyun-Sik Choi
:
Drowsy driving detection using neural network with backpropagation algorithm implemented by FPGA. - Seong Il Bae, Gyu Bin Lee, Eul Gyu Im
:
Ransomware detection using machine learning algorithms. - YunSeok Choi
, Dahae Kim, Jee-Hyong Lee:
Neural attention model with keyword memory for abstractive document summarization. - Dong-Kyu Chae, Bo-Kyum Kim, Seung Ho Kim, Sang-Wook Kim
:
Incremental feature selection for efficient classification of dynamic graph bags. - Xing Liu
, Panwen Liu, Lun Hu, Chengming Zou, Zhangyu Cheng:
Energy-aware task scheduling with time constraint for heterogeneous cloud datacenters. - Keon Myung Lee
, Ki Sun Park, Kyung Soon Hwang, Kwang-Il Kim:
Deep neural network model construction with interactive code reuse and automatic code transformation.
- Marek R. Ogiela
:
Advanced approaches for information processing in multimedia, decision-making, and security systems.
- Ugo Fiore
:
Minority oversampling based on the attraction-repulsion Weber problem. - Kyungroul Lee
, Kangbin Yim
, Sun-Young Lee
:
Vulnerability analysis on the image-based authentication: Through the WM_INPUT message. - HyoJoon Kim
, Sang Hui Jeong
, Ji Hyeon Seo
, Inseok Park, Hoon Ko
, Seong Yong Moon
:
Augmented reality for botulinum toxin injection. - Yi-Li Huang, Fang-Yie Leu
, Ruey-Kai Sheu, Jung-Chun Liu, Heru Susanto
:
A secure and efficient WSN by employing symmetric key matrix and rectangular frame scheme. - Lidia Ogiela
, Makoto Takizawa:
New protocols of cognitive data management and sharing in cloud computing. - Urszula Ogiela
:
Cognitive cryptography for data security in cloud computing. - Jindan Zhang
, Baocang Wang, Marek R. Ogiela
, Xu An Wang
, Arun Kumar Sangaiah
:
New public auditing protocol based on homomorphic tags for secure cloud storage. - Meriem Guerar
, Mauro Migliardi
, Francesco Palmieri
, Luca Verderame
, Alessio Merlo:
Securing PIN-based authentication in smartwatches with just two gestures.
Volume 32, Number 19, October 2020
- Sparsh Mittal
:
A survey on evaluating and optimizing performance of Intel Xeon Phi. - Ali Assi
, Hamid Mcheick
, Wajdi Dhifli
:
Data linking over RDF knowledge graphs: A survey. - Rodrigo Baya, Martín Pedemonte
, Alejandro Gutiérrez Arce
, Pablo Ezzatti
:
An asynchronous computation architecture for enhancing the performance of the Weather Research and Forecasting model. - Guang-Li Huang
, Jing He
, Zenglin Xu, Guangyan Huang
:
A combination model based on transfer learning for waste classification. - Yuechao Lu
, Ichitaro Yamazaki, Fumihiko Ino, Yasuyuki Matsushita
, Stanimire Tomov
, Jack J. Dongarra:
Reducing the amount of out-of-core data access for GPU-accelerated randomized SVD. - Henrique Kloh, Vinod E. F. Rebello
, Cristina Boeres, Bruno Schulze, Mariza Ferro
:
Static job scheduling for environments with vertical elasticity. - Yuanmu Li
, Zhanqing Wang:
A medical image segmentation method based on hybrid active contour model with global and local features. - Junyan Wang
:
Nondominated sorting genetic algorithm II with merged strategies for industrial network topology optimization. - Zhipu Xie
, Bowen Du, Shangfo Huang, Bo Huang, Leilei Sun, Weifeng Lv:
Guaranteeing differential privacy for sequence predictions in bike sharing systems. - Jiangjun Yuan, Jiawen Shi, Juyan Che, Chonghuan Xu
, Jie Wang:
Modeling and simulation analysis of public opinion polarization in a dynamic network environment. - Yibin Xu
, Yangyu Huang
, Jianhua Shao, George Theodorakopoulos
:
A flexible n/2 adversary node resistant and halting recoverable blockchain sharding protocol. - Yali Lv
, Weixin Hu, Jiye Liang
, Yuhua Qian, Junzhong Miao:
A naive learning algorithm for class-bridge-decomposable multidimensional Bayesian network classifiers. - Yinglong Dai
, Guojun Wang
, Jianhua Dai, Oana Geman:
A multimodal deep architecture for traditional Chinese medicine diagnosis. - Mahzad Khoshlessan, Ioannis Paraskevakos, Geoffrey C. Fox, Shantenu Jha
, Oliver Beckstein
:
Parallel performance of molecular dynamics trajectory analysis. - Li-Hui Lin
, Tzong-Jer Chen
:
Image quality assessment by an efficient correlation-based metric. - Zhen Wei, Wei Zhang
:
Construction of an intelligent cellular automata model for historic landscape islands in Shanghai and fusion simulation. - Yejin Tan
, Wei Wu, Jian Liu, Huimei Wang, Ming Xian:
Lightweight edge-based kNN privacy-preserving classification scheme in cloud computing circumstance. - Hongzhong Ma, Chaozhi Huang
, Xiping Liu, Wangfeng Shi, Wei Liu:
The effect of a single-sided pole shoe and slot on reducing torque ripple in a switched reluctance motor. - Weiming Chen
, Siqi Chen, Hailin Guo, Xiaoyang Ni:
Welding flame detection based on color recognition and progressive probabilistic Hough transform.
Volume 32, Number 20, October 2020
Editorials
- Veronica Gil-Costa
, Hermes Senger
:
High-performance computing for computational science.
- Matthias Diener
, Laxmikant V. Kalé, Daniel J. Bodony
:
Heterogeneous computing with OpenMP and Hydra. - Xinzhe Wu
, Serge G. Petiton, Yutong Lu:
A parallel generator of non-Hermitian matrices computed from given spectra. - Adriano Marques Garcia
, Claudio Schepke
, Alessandro Girardi
:
PAMPAR: A new parallel benchmark for performance and energy consumption evaluation. - Frederico Luís Cabral
, Sanderson L. Gonzaga de Oliveira
, Carla Osthoff
, Gabriel P. Costa, Diego N. Brandão
, Mauricio Kischinhevsky:
An evaluation of MPI and OpenMP paradigms in finite-difference explicit methods for PDEs on shared-memory multi- and manycore systems. - Roussian R. A. Gaioso, Veronica Gil-Costa
, Hélio Guardia
, Hermes Senger
:
Performance evaluation of single vs. batch of queries on GPUs. - Bernabé López-Albelda
, A. J. Lázaro-Muñoz, José María González-Linares
, Nicolás Guil
:
Heuristics for concurrent task scheduling on GPUs. - Lucas Leandro Nesi
, Matheus da Silva Serpa
, Lucas Mello Schnorr
, Philippe Olivier Alexandre Navaux
:
Task-based parallel strategies for computational fluid dynamic application in heterogeneous CPU/GPU resources.
- Timothy W. Robinson, Abhinav Thota
:
Foreword to the Special Issue of the Cray User Group.
- Simon McIntosh-Smith
, James Price, Andrei Poenaru
, Tom Deakin
:
Benchmarking the first generation of production quality Arm-based supercomputers. - Charlene Yang
, Thorsten Kurth
, Samuel Williams
:
Hierarchical Roofline analysis for GPUs: Accelerating performance optimization for the NERSC-9 Perlmutter system. - Verónica G. Vergara Larrea
, Reuben D. Budiardja
, Rahulkumar Gayatri, Christopher S. Daley
, Oscar R. Hernandez, Wayne Joubert:
Experiences in porting mini-applications to OpenACC and OpenMP on heterogeneous systems. - Nick Brown
, Anna Roubícková, Ioanna Lampaki, Lucy MacGregor, Michelle Ellis, Paola Vera de Newton:
Machine learning on Crays to optimize petrophysical workflows in oil and gas exploration. - Ananda V. Kommaraju
, Kristyn J. Maschhoff, Michael F. Ringenburg, Benjamin Robbins:
Scalable reinforcement learning on Cray XC. - Bilel Hadri
, Matteo Parsani
, Maxwell Hutchinson, Alexander Heinecke, Lisandro Dalcín, David E. Keyes
:
Performance study of sustained petascale direct numerical simulation on Cray XC40 systems. - Nick Brown
, Brian Bainbridge, Ciarán Beggan, William Brown
, Brian Hamilton, Susan Macmillan:
Modelling the Earth's geomagnetic environment on Cray machines using PETSc and SLEPc. - Jingqing Mu
, Jérome Soumagne
, Suren Byna
, Quincey Koziol, Houjun Tang
, Richard Warren:
Interfacing HDF5 with a scalable object-centric storage system on hierarchical storage. - John Fragalla
, Bill Loewe
, Torben Kling Petersen
:
New Lustre features to improve Lustre metadata and small-file performance. - Farouk Salem
, Florian Schintke, Thorsten Schütt, Alexander Reinefeld:
Scheduling data streams for low latency and high throughput on a Cray XC40 using Libfabric. - Maxime Martinasso
, Miguel Gila, William Sawyer, Rafael Sarmiento-Pérez, Guilherme Peretti-Pezzi, Vasileios Karakasis:
Cray programming environments within containers on Cray XC systems.
Volume 32, Number 21, November 2020
Special Issue Papers
- Jiajian Xiao
, Philipp Andelfinger
, Wentong Cai
, Paul Richmond
, Alois C. Knoll
, David Eckhoff:
OpenABLext: An automatic code generation framework for agent-based simulations on CPU-GPU-FPGA heterogeneous platforms. - Robert Dietze
, Gudula Rünger
:
The search-based scheduling algorithm HP* for parallel tasks on heterogeneous platforms. - Hamidreza Khaleghzadeh
, Muhammad Fahad
, Ravi Reddy Manumachu
, Alexey L. Lastovetsky
:
A novel data partitioning algorithm for dynamic energy optimization on heterogeneous high-performance computing platforms. - Jaroslav Olha
, Jana Hozzová, Jan Fousek
, Jiri Filipovic:
Exploiting historical data: Pruning autotuning spaces and estimating the number of tuning steps. - Brij B. Gupta
, Megha Quamara
:
An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols. - Sana Moin, Ahmad Karim
, Kalsoom Safdar
, Iqra Iqbal, Zanab Safdar, V. Vijayakumar, Khawaja Tehseen Ahmed, Shahbaz Akhtar Abid:
GREEN SDN - An enhanced paradigm of SDN: Review, taxonomy, and future directions. - Sardar Khaliq uz Zaman
, Iftikhar Ahmed Khan, Syed Sajid Hussain
, Tassawar Iqbal, Junaid Shuja
, Syed Faraz Ahmed
, Yaser Jararweh, Kwangman Ko:
PreDiKT-OnOff: A complex adaptive approach to study the impact of digital social networks on Pakistani students' personal and social life. - Pradeeban Kathiravelu
, Peter Van Roy, Luís Veiga
:
Interoperable and network-aware service workflows for big data executions at internet scale. - Shadi AlZu'bi
, Sokyna Al-Qatawneh, Mohammad W. Elbes, Mohammad A. Alsmirat
:
Transferable HMM probability matrices in multi-orientation geometric medical volumes segmentation. - Cosimo Anglano, Massimo Canonico, Paolo Castagno, Marco Guazzone
, Matteo Sereno:
Profit-aware coalition formation in fog computing providers: A game-theoretic approach. - Ahmed Musa, Haythem Bany Salameh
, Nusseibeh Abu Sannad, Rami Halloush
, Khalid A. Darabkh
:
Spectrum management with simultaneous power-controlled assignment decisions in cognitive radio networks. - Muder Almiani
, Alia Abu Ghazleh
, Amer Al-Rahayfeh, Abdul Razaque
:
Cascaded hybrid intrusion detection model based on SOM and RBF neural networks. - Syed Asad Raza Kazmi, Awais Qasim
, Adnan Khalid
, Ruttaba Assad, Muhammad Shahbaz:
Formal modeling and verification of cloud-based web service composition. - Hyunmin Noh, Hwanwook Lee, Yunmin Go, Hyun Park, Jongman Lee, Jaewoo Kim, Hwangjun Song
:
Congestion-aware HTTP adaptive streaming system over SDN-enabled Wi-Fi network. - Carlos Guerrero
, Isaac Lera, Carlos Juiz:
Optimization policy for file replica placement in fog domains. - Sarah Abdallah
, Ayman I. Kayssi
, Imad H. Elhajj
, Ali Chehab
:
Performance analysis of SDN vs OSPF in diverse network environments. - Yaser Jararweh, Mohammed A. Shehab
, Qussai Yaseen
, Mahmoud Al-Ayyoub:
Improving classification and clustering techniques using GPUs. - Faisal Rehman
, Osman Khalid, Nuhman ul Haq
, Tahir Maqsood, Mazhar Ali, Raja Wasim Ahmad, Junaid Shuja
, Shahzad Sarwar, Sajjad Ahmad Madani
:
A scalable model for real-time venue recommendations using MapReduce. - Kavitha Kadarla
, S. C. Sharma:
Performance analysis of ACO-based improved virtual machine allocation in cloud for IoT-enabled healthcare.
- Sajid Latif
, Syed Mushhad M. Gilani
, Liaqat Ali, Saleem Iqbal, Misbah Liaqat
:
Characterizing the architectures and brokering protocols for enabling clouds interconnection.
- Lo'ai Tawalbeh
, Mohammad Tawalbeh, Monther Aldwairi:
Improving the impact of power efficiency in mobile cloud applications using cloudlet model.
- Abdelkerim Souahlia
, Ammar Belatreche, Abdelkader Benyettou, Zoubir Ahmed-Foitih, Elhadj Benkhelifa
, Kevin Curran
:
Echo state network-based feature extraction for efficient color image segmentation.
- Hongyan Shi, NanDong Zhang, Xiao-qiang Wu
, Yu-Dong Zhang
:
Multimodal lung tumor image recognition algorithm based on integrated convolutional neural network.
Volume 32, Number 22, November 2020
- Junxing Zhu
, Xiang Wang, Qiang Liu
, Xiaoyong Li, Chengcheng Shao, Bin Zhou:
A multiview approach based on naming behavioral modeling for aligning chinese user accounts across multiple networks. - Qilin Xiao, Yun Cheng, Minlei Xiao, Jun Zhang, Hongji Shi, Lihui Niu, Chenguang Ge, Haitao Lang
:
Improved region convolutional neural network for ship detection in multiresolution synthetic aperture radar images. - Suresh K. Peddoju
, Himanshu Upadhyay, Leonel E. Lagos:
File integrity monitoring tools: Issues, challenges, and solutions. - Ying Sun, Jinrong Tian
, Du Jiang, Bo Tao, Ying Liu, Juntong Yun, Disi Chen:
Numerical simulation of thermal insulation and longevity performance in new lightweight ladle. - Fang Huang
:
Parallelization implementation of the multi-scale retinex image-enhancement algorithm based on a many integrated core platform. - Junfeng Tian, Yanan Pang:
Adjoin: A causal consistency model based on the adjacency list in a distributed system. - Jialin Jiang
, Xinzhi Wang, Xiangfeng Luo:
Interdisciplinary knowledge-based implicit emotion recognition. - Changen Zhou
, Haoyi Fan, Wen Zhao, Hongben Xu, Huangwei Lei, Zhaoyang Yang, Zuoyong Li
, Candong Li:
Reconstruction enhanced probabilistic model for semisupervised tongue image segmentation. - Marcelo Antonio de Carvalho Jr.
, Paulo Bandiera-Paiva
:
Towards unobtrusive patient-centric access-control for Health Information System. - Guimin Shi
, Sheng Yang, Yi Jiang, Zhiming Luo:
Pattern synthesis of thinned multi-input multi-output radar using difference set and differential evolution. - Yuanzheng Cai
, Tao Wang
, Wei Liu, Zhiming Luo:
A robust interclass and intraclass loss function for deep learning based tongue segmentation. - Xiaolin Li
, Haitao Niu
:
Feature extraction based on deep-convolutional neural network for face recognition. 1 - Luís Reis, João Bispo
, João M. P. Cardoso
:
Compilation of MATLAB computations to CPU/GPU via C/OpenCL generation. - Romolo Marotta
, Davide Tiriticco
, Pierangelo di Sanzo
, Alessandro Pellegrini
, Bruno Ciciani
, Francesco Quaglia
:
Mutable locks: Combining the best of spin and sleep locks. - Zhixia Zhang, Liping Xie:
A many-objective integrated evolutionary algorithm for feature selection in anomaly detection. - Liang Dai
, Guodong Du
, Jia Zhang, Candong Li, Rong Wei, Shaozi Li:
Joint multilabel classification and feature selection based on deep canonical correlation analysis. - Bin Yu
, Zhiming Luo, Huangbin Wu, Shaozi Li:
Hand gesture recognition based on attentive feature fusion.
Volume 32, Number 23, December 2020
Editorial
- Zheng Xu
, Qingyuan Zhou:
Special issue on applications and techniques in cyber intelligence 2019.
- Xiaoyan Li
, Zhigang Lv, Peng Wang, Mengyu Sun, Mengyu Qiao:
Combination weighted clustering algorithms in cognitive radio networks. - Feng Li
:
On forwarding indices of lexicographic product networks. - Qianyi Shang
, Lijun Chen
, Peng Peng:
On-chip evolution of combinational logic circuits using an improved genetic-simulated annealing algorithm. - Jianmin Wang, Wenbin Zhao, Tongrang Fan
, Shilong Yang, Lv Hongwei:
An improved join-free snowflake schema for ETL and OLAP of data warehouse. - Xiaogang An, Weiwei Zhu, Na An
:
Control system optimization of spillage brake based on RBF neural network. - Jia Xu
, Shouxin Song, Huaiyuan Zhai, Pengwei Yuan, Mingli Chen:
A new analytical framework for network vulnerability on subway system. - Xiaobing Ding
, Yuan Zhao, Zhigang Liu, Hua Hu:
The modeling of urban rail transit emergency delay propagation scope under network operation mode. - Honggen Zhou, Zhen Wang, Jinfeng Liu
, Guizhong Tian, Xuwen Jing, Lei Li:
Research on block storage yard scheduling according to grid method. - Yilei Pei, Dandan Li
, Wanxin Xue:
The evaluation of customer experience using BP neural network-taking catering O2O takeout. - Haiqing Gan
, Chuiyong Zheng:
An electric vehicle operation optimization method based on demand-side management. - Bo Yang
, Chang Liu:
Ontology reasoning of start-ups' growth risk based on immune system. - Quang Thanh Tran
, Li Hao, Quang Khai Trinh:
A comprehensive research on exponential smoothing methods in modeling and forecasting cellular traffic. - Chengjun Guo, Yongqi Chen
:
An interval support vector domain description based on the dynamic decreasing inertia weight particle swarm optimization. - Xianlei Xu
, Wenru Gao, Di Zhang, Taotao Li, Xu Qiao:
Cloud-based difference algorithm using big GPR data for roadbed damage detection. - Nijia Lu
, Guohua Wu, Zhen Zhang, Yitao Zheng, Yizhi Ren, Kim-Kwang Raymond Choo
:
Cyberbullying detection in social media text based on character-level convolutional neural network with shortcuts.
- Fang Dong
, Jianming Yong
, Xiang Fei:
Emerging intelligent big data analytics for cloud and edge computing.
- Huaming Chen
, Jun Shen
, Lei Wang, Chi-Hung Chi:
APEX2S: A two-layer machine learning model for discovery of host-pathogen protein-protein interactions on cloud-based multiomics data. - Zhicheng Cai
, Duan Liu, Yifei Lu
, Rajkumar Buyya
:
Unequal-interval based loosely coupled control method for auto-scaling heterogeneous cloud resources for web applications. - Bo Mao, Bingchan Li:
City object detection from airborne Lidar data with OpenStreetMap-tagged superpixels. - Cong Wang
, Fanghui Zheng, Guangcong Zheng, Sancheng Peng, Zejie Tian, Yujia Guo, Guorui Li, Ying Yuan:
Modeling on virtual network embedding using reinforcement learning. - Wenjia Wu
, Weihong Xu, Zhouguo Chen, Ming Yang
:
Energy-efficient Link Scheduling in Time-variant Dual-Hop 60GHz Wireless Networks. - Yongjia Yu
, Vasu Jindal, I-Ling Yen, Farokh B. Bastani, Jie Xu, Peter Garraghan
:
Integrating clustering and regression for workload estimation in the cloud. - Jinghui Zhang
, Jun Zhan, Jiange Li, Jiahui Jin
, Lei Qian:
Optimizing execution for pipelined-based distributed deep learning in a heterogeneously networked GPU cluster. - Haiting Zhu
, Yuan Zhang, Lu Zhang, Gaofeng He
, Linfeng Liu, Ning Liu:
SA Sketch: A self-adaption sketch framework for high-speed network.
Volume 32, Number 24, December 2020
- Yongqi Chen
, Qinge Dai, Yang Chen:
A new interval native Bayes uncertain fault diagnosis method based on the firefly algorithm. - Philipp Samfass
, Tobias Weinzierl
, Dominic Etienne Charrier, Michael Bader:
Lightweight task offloading exploiting MPI wait times for parallel adaptive mesh refinement. - Vaibhav Sundriyal
, Masha Sosonkina, David Poole, Mark S. Gordon:
Runtime power allocation approach for GAMESS hybrid CPU-GPU implementation. - Huaiguang Liu
, Yu Cai, Shiyang Zhou
, Jintang Yang:
Stereo Matching with Multi-scale Based on Anisotropic Match Cost. - Xinxin Zhang, Leilei Gu
, Hong Chen, Guozhu Jia
:
Study on the influence of surrounding urban SO2, NO2, and CO on haze formation in Beijing based on MF-DCCA and boosting algorithms. - Jinxia Wei
, Chun Long, Jiawei Li, Jing Zhao:
An intrusion detection algorithm based on bag representation with ensemble support vector machine in cloud computing. - Gaimei Gao
, Hongxia Fei, Zefeng Qin:
An efficient certificateless public auditing scheme in cloud storage. - Rochak Swami
, Mayank Dave, Virender Ranga
:
Voting-based intrusion detection framework for securing software-defined networks. - Lin Yang
, Zhiming Luo, Wangqing Lin, Shaozi Li:
Research on line overload identification of power system based on improved neural network algorithm. - David Samuel, Syeduzzaman Khan, Cody J. Balos
, Zachariah Abuelhaj, Anthony D. Dutoi, Chadi Kari, David Mueller, Vivek K. Pallipuram
:
A2Cloud-RF: A random forest based statistical framework to guide resource selection for high-performance scientific computing on the cloud. - Hongxia Liu, Scott Mizzi
:
Evaluating climate changes and land use changes on water resources using hybrid Soil and Water Assessment Tool-DEEP optimized by metaheuristics. - Lucia G. Menezo
, Valentin Puente
, José-Ángel Gregorio
:
Rainbow: A composable coherence protocol for multi-chip servers. - Hangqi Ding
, Zhiyong Wu, Luchen Zhao:
Whale optimization algorithm based on nonlinear convergence factor and chaotic inertial weight. - Jiale Zhou
, Hong Li, Chiyu Wang
, Xinrong Li, Jiawen Shi, Zhicheng Pang:
Optimizing unbalanced text classification tasks by integrating critical data mining and restricted rewriting techniques. - Meng Cao
, Yonghua Zhu, Wenjing Gao, Mengyao Li, Shaoxiu Wang:
Various syncretic co-attention network for multimodal sentiment analysis. - Loïc Cudennec
:
Adaptive message passing polling for energy efficiency: Application to software-distributed shared memory over heterogeneous computing resources. - Zhengming Yi
, Yiping Yao:
A scalable lock on NUMA multicore. - Dara Q. Quach, Daniel P. Playne
, Chris Scogings:
GPUAnimats - Simulating animats, an agent-based, artificial life model on graphical processing units. - Ling Li, Xiangbing Zhou
, Yiping Li, Jiangang Gu, Shaopeng Shen:
An improved genetic algorithm with Lagrange and density method for clustering. - Xiaoliang Xu
, Chang Li, Yuxiang Wang
, Yixing Xia:
Multiattribute approximate nearest neighbor search based on navigable small world graph.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.