


default search action
Computers & Electrical Engineering, Volume 47
Volume 47, October 2015
- Nassim Mirjazaee, Neda Moghim: 
 An opportunistic routing based on symmetrical traffic distribution in vehicular networks. 1-12
- Gustavo Gonzalez Granadillo, Joaquín García-Alfaro  , Ender Alvarez, Mohammed El-Barbori, Hervé Debar , Ender Alvarez, Mohammed El-Barbori, Hervé Debar : :
 Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI index. 13-34
- Astik Biswas, Prakash Kumar Sahu, Mahesh Chandra  : :
 Multiple camera in car audio-visual speech recognition using phonetic and visemic information. 35-50
- M. Nishat Akhtar  , Junita Mohamad-Saleh , Junita Mohamad-Saleh , Othman Sidek: , Othman Sidek:
 Design and simulation of a parallel adaptive arbiter for maximum CPU utilization using multi-core processors. 51-68
- Deborah Maria Vieira Magalhães  , Rodrigo N. Calheiros , Rodrigo N. Calheiros , Rajkumar Buyya, Danielo Goncalves Gomes , Rajkumar Buyya, Danielo Goncalves Gomes : :
 Workload modeling for resource usage analysis and simulation in cloud computing. 69-81
- Deepti Mittal  , Kajal Kumari: , Kajal Kumari:
 Automated detection and segmentation of drusen in retinal fundus images. 82-95
- M. Tarek Ibn Ziad  , Mohamed Hossam, Mohamad A. Masoud, Mohamed Nagy, Hesham A. Adel, Yousra Alkabani, M. Watheq El-Kharashi, Khaled Salah, Mohamed Abdel Salam: , Mohamed Hossam, Mohamad A. Masoud, Mohamed Nagy, Hesham A. Adel, Yousra Alkabani, M. Watheq El-Kharashi, Khaled Salah, Mohamed Abdel Salam:
 On kernel acceleration of electromagnetic solvers via hardware emulation. 96-113
- Xuehua Zhao  , Daoliang Li, Bo Yang, Huiling Chen , Daoliang Li, Bo Yang, Huiling Chen , Xinbin Yang, Chenglong Yu, Shuangyin Liu: , Xinbin Yang, Chenglong Yu, Shuangyin Liu:
 A two-stage feature selection method with its application. 114-125
- Faisal Nadeem Khan, Chiew Hoon Teow, Shiu Guong Kiu, Ming Chieng Tan, Yudi Zhou, Waled Hussein Al-Arashi  , Alan Pak Tao Lau , Alan Pak Tao Lau , Chao Lu , Chao Lu : :
 Automatic modulation format/bit-rate classification and signal-to-noise ratio estimation using asynchronous delay-tap sampling. 126-133
- Danielo Goncalves Gomes  , Luiz Fernando Bittencourt, Rafael Tolosana-Calasanz: , Luiz Fernando Bittencourt, Rafael Tolosana-Calasanz:
 Introduction to the Special Section on "Cloud computing: Current advances and new research trends". 135-137
- Sukhpal Singh  , Inderveer Chana: , Inderveer Chana:
 Q-aware: Quality of service based cloud resource provisioning. 138-160
- Yunchang Liu, Chunlin Li, Zhiyong Yang: 
 Tradeoff between energy and user experience for multimedia cloud computing. 161-172
- Hadi Khani, Amin Latifi, Nasser Yazdani, Siamak Mohammadi  : :
 Distributed consolidation of virtual machines for power efficiency in heterogeneous cloud data centers. 173-185
- Saad Mustafa  , Babar Nazir , Babar Nazir , Amir Hayat, Atta ur Rehman Khan , Amir Hayat, Atta ur Rehman Khan , Sajjad Ahmad Madani , Sajjad Ahmad Madani : :
 Resource management in cloud computing: Taxonomy, prospects, and challenges. 186-203
- Da-Ren Chen  , Kai-Feng Chiang: , Kai-Feng Chiang:
 Cloud-based power estimation and power-aware scheduling for embedded systems. 204-221
- Ehsan Arianyan  , Hassan Taheri, Saeed Sharifian , Hassan Taheri, Saeed Sharifian : :
 Novel energy and SLA efficient resource management heuristics for consolidation of virtual machines in cloud data centers. 222-240
- Subhadra Bose Shaw, Anil Kumar Singh: 
 Use of proactive and reactive hotspot detection technique to reduce the number of virtual machine migration and energy consumption in cloud data center. 241-254
- Joaquín García-Alfaro  , Francesco Longo , Francesco Longo , Gregorio Martínez Pérez: , Gregorio Martínez Pérez:
 Introduction to the special section on critical systems modelling and security. 255-257
- Gabriele Lenzini, Sjouke Mauw  , Samir Ouchani , Samir Ouchani : :
 Security analysis of socio-technical physical systems. 258-274
- Stefano Marrone  , Ricardo J. Rodríguez , Ricardo J. Rodríguez , Roberto Nardone , Roberto Nardone , Francesco Flammini , Francesco Flammini , Valeria Vittorini: , Valeria Vittorini:
 On synergies of cyber and physical security modelling in vulnerability assessment of railway systems. 275-285
- Fabrizio Baiardi  , Federico Tonelli, Luca Guidi, Daniela Pestonesi, V. Angeletti: , Federico Tonelli, Luca Guidi, Daniela Pestonesi, V. Angeletti:
 Assessing and managing the information and communication risk of power generation. 286-298
- Lorena Cazorla, Cristina Alcaraz  , Javier López , Javier López : :
 Awareness and reaction strategies for critical infrastructure protection. 299-317
- Gianluca Dini  , Lanfranco Lopriore: , Lanfranco Lopriore:
 Password systems: Design and implementation. 318-326
- Harsha K. Kalutarage  , Siraj Ahmed Shaikh , Siraj Ahmed Shaikh , Indika P. Wickramasinghe, Qin Zhou , Indika P. Wickramasinghe, Qin Zhou , Anne E. James , Anne E. James : :
 Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks. 327-344

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














