


default search action
Concurrency and Computation: Practice and Experience, Volume 28
Volume 28, Number 1, January 2016
- Weifeng Liu, Michael Gerndt, Bin Gong:
Model-based MPI-IO tuning with Periscope tuning framework. 3-20 - Emanuele Manca, Andrea Manconi, Alessandro Orro, Giuliano Armano, Luciano Milanesi
:
CUDA-quicksort: an improved GPU-based implementation of quicksort. 21-43 - Tonglin Li, Xiaobing Zhou, Ke Wang, Dongfang Zhao, Iman Sadooghi, Zhao Zhang, Ioan Raicu:
A convergence of key-value storage systems from clouds to supercomputers. 44-69 - Ke Wang, Kan Qiao, Iman Sadooghi, Xiaobing Zhou, Tonglin Li, Michael Lang
, Ioan Raicu:
Load-balanced and locality-aware scheduling for data-intensive workloads at extreme scales. 70-94 - Vitor Venceslau Curtis
, Carlos Alberto Alonso Sanches
:
An efficient solution to the subset-sum problem on GPU. 95-113 - Lahiru S. Gallege, Dimuthu U. Gamage, James H. Hill, Rajeev R. Raje:
Understanding the trust of software-intensive distributed systems. 114-143 - Peter A. Buhr, David Dice, Wim H. Hesselink
:
Dekker's mutual exclusion algorithm made RW-safe. 144-165 - Youzhong Ma, Xiaofeng Meng, Shaoya Wang:
Parallel similarity joins on massive high-dimensional data using MapReduce. 166-183
Volume 28, Number 2, February 2016
Editorials
- Georg Hager
, Darren J. Kerbyson, Abhinav Vishnu, Gerhard Wellein:
Performance and power for highly parallel systems. 187-188
- Georg Hager
, Jan Treibig, Johannes Habich, Gerhard Wellein
:
Exploring performance and power properties of modern multi-core chips via simple machine models. 189-210 - Joshua Peraza, Ananta Tiwari, Michael Laurenzano, Laura Carrington, Allan Snavely:
PMaC's green queue: a framework for selecting energy optimal DVFS configurations in large scale MPI applications. 211-231 - Alex D. Breslow, Leo Porter
, Ananta Tiwari, Michael Laurenzano, Laura Carrington, Dean M. Tullsen
, Allan Snavely:
The case for colocation of high performance computing workloads. 232-251 - Harald Servat
, Germán Llort
, Judit Giménez
, Jesús Labarta
:
Detailed and simultaneous power and performance analysis. 252-273 - Scott Pakin
, Curtis B. Storlie, Michael Lang
, Robert E. Fields, Eloy E. Romero Jr., Craig Idler, Sarah Michalak, Hugh Greenberg, Josip Loncaric, Randal Rheinheimer, Gary Grider, Joanne Wendelberger
:
Power usage of production supercomputers and production workloads. 274-290
- Florin Pop
, Mauro Iacono
, Marco Gribaudo
, Joanna Kolodziej:
Advances in modelling and simulation for big-data applications (AMSBA). 291-293
- Jianwei Liao:
Server-side prefetching in distributed file systems. 294-310 - Tinghuai Ma
, Huan Rong, Changhong Ying, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Detect structural-connected communities based on BSCHEF in C-DBLP. 311-330 - Shuoyi Zhao, Ruixuan Li, Wenlong Tian, Weijun Xiao, Xinhua Dong, Dongjie Liao, Samee U. Khan
, Keqin Li:
Divide-and-conquer approach for solving singular value decomposition based on MapReduce. 331-350 - Pantelimon George Popescu, Emil-Ioan Slusanschi
, Voichita Iancu, Florin Pop:
A new upper bound for Shannon entropy. A novel approach in modeling of Big Data applications. 351-359 - Omar Behadada, Marcello Trovati
, Mohammed Amine Chikh, Nik Bessis
:
Big data-based extraction of fuzzy partition rules for heart arrhythmia detection: a semi-automated approach. 360-373 - Vlad Serbanescu, Keyvan Azadbakht, Frank S. de Boer, Chetan Nagarajagowda, Behrooz Nobakht:
A design pattern for optimizations in data intensive applications using ABS and JAVA 8. 374-385 - Song Wu, Songqiao Tao, Xiao Ling, Hao Fan, Hai Jin, Shadi Ibrahim:
iShare: Balancing I/O performance isolation and disk I/O efficiency in virtualized environments. 386-399 - Massimo Ficco, Giovanni Avolio, Francesco Palmieri
, Aniello Castiglione
:
An HLA-based framework for simulation of large-scale critical systems. 400-419 - Michal P. Karpowicz
:
Energy-efficient CPU frequency control for the Linux system. 420-437 - Davide Cerotti
, Marco Gribaudo
, Mauro Iacono
, Pietro Piazzolla
:
Modeling and analysis of performances for concurrent multithread applications on multicore and graphics processing unit systems. 438-452
- Pavan Balaji, Zhiyi Huang:
Programming models and applications for multicores and manycores. 453-454
- Quan Chen, Long Zheng, Minyi Guo:
Adaptive demand-aware work-stealing in multi-programmed multi-core architectures. 455-471 - Georgios Varisteas, Mats Brorsson:
Palirria: accurate on-line parallelism estimation for adaptive work-stealing. 472-491 - Lanjun Wan
, Kenli Li, Jing Liu, Keqin Li:
Efficient CPU-GPU cooperative computing for solving the subset-sum problem. 492-516 - Wasuwee Sodsong, Jingun Hong, Seongwook Chung, Yeong-Kyu Lim, Shin-Dug Kim, Bernd Burgstaller:
Dynamic partitioning-based JPEG decompression on heterogeneous multicore architectures. 517-536 - Xiaonan Tian, Rengan Xu, Yonghong Yan, Sunita Chandrasekaran, Deepak Eachempati, Barbara M. Chapman:
Compiler transformation of nested loops for general purpose GPUs. 537-556 - I. Z. Reguly, Endre László, Gihan R. Mudalige
, Mike B. Giles
:
Vectorizing unstructured mesh computations for many-core architectures. 557-577
Volume 28, Number 3, March 2016
Editorials
- Yang Xiang, Ivan Stojmenovic, Peter Mueller, Jun Zhang
:
Security and reliability in big data. 581-582
- Gwan-Hwan Hwang, Wei-Sian Huang, Jenn-Zjone Peng, Yu-Wei Lin:
Fulfilling mutual nonrepudiation for cloud storage. 583-599 - Hua Wang
, Xun Yi
, Elisa Bertino, Lili Sun:
Protecting outsourced data in cloud computing through access management. 600-615 - Chunjing Han, Zhenyu Li, Gaogang Xie, Steve Uhlig
, Yulei Wu, Liangxiong Li, Jingguo Ge, Yunjie Liu:
Insights into the issue in IPv6 adoption: A view from the Chinese IPv6 Application mix. 616-630 - Wei Zhou, Yang Xu, Guojun Wang:
Decentralized group key management for hierarchical access control using multilinear forms. 631-645 - Chang Liu, Nick Beaugeard, Chi Yang, Xuyun Zhang
, Jinjun Chen:
HKE-BC: hierarchical key exchange for secure scheduling and auditing of big data in cloud computing. 646-660 - Jinson Zhang, Mao Lin Huang
:
Density approach: a new model for BigData analysis and visualization. 661-673 - Yuxin Mao, Ping Zhu, Guiyi Wei, Mohammad Mehedi Hassan, M. Anwar Hossain
:
A game-based incentive model for service cooperation in VANETs. 674-687 - Adam Muhlbauer, Timothy Zelinsky, Salil S. Kanhere
:
Platform zero: a step closer to ubiquitous computing. 688-706 - Ruppa K. Thulasiram, Parimala Thulasiraman, Hari Prasain, Girish K. Jha:
Nature-inspired soft computing for financial option pricing using high-performance analytics. 707-728 - Wei Zhou, Jizhong Han, Yun Gao, Zhiyong Xu:
An efficient graph data processing system for large-scale social network service applications. 729-747
- Jesús Carretero
, Raimondas Ciegis, Emmanuel Jeannot, Laurent Lefèvre, Gudula Rünger, Domenico Talia, Julius Zilinskas:
HeteroPar 2014, APCIE 2014, and TASUS 2014 Special Issue. 748-749
- Farouk Mansouri, Sylvain Huet, Dominique Houzet:
A domain-specific high-level programming model. 750-767 - Fábio Soldado, Fernando Alexandre, Hervé Paulino
:
Execution of compound multi-kernel OpenCL computations in multi-CPU/multi-GPU environments. 768-787 - Alejandro Acosta
, Francisco Almeida
:
The particle filter algorithm: parallel implementations and performance analysis over Android mobile devices. 788-801 - Tania Malik
, Vladimir Rychkov, Alexey L. Lastovetsky
:
Network-aware optimization of communications for parallel matrix multiplication on hierarchical HPC platforms. 802-821 - Davide Morelli
, Andrea Canciani, Antonio Cisternino
:
A high-level and accurate energy model of parallel and concurrent workloads. 822-833
- Matthew Dixon, José E. Moreira, David Daly:
Workshop on high-performance computational finance. 834-835
- Neil Burke, Andrew Rau-Chaplin
, Blesson Varghese:
Computing probable maximum loss in catastrophe reinsurance portfolios on multi-core and many-core architectures. 836-847 - Shuo Li, James Lin:
Accelerating Asian option pricing on many-core architectures. 848-865 - Matthew Dixon, Jörg Lotze, Mohammad Zubair:
A portable, extensible and fast stochastic volatility model calibration using multi and many-core processors. 866-877 - Evgeny Fiksman, Andrey Nikolaev, Ilya Burylov, Sania Salahuddin:
STAC-A2 on Intel architecture: evolving from scalar code to heterogeneous applications. 878-891 - Christian Brugger, Gongda Liu, Christian de Schryver
, Norbert Wehn
:
Precision-tuning and hybrid pricer for closed-form solution-based Heston calibration. 892-904 - Alexander Moreno, Tucker Balch:
Improving financial computation speed with full and subproblem memoization. 905-915 - Giorgis Georgakoudis
, Charles J. Gillan, Ahmed Sayed, Ivor T. A. Spence, Richard Faloon, Dimitrios S. Nikolopoulos
:
Methods and metrics for fair server assessment under real-time financial workloads. 916-928 - Fábio Daros Freitas, Christian Daros Freitas, Alberto Ferreira de Souza
:
Intelligent trading architecture. 929-943
Volume 28, Number 4, March 2016
Editorials
- Yogesh Simmhan
, Lavanya Ramakrishnan, Gabriel Antoniu, Carole A. Goble:
Cloud computing for data-driven science and engineering. 947-949
- Alexandru Costan
, Radu Tudoran, Gabriel Antoniu, Goetz Brasche:
TomusBlobs: scalable data-intensive processing on Azure clouds. 950-976 - Ishan Patel, Andrew Rau-Chaplin
, Blesson Varghese:
Accelerating R-based analytics on the cloud. 977-994 - Paolo Missier
, Simon Woodman, Hugo Hiden, Paul Watson
:
Provenance and data differencing for workflow reproducibility analysis. 995-1015 - Naiqiao Du, Xiaojun Ye, Jianmin Wang
:
A semantic-aware data generator for ETL workflows. 1016-1040 - Piyush Mehrotra, M. Jahed Djomehri, Steve Heistand, Robert Hood, Haoqiang Jin, Arthur Lazanoff, Subhash Saini, Rupak Biswas:
Performance evaluation of Amazon Elastic Compute Cloud for NASA high-performance computing applications. 1041-1055 - Leonardo Candela
, Donatella Castelli, Gianpaolo Coro
, Pasquale Pagano
, Fabio Sinibaldi
:
Species distribution modeling in the cloud. 1056-1079
- Yong Yu
, Yi Mu, Rongxing Lu, Jian Ren:
Recent advances in security and privacy in large-scale networks. 1080-1082
- Bo Yang, Mingwu Zhang, Jun-Qiang Du:
An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing. 1083-1093 - Haiyong Bao, Le Chen:
A lightweight privacy-preserving scheme with data integrity for smart grid communications. 1094-1110 - Yue Zhang, Jing Qin
, Lihua Du:
A secure biometric authentication based on PEKS. 1111-1123 - Jiang Deng, Chunxiang Xu, Huai Wu, Liju Dong:
A new certificateless signature with enhanced security and aggregation version. 1124-1133 - Zhide Chen, Meng Wang, Li Xu, Wei Wu:
Worm propagation model in mobile network. 1134-1144 - Xiaolei Dong, Jun Zhou, Zhenfu Cao
:
Efficient privacy-preserving temporal and spacial data aggregation for smart grid communications. 1145-1160 - Yafang Zhang, Jianbing Ni, Xiaoling Tao, Yong Wang, Yong Yu
:
Provable multiple replication data possession with full dynamics for secure cloud storage. 1161-1173 - Shuangyu He, Qianhong Wu, Bo Qin, Jianwei Liu, Yan Li:
Efficient group key management for secure big data in predictable large-scale networks. 1174-1192 - Yongyong Ge, Yannan Li
, Zhusong Liu:
Delegation of signing rights for emerging 5G networks. 1193-1203 - Yinbin Miao, Jianfeng Ma, Zhiquan Liu
:
Revocable and anonymous searchable encryption in multi-user setting. 1204-1218 - Xinghua Li, Ermeng Wang, Weidong Yang, Jianfeng Ma:
DALP: A demand-aware location privacy protection scheme in continuous location-based services. 1219-1236 - Minqian Wang, Zhenfeng Zhang, Cheng Chen:
Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme. 1237-1245 - Xuefeng He, Xingzheng Ai, Yuewu Jing, Yuanyuan Liu:
Partner selection of agricultural products supply chain based on data mining. 1246-1256
- Salvatore Venticinque
, David Camacho
:
Intelligent Distributed Computing. 1257-1260
- R. Martin, Ricardo Aler
, José María Valls
, Inés María Galván
:
Machine learning techniques for daily solar energy prediction and interpolation using numerical weather models. 1261-1274 - Alba Amato
, Beniamino Di Martino, Marco Scialdone, Salvatore Venticinque
:
Distributed architecture for agents-based energy negotiation in solar powered micro-grids. 1275-1290 - Davide Carneiro
, André Pimenta, Sérgio Gonçalves
, José Neves
, Paulo Novais
:
Monitoring and improving performance in human-computer interaction. 1291-1309 - Carlos Javier Hernández-Castro
, David F. Barrero
, María D. R.-Moreno
:
Machine learning and empathy: the Civil Rights CAPTCHA. 1310-1323 - Kai Jander, Lars Braubach, Winfried Lamersdorf:
Distributed monitoring and workflow management for goal-oriented workflows. 1324-1335 - Randi Karlsen, David Sundby, Joan C. Nordbotten:
Development of image collection representations for intelligent distributed systems. 1336-1355 - Jason J. Jung
:
Exploiting geotagged resources for spatial clustering on social network services. 1356-1367 - Alexander Pokahr
, Lars Braubach:
Elastic component-based applications in PaaS clouds. 1368-1384 - Esther Villar-Rodriguez
, Javier Del Ser
, Ana I. Torre-Bastida
, Miren Nekane Bilbao
, Sancho Salcedo-Sanz:
A novel machine learning approach to the detection of identity theft in social networks based on emulated attack instances and support vector machines. 1385-1395
Volume 28, Number 5, April 2016
- Wei Wei, Yuhong Zhang, Yang Liu, Zhiguang Qin:
FRP: a fast resource placement algorithm in distributed cloud computing platform. 1399-1416 - Damjan Strnad
, Andrej Nerat
:
Parallel construction of classification trees on a GPU. 1417-1436 - Xiaoqiang Pei, Yijie Wang, Xingkong Ma, Fangliang Xu:
Repairing multiple failures adaptively with erasure codes in distributed storage systems. 1437-1461 - Absalom E. Ezugwu
, Sahalu B. Junaidu, Marc E. Frîncu, Seyed M. Buhari
, Afolayan Ayodele Obiniyi:
Scheduling multi-component applications with mobile agents in heterogeneous distributed systems. 1462-1479 - Ting Yu, Julian Oppermann, Chris P. Bradley, Oliver Sinnen
:
Performance optimisation strategies for automatically generated FPGA accelerators for biomedical models. 1480-1506 - Xinyang Wang, Jiarong Liang, Deyu Qi, Weiwei Lin:
The twisted crossed cube. 1507-1526 - Kevin Lee
, Georg Buss, Daniel Veit
:
A heuristic approach for the allocation of resources in large-scale computing infrastructures. 1527-1547 - Rodrigo da Rosa Righi, Cristiano André da Costa
, Vinicius Facco Rodrigues
, Gustavo Rostirolla:
Joint-analysis of performance and energy consumption when enabling cloud elasticity for synchronous HPC applications. 1548-1571 - Vinay Arora, Rajesh Kumar Bhatia, Maninder Singh
:
A systematic review of approaches for testing concurrent programs. 1572-1611 - Duanyang Liu, Xi Yang, Zhen Cheng:
An energy-aware scheduling algorithm for divisible loads in a bus network. 1612-1628 - Yu-Te Lin, Jenq Kuen Lee:
Vector data flow analysis for SIMD optimizations on OpenCL programs. 1629-1654 - Matthias Feldotto
, Kalman Graffi:
Systematic evaluation of peer-to-peer systems using PeerfactSim.KOM. 1655-1677 - Dali Li
, Chuanfu Xu, Yongxian Wang
, Zhifang Song, Min Xiong, Xiang Gao, Xiaogang Deng:
Parallelizing and optimizing large-scale 3D multi-phase flow simulations on the Tianhe-2 supercomputer. 1678-1692
Volume 28, Number 6, April 2016
Editorials
- Yunquan Zhang, Ji-Lin Zhang:
Workshop on high performance data intensive computing. 1695-1696
- Shan-Shan Tu, Shao-Zhang Niu, Hui Li:
A fine-grained access control and revocation scheme on clouds. 1697-1714 - Javid Taheri, Albert Y. Zomaya
, Samee U. Khan
:
Genetic algorithm in finding Pareto frontier of optimizing data transfer versus job execution in grids. 1715-1736 - Zhenyu Liu, Jingyuan Hu, Yang Li, Yi Huang:
Towards virtual dataspaces for material scientific data cloud. 1737-1750 - Jilin Zhang, Junfeng Yuan, Jian Wan, Jie Mao
, Li-Ting Zhu, Li Zhou, Congfeng Jiang, Peng Di
, Jue Wang:
Efficient parallel implementation of incompressible pipe flow algorithm based on SIMPLE. 1751-1766
- Mirela Sechi Moretti Annoni Notare
:
Wireless and mobile network performance evaluation. 1767-1768
- Haifa Raja Maamar, Azzedine Boukerche, Emil M. Petriu:
A performance evaluation of mobility management and multihop supplying partner strategies for 3D streaming systems over thin mobile devices. 1769-1795 - Constantinos Marios Angelopoulos
, Sotiris E. Nikoletseas, Dimitra Patroumpa, Christoforos L. Raptopoulos:
Efficient collection of sensor data via a new accelerated random walk. 1796-1811 - Salvador Climent, Antonio Sánchez, Sara Blanc
, Juan Vicente Capella, Rafael Ors:
Wireless sensor network with energy harvesting: modeling and simulation based on a practical architecture using real radiation levels. 1812-1830 - Hayette Boumerzoug, Boucif Amar Bensaber, Ismaïl Biskri
:
A lightweight key management scheme based on an Adelson-Velskii and Landis tree and elliptic curve cryptography for wireless sensor networks. 1831-1847 - YunFeng Gu, Azzedine Boukerche, Robson Eduardo De Grande
:
Supporting multidimensional range queries in Hierarchically Distributed Tree. 1848-1869
- Gang Li
, Wenjia Niu, Li Guo, Lynn Margaret Batten, Yinlong Liu, Guoyong Cai:
Securing cyberspace. 1870-1871
- Bianqing Yuan, Jiqiang Liu:
A universally composable secure grouping-proof protocol for RFID tags. 1872-1883 - Ping Xiong, Lefeng Zhang
, Tianqing Zhu:
Semantic analysis in location privacy preserving. 1884-1899 - Hongzhe Li, Hyuckmin Kwon, Jonghoon Kwon
, Heejo Lee:
CLORIFI: software vulnerability discovery using code clone verification. 1900-1917 - Jiang Deng, Chunxiang Xu, Huai Wu, Jie Chen:
Analysis and improvement of a fair remote retrieval protocol for private medical records. 1918-1929 - Lingwei Song, Jinxia Wei, Licheng Wang, Chenlei Cao, Xinxin Niu:
Identity-based storage management and integrity verify protocol for secure outsourcing in multi-cloud. 1930-1945
Volume 28, Number 7, May 2016
Editorials