


Остановите войну!
for scientists:


default search action
Concurrency and Computation: Practice and Experience, Volume 30
Volume 30, Number 1, January 2018
Editorial
- Fatos Xhafa
:
Special issue on advanced techniques for cloud data storage and collaborative systems.
- Carmen De Maio, Giuseppe Fenza, Mariacristina Gallo, Vincenzo Loia
, Mimmo Parente:
Social media marketing through time-aware collaborative filtering. - Supannada Chotipant, Farookh Khadeer Hussain, Omar Khadeer Hussain
:
SERNOTATE: An automated approach for business service description annotation for efficient service retrieval and composition. - Prajwol Sangat
, Maria Indrawan-Santiago, David Taniar
:
Sensor data management in the cloud: Data storage, data ingestion, and data retrieval. - Hyoungwoo Park, Buseung Cho, Il Sun Hwang, Jongsuk Ruth Lee
:
Study on the SDN-IP-based solution of well-known bottleneck problems in private sector of national R&E network for big data transfer. - Xiaoyuan Yang, Xiaoshuang Luo, Xu An Wang
, Shuaiwei Zhang:
Improved outsourced private set intersection protocol based on polynomial interpolation.
- Scott Michael
, Yun He
:
Foreword to the special issue of the Cray User Group (CUG 2017).
- Yun (Helen) He, Brandon Cook, Jack Deslippe, Brian Friesen
, Richard A. Gerber
, Rebecca Hartman-Baker
, Alice Koniges
, Thorsten Kurth
, Stephen Leak
, Woo-Sun Yang, Zhengji Zhao, Eddie Baron
, Peter Hauschildt:
Preparing NERSC users for Cori, a Cray XC40 system with Intel many integrated cores. - Douglas Doerfler
, Brian Austin, Brandon Cook, Jack Deslippe, Krishna Kandalla, Peter Mendygral:
Evaluating the networking characteristics of the Cray XC-40 Intel Knights Landing-based Cori supercomputer at NERSC. - Steven Martin
, Cary Whitney, David Rush, Matthew Kappel:
How to write a plugin to export job, power, energy, and system environmental data from your Cray® XC™ system. - Kevin Harms, Ti Leggett, Benjamin S. Allen, Susan Coghlan, Mark R. Fahey
, Carissa Holohan
, Gordon McPheeters, Paul Rich:
Theta: Rapid installation and acceptance of an XC40 KNL system. - Michael Moore
, Patrick Farrell, Bob Cernohous:
Lustre Lockahead: Early experience and performance using optimized locking. - Bryce Hicks
:
Improving I/O bandwidth with Cray DVS Client-side Caching. - Nick Brown
, Michèle Weiland
, Adrian Hill, Ben Shipway
:
In situ data analytics for highly scalable cloud modelling on Cray machines. - Sam Clarke
:
Trust separation on the Cray XC40 using PBS Pro. - JaeHyuk Kwack
, Gregory H. Bauer
:
HPCG and HPGMG benchmark tests on multiple program, multiple data (MPMD) mode on Blue Waters - A Cray XE6/XK7 hybrid system. - Reuben D. Budiardja
, Timothy Bouvet, Galen Wesley Arnold:
Application-level regression testing framework using Jenkins.
Volume 30, Number 2, January 2018
Editorial
- Marek R. Ogiela
, Hoon Ko
:
Bio-inspired and cognitive approaches in cryptography and security applications.
- Pavel Krömer
, Jan Platos
, Jana Nowaková
, Václav Snásel:
An acceleration of quasigroup operations by residue arithmetic. - Masakatsu Nishigaki
:
Humanics information security. - Urszula Ogiela, Makoto Takizawa
, Lidia Ogiela
:
Visual CAPTCHA application in linguistic cryptography. - Taekeun Hong
, Chang Choi
, Juhyun Shin:
CNN-based malicious user detection in social networks. - Guan-Chen Li, Chin-Ling Chen, Hsing-Chung Chen
, Feng Lin, Cheng Gu:
Design of a secure and effective medical cyber-physical system for ubiquitous telemonitoring pregnancy. - Jung-Chun Liu, Fang-Yie Leu
, Guan-Liang Lin, Heru Susanto
:
An MFCC-based text-independent speaker identification system for access control. - Saraswathi Sivamani, Jongsun Choi, Kitae Bae, Hoon Ko, Yongyun Cho
:
A smart service model in greenhouse environment using event-based security based on wireless sensor network.
Volume 30, Number 3, February 2018
Editorial
- Chang Choi
, Marek R. Ogiela
, Hsing-Chung Chen:
Intelligent approaches for security technologies.
- Xin Su
, Bingying Wang, Xuewu Zhang, Yupeng Wang, Dongmin Choi
:
User biometric information-based secure method for smart devices. - Mohammad Amin Hatef, Vahid Shaker, Mohammad Reza Jabbarpour
, Jason J. Jung, Houman Zarrabi:
HIDCC: A hybrid intrusion detection approach in cloud computing. - Yan Kong
, Minjie Zhang
, Dayong Ye
, Jinxiu Zhu, Junho Choi:
An intelligent agent-based method for task allocation in competitive cloud environments. - Flora Amato, Vincenzo Moscato, Antonio Picariello, Francesco Piccialli
, Giancarlo Sperlì:
Centrality in heterogeneous social networks for lurkers detection: An approach based on hypergraphs. - Yuanlong Cao
, Fei Song, Guoliang Luo, Yugen Yi, Wenle Wang
, Ilsun You, Hao Wang:
(PU)2M2: A potentially underperforming-aware path usage management mechanism for secure MPTCP-based multipathing services. - Jiwon Hong
, Sanghyun Park, Sang-Wook Kim, Dongphil Kim, Wonho Kim:
Classifying malwares for identification of author groups. - Jeong-Hun Park, Seunggye Hwang, Janghoon Yang, Kitae Bae, Hoon Ko
, Dong Ku Kim:
Generalized distributed compressive sensing with security challenges for linearly correlated information sources. - Urszula Ogiela, Lidia Ogiela
:
Linguistic techniques for cryptographic data sharing algorithms. - Christian Esposito
, Aniello Castiglione
, Francesco Palmieri
:
Information theoretic-based detection and removal of slander and/or false-praise attacks for robust trust management with Dempster-Shafer combination of linguistic fuzzy terms. - Kyungroul Lee, Kangbin Yim
, Jung-Taek Seo
:
Ransomware prevention technique using key backup.
Volume 30, Number 4, February 2018
- Wim H. Hesselink
, Peter A. Buhr
, David Dice:
Fast mutual exclusion by the Triangle algorithm. - Natcha Simsiri, Kanat Tangwongsan, Srikanta Tirthapura, Kun-Lung Wu
:
Work-efficient parallel union-find. - Dimitris Kontoudis
, Panagiotis E. Fouliras
:
A statistical approach to virtual server resource management. - Andrea Martínez, Anna Sikora
, Eduardo César
, Joan Sorribes
:
Evaluating a formal methodology for dynamic tuning of large-scale parallel applications. - Terry R. Jones
, George Ostrouchov, Gregory A. Koenig, Oscar H. Mondragon
, Patrick G. Bridges
:
An evaluation of the state of time synchronization on leadership class supercomputers.
Volume 30, Number 5, March 2018
Editorial
- Miroslaw Kutylowski, Yu Wang
, Shouhuai Xu, Laurence T. Yang:
Special issue on social network security and privacy.
- Muhammad Al-Qurishi
, Sk. Md. Mizanur Rahman
, Atif Alamri, Mohamed A. Mostafa
, Majed A. AlRubaian, M. Shamim Hossain
, Brij B. Gupta:
SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks. - Chaoliang Li, Shigang Liu
:
A comparative study of the class imbalance problem in Twitter spam detection. - Suliman K. Almasoud, Ahmad Almogren
, Mohammad Mehedi Hassan
, Iehab Al Rassan:
An efficient approach of improving privacy and security in online social networks. - Meikang Qiu, Keke Gai
, Hui Zhao, Meiqin Liu:
Privacy-preserving smart data storage for financial industry in cloud computing. - Jun Cai, Jian-Zhen Luo
, Yan Liu, Wenguo Wei, Fangyuan Lei:
A network community restructuring mechanism for transport efficiency improvement in scale-free complex networks. - Yuantian Miao, Zichan Ruan
, Lei Pan
, Jun Zhang
, Yang Xiang:
Comprehensive analysis of network traffic data. - Rui Chang
, Liehui Jiang, Wenzhi Chen, Hongqi He, Shuiqiao Yang, Hang Jiang, Wei Liu, Yong Liu:
Towards a multilayered permission-based access control for extending Android security. - Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo
:
CloudMe forensics: A case of big data forensic investigation.
Volume 30, Number 6, March 2018
- Li-Yung Ho
, Jan-Jan Wu, Pangfeng Liu:
Workload prediction and balance for distributed reachability processing for large-scale attribute graphs. - Pengfei Wang
, Kai Lu, Gen Li, Xu Zhou:
A survey of the double-fetch vulnerabilities. - Yizi Shang
, Ling Shang:
Trust model for reliable node allocation based on daily computer usage behavior. - Min Xie, Liang-Cheng Ye, Jia-Rong Liang
:
A t/k diagnosis algorithm on hypercube-like networks. - Tatiane Ornelas, Regina Braga
, José Maria N. David
, Fernanda Campos, Gabriella C. B. Costa
:
Provenance data discovery through Semantic Web resources.
Volume 30, Number 7, April 2018
Editorial
- Giuseppe A. Trunfio
, William Spataro, Georgios Ch. Sirakoulis:
Special issue on high performance computing in modeling and simulation.
- Imen Chakroun
, Tom Vander Aa, Bruno De Fraine, Tom Haber, Pascal Costanza, Roel Wuyts
:
A high-level library for multidimensional arrays programming in computational science. - Gladys Utrera
, Marisa Gil
, Xavier Martorell:
Analyzing the impact of communication imbalance in high-speed networks. - Amin Majd
, Golnaz Sahebi, Masoud Daneshtalab
, Juha Plosila, Shahriar Lotfi
, Hannu Tenhunen
:
Parallel imperialist competitive algorithms. - Alban Rousset
, Bénédicte Herrmann, Christophe Lang, Laurent Philippe
, Hadrien Bride:
Nested graphs: A model to efficiently distribute multi-agent systems on HPC clusters. - Massimo Cafaro
, Marco Pulimeno
, Italo Epicoco, Giovanni Aloisio
:
Parallel space saving on multi- and many-core processors. - Alonso Inostrosa-Psijas
, Veronica Gil-Costa
, Mauricio Marín
, Gabriel A. Wainer
:
Semi-asynchronous approximate parallel DEVS simulation of web search engines. - Loukas Bampis
, Savvas A. Chatzichristofis
, Chryssanthi Iakovidou, Angelos Amanatiadis
, Yiannis S. Boutalis, Antonios Gasteratos:
A LoCATe-based visual place recognition system for mobile robotics and GPGPUs. - Angelos Amanatiadis
, Loukas Bampis
, Evangelos G. Karakasis
, Antonios Gasteratos, Georgios Ch. Sirakoulis
:
Real-time surveillance detection system for medium-altitude long-endurance unmanned aerial vehicles.
Volume 30, Number 8, April 2018
- Vitaly Buravlev, Rocco De Nicola
, Claudio Antares Mezzina
:
Evaluating the efficiency of Linda implementations. - Arturo Téllez-Velázquez
, Raúl Cruz-Barbosa:
A CUDA-streams inference machine for non-singleton fuzzy systems. - Eduardo C. Inacio
, Mario A. R. Dantas
:
A coarse-grained page cache aware multivariate analytical model for the storage performance of a parallel file system. - Marc Sánchez Artigas
, Cristian Cotes, Marc Ruiz Rodríguez, Pedro García López:
StackSync: Attribute-based data sharing in file synchronization services. - Ling Chen
, Yuliang Zhao, Yi Yang, Mingqi Lv, Donghui Chen, Yong Wu, Jingchang Wang:
A query execution scheduling scheme for Impala system.
Volume 30, Number 9, May 2018
Editorial
- Sébastien Limet, Alessio Merlo
, Luca Spalazzi
:
HPC & Co strike back: Where are distributed paradigms heading toward?
- BaoKang Wang
, Yuki Fukazawa, Toshio Kondo, Takahiro Sasaki:
Tile/line access cache memory based on a multi-level Z-order tiling data layout. - Gaurav Saxena
, Peter K. Jimack
, Mark A. Walkley:
A quasi-cache-aware model for optimal domain partitioning in parallel geometric multigrid. - Thomas L. Falch
, Anne C. Elster:
ImageCL: Language and source-to-source compiler for performance portability, load balancing, and scalability prediction on heterogeneous systems. - Alina Sîrbu
, Özalp Babaoglu
:
A data-driven approach to modeling power consumption for a hybrid supercomputer. - Tiago Carneiro Pessoa
, Jan Gmys
, Francisco Heron de Carvalho Junior, Nouredine Melab, Daniel Tuyttens:
GPU-accelerated backtracking using CUDA Dynamic Parallelism. - Majdi Maabreh
, Hafez Irshid
, Ajay Gupta
, Izzat Alsmadi:
A multithreading and hashing technique for indexing Target-Decoy peptides databases. - Simon Pickartz
, Carsten Clauss, Jens Breitbart, Stefan Lankes
, Antonello Monti
:
Prospects and challenges of virtual machine migration in HPC. - Valeria Cardellini
, Francesco Lo Presti
, Matteo Nardelli
, Gabriele Russo Russo
:
Optimal operator deployment and replication for elastic distributed data stream processing. - Gabriele D'Angelo
, Stefano Ferretti
, Vittorio Ghini:
Distributed hybrid simulation of the Internet of things and smart territories.
Volume 30, Number 10, May 2018
- Xinping Xu
, Wenxin Li, Heng Qi
, Keqiu Li:
On efficient virtual cluster scaling across geo-distributed data centers. - Yashuang Mu, Lidong Wang, Xiaodong Liu
:
A fast rank mutual information based decision tree and its implementation via Map-Reduce. - Mohsin Fayyaz
, Khurram Aziz, Ghulam Mujtaba, Ahmad Fayyaz, Samee U. Khan:
Very low computational complexity (VLCC) architecture for optical interconnect in data center networks. - Jie Yu
, Guangming Liu, Xiaoyong Li
, Wenrui Dong, Qiong Li:
Cross-layer coordination in the I/O software stack of extreme-scale systems. - Yang Xiao, Thireshan Jeyakumaran, Ehsan Atoofian
, Ali Jannesari
:
Improving performance of transactional memory through machine learning.
Volume 30, Number 11, June 2018
- Ning Pan
, Zhiqiang Zhu, Liangsheng He, Lei Sun:
An efficiency approach for RBAC reconfiguration with minimal roles and perturbation. - Cosimo Anglano, Massimo Canonico, Marco Guazzone
:
Prometheus: A flexible toolkit for the experimentation with virtualized infrastructures. - Justin Chang
, K. B. Nakshatrala
, Matthew G. Knepley
, S. Lennart Johnsson:
A performance spectrum for parallel computational frameworks that solve PDEs. - Karthick Seshadri
, Mercy Shalinie Selvaraj, Sidharth Manohar:
A distributed parallel algorithm for inferring hierarchical groups from large-scale text corpuses. - Dharmendra Prasad Mahato
, Ravi Shankar Singh:
Maximizing availability for task scheduling in on-demand computing-based transaction processing system using ant colony optimization.
Volume 30, Number 12, June 2018
Editorial
- Sílvia Delgado Olabarriaga
, Dagmar Krefting
, Tristan Glatard:
Special isssue of the CCGrid-Life workshop 2017.
- Michael Witt
, Christoph Jansen, Dagmar Krefting, Achim Streit:
Sandboxing of biomedical applications in Linux containers based on system call evaluation. - Patricia González
, David R. Penas
, Xoán C. Pardo, Julio R. Banga
, Ramón Doallo:
Multimethod optimization in the cloud: A case-study in systems biology modelling.
- Mostapha Zbakh, Mohamed Bakhouya
, Mohamed Essaaidi, Pierre Manneback:
Cloud computing and big data: Technologies and applications.
- Fatemeh Ebadifard, Seyed Morteza Babamir
:
A PSO-based task scheduling algorithm improved using a load-balancing technique for the cloud computing environment. - Kun Ma
, Bo Yang, Ziqiang Yu:
Optimization of stream-based live data migration strategy in the cloud. - Georgios L. Stavrinides
, Helen D. Karatza:
The impact of checkpointing interval selection on the scheduling performance of real-time fine-grained parallel applications in SaaS clouds under various failure probabilities. - Alessandro Kraemer
, Carlos Maziero, Olivier Richard, Denis Trystram:
Reducing the number of response time service level objective violations by a cloud-HPC convergence scheduler. - Sidi Ahmed Mahmoudi
, Mohammed Amin Belarbi
, Saïd Mahmoudi
, Ghalem Belalem
:
Towards a smart selection of resources in the cloud for low-energy multimedia processing. - Angelo Furfaro
, Teresa Gallo, Alfredo Garro, Domenico Saccà, Andrea Tundis
:
Cybersecurity compliance analysis as a service: Requirements specification and application scenarios. - An Braeken
, Abdellah Touhafi
:
AAA - autonomous anonymous user authentication and its application in V2G. - Abdellah Touhafi
, An Braeken
, Abderrahim Tahiri, Mostapha Zbakh:
CoderLabs: A cloud-based platform for real-time online labs with user collaboration. - Fadwa Lachhab
, Mohamed Bakhouya
, Radouane Ouladsine, Mohammed Essaaidi:
Performance evaluation of linked stream data processing engines for situational awareness applications. - Yassir Samadi
, Mostapha Zbakh, Claude Tadonki:
Performance comparison between Hadoop and Spark frameworks using HiBench benchmarks.
Volume 30, Number 13, July 2018
- Ahmed E. Abdel Raouf
, Nagwa L. Badr, Mohamed F. Tolba:
Dynamic data reallocation and replication over a cloud environment. - Juncai Guo
, Xue Chen:
Bias-Sentiment-Topic model for microblog sentiment analysis. - Ahmed Izzat Alsalibi
, Sparsh Mittal
, Mohammed Azmi Al-Betar
, Putra Bin Sumari:
A survey of techniques for architecting SLC/MLC/TLC hybrid Flash memory-based SSDs. - Michael Hofmann
, Gudula Rünger:
Flexible all-to-all data redistribution methods for grid-based particle codes. - Xinyang Wang
, Deyu Qi, Weiwei Lin, Mincong Yu, Zhishuo Zheng, Naqin Zhou, Pengguang Chen:
A general framework for big data knowledge discovery and integration.
Volume 30, Number 14, July 2018
- Anwesha Das
, Arun Iyengar, Frank Mueller:
KeyValueServe†: Design and performance analysis of a multi-tenant data grid as a cloud service. - Jeremias M. Gomes, Alba Cristina Magalhaes Alves de Melo
, Jun Kong, Tahsin M. Kurç, Joel H. Saltz, George Teodoro
:
Cooperative and out-of-core execution of the irregular wavefront propagation pattern on hybrid machines with Intel® Xeon Phi™. - Monika Bharti
, Rajesh Kumar, Sharad Saxena:
Context-aware search optimization framework on the internet of things. - Ronald A. Olsson
, Aaron W. Keen, Todd Williamson:
Reducing distributed JR program start-up time via extending JR's operation abstraction. - Zhoukai Wang
, Yinliang Zhao, Yang Liu, Cuocuo Lv:
A speculative parallel simulated annealing algorithm based on Apache Spark.
Volume 30, Number 15, August 2018
Editorial
- Francesco Piccialli
, Jason J. Jung:
Data fusion in the internet of data.
- Hai-Tao Zheng, Zhe Wang
, Wei Wang, Arun Kumar Sangaiah
, Xi Xiao, Cong-Zhi Zhao:
Learning-based topic detection using multiple features.