


default search action
International Journal of Computational Science and Engineering, Volume 16
Volume 16, Number 1, 2018
- Tong Zhang, Hongjun Dai, Changsong Wu, Zhiping Jia:

Enhancing the performance of process level redundancy with coprocessors in symmetric multiprocessors. 1-8 - Christian Callegari, Lisa Donatini, Stefano Giordano, Michele Pagano:

Improving stability of PCA-based network anomaly detection by means of kernel-PCA. 9-16 - Antonio Prado, Sushmita Ruj, Milos Stojmenovic, Amiya Nayak:

Applying transmission-coverage algorithms for secure geocasting in VANETs. 17-26 - Anupam Biswas, Bhaskar Biswas, Anoj Kumar, K. K. Mishra:

Particle swarm optimisation with time varying cognitive avoidance component. 27-41 - Yanli Lv, Yuanlong Li, Shuang Xiang, Chunhe Xia:

Coordinated scan detection algorithm based on the global characteristics of time sequence. 42-52 - Hui Zeng, Liyan Xiong, Jianjun Chen:

The intensional semantic conceptual graph matching algorithm based on conceptual sub-graph weight self-adjustment. 53-62 - Xiao Wei, Daniel Dajun Zeng, Xiangfeng Luo, Wei Wu:

Building a large-scale testing dataset for conceptual semantic annotation of text. 63-72 - Jiongming Jiang, Yu Xue, Tinghuai Ma, Zhongyang Chen:

Improved artificial bee colony algorithm with differential evolution for the numerical optimisation problems. 73-84 - Hong Zhang, Quan-ju Zhang:

A study of cooperative advertising in a one-manufacturer two-retailer supply chain based on the multi-stage dynamic game theory. 85-97 - Yuhui Zheng, Kai Ma, Shunfeng Wang, Jing Sun, Jianwei Zhang:

Line integral convolution-based non-local structure tensor. 98-105
Volume 16, Number 2, 2018
- Guangping Xu, Qunfang Mao, Huan Li, Shengli Li:

Towards optimisation of replicated erasure codes for efficient cooperative repair in cloud storage systems. 108-116 - Lei Shi, Qiguo Duan, Ping Dong, Lei Xi, Xinming Ma:

Signal prediction based on boosting and decision stump. 117-122 - Junfeng Zhao, Jiantao Zhou, Hongji Yang:

A matching approach to business services and software services. 123-131 - Tingyi Zheng, Li Wang:

Using online dictionary learning to improve Bayer pattern image coding. 132-140 - Hongxia Deng, Han Li, Sha Chang, Jie Xu, Haifang Li:

Feature binding pulse-coupled neural network model using a double colour space. 141-152 - Yizhe Zhou, Depin Peng:

A new model of vehicular ad hoc networks based on artificial immune theory. 153-161 - Jonti Deuri, S. Siva Sathya:

Cricket chirping algorithm: an efficient meta-heuristic for numerical function optimisation. 162-172 - Juan Carlos Osorio, Miguel Cerrolaza, Maritza Perez:

Optimising the stiffness matrix integration of n-noded 3D finite elements. 173-180 - Hiroaki Yui, Satoshi Nishimura:

A cost effective graph-based partitioning algorithm for a system of linear equations. 181-190 - Wei Sun, Yang Yu, Jia Li:

A based-on-set-partitioning exact approach to multi-trip of picking up and delivering customers to airport. 191-201 - Liping Chen, Weitao Ha:

Reliability prediction and QoS selection for web service composition. 202-211
Volume 16, Number 3, 2018
- Weiwei Kong, Yang Lei, Jing Ma:

Data security and privacy information challenges in cloud computing. 215-218 - Angelo Chianese, Francesco Piccialli:

A perspective on applications of in-memory and associative approaches supporting cultural big data analytics. 219-233 - Dong-sheng Liu, Xiao-hong Xiao, Xiao-hui Zeng:

Load balancing algorithm based on multiple linear regression analysis in multi-agent systems. 234-241 - Liming Zheng, Xu An Wang, Xiaobo Tian, Xiaodong Li:

TERS: a traffic efficient repair scheme for repairing multiple losses in erasure-coded distributed storage systems. 242-254 - Yukun Dong:

A sound abstract memory model for static analysis of C programs. 255-264 - Angelo Chianese, Salvatore Cuomo, Pasquale De Michele, Francesco Piccialli:

Self and social network behaviours of users in cultural spaces. 265-281 - Minghui Zhang, Haiwei Pan, Niu Zhang, Xiaoqin Xie, Zhiqiang Zhang, Xiaoning Feng:

Cost-sensitive ensemble classification algorithm for medical image. 282-288 - Deng Chen, Yanduo Zhang, Wei Wei, Rongcun Wang, Huabing Zhou, Xun Li, Binbin Qu:

Mining balanced API protocols. 289-302 - Masoumeh Zareapoor

, Pourya Shamsolmoali, Mohd. Afshar Alam:
Advance DDOS detection and mitigation technique for securing cloud. 303-310 - Wenjie Fan, Hong Zhang, Kuan-Ching Li, Shunxiang Zhang, Mario Donato Marino, Hai Jiang:

An efficient algorithm for modelling and dynamic prediction of network traffic. 311-320 - Wenjie Fan, Lifeng Li, Xiaowan Chen, Hai Jiang, Zhongwen Li, Kuan-Ching Li:

Deploying parallelised ciphertext-policy attributed-based encryption in clouds. 321-333
Volume 16, Number 4, 2018
- Weijie Zhao, Florin Rusu, Kesheng Wu, Peter Nugent:

Automatic identification and classification of Palomar Transient Factory astrophysical objects in GLADE. 337-349 - Punam Bedi, Sumit Kumar Agarwal, Richa:

Trust and reputation-based multi-agent recommender system. 350-362 - Shivani Batra, Shelly Sachdeva:

Anomaly free search using multi table entity attribute value data model. 363-377 - Asif Zaman, Mohammad Anisuzzaman Siddique, Annisa, Yasuhiko Morimoto:

Secure k-objects selection for a keyword query based on MapReduce skyline algorithm. 378-389 - Vinita Jindal

, Punam Bedi:
High performance adaptive traffic control for efficient response in vehicular ad hoc networks. 390-400 - Wanming Chu:

Smart city workflow patterns for qualitative aggregate information retrieval from distributed public information resources. 401-410 - Lukas Pichl, Taisei Kaizoji:

Computational intelligence methods for data mining of causality extent in the time series. 411-418 - Miguel Ceriani, Paolo Bottoni

:
A dataflow platform for applications based on Linked Data. 419-429 - Qing Wu, Chunjiang Zhang, Liang Gao:

A modified electromagnetism-like mechanism algorithm with pattern search for global optimisation. 430-440 - Xiaoyi Yang, Meijuan Huang:

Zero knowledge proof for secure two-party computation with malicious adversaries in distributed networks. 441-450

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














