default search action
International Journal of High Performance Computing and Networking, Volume 14
Volume 14, Number 1, 2019
- Hongyong Ji, Zhangjie Fu:
Coverless information hiding method based on the keyword. 1-7 - Nan Liu, Weipeng Jing, Wenlong Song, Jiawei Zhang:
Measurement method of carbon dioxide using spatial decomposed parallel computing. 8-16 - Ovidiu Mihai Poncea, Sorin Andrei Pistirica, Florica Moldoveanu, Victor Asavei:
Design and implementation of an Openflow SDN controller in NS-3 discrete-event network simulator. 17-29 - Dongjin Yu, Jiaojiao Wang, Ruiting Wang:
Exploring traffic condition based on massive taxi trajectories. 30-41 - Hongxi Yin, Qingchun Zhao, Dongjiao Xu, Xiaolei Chen, Ying Chang, Hehe Yue, Nan Zhao:
1.25 Gbits/s-message experimental transmission utilising chaos-based fibre-optic secure communications over 143 km. 42-51 - Kashif Hussain, Mohd. Najib Mohd. Salleh, Abdul Mutalib Leman:
Optimisation of ANFIS using mine blast algorithm for predicting strength of Malaysian small medium enterprises. 52-59 - Zhen Li, Minghao Zhao, Han Jiang, Qiuliang Xu:
Keyword guessing on multi-user searchable encryption. 60-68 - Xian-Fa Cai, Jia Wei, Guihua Wen, Zhiwen Yu, Yongming Cai, Jie Li:
Semi-supervised dimensionality reduction based on local estimation error. 69-76 - Udaya Kiran Tupakula, Vijay Varadharajan, Preeti Mishra:
Securing SDN controller and switches from attacks. 77-91 - Rui Wang, Min Lv, Zhiyong Wu, Yongkun Li, Yinlong Xu:
Fast graph centrality computation via sampling: a case study of influence maximisation over OSNs. 92-101 - Qi Liu, Min Lu, Xiaodong Liu, Nigel Linge:
Non-intrusive load monitoring and its challenges in a NILM system framework. 102-111 - Libin Xu, Pin Wan, Yonghua Wang, Ting Liang:
A similarity algorithm based on hamming distance used to detect malicious users in cooperative spectrum sensing. 112-119
Volume 14, Number 2, 2019
- Zhiguo Qu, Huangxing He, Wenjie Liu, Song-Ya Ma:
A self-adaptive quantum steganography algorithm based on QLSb modification in watermarked quantum image. 121-129 - Xiaolin Yang, Zhigang Zhang, Yilin Wang, Cheqing Jin:
Distributed continuous KNN query over moving objects. 130-138 - Aiguo Chen, Xuemei Li, Guoming Lu, Guangchun Luo:
A cross-layer QoS model for space DTN. 139-146 - Yubiao Wang, Junhao Wen, Wei Zhou:
A trust-based evaluation model for data privacy protection in cloud computing. 147-156 - Leyi Shi, Yuwen Cui, Xu Han, Honglong Chen, Deli Liu:
Mimicry honeypot: an evolutionary decoy system. 157-164 - M. Graham Lopez, Wayne Joubert, Verónica G. Vergara Larrea, Oscar R. Hernandez, Azzam Haidar, Stanimire Tomov, Jack J. Dongarra:
Evaluation of directive-based performance portable programming models. 165-182 - Jianhong Zhang, Hongxin Meng:
Genuine and secure public auditing for the outsourced data in cloud. 183-196 - Ioannis K. Marmorkos, Costas C. Constantinou:
Distributed admission control algorithm for random access wireless networks in the presence of hidden terminals. 197-207 - Zhen Chen, Limin Shen, Dianlong You, Huihui Jia, Chuan Ma, Feng Li:
Modelling geographical effect of user neighbourhood on collaborative web service QoS prediction. 208-218 - Xiaohui Yang, Wenqing Ding:
Researches on data encryption scheme based on CP-ASBE of cloud storage. 219-228 - Xiaohong Zhang, Jianji Ren, Zhizhong Liu, Zong-pu Jia:
Deferred virtual machine migration. 229-236 - Chia-Wei Tseng, Po-Hao Lai, Bo-Sheng Huang, Li-Der Chou, Meng-Chiou Wu:
NFV deployment strategies in SDN network. 237-248
Volume 14, Number 3, 2019
- Ying Huang, Yezhen Luo, Honghui Lai, Yiwang Huang:
A new localisation strategy with wireless sensor networks for tunnel space model. 249-256 - Li Tan, Chaoyu Yang, Minghua Yang, Xiaojiang Tang:
Path self-deployment algorithm of three-dimensional space in directional sensor networks. 257-264 - Baowei Wang, Qun Ding, Xiaodu Gu:
A secure reversible chaining watermark scheme with hidden group delimiter for WSNs. 265-273 - Kangshun Li, Weiguang Chen, Ying Huang, Shuling Yang:
A new segmentation algorithm based on evolutionary algorithm and bag of words model. 274-283 - Xianglin Wei, Qin Sun:
A jamming detection method for multi-hop wireless networks based on association graph. 284-293 - Hua Ma, Linchao Zhang, Zhenhua Liu, Enting Dong:
Secure deduplication of encrypted data in online and offline environments. 294-303 - Lei Wu, Longshu Li, Xuejun Li, Futian Wang, Yun Yang:
An efficient temporal verification algorithm for intersectant constraints in scientific workflow. 304-314 - Wei Zhong, Yi Zhuang, Jian Sun, Jingjing Gu:
Load forecasting for cloud computing based on wavelet support vector machine. 315-324 - Yongjun Ren, Wenyue Ma, Xiaohua Wang:
A new method of text information hiding based on open channel. 325-332 - Yan Mu, Zhili Zhou:
Visual vocabulary tree-based partial-duplicate image retrieval for coverless image steganography. 333-341 - Ping He, Shuli Luan:
Efficient algorithm for online data retrieval with one antenna in wireless networks. 342-355 - Heng Zhang, Bin Zhuang:
An efficient 3D point clouds covariance descriptor for object classification with mismatching correction algorithm. 356-364 - Yassir Samadi, Mostapha Zbakh, Claude Tadonki:
Graph-based model and algorithm for minimising big data movement in a cloud environment. 365-375 - Yanli Liu, Mengyu Zhu:
Processed RGB-D SLAM based on HOG-Man algorithm. 376-384 - Haoxuan Li, Hui Huang, Shichong Tan, Ning Zhang, Xiaotong Fu, Xiaoling Tao:
A new revocable reputation evaluation system based on blockchain. 385-396
Volume 14, Number 4, 2019
- Yanli Liu, Mengyu Zhu:
Telecom customer clustering via glowworm swarm optimisation algorithm. 397-404 - Prema Soundararajan, R. Jehadeesan, B. K. Panigrahi:
A comparative study on automatic parallelisation tools and methods to improve their usage. 405-415 - Mingzhong Wang:
FollowMe: a mobile crowd sensing platform for spatial-temporal data sharing. 416-424 - Xiao Lin, Haizhou Du, Shenshen Chen:
A novel graph compression algorithm for data-intensive scientific networks. 425-434 - Qi Liu, Zhen Wang, Xiaodong Liu, Nigel Linge:
Outlier detection of time series with a novel hybrid method in cloud computing. 435-443 - Mourad Amad, Djamil Aïssani, Razika Bouiche, Nouria Madi:
A priority-based queuing system for P2P-SIP call communications control. 444-452 - Mokhtar A. Alworafi, Atyaf Dhari, Sheren A. El-Booz, Suresha Mallappa:
Budget-aware task scheduling technique for efficient management of cloud resources. 453-465 - Yajie Sun, Feihong Gu, Sai Ji:
Sparse reconstruction of piezoelectric signal for phased array structural health monitoring. 466-472 - Dharmaraj R. Patil, Jayantrao Bhaurao Patil:
Malicious web pages detection using feature selection techniques and machine learning. 473-488
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.